Look at their conversation, Bin items are a bit funny, but also some kind, after all he had also had this experience, that is when the young and fit, really miss ah! Punched a big yawn, the decision whether the two items Bin little guy, and he felt as if the body has reached its limit. But this time, a term once again comes h1 attracted his attention - botnets.
What is this botnet? Item Bin naturally know the English name is BotNet, so it was a direct call "Porter net." In English, Bot is a robot means, so translated as "network robots" also makes sense, anyway, the kind only the computer being controlled.
Botnet is centralized control of the Internet by a group of computer hackers, yes, a group, formed a small group of computer network, is often used by hackers to launch a large-scale attacks, such as distributed denial of service attack (DDos ), sending a flood of spam, since these computers have been mastered in the same hands of hackers, will make that possible, and powerful. Way to control the bots is the IRC channel mentioned earlier, the owner of the botnet IRC channels as long as a control, then the command in the channel, all the bots will receive the command, and then at the same action.
Will BotNet is translated into the image of a botnet, is with Chinese characteristics, these computers like the zombies of folklore as being "Vampire Man" with "special methods" control, you can order them to do anything. Whether the safe operation of the network or data security protection for the user (zombie computer hackers free access to all the information), botnets have a hidden threat in the eyes, it is also particularly concerned by the public, not only the security community, hacker community as well.
In the eyes of those who just hackers, botnets is nothing short of Magic's Mo Gong, murderous, dog in the manger, great harm, would seriously interfere with users of the network life. However, Bin items are not just hackers, not Internet police, but not stuffy, he is accustomed to seeing such things do not blame. However, they talk about has caused great interest in the items Bin, so he decided to continue to monitor and continue to view their chat, hoping to find some useful information.
Monday, February 28, 2011
Sunday, February 27, 2011
Chapter 02 botnets (2)
This "owed" Bin item often do, I believe this is all the hackers of the "advantages." Security patches to fight someone else's system, which is eccentric hackers, many people find it difficult to understand. In fact, motive is very simple, after all he finally break through the fortress, to develop into their own chickens [Note: hackers will be that they have control of the computer called the chicken], certainly does not want other people are getting into the hand, so they Other possible invasion of the road all to you blocked, leaving only their own unique back door, after the intruder is only one person can come. Selfishness is human nature, hackers are people too, so no exception. So-called "friendship test" is nothing but some people used to earn the means of the eye fills entry Bin scoff at this practice has been. In real life, hypocrisy no problem, not a large watermelon on the network are so hypocritical!
After some repair each other, items left behind a few relatively low-level bin vulnerabilities are patched, and there are several relatively low-level, he is not found, from his way, items can be inferred Bin is not how the other's technology wise, appears to be a novice, just happen to know of this vulnerability, but also happen to find yourself this "chicken."
It seems to stop here today. Bin items such inference, according to his temper, he is not taking even a short time the machine as short as two to three months may be more than 2012 long.
But this time they inferred the wrong key bin, he found this little guy interest unabated, even running on the server from IRCbot come. This program is able to control the IRC channel. IRC channel is equivalent to a chat room, of course, it features not only chat room that simple. Then, set up an IRC channel, Bin items found another intruder into your system, and they two were chatting in the channel to.
Ho! These two guys quite relaxed! Item Bin felt some heavy eyelids, but he still insists that he is really interested in their chats.
Initially, the two men (for the time being to call with h1 and h2) to discuss the establishment of a program structure and share the attack potential targets of attack used to attack programs, both with the English, the content from their point of view, h2 is completely a novice, as are the h1 to say, not so much in the discussion, as it is teaching h1 h2. H1 to h2 and then brag about how much has been denial of service attack server, how many chickens there. h2 will have to show him, then began Yongxiang Bin h1 this server to denial of service attack others, but long term Bin restrictions made on the system design when the items Bin honeypot put this issue into account, and all From here out of the attack will be blocked off. Thus, h1 h2 before they lost in the face, but he used his chickens save face, much to show off a lot, can be seen from the conversation, h2 still worship him. Then they began to share the chicken, stealing the account number and the porn sites resources. Bin items are not interested in these natural, never missing his chickens.
After some repair each other, items left behind a few relatively low-level bin vulnerabilities are patched, and there are several relatively low-level, he is not found, from his way, items can be inferred Bin is not how the other's technology wise, appears to be a novice, just happen to know of this vulnerability, but also happen to find yourself this "chicken."
It seems to stop here today. Bin items such inference, according to his temper, he is not taking even a short time the machine as short as two to three months may be more than 2012 long.
But this time they inferred the wrong key bin, he found this little guy interest unabated, even running on the server from IRCbot come. This program is able to control the IRC channel. IRC channel is equivalent to a chat room, of course, it features not only chat room that simple. Then, set up an IRC channel, Bin items found another intruder into your system, and they two were chatting in the channel to.
Ho! These two guys quite relaxed! Item Bin felt some heavy eyelids, but he still insists that he is really interested in their chats.
Initially, the two men (for the time being to call with h1 and h2) to discuss the establishment of a program structure and share the attack potential targets of attack used to attack programs, both with the English, the content from their point of view, h2 is completely a novice, as are the h1 to say, not so much in the discussion, as it is teaching h1 h2. H1 to h2 and then brag about how much has been denial of service attack server, how many chickens there. h2 will have to show him, then began Yongxiang Bin h1 this server to denial of service attack others, but long term Bin restrictions made on the system design when the items Bin honeypot put this issue into account, and all From here out of the attack will be blocked off. Thus, h1 h2 before they lost in the face, but he used his chickens save face, much to show off a lot, can be seen from the conversation, h2 still worship him. Then they began to share the chicken, stealing the account number and the porn sites resources. Bin items are not interested in these natural, never missing his chickens.
Saturday, February 26, 2011
Volume I Chapter 02 botnets(1)
Item Bin see each other using remote overflow vulnerability that adds two system user accounts: r and rt, so that you can come up tel. Item Bin clearly see each other to create a second account in the wrong when a command, may be due to too excited. The two account password is abcdef, intruder records all keystrokes are recorded. Now, the intruder already has the system account, then he can always come in with these two accounts tel.
Then, the other in the system creates a hidden directory, and then he began to download the tools from other systems package to this directory, spent a little time to transfer files, download the toolkit was successfully down items found his tools Bin package is not big, a little more than four trillion. Install the kit, he only execute a file, it is a simple script file to the batch system as windows (extension. Bat) files, can automatically perform many commands.
Ha ha! Item Bin smile, it seems that the other party is not a passer, but plan to this server as a base for his long-term use. Item Bin sneer to see you have the ability of the.
Kit installed, the intruder began to clean up the log file, and his invasion and installation of related behaviors toolkit will be recorded in the log file, so in order to avoid getting caught, this step is certainly unavoidable.
Cleaned up log files, the placement of the system of his own back door, he casually browse it in the system, along with some changes to the command and some strange moves, while starting a service, while they Kill off the process, item Bin all feel a little strange. But soon, he will understand, the original system, the other in finding other vulnerabilities, Bin items because the other side started to help reinforce the system.
Then, the other in the system creates a hidden directory, and then he began to download the tools from other systems package to this directory, spent a little time to transfer files, download the toolkit was successfully down items found his tools Bin package is not big, a little more than four trillion. Install the kit, he only execute a file, it is a simple script file to the batch system as windows (extension. Bat) files, can automatically perform many commands.
Ha ha! Item Bin smile, it seems that the other party is not a passer, but plan to this server as a base for his long-term use. Item Bin sneer to see you have the ability of the.
Kit installed, the intruder began to clean up the log file, and his invasion and installation of related behaviors toolkit will be recorded in the log file, so in order to avoid getting caught, this step is certainly unavoidable.
Cleaned up log files, the placement of the system of his own back door, he casually browse it in the system, along with some changes to the command and some strange moves, while starting a service, while they Kill off the process, item Bin all feel a little strange. But soon, he will understand, the original system, the other in finding other vulnerabilities, Bin items because the other side started to help reinforce the system.
Friday, February 25, 2011
Volume I Chapter 01 honeypot system (8)
Bin items without any machine of course, safety precautions are not machines, that the machine is relatively low, in his view, because those flaws are real, if you encounter a true master, he can still ignore your monitor and Defense let your machine get on the ground. Xiang-bin inside the machine's flaws are really fake, the general vulnerability hazards are real small, but enough to damage the system's vulnerability is his virtual out through a special process, from the perspective of the invaders, they are real no different, which is why he spent so much time's sake. A honeypot system layout is easy, but to a high quality layout honeypot system is not easy, and a completely high-quality in their own hands honeypot system is even more difficult. Key bin one day or two will get their shows his skill.
Bin items are now very excited, the original sleep gone, his arrangement of the system took so long time (actually it is not only more than twenty hours, as arranged prior to the start he has spent a lot of preparation time) The first fish is hooked now, it is no wonder he was excited. Another image of that argument, his wife, Bin items very, very sexy dress, covered in female hormones are distributed, and now finally attracted the first butterflies waiting for him to peep, he is not excited about it!
Since the brothers to come to the technology that he has been very good. For the kind of technology is still in the "script kiddies" phase of the baby items Bin hackers are not interested in, so he left a loophole has some difficulties, not just any people can come. Say, a server, if the password is not set, thus opening the door gurus Yaobu bother to come in, or one can see that I'm sure there are weird.
This time, items Bin see, that hackers have further action
Bin items are now very excited, the original sleep gone, his arrangement of the system took so long time (actually it is not only more than twenty hours, as arranged prior to the start he has spent a lot of preparation time) The first fish is hooked now, it is no wonder he was excited. Another image of that argument, his wife, Bin items very, very sexy dress, covered in female hormones are distributed, and now finally attracted the first butterflies waiting for him to peep, he is not excited about it!
Since the brothers to come to the technology that he has been very good. For the kind of technology is still in the "script kiddies" phase of the baby items Bin hackers are not interested in, so he left a loophole has some difficulties, not just any people can come. Say, a server, if the password is not set, thus opening the door gurus Yaobu bother to come in, or one can see that I'm sure there are weird.
This time, items Bin see, that hackers have further action
Thursday, February 24, 2011
Volume I Chapter 01 honeypot system (7)
So, China's top hacking it? The answer of course is yes. China's top hackers are hidden among the network. Why? Think a little to know: to become a skilled hacker, definitely need a lot of time, but also regular contact with various operating systems and servers, and network management in this profession just qualify. In general, the more mature the technology you can understand the more you "hack" the true meaning of the term, return to their origin, which is hidden the real hackers are not usually the reason.
Networks such as rivers and lakes, the hacker is a recluse expert, in order to pursue "the ultimate gangster" of them faintly in the city, silence is not known, no helping hand Zeyi, or must be earth-shattering.
Now, especially in China, "hacker" is simply the term has become a dirty word. "So and so a company hacking, extortion n million," "so and so hackers use Trojan to steal huge sums of money" sort of news always hit the newspapers, and gradually we began to jeopardize network security so-called "hacker" aversion , cast aside the emotions. In fact, this is also the news media who are misleading the people credit for what those people are hackers Well, obviously is the hacker (cracker)! Yes, hackers usually have a decent technology, but they have lost the true hacker spirit, fall into the Magic, for their own selfish desires, "banditry", do whatever they want, they do not deserve called hackers! So I hope to see such news usually able to distinguish the time: the hacker is not a hacker. (Note: special crack software technology enthusiasts also called cracker, this does not mean they are hereby noted)
Ado, back to the topic. As a hacker, and only know ourselves, to know yourself! So it took time to study items Bin a bit of this technology, and broke a honeypot to play, maybe the way and learn from others "do not pass the secret," Hey ... ...
Networks such as rivers and lakes, the hacker is a recluse expert, in order to pursue "the ultimate gangster" of them faintly in the city, silence is not known, no helping hand Zeyi, or must be earth-shattering.
Now, especially in China, "hacker" is simply the term has become a dirty word. "So and so a company hacking, extortion n million," "so and so hackers use Trojan to steal huge sums of money" sort of news always hit the newspapers, and gradually we began to jeopardize network security so-called "hacker" aversion , cast aside the emotions. In fact, this is also the news media who are misleading the people credit for what those people are hackers Well, obviously is the hacker (cracker)! Yes, hackers usually have a decent technology, but they have lost the true hacker spirit, fall into the Magic, for their own selfish desires, "banditry", do whatever they want, they do not deserve called hackers! So I hope to see such news usually able to distinguish the time: the hacker is not a hacker. (Note: special crack software technology enthusiasts also called cracker, this does not mean they are hereby noted)
Ado, back to the topic. As a hacker, and only know ourselves, to know yourself! So it took time to study items Bin a bit of this technology, and broke a honeypot to play, maybe the way and learn from others "do not pass the secret," Hey ... ...
Wednesday, February 23, 2011
Volume I Chapter 01 honeypot system (6)
To summarize: honey pot, the English called Honeypot, it is one without any safety precautions, and connect to the network computer, but different from ordinary computer, it runs a variety of internal data logger and special purpose of the "self-exposure program "- to lure gluttonous black bear (off) the hook, natural honey is indispensable. Honeypot is like intelligence gathering system, which deliberately targeted as people, to lure hackers to come to attack. So the attacker after the invasion, you know how he can succeed, keep abreast of the latest for server launch attacks and vulnerabilities. Hackers can also tapping the link between the collection of various tools used by hackers, and master their social networks. It can be said honeypot is a system specifically for the hackers, many hackers have the experience to be played honeypots, including items Bin, it is very uncomfortable feeling, that either he was aware early, his address must be the other track.
Honeypot is a relatively young technology, study abroad, more of this, the domestic research on this very little, so the items get the honey pot Bin spend more time. In real life, Bin item is a small company's network, usually maintaining the company will maintain the network, there's that little site, very relaxed, basically bulletproof, so he usually has more time to dry you like to do, for example, playing someone else's server patches and the like. Of course, this is entirely the obligation, the other does not know his visit.
Hundreds of millions of Chinese Internet users, hackers, and ultimately, naturally, but really is not much of the top hackers, most are just so-called "script kiddies" (to encourage new, key bin usually call them hackers, but does not include those to destroy others for the music systems and data, "hacker"!), they are generally new to hacking the circle, only issued to people using the network of ready-made tools and published the well-known vulnerability to invasion of web server, change to change other people's pages, is holding a little bit high horse around with other people ... ... and there is no kind of laughed at what they mean, young people do, you can understand, after all, Bin items before their generation is so over.
Honeypot is a relatively young technology, study abroad, more of this, the domestic research on this very little, so the items get the honey pot Bin spend more time. In real life, Bin item is a small company's network, usually maintaining the company will maintain the network, there's that little site, very relaxed, basically bulletproof, so he usually has more time to dry you like to do, for example, playing someone else's server patches and the like. Of course, this is entirely the obligation, the other does not know his visit.
Hundreds of millions of Chinese Internet users, hackers, and ultimately, naturally, but really is not much of the top hackers, most are just so-called "script kiddies" (to encourage new, key bin usually call them hackers, but does not include those to destroy others for the music systems and data, "hacker"!), they are generally new to hacking the circle, only issued to people using the network of ready-made tools and published the well-known vulnerability to invasion of web server, change to change other people's pages, is holding a little bit high horse around with other people ... ... and there is no kind of laughed at what they mean, young people do, you can understand, after all, Bin items before their generation is so over.
Tuesday, February 22, 2011
Volume I Chapter 01 honeypot system (5)
Item Bin reason is because they opened the monitor speakers in the spread of the intrusion alarm, indicating a peer is on his wife (the computer) an interest, is to molest her, as a man (hacker), he can not allow No matter!
He entered a few commands, and soon invaded his brothers who know the way the machine: his use of a remote buffer overflow vulnerability that could allow an intruder in the database service through the implementation of overflow to execute code remotely on the target system execute arbitrary commands with root privileges. This vulnerability has long been spread in the circle, and nothing profound, but will use a remote buffer overflow to infiltrate the network, at least show the other side has a little weight.
Way of hacking the ever-changing, hard to detect, Xiang Bin, enter a few commands that you know how? Is he really God? Of course the answer is no. Under normal circumstances no one can be easily able to know each other a few ways the invasion, even if the head of the hacker Kevin •; Nick will not work. As previously mentioned, the diversity of invasive way to determine the items Bin not know each other so quickly to the invasion of way, a ghost that he is to use software vulnerabilities or vulnerabilities come in! Movies leave out the supernatural Guangda hacker, all pretend to understand a number of non-technical director, is completely Bluff, and have no desire to mislead and fool the Guanzhong! So, how is Bin items you know? This is the key bin around the clock efforts of the past two days - in his own arrangement of a high-quality machine honeypot system. Yes, yes, that is, the honeypot.
What is a honey pot, honey pot is it installed? Sense point of view, can indeed be seen as a jar filled with honey. Honeypot, it is first a jar. Jar do? Of course, hold things, but this time something is not installed anything else, but the hackers, ah, is that the uninvited guest. Inside the honey pot refers to the system vulnerabilities, these vulnerabilities are not unknown vulnerabilities, but deliberately left bin items, or a virtual out his application, but in each other's view, this and the real vulnerability is not What is different, the average hacker can not quickly be found. And these vulnerabilities are within the control of bin items, they are well aware of his, because they are deliberately left behind items Bin - Honey!
He entered a few commands, and soon invaded his brothers who know the way the machine: his use of a remote buffer overflow vulnerability that could allow an intruder in the database service through the implementation of overflow to execute code remotely on the target system execute arbitrary commands with root privileges. This vulnerability has long been spread in the circle, and nothing profound, but will use a remote buffer overflow to infiltrate the network, at least show the other side has a little weight.
Way of hacking the ever-changing, hard to detect, Xiang Bin, enter a few commands that you know how? Is he really God? Of course the answer is no. Under normal circumstances no one can be easily able to know each other a few ways the invasion, even if the head of the hacker Kevin •; Nick will not work. As previously mentioned, the diversity of invasive way to determine the items Bin not know each other so quickly to the invasion of way, a ghost that he is to use software vulnerabilities or vulnerabilities come in! Movies leave out the supernatural Guangda hacker, all pretend to understand a number of non-technical director, is completely Bluff, and have no desire to mislead and fool the Guanzhong! So, how is Bin items you know? This is the key bin around the clock efforts of the past two days - in his own arrangement of a high-quality machine honeypot system. Yes, yes, that is, the honeypot.
What is a honey pot, honey pot is it installed? Sense point of view, can indeed be seen as a jar filled with honey. Honeypot, it is first a jar. Jar do? Of course, hold things, but this time something is not installed anything else, but the hackers, ah, is that the uninvited guest. Inside the honey pot refers to the system vulnerabilities, these vulnerabilities are not unknown vulnerabilities, but deliberately left bin items, or a virtual out his application, but in each other's view, this and the real vulnerability is not What is different, the average hacker can not quickly be found. And these vulnerabilities are within the control of bin items, they are well aware of his, because they are deliberately left behind items Bin - Honey!
Sunday, February 20, 2011
Volume I Chapter 01 honeypot system (4)
After watching the news items Bin hearts of some horrifying. Why be afraid? In accordance with the text of the description of the intensity of work that brothers do not seem like he does, you say he can not afraid of you! Think about Bin items are physical condition, his heart slowly sinking, the previous abdominal muscles now become fat, feel more and more obvious physical difference ... ... go on like this, I am sure that sooner or later comes to an end! Item Bin said to himself.
Not previously concerned about this problem, now that we should pay attention to see, items Bin finally realized that his life is stupid overdraft practices. So he decided later to regular exercise, develop physical exercise program on time diet, three meals a day although unrealistic, but the total of the eat two meals a day. Ah, there is attention to rest, after all, the body is the capital of revolution it!
Since the decision, and not lip ah, so the key to shut the browser Bin, and then then turn off the monitor, plan to sleep, good rest. However, this time the sound coming from speakers in turn his back on the computer, open the display.
Not previously concerned about this problem, now that we should pay attention to see, items Bin finally realized that his life is stupid overdraft practices. So he decided later to regular exercise, develop physical exercise program on time diet, three meals a day although unrealistic, but the total of the eat two meals a day. Ah, there is attention to rest, after all, the body is the capital of revolution it!
Since the decision, and not lip ah, so the key to shut the browser Bin, and then then turn off the monitor, plan to sleep, good rest. However, this time the sound coming from speakers in turn his back on the computer, open the display.
Saturday, February 19, 2011
Volume I Chapter 01 honeypot system (3)
Bin item a few random points to open the industry Web site, casual look. There is of course the industry sector and the IT security sector, key bin one is concerned about the contents of the hacking, then there is the IT and the Internet. This time, a news caught his eye: Huawei staff exhausted!
Huawei is a cow of IT companies in order to have a large number of known high-quality R & D personnel, key bin, many brothers and work inside. Exhausted? Is not it? Who is it? No doubt, the title appealed to him, and he points to open this news.
The general content of the news is a just over a year in Huawei's even a worn out man! The paper said that he used to be a top athlete, last year after joining Huawei, Huawei as intense competition, coupled with Huawei unique "mattress culture", he often worked overtime in the company and eventually closed in the development of a moral one ... ... This is Huawei The "mattress culture" Bin item is heard earlier, this is Ren, president of Huawei proposed in an article, in Huawei, almost every developer has a mattress, the volume on the bottom metal cargo containers , below the desk. Lunch break, sleeping on the ground's clothes; overtime at night, full moon does not dormitory to which a mattress, tired, sleep, wake up get up and do it again. A mattress on the equivalent of half a house, Huawei start carrying this mattress gone through the hardships. "Mattress culture" means that Huawei to play to the maximum value of intelligence, it is a symbol of the spirit of Huawei. In fact, this so-called "mattress culture" Huawei is not unique, can be said to exist in almost every IT company, do this trip through the night is normal, since the choice of the industry must have this consciousness. IT people's health problems are becoming increasingly drew attention, do not attach importance not, ah, this is not, and a brother left. Attached to a piece of paper in the following table, which is better known these years IT's "black list": Ericsson China president Jan Malm, Associate Director of Press Center Dayang Wang Jianfeng, Hangzhou CNC, general manager of Du Bin, domain name registration system leading experts, the Chinese channel of the CTO Huang Bolin, NetEase CEO Ted Sun agent, Motorola vice president and chief marketing officer, Gregory - Robert Frost, a former IBM Greater China general manager of government and public utilities ... ... Li Qingping
Huawei is a cow of IT companies in order to have a large number of known high-quality R & D personnel, key bin, many brothers and work inside. Exhausted? Is not it? Who is it? No doubt, the title appealed to him, and he points to open this news.
The general content of the news is a just over a year in Huawei's even a worn out man! The paper said that he used to be a top athlete, last year after joining Huawei, Huawei as intense competition, coupled with Huawei unique "mattress culture", he often worked overtime in the company and eventually closed in the development of a moral one ... ... This is Huawei The "mattress culture" Bin item is heard earlier, this is Ren, president of Huawei proposed in an article, in Huawei, almost every developer has a mattress, the volume on the bottom metal cargo containers , below the desk. Lunch break, sleeping on the ground's clothes; overtime at night, full moon does not dormitory to which a mattress, tired, sleep, wake up get up and do it again. A mattress on the equivalent of half a house, Huawei start carrying this mattress gone through the hardships. "Mattress culture" means that Huawei to play to the maximum value of intelligence, it is a symbol of the spirit of Huawei. In fact, this so-called "mattress culture" Huawei is not unique, can be said to exist in almost every IT company, do this trip through the night is normal, since the choice of the industry must have this consciousness. IT people's health problems are becoming increasingly drew attention, do not attach importance not, ah, this is not, and a brother left. Attached to a piece of paper in the following table, which is better known these years IT's "black list": Ericsson China president Jan Malm, Associate Director of Press Center Dayang Wang Jianfeng, Hangzhou CNC, general manager of Du Bin, domain name registration system leading experts, the Chinese channel of the CTO Huang Bolin, NetEase CEO Ted Sun agent, Motorola vice president and chief marketing officer, Gregory - Robert Frost, a former IBM Greater China general manager of government and public utilities ... ... Li Qingping
Friday, February 18, 2011
Volume I Chapter 01 honeypot system (2)
As a wife, the computer hacker as their continuous struggle can be said to be commonplace, there is nothing fanciful. The years has been such a key Bin rest, and now he has grown used to this life, one sat in front of computers, like eating, like stimulants, the brain is especially active, sleepy, could not sleep.
Bin others slept active in the network entry, while the activities at all he was fast asleep, this is a true portrayal of his life. Although the transliteration of the hackers term, but had to admit was very apt translation of the word - to live in the night creatures.
Bin items originally wanted to bowl of instant noodles sleep, but suddenly found the last to buy instant noodles have been eaten, eat, then have to go to the supermarket to buy, thought for a moment, the hearts of some hesitation, because the supermarket some distance from here, too spend a lot of time, he really did not want to run. Sleep has been hit this time, eyes suddenly became very heavy.
Forget it, I would first go to sleep again, when sleep will not feel hungry. Item Bin finally decided to forbearance and tolerance, something big to sleep now. In fact this is his wishful thinking, intense hunger so that he can not sleep, gradually came a slight abdominal cramps, but do not worry, this is his old trouble, due to irregular eating regularly, and his the stomach has long become fragile, and every hungry would like, as long as forbearance and tolerance, after the hunger too little feeling.
Item Bin persisted in bed, hoping to soon sleep in the past, but this seems very serious hunger, abdominal pain, more and more serious, his forehead has cropped up a few cold sweat. Sleep off his pain, no way, he had to climb up from the bed.
Damn stomach! Not work a little bit hungry! Bin heart cursed items. Well, I surrender. Unable to withstand the stomach's torture, he had to go downstairs to the street to buy a breakfast, a box of instant noodles had wanted Shunpian Dai, but now the supermarket not to open the door and had to run again next trip, it's also a waste of time.
After breakfast, key bin feeling some stomach up, eat a lot of thought is not much point. He touched the bulging belly, I suddenly felt a little sleepy, but also the spirit. So, he will display open, decided to on the Internet.
How to open the display only? Not surprisingly, he has not shut down, exactly, he did not shut down the habit. Yes, Bin items like those large server machine as "over many years" to running. Do not worry about the life of the machine, he's already a server level machine configuration, how can there be so easily broken. So many servers on the network running over many years, which machine you've seen something wrong with you at every turn? Unix / Linux family of operating systems is also very stable, as long as the occasional reboot click on OK. In fact, he has a machine to his personal website, the other is an all brothers to the entry-bin (most of network management, but also hackers, but they do not know the item is the famous Bin BX, only know that term Bin on the server's security configuration is very good at) practiced hand in place.
Bin others slept active in the network entry, while the activities at all he was fast asleep, this is a true portrayal of his life. Although the transliteration of the hackers term, but had to admit was very apt translation of the word - to live in the night creatures.
Bin items originally wanted to bowl of instant noodles sleep, but suddenly found the last to buy instant noodles have been eaten, eat, then have to go to the supermarket to buy, thought for a moment, the hearts of some hesitation, because the supermarket some distance from here, too spend a lot of time, he really did not want to run. Sleep has been hit this time, eyes suddenly became very heavy.
Forget it, I would first go to sleep again, when sleep will not feel hungry. Item Bin finally decided to forbearance and tolerance, something big to sleep now. In fact this is his wishful thinking, intense hunger so that he can not sleep, gradually came a slight abdominal cramps, but do not worry, this is his old trouble, due to irregular eating regularly, and his the stomach has long become fragile, and every hungry would like, as long as forbearance and tolerance, after the hunger too little feeling.
Item Bin persisted in bed, hoping to soon sleep in the past, but this seems very serious hunger, abdominal pain, more and more serious, his forehead has cropped up a few cold sweat. Sleep off his pain, no way, he had to climb up from the bed.
Damn stomach! Not work a little bit hungry! Bin heart cursed items. Well, I surrender. Unable to withstand the stomach's torture, he had to go downstairs to the street to buy a breakfast, a box of instant noodles had wanted Shunpian Dai, but now the supermarket not to open the door and had to run again next trip, it's also a waste of time.
After breakfast, key bin feeling some stomach up, eat a lot of thought is not much point. He touched the bulging belly, I suddenly felt a little sleepy, but also the spirit. So, he will display open, decided to on the Internet.
How to open the display only? Not surprisingly, he has not shut down, exactly, he did not shut down the habit. Yes, Bin items like those large server machine as "over many years" to running. Do not worry about the life of the machine, he's already a server level machine configuration, how can there be so easily broken. So many servers on the network running over many years, which machine you've seen something wrong with you at every turn? Unix / Linux family of operating systems is also very stable, as long as the occasional reboot click on OK. In fact, he has a machine to his personal website, the other is an all brothers to the entry-bin (most of network management, but also hackers, but they do not know the item is the famous Bin BX, only know that term Bin on the server's security configuration is very good at) practiced hand in place.
Thursday, February 17, 2011
Volume I , Chapter 01 honeypot system (1)
Bin looked at the time of entry, it is now five o'clock and more out of the window is slightly off, unknowingly a new day has begun. Some eye irritation, it is no wonder, he has more than forty consecutive hours at a computer before, yes, even to eat (or rather instant noodles) in front of the computer. This is his job, but also his interest, for him, this is not pain, on the contrary, is a treat.
To outsiders, key bin is just a network company's network, usually honest, conscientious, whether anyone else think that this rarely speak with one of the gas refined there was another item bin capacity - a technology of the top sophisticated hackers.
Bin items used on the network ID is simply the name of his first two letters of the alphabet, but not the XB, but the BX. Xiang Bin, as a hacker, natural learn some knowledge of psychology. As you select a name for himself, though only their own virtual nickname on the network, but often still leave a personal stamp, as someone who can from a person's handwriting and deduce its character as a person's online ID can also be revealed some information, or personality, or family, or the ideal aspirations and so on.
Hackers are not the sun's career, so in order to avoid trouble, Bin items are not give themselves a certain sense ID, just take two letters and is in turn the two letters, from the theory of probability, 99% of the people He will be the ID and not linked.
Hacker circles in the country, BX is one of the most mysterious hacker, in the circle also by a very high position. BX The ID is a well-known foreign hacker leak out, items previously participated in a bin, a hacker and groups abroad, that name is used, then the thing fell out, also pulled out of the item Bin organization Overseas hackers know that BX is Chinese, the other knew nothing. As the level of organization that hacking is one of the best in the international arena, and BX is a core member of that organization, so although others did not find anything earth-shattering BX things done, but the name BX was passed up in the circle, After all, the strength of that organization is placed there.
To outsiders, key bin is just a network company's network, usually honest, conscientious, whether anyone else think that this rarely speak with one of the gas refined there was another item bin capacity - a technology of the top sophisticated hackers.
Bin items used on the network ID is simply the name of his first two letters of the alphabet, but not the XB, but the BX. Xiang Bin, as a hacker, natural learn some knowledge of psychology. As you select a name for himself, though only their own virtual nickname on the network, but often still leave a personal stamp, as someone who can from a person's handwriting and deduce its character as a person's online ID can also be revealed some information, or personality, or family, or the ideal aspirations and so on.
Hackers are not the sun's career, so in order to avoid trouble, Bin items are not give themselves a certain sense ID, just take two letters and is in turn the two letters, from the theory of probability, 99% of the people He will be the ID and not linked.
Hacker circles in the country, BX is one of the most mysterious hacker, in the circle also by a very high position. BX The ID is a well-known foreign hacker leak out, items previously participated in a bin, a hacker and groups abroad, that name is used, then the thing fell out, also pulled out of the item Bin organization Overseas hackers know that BX is Chinese, the other knew nothing. As the level of organization that hacking is one of the best in the international arena, and BX is a core member of that organization, so although others did not find anything earth-shattering BX things done, but the name BX was passed up in the circle, After all, the strength of that organization is placed there.
Wednesday, February 16, 2011
Hacker legend
"Hacker legend "Introduction: This is a reincarnation story. In 2006, a hidden network of him in ordinary super-hacker key bin, pay attention to his bodies are no too, resulting in serious bodily functions failure, in a contest and foreign hackers have been several days and nights without a break, he finally hung out. Results are God mercy, let him reborn and in 1996 upon the body of a junior high school students Xu Yi, fusion occurred between the memory, producing a new boy ... ... . In 1996, China has just started the era of the Internet In 1996, hackers in China's burgeoning . Past, key bin will be dedicated his life career in Hackers, and even the taste of first love never paid off; life, still love the hackers Xu Yi will do? Between mature and immature between how he will deal with your feelings? Fall in love with a greater than themselves, the 10-year-old woman, what kind of obstacles he will face? . His arrival, the trajectory of history, what will happen deflection? His arrival, the Chinese Internet dramatic changes which will occur? His arrival will be much impact to the Chinese hackers?
Subscribe to:
Posts (Atom)