California somewhere.
Jamie is a technical soldiers, as well network technology, has been entrusted with superior "responsibility", responsible for network construction squadron computer room, while he still has a part-time duty, a military community network administrator.
He was satisfied with his work, gotta say, this is the United States were poor, because he has a lot of time to do their own thing, and the interest in work and their counterparts, so much work, as it is to enjoy .
After several years of study, his network technology has been greatly improved, and now he has become the most mysterious career American youth worship - a member of hackers.
He is responsible for the server that is independent of the community, which only this one program. In this regard, Jamie deep waste, that did not make good use of the maximum value of the server, so the addition of this server resources a little bit out of it for the normal operation of the community, almost as his private property. To make this server truly impregnable, he often invited friends to help a hacker had "friendship test" can be said that almost all marked marked the patch, make up all known vulnerabilities. This is the challenge of his own again, is also responsible for the work. After all, if the server is responsible for their own people to the invasion, his technical authority and honor will be seriously questioned by everyone.
Server is running almost two years, which two years did a lot of peers to play this server idea. However, that Jamie is proud of attack or invasion of these have failed, succeeded in blocking their own pace, and even a few times, he still had fight back, according to their left, "footprints", a harsh lesson The so-called hackers who do not know kid.
Over time, Jamie can be a small circle in the hacker known, suffered losses in his hands and give him a nickname taken, called the "Iron Mask Shura", quite blame him too much of the meaning of new people start. But Jamie does not have meaning, on the contrary, he was kinda like the nickname that this is a symbol of strength.
Today, Jamie has been transformed dirty, carefully dressed, as a handsome gentleman, as to a Sally about his success. Sally is a beautiful girl, are met Jamie users on the network. Poor Jamie, usually the time spent on the computer all the above, the door is not no second door step, and did not have time to get to know the girls. Finally met a beautiful woman on the network, after Jamie's worked hard, the other party had finally agreed to meet him.
Jamie mirror loosened some tight tie, humming a song very charm of rural America, started before he left last thing - a routine check on the server.
As Jamie's servers are often subject to peer "warm" care, Jamie checks the server every day has become a habit, and the time variable, sometimes boring, day to check a forty-five times. It is this good practice to ensure the normal operation of the server a long time to thwart a lot of ideas to hit the server peer.
Jamie first system to see a bit suspicious of the process there.
"Thank God, did not find annoying flies." Usual Jamie hit the server does not resent the idea of someone else, perhaps even expected, but now Jamie has marriage is to be done, he prayed to God, I hope this time no do not open eyes monkeys to make trouble, or be sure to let him have it.
However, God seemed to nap at this time, and did not hear Jamie's prayer. Because experienced Jamie found a trace of an exception in the system. By looking at the WWW logs, he found within a few minutes to log a problem.
Although the intruder modified the logs, removing traces of his invasion, and even the format of the log, the log records falsified, but the seasoned Jamie still found them unusual.
"He is a bad guy!" Jamie said to himself.
Log file is recorded in a computer system or software operation of various services of the log file. It is like the bank's surveillance video, what happens in the system in the form of text are clearly recorded.
Hacking system, also in the log file to leave their footprints, as "a certain time and certain points of a second IP of the user to download a certain file ... ..." form. Of course, the record format may vary somewhat.
Clean their own invasion "footprint" is also a very high artistic skill. Intruder must not only exist in the system log file which is very clear, have to pay attention to many other things.
Rookie generally do not know how to wipe your ass clean and, even if he has this awareness, are often not clean, after all, exist in the system to know how many hidden log file for a rookie is not an easy task, Moreover, many people do not have such awareness.
Little skilled, able to find the number and distribution of the log, but they are often the practice is to clear the logs or records of the invasion of their local delete - however, this is off the Xiasheng. As long as the administrator know how to view the log file, you can easily find their machines compromised by others, unless he is a fool.
The highest state is not only clean "footprint", but also to forge the "footprint", so that the log record is consistent in time, is also required in the content looks very real, which requires the intruder must log files The format is very research. Because log files are usually large amount of information inside the log to find a suspicious log record is too much trouble, let alone to spend effort to identify the authenticity of records.
Jamie still found the reason why is because he saw a user has downloaded the image file server, from a certain point on, the IP logging is the actions of the user. Jamie looked and found that users have downloaded more than two consecutive hours, over two hundred images to be downloaded. Jamie saw immediately that strange, since your server does not provide a one-time download so many files, even if the forum registered user to use the mouse to save the image can only save one by one, so Jamie learned about the problem immediately the.
According to the log file, Jamie view downloadable images of each other and found that most of these pictures seems to be satellite photos, and then based on these photos, he found a picture where the post, after some reading, he finally know that these pictures may be legends The "Aurora" masterpiece.
"Damn!" Jamie swore and quickly will make a bold prediction that the guy's Huitie to shut off, because his guess if there are no errors, then he may inadvertently leaking state secrets.
Jamie has been completely forgotten Sally's appointment, he tugged at a red tie, the brain high-speed spin.
"Why invaders interested in these photos?"
"Is the purpose of the invasion or accidental?"
"'Aurora' really exist?"
... ... ... ...
Jamie while thinking, while continuing to look further logging, and finally download the records in those pictures before the two minutes that time forged logs.
"Damn!"
Jamie vaguely aware of the seriousness of the invasion, which may be related to foreign espionage, as a rule, they should be immediately reported, but Jamie angry challenge to his authority, he decided to hand him a lecture of this intruder.
No comments:
Post a Comment