View Single Post
Old 10-07-2011, 05:42 PM   #26
obg72dhe8z
Commander In Chief
 
Join Date: Aug 2010
Posts: 1,870
obg72dhe8z is on a distinguished road
Default

The picture shows the Eighth China International Fair of computer network and information security iceberg. Joan / CFP

Lunar New Year, abroad to return home from the day before the wedding, Jiangsu Province, Nanjing Public Security Bureau arrested and brought to justice basaltic branch. It is understood that Song Yanxi now at a university in Singapore, had previously served as research fellow at the Chinese Academy of Sciences, with a PhD degree background.
Song Yanxi after justice, have been pushed to regret it, but different from other criminals, his remorse is the police can arrest him When Song Yanxi in to the police shows how he penetrated the background during the game site, police handling the case pointed out his mistake, he even expressed heartfelt admiration Qiaoqi thumb.
police handling the case told reporters that the process of detection of the case entirely on the network can be called a
energy Ph.D
1979 Song Yanxi born since primary school from a very smart, very top-notch performance. In high school, Song Yanxi by domestic institutions ahead of a top science alone Admission.
before entering university, Song Yanxi to have a strong interest in computer science, and through self-knowledge has accumulated a large number of computer hardware and software. However, the university, the Song Yanxi did not make his love of computer science studies,2 robbers pretend to shoot nude -law allowed polic, but the heat into the profession.
Although the major is not his own favorite, but the Song Yanxi still achieved excellent results. After graduation, Song Yanxi also very successful in Kaoyan way into the Chinese Academy of Sciences to study postgraduate study area is low-temperature superconductivity. Easy to obtain a master's degree with distinction, the Song Yanxi went on to doctoral and professional direction to main energy research, and successfully became a researcher at Chinese Academy of Sciences.
been very confident Song Yanxi, originally has an excellent future, but during 2007, he was unable to withstand the temptation on the network, combined with his own character too, so he completely changed since the life trajectory.
With excellent computer technology, Song Yanxi process in an online game site found in the background of a loophole, and the data obtained by modifying a large number of game points, and soon 10 million profit on the resale.
But soon, Song Yanxi was apprehended by the police in Daqing in Heilongjiang Province. Less serious, and because of all the ill-gotten gains returned,belstaff motorcycle jackets, Song Yanxi only be punished by public security penalties.
because of this incident, Song Yanxi forced to leave the original units. This time the turn of events but did not make Song Yanxi Their actions may have touched the Criminal Code off
.
the police and the hacker put on the network report said, the site's These Meanwhile, the extra money, which leads to the gaming platform of virtual currency depreciation, indirect losses caused to the site of RMB 400 million yuan. Site doubt that their system was hacked.
Nanjing Public Security Bureau Xuanwu Branch of Alarm, the Internet police brigade to carry out investigations promptly.
Internet police brigade's police that: The site must have loopholes in the background, and was discovered and exploited. To find loopholes in the background as long as the website, the hacker will be able to seize the
However, the Internet police to use their expertise, after many days of search is, however, as the webmaster can not find the clue. waste a lot of time and delay detection of progress. They'll adjust the detection of thinking, focusing on the trail of suspects starting from the end to determine the identity of the suspect and arrested him.
Thus, from late November 2010, the network police use their expertise in the virtual online world, and hackers launched a no smoke,belstaff brad jacket,
basaltic branch of the Internet police network in the Nanjing Public Security Bureau in collaboration with the guidance of the police detachment, began tracking the network day and night. For the network, there is no time and space constraints, the suspect may at any time and place of committing the crime. To this end, 24-hour investigation focused their attention on the network is a necessary step.
intrusion traces, it will carry through the line tracking. However, this is clearly different from the past, some hackers
careful analysis of the process of investigation, police found the suspect intentionally set a See so many other tricks to make out, police investigators and Ma Yao Jia Donghai excited.
soon, the police discovered an important clue: the victim site was penetrated during the time, one man, Gu Wei, Hangzhou has been marketing on the network a large number of the site's virtual currency. Attention turned to police investigators immediately Gu Wei, began investigating the source of his virtual currency.
After ten days of follow-up, the police finally locked the victims were invasive site of the Gu Wei Song Yanxi the fence is the people.
January 26 this year, investigators learned that Song Yanxi fly home and go to Mianyang, Sichuan Province. Cooperation with the police in Mianyang, the second implementation of the New Year arrests. Gu Wei Song Yanxi accomplices also were arrested and brought to justice in Hangzhou.
statement, according to Song Yanxi, starting in 2008,1 kg of heroin hidden inside man was intercepted b, he used his computer knowledge, invasive of a gaming site back in Hangzhou,belstaff jackets, to find loopholes in the background and modify the Alipay friends in, and then transferred to the Gu Wei, Gu Wei to the players from the sale, profit from more than 400 million.
police handling the case told reporters that in 2007, Song Yanxi perpetrator was arrested the first time, he has always maintained that the level of his computer, this should not be caught, just because imprudent. If the precision in the planning process to act is entirely possible to track escaped the police. For the next two years time, Song Yanxi indeed hidden by methods, rapid and safe movement, and even the gaming site of the technical staff are not unusual.

hacking the growing tendency of business

It is understood that in this case, despite the repeated invasion of Song Yanxi One reason the site to show off their technology, but it is undeniable that Song Yanxi Web site of the invasion process, there to pursue their interests.
the ability of smaller scale attacks. But now a growing number of attacks started to use illegal controlled by a remote control program the computer to others, access is controlled computer or server information. Daily News As the illegal use of a remote control program for controlling a person's computer or server can also be controlled computer or steal a variety of information on the server, through the use of or sell this information to obtain economic benefits, so now the network has formed a manufacturing Trojan, spread Trojan, steal account information, third-party platform for stolen goods, money laundering, the online division of a clear black chain. This black chain is now quite mature, and toward the organization, scale and open direction. Black all aspects of the industry chain clear division of labor in close convergence,belstaff shop, from the professors how to create malicious programs or code, malicious programs or code of the preparation, production and dissemination, to attack a specific target, to steal user information, from the target blackmail, extortion, the use of third party money laundering, stolen goods, the whole industry chain structure is very complete and all aspects of the industry chain profitable.
Mr Liu said that at present, these - controlled computer Hackers can also be Hackers getting lower and lower the threshold, to pay several hundred dollars of tuition fees, a junior computer operator who will be able to master the handling of the Recently, the pharmaceutical industry and the hackers to attack the games industry is widespread, and even the formation of the Internet companies only pay In addition, many took to the road, but the information itself is relatively weak against the power of SMEs to face attacks,belstaff panther jacket, but also have to pay
According to the National Computer Network Emergency Response Technical Coordination Centre, preliminary statistics for 2009, this black industry chain has more than 238 million yuan in output value, resulting in the loss of more than 7.6 billion.
2010 年 10 December evening, Yunnan Yuxi News Home malicious tampering by unscrupulous elements in the page add thousands of At 22:30 on December 11, 2010 or so, Yuxi News Network home page has been maliciously tampered with, in the home to add thousands of Since then, Yuxi News Network home page almost every day to be tampered with. December 17, 18 days, Yuxi News Network, Yuxi civilization net, Yu Zhi beauty network, research and industrial park sites forced to close. Police received a report after the detachment of Yuxi City Public Security Bureau immediately set up a task force monitoring network to investigate the case. After repeated investigation, a network called January 12 this year, Yuxi police the way to Chongqing, brought the Under questioning, since November 11, 2010 since the suspect Chen Yuxi News together with friends on sites such as the implementation of Trojan viruses, hanging links, illegal profit of 5,000 yuan.
... ...

newspaper correspondent reporter Ding Guofeng Yang Weibin
obg72dhe8z is offline   Reply With Quote

Sponsored Links