War for Chinese hackers (first "hacker X file")

zhaozj2021-02-08  301

(People like this document to contribute to the cause of China's network security) Author: Miao Deyu

On the way of China's Internet growth, there are many things we must mention, there are too many things we must remember. After reviewing the history, we have been confused, we have had brilliant and ideals, and they also have experienced a confusion and helplessness. When my friends in the security community, when we plan this topic, we opened the history of China's Internet. In this heavy book, we strive to find the development history of Chinese hackers and safety undertakings, find that Segment belongs to the history of Chinese hackers ...

Memato 1994: The origin of Chinese hackers (1994-1996)

That time was the Chinese Internet in the middle of the year, that is, in this year, the gate of China's Internet is finally open to the public. But in that era, the computer is still a very extravagant electronic product, and the Internet is a strange noun for the public, and we can only find nouns related to the network in the professional books, and those online Most of the groups are scientific research personnel and young knowledge (that time the small capital has not yet proposed). The biggest fun of all local computers is the Copy Software products such as small games and DOS, and piracy is still a strange noun for us. For the majority of computer users, COPY is a generic communication method. So the earliest hacker or "thief" was born in that era. At that time, we didn't have much ideal and rhetoric, a new small software is almost our computer's life and understanding, and for these whiskers, the latest products that COPY to abroad are their greatest honors, that one The small floppy disk in Zhang carries the initial dream of Chinese hackers. It is also from that period, and many of the people we are now familiar with us now lead the wave of China's software and the development of the Internet industry.

In that China's most harsh year, most players operate more than 9600 BITS / S is also small cats, Mercedes on the most original network. That's not what we now in a traditional sense, but the most primary BBS station, a way to rely on the telephone number directly connected to the BBS server to communicate. The most of them is China Hui Dynasty, not the Internet. Football and software addicts to be the hottest topic, and the exchange of registration code has made many people. More BBS-way servers appear in major cities across the country, the exchange crack of software has become the most popular topic, and one set of Linux can sell 1200 yuan. The players in that era have now become a champion of the Internet. Some names we have to mention: Zhou Zhi Nong - Natural code inventors, creating a nature BBS station. Pony MA - President of Tengxun, China Hui Detong's first batch of netizens. Seeking the President of Jinshan Company, creating a West Line and West Point BBS Station. Roy Luo, Zhongdong (Dr.arab), Pander, ... These people are familiar with or less familiar, in that age, in their unique way to make a special dream of Chinese network people, and their Involves the prototype of China's first-generation hackers - thief.

Time turned into 1996, in the annual class of China netizens, the per capita of contact with the network before the 1996 is called China's first generation of netizens, maybe some people have never been exposed to the Internet, the most contact is also the most. The Phone connected to the BBS, but they still be worthy of China's first generation of netizens. During this period of 1995-1996, the Internet information port of China's large and medium-sized cities founded the scale. The first generation of network management of China International Internet was born. China's first generation of public netizens also began to go out of BBS, and integrated into this More vast Tiandi. The two years is the initial growth period of China's Internet, and it is also a period in which the Chinese software industry began to flourish. In the calm year, Chinese network people do their own dreams in their own way. Many of these people have been exposed to early BBS, in their opinion, from BBS immigration Internet only, but expand their stage. Let your eyes look more. The activities they initially conducted on BBS have also migrated to the more vast space of Internet. During this period, a group of legendary characters have also been born in this period. The most famous is the most famous, his personal homepage is mainly based on the crack software and the registration code. The software is extremely During the lack of period, he created the legendary history of China's personal web access. Of course, in that stage, in addition to the stealing, the telephone flying passengers have also appeared in China, but due to the emergence of the program-controlled switch, flying passengers have become history. At the end of 1996, China Telecom began to implement preferential Internet policies. After that, the Chinese network began to truly enter the pace of the family. Memato 1997: China Hacker's Growth (1997-1999)

In 1997, the history of Internet development should be the most memorable year, and during the growth of Chinese hackers, there was also a large number of primary hackers. The name of the Internet was also accepted by the public, new ideas, new The concept has gradually reflected from the network. In the early 1997, only 7 Simplified Chinese webpages related to hackers were also searched in the Yahoo search engine. And the content of the website is translated or repeated the content of the same web page, there is no practical meaning. However, the term "hacker" has begun to formally deeply in-depth netizen. At that time, the highest technology of primary hackers was just using the email bomb, and most of them were foreign tools, and there is no such hacker weapon. Your spirit leader. There is a spiritual leader with a spiritual leader in that time. Kevin Mitnick, the world's number one hacker. The legendary figure does not only lead the thoughts of American hackers and affect the direction of Chinese primary hackers advancement and exploration.

In 1998, when we started vigorous development of Internet Greater Jumping activities, in the United States, the one-year hacker conference, published a "BACK OrIfor" hacker group in the United States. Hacker software, and release the source code together. This software set off a global computer network security issue and promoted the rapid development of "Trojan Ma". After BO announced, through the new Internet quickly passed to China, many netizens were the first love for hacker career using this software. But Bo did not set off in China. Of course, factors are a variety of factors, such as the network is still in development, BO is an emblem that is not convenient for Chinese netizens. But the other main reason for BO has no brilliance is the birth and massive attack of CIH viruses. In this history, the first virus brought hundreds of millions of losses to the Chinese economy with the main attack target for the main attack target.

1998 Brought too much amazing, fear, ideal and power for Chinese hackers who were still in development. Soon after BO, the Chinese hacker's own Trojan horse was also born. This is the network spy Netspy. But Netspy's birth did not bring too much vibration to the development of Chinese hackers, all of which make CIH's rays cover. In the subsequent days, Xie Chaoxia, PP (Pengquan), Tianxing (Chen Weishan), etc., starts to reveal the head corner, and a small amount of domestic tools began to be small between Chinese hackers. When everyone is busy with the anti-virus, a international incident has set off the first wave of Chinese hackers. From January to August 1998, a large-scale massacre, rape, and indigenous Chinese essay occurred in Indonesia. Many Chinese women are killed by barbaric rape. The Chinese supermarket is robbed, and many of the Indonesian anti-China who lost humanity will also send a lot of the picture of the Chinese people to the Internet. This series of behaviors angered Chinese hackers who have just learned to walk, they do not have to gather in the IRC chat room, and send spam to the Metail of the Indonesian government website with eight to six people. Use ping to attack Indonesian website. These now seem that a naive attack method has created the initial unity and strong spirit of Chinese hackers, and the formation of the formation of the lame China's Hongke. In order to call more people to join the battle, there are several technical hackers lead to form the "China Hacker Emergency Convention Center" responsible for coordination work during the Attack of Indonesia. Indonesian emotions have created a large number of netizens who have been involved in the hacker. Some people returned to real life after the attack. Some people have begun to pursue the ideal pursuit of hackers. The same event also enabled the "Green Corps" the name of the hacker organization, the name of China's Internet, and concurrently "Zhonglian Green Alliance".

After the vigorous Indonesian emotional incident, Chinese hackers seem to return to calm, continue to focus on ideal pursuit and exploration, UNIX, Linux, HTTP, FTP and other network technical issues and hackers have become the main topics of Chinese hackers, weak Court against Chinese hackers began new reflection, they also motivate them to fight the fighting spirit. They have a hunger-speaking intake technology nutrients, and the hacker technical website has gradually increased, and the new hacker technology masters have emerged again. The most representative of this period. Sexual technical hacker is a developer of a hacker software such as a glow, a snow, a knife, and a small fence. In the next day, Xiaoxiao's pursuit of his ideals, so that these excellent software such as stream is upgraded again and again. Improve the stage of world excellent hacker software.

In 1999, China's Internet users had increased, creating the fastest growing level in the same period, but that year became an unforgettable year of every Chinese and Chinese hackers, this year's history of hackers in China It is never wiped. The NATO-based NATO in the year was launched a war with various excuses, and the Chinese people launched a strong support for justice in various media. The Internet has set off a US hegemony. Critique of theism. However, in May, the US bomber slammed my embassy in the South of China. Once the news came out, the country was shocked and anger, and the students in all colleges and universities in the country were more indignant. Shuimu Tsinghua and other major website forums have reached the highest peak of history.

In the early days of the war, Chinese hackers' actions were only limited to the people of the South Practitioner, and did not take too much overcharge. However, when I was in the south of the Embassy in the South Affairs, the Chinese hacker had another large-scale unity, and the attack on the US website has carried out an attack on the US website. It has been a rapid abandoned American hacker spirit, and China's hackers have no spiritual leaders in their minds, and some are just anger. The next day after the Chinese embassy was blown up, the first China's Hongke website was born, and it also created a new hacker branch - Hui. After reading the news at noon, China's Hongke website, he finished this website in half an hour, and preliminarily named "The Motherland of China 's Motherland" (the next July was renamed as China's Hongke The ancestor's unified front of the motherland is dominated by the guidance of the patriotic red passenger, and there is no lancing in the website declaration, and quoted Mao Zedong Youth: "The country is our country, the people are our people, we don't shout Who shouted? Who did we do anyone? "Extremely burning. The website has reached more than 500,000 in just a few days, and there is a news link in Sina.com, China's Hongke has become a special group in the world hacker, patriotic and solidarity is their eternal spiritual concept. In the hacking war, the Chinese people's first united, many US websites were attacked, and large-scale spam also made the US mail server fails, this great wage war has achieved comprehensive victory. Soon after all returned, in July, Li Teng, Taiwan suddenly threw two national theories, and the stations of the Taiwan Straits were tense. Chinese hackers rely on experience summed up from the US network counterattack, and quickly attacked the Taiwan Executive Institute and other websites, and the Trojan program for many Taiwan servers, leading to many websites of the website of the Taiwan alone for a long time. It is worth mentioning that the installed Trojan was first changed from the US BO to the "Ice" and NetSpy of Chinese hackers. And the Trojan Ice also became the most favorite Trojan program for Chinese hackers.

The Trojan Hihe is a software that must be mentioned in the history of Chinese hackers. It is written by China Security Programmer Huang Xin. Huang Xin did not take into account it as a Trojan horse when the initial version of this software was originally developed, but then the ice is crazy. In the hands of the hacker, many users are controlled by the ice river unconsciously. Early ice river is still a good Trojan software, and then Huang Xin uses a lot of time to reconstruct the Ice Code, and the Ice River 2.2 is born. The new version of the ice river is quickly circulating, and a large number of primary hackers have entered the hacker's door. The development of Chinese hackers has moved to new era. After again, there are many excellent domestic hackers, XSAN, YAI, etc., and hackers have also begun to have a commercial indication, from the former "Green Corps". The "Zhonglian Green Alliance" network security company formed by members was established. It officially began the footsteps of the hacker to commercialize, and Chinese hackers gradually grew up.

Tour 2003: Imperial Desire (2000-2002)

In 2000, it became the most brilliant year in China. Internet cafes were also flocked to all over the country. The people on the Internet increased more than doubled. For a time, "Are you online?" Became a popular greeting. At the same time, China's hacker team is also rapidly expanding. Many hacking tools and software make the threshold that enters hackers greatly reduced, hackers are no longer the name of the network master, many hackers are likely to be a stick in a mouth. Sugar hand flips the children of primary school textbooks. It is precisely because of this situation, Chinese hackers begin to messy.

At the beginning of 2000, the loss of the "Dong Shilang Nanjing Massacre" incident once again aroused some hacking nationalist emotions, and some domestic hackers launched an attack on Japanese websites and attacked some Taiwan websites. Because there is not much sensational force, there is no more influence, but it is worth noting that many domestic hackers have been born in the rain. In addition, in this year, a new concept "Blue Check" was also raised. At this time, domestic hackers are basically divided into three types, one is a hacker who is represented by China's Hongke, a hacker with political color and patriotism. Another is representative of Blue passengers, they are passionate about pure Internet security technology, and there is a technique for other issues. The last thing is to completely pursue the original spirit of hackers, do not care about politics, and sought after the technology is not crazy. Of course, in this year, the expansion of Chinese hacking groups has led to the emergence of many pseudo-hackers, and in these pseudo-blacks groups, the "hacker attack defense secret" incident is the most prominent incident. The high school student of China's security general plagiarized a large number of hackers and works in China, and then they were published by their own names. This wrong word is only an electronic publication (differently different) brochures in electronic publications (differently different), and the behavior of Chinese pseudo-hackers is pushed to the extreme. Thereafter, many pseudo-blackers who haven't plentiful in the technology have played a farce of a scene, but not only the spirit of Chinese hackers, but also become the most dirty corner of Chinese hacks. After entering the new century, Japan's emotional emotions are increasingly arrogant, Mitsubishi incidents, daily air incidents, textbook incidents and "Taiwan" have angered Chinese hackers. Through several domestic hackers, several large-scale hackers have been organized. Some fool-type hackers have also emerged, and the most famous "Chinese boys" of the most famous lonely swordsman. The reduction in technical thresholds has caused many teen hackers, ready-made tools, ready-made software armed for young people who don't know anything about network technology, but also causes the later young hackers' ignorance and despite.

Since domestic hacking has reached the extent of white heat, various media and small newsmakes have greatly improved the degree of interested in hackers. The security company hopes to be able to seize this opportunity to speculate, Hisense's 8341 firewall challenge global hacker is the most busy play in the time, and took out 500,000 yuan of attractive numbers as an event. The bonus, all topics of all the safety circles are concentrated on the firewall of Hisense. When the hacker master is working hard to break through the firewall, the dramatic scene has occurred, and the website of Hisense is black. The hacker has been ridiculous to Hisense Company, and the test of Hisense has been questioned. But because the hacker attack is not the test website given by Hisense, the 500,000 yuan bonus can't take away, and I will be charged by Hisense. This unusually lively farce is also the pasture of the grass.

On April 1, 2001, after the "Chinese and Croiser Incident" in my country, a "Chinese and Tropical Incident" has taken the first to launch a malicious attack in some websites of my country. Chinese and American hackers have produced some small friction. During the five-legged holiday, many Chinese hackers took up the weapons in their hands, and the large-scale offense was launched to the US website and claimed to have "80,000 people". But afterwards prove that this is just a group of children's graffiti games, and staged a "patriotic show" in the media. Most of the eight thousand people know nothing about the network knowledge, the way used is still a spam and ping a few years ago. In addition, many false information made by PDSHOP have also become this "patriotic show" "The biggest failure." However, due to the hyper action of the hacker, many media have a concern for Chinese hackers, so many people understand this special group on China's Internet.

In the subsequent reflection, Chinese hackers have begun to gradually mature, and many hackers have returned to technology, and there is no hype enthusiary in the media. The discussion and extension of hacking morality and hacker culture also makes Chinese hackers return to natural states and is committed to research on network security technology.

Compared with the current Chinese hacker status, Chinese hackers have not much behavior for commercial crimes, and there are some so-called commercial hacker criminals in newspapers and periodicals. In fact, physical means, rather than network means. Although Chinese hackers in the newspaper are reflected in some extent of patriotic vents, hackers are mostly personal behaviors. If they are not guided, there is a possibility of developing a computer network crime. But objectively, Chinese hackers have played an enlightenment in my country's network security. There is no hacker, there is no network security. At the same time, a group of hackers have changed to network security experts, they discover security vulnerabilities, develop many security technology and security software, and contribute to the development of my country's computer or network. Hand:

This article wrote a paragraph, in just a few days, we reviewed all events and people who influence Chinese hackers since the birth of China's Internet. Some are painful, some are full of passion. But in any case, we all want to see that Chinese hackers will continue to play from the passion of the last century, and continue to be connected with Chinese hackers' sharp thoughts. The names and incidents mentioned in the temperature is only part, many hackers and hackers may be ignored, but their contribution to China's network security undertakings is that we will never forget. Xu Yanyi, Chinese Eagle School, Netcc, Yuan Ge, etc. We can't record one by one, but the development of China's security career is unable to separate.

War for Chinese hacks, let me never have such excitement and trembling. Sincere is not wrong, nothing is not wrong. Time quietly flowing through the years of the bed, one day we will finally be old, and he is still young. Perhaps people don't know how all he left me is full of self-sufficient life ...

When you are white, when you are on the year, you will return to the computer again, go back to the soul to find a lost network, you will clearly discover, under a thick dust The legendary figure will still remain the shock of passion. When you return to the small town that you raise your, you will have the old age, whether you speak the same day like a movie, the same hack of the movie is like a movie. ......

Full text

转载请注明原文地址:https://www.9cbs.com/read-800.html

New Post(0)