This article is a mirror article of machine translation, please click here to jump to the original article.

View: 14432|Reply: 3

[Webmaster Communication] Eight gray areas of the Internet

[Copy link]
Posted on 3/1/2015 11:04:16 PM | | |
Where there are people, there are rivers and lakes, and the world is what you can't imagine. This week's Titanium Media [Weekly Planning], watching Titanium Media author Chengzhe summarized the eight gray areas of the Internet rivers and lakes, including: pornography and policy edge ball SP; CPA without integrity; CPS advertising for pornography, gambling, and pyramid schemes; bidding and SEO; fraud; hackers; brush brush; virus invasion and so on.
1. Service Provider is referred to as SP

Explanation: The direct provider of mobile Internet service content application services, often referred to as telecommunications value-added service providers, is responsible for developing and providing services suitable for mobile phone users according to user requirements.

Scenario: SP saved several major portals as a mobile business (Sohu, Tencent, NetEase, and Sina relied on them for the winter), so how did speculators use SP to make money back then? It's easy to use! I just learned to surf the Internet in 2002 and came into contact with such services. At that time, it was like this, relying on a picture of a beautiful woman to seduce you, and then saying that you can enter the chat room to chat passionately, you only need to text XXX to XXX to get the password to enter.

This kind of pornography and policy rubbing ball has made all the Internet speculators make huge profits back then. Conservatively estimate that personal operation monthly income of 100,000 yuan is definitely not a problem. Although this thing is gone now, these methods are still there.

2. Cost Per Action is abbreviated as CPA advertising

Explanation: The pricing method refers to the actual effect of advertising, that is, billing according to the valid questionnaire or order responded, regardless of the amount of advertising. There are two ways to make CPA money, one is to install software, and the other is to register as a member.

Scenario 1: As long as people who surf the Internet believe that they will feel it, their computers will be inexplicably installed with various software. Listed such as 360, Kingsoft Wordmaster, Picture Browse, 9158 and so on. In fact, these are all interests, these software providers have their corresponding CPA alliances, as long as you are installed with their software, the background will use statistics to give this person a commission. About 0.5-1.5 yuan a installation, generally settled on a monthly basis.

There are still some methods of integrity

1. So when you often browse the web, you will see the prompt "Your computer is poisoned, please install XX antivirus software", and then you will believe it and install it.

2. You have installed a small software similar to PDF to TXT, but when you finish installing it, you will find that you have installed no less than 7 software!

3. Install the so-called cracking software, free plug-ins are the easiest to install.

Scenario 2: I want to focus on the rise of 9158, which claims to be not engaged in pornography, which may be true. But one thing I must point out is that the rise of 9158 is based on a large number of pornographic CPAs. Have you ever wondered how 9158 relies on social communication for such a colorful software? Absolutely impossible! It should be said that the communicator of 9158 uses pornography to spread. But 9158 can be said to have not spread like this, they just let others help it spread, but in fact, those who help 9158 spread are relying on and can only rely on pornography.

There are unprincipled methods

1. Hype the forum, where did you get a picture of a beautiful woman, keep building to the top, and then lure it to download the software.

2. Use SEO to cover a large number of pornographic keywords. When people who want to search for pornographic information search for it, they will open their web page, and after entering, there is a pornographic page playing pornographic videos, saying that they need to download the player to play this video, and how many people are currently watching. In fact, they are all fake, and the downloaded is the 9158 software. If you want to say that he is engaged in pornography, there is no real pornographic content, so he is walking in the gray area of the law. Hehe, have you ever been deceived?

Scenario 3: The current page game advertisement is also a pornographic propaganda, giving you a half-exposed dynamic picture in the lower right corner, with plump breasts shaking all the time, and then accompanied by the text "Help her untie it". Then you click on it and a larger half-exposed pornographic picture appears, a woman tied up, plus some female gasping audio "Come help me". So you click Register and enter the game! And you found out! It's actually the "XX Three Kingdoms" that all the women have disappeared! All unscrupulous liars!!

I personally doubt the stickiness of such users, but the promoter doesn't care, as long as the promoter gets the money, everything is expected to be fine. A registration may earn 8 cents, and the IP access of an animation website is assumed to be 100,000 per day, so you may be able to earn 300 to 500 from the income of this pop-up window alone. However, Baidu has recently changed its algorithm to crack down on pop-up windows, and it seems that they have a little restraint.

3. Cost Per Sales is referred to as CPS advertising

Explanation: The actual number of products sold is used to convert the ad run amount, i.e. the method of charging per order/transaction. For each successful transaction that the user completes, the website owner receives a commission.

Scenario 1: I'm going to talk about real tubes, the kind of sites that really take off their clothes, not 9158. This kind of website uses this sharing model, which also stimulates promoters to promote. The method is what I said before, similar to using forums and SEO to hype up, so that those nouveau riche can find pornographic websites, the share ratio is generally 5/5, and the promoter takes 50%. Although it is 50%, it will definitely be deducted, and how much money can be made depends on the promoter. I saw someone once exposed that one of the orders he promoted was a big boss who rushed 2,000 yuan at once. You can see the power of the erotic industry.

Scenario 2: There is also such a share for the promotion of gambling websites, and generally such people will go to forums related to stock entrepreneurship and QQ groups to attract people. Talk about how you make money, and then use the method of talking and stopping to fish for the bait. And those who originally appeared on these forums and QQ groups had the mentality of getting rich overnight, and as a result, they fell into online gambling and lost all their money. Promoters can take a commission from the website.

Scenario 3: Online pyramid scheme. This thing may be a little far from us in the TMT industry, and we all know this thing at a glance. But those novices who have just gone online and are eager to make a fortune will join such an organization. Online MLM is not as obvious as MLM in reality, but a variant in reality.

1. The biggest variant in the gray area is the mobile phone recharge software, which has been very arrogant on Taobao and wanders in the gray area. The model of this kind of software is that you will not make money by recharging your mobile phone, but you can sell this software to others for 300 to buy the software, you can get half of it, and if others sell it to others, he can take half of it, and you can also take 1/4 of it again, and so on.

This kind of disguised pyramid scheme is huge, let's analyze the essence of this company, return to the most essential we can see that such a company is to recharge mobile phones to make money. It only has this function, but it has invented a method of making no profit, inventing a software that is useless. Let others sell to others. It's really high. But essentially, the company has nothing but the ability to recharge.

2. Fake rebate network. I would like to talk about the former Pacific direct purchase network, which has now been dealt with by the government. The following figure shows the processing notice

I can't remember the specific policy, I can only give a rough idea. It probably means that if you want to become a first-level agent with a few thousand yuan in existence, you will have the qualifications to develop the second level, and you can buy things back to a higher point, and you will be given a share after the second level joins. The policy is quite complicated, I definitely can't remember, but MLM is like this, the essence is to let people pull people and then divide the commission, and everyone will not be deceived if they recognize this. However, the variant of MLM on the Internet will do the most complex disguise, will give various success slogans, and will be marked with various authoritative certifications, this MLM website claims to be BMC's new business model, claiming to establish cooperation with the government, sign contracts with major banks, and join forces with major websites to rebate (in fact, it is only a webmaster alliance of major websites). Just look at his Baidu Encyclopedia.

Finally, let's talk about the fate of this company. On April 20, 2012, Jiangxi Wonderful Life Investment and Development Co., Ltd. (hereinafter referred to as "Wonderful Life") was imposed an administrative penalty decision to confiscate 33.708 million yuan of illegal gains and a fine of 2 million yuan in accordance with the law, and handed over three key MLM personnel to the public security organs in accordance with the law to pursue criminal responsibility.

4. Bidding and SEO

Explain bidding: Run search engine keyword ads to promote your products.

Explain SEO: Rank your site at the top of your keywords by adapting to search engine ranking rules.

Scenario 1: Because a company is still open, I will anonymously say that the "X search" company has already made a fortune in the SP era. After SP, the company's speculative personality led to wanting to continue to play edges. So he falsified data and deceived those rich bosses that he was Baidu on mobile. Trick them into advertising keyword ads. Buy target user information - call to induce them to participate in offline activities - brainwash at the MLM master meeting - buy mobile top keywords - target users are fooled - resell fooled user information materials.

Scenario 2: Presumably everyone knows that Baidu bidding is often said to be deceived. So I won't talk about fraud this time, but talk about the gray area of the bidding industry and see how gray the gray area of bidding is. There are several industry sayings in the bidding industry: "Women love beauty, men want to be successful, children want to learn, and the elderly want to be healthy."

According to "Women Love Beauty", after Dr. Ximu praised "L-carnitine" on Hunan Satellite TV, the Baidu index rose rapidly, and this type of product also appeared in the bidding. Bidders will provide some weight loss products and beauty products, which will exaggerate the effect and hide side effects, and these weight loss drugs cost less than 20 but sell to consumers between 200-300. And there will be no lasting effect, and it will inevitably rebound after eating. In addition, products like "X Thin" are such products, but they earn tens of millions of dollars a year.

According to the "Men Want to Be Successful" bidders will collect a bunch of videos of lectures by successful people like "Chen Anzhi" and "Jay Abraham" from the Internet, and package them into a CD called "10 Days to Earn 10,000 Quick Books". Then carefully package, saying that if you miss it, it will be gone, "If you have a bad heart, please turn it off", "If you don't like the daily income of 500, please turn it off", etc., let you spend about 200-400 to buy a few CDs that cost less than 10 yuan.

In addition, bidders will also find some mysterious stock trading techniques, real estate techniques, credit card cash-out top secrets, earning 500 yuan a day, etc. As long as you use your brain, you will understand, why is he really making money and selling it to you?

According to the "man lustful", bidders will also collect a bunch of "pick-up cheats" from the Internet to make exquisite packaging, which also requires you to spend 300-500 to buy a 10 yuan CD. In addition, the bidder will also do some sideballs, sell satellite TV sticks (you can watch adult TV), perspective glasses, aphrodisiacs, aphrodisiacs and other messy things. The packaging on that page is very good, and it can arouse all kinds of desires of human nature. The same profit is more than 200.

According to the "children want to learn" bidders will find such a product, and XX champions and XX experts come out to support it, saying how good this product is and how amazing the child uses it. But in fact, you don't know if these experts are true or not, and those so-called champions don't know where to find them. Whether your child really has an effect after using it, they don't care. The same profit is more than 200 per order.

According to the "old people want to be healthy" bidding, you will find a variety of peculiar health care products, and then a mysterious organization in the United States secretly develops them, and a certain user appears to come to the explanation. In short, this page can bewitch the vast majority of people, and as for the real curative effect, you can't find the voice of the real user. Similarly, the cost of these health care products is about 20 yuan, which is ten times the price.

Although the above things do not involve fraud, they are really walking on the gray edge of the law, which shows me the mentality of Chinese people who are eager for quick success caused by China's transformation period. Not that all bidding products have problems, I just want to say that at least the emergence of these edge bidding makes us worth reflecting on.

Here I would like to question several industry bigwigs, Wang Tong, Fu Wei, and ZAC. Can you give students some ethical explanations before the course starts, after all, there is no money in this world.

5. Fraud

Explanation: Online fraud

Scenario 1: Real case, many online game coins and equipment on Taobao are under the banner of low price, which is slightly lower than the market price by about 20%. My roommate chose one, so this person told him to add a QQ chat first. It should be noted here that Taobao is only subject to Want Want chat data, not QQ. So when transferred to QQ chat, all evidence collection is invalid. After that, this person gave my classmate another address and asked him to take a picture. When he finished buying, he found that the money was sent to a certain company instead of Taobao, and when he wanted to pay, I decisively asked him to close the web page. If he pays, he must have been deceived, because your records are not on Taobao and have nothing to do with Taobao at all.

Scenario 2: Online part-time jobs, many so-called online part-time jobs let you join under the slogan of 1,000 words and 50 yuan. But in fact, after you fill in your personal information, they will ask you for a deposit of a few hundred yuan, and once they get it, there is no trace.

Scenario 3: Fishing. My dad received a winning text message from the so-called "XXXXX" column group on his mobile phone, and then he asked my dad to open an ugly and ugly web page and enter the password to get it. After my dad finished entering the password, it popped up a winning message, and then asked my dad to give them a deposit of 1 yuan first. Then I opened a website with a fourth-level domain name, which really imitated and scared me. I suspect that if you enter it, he will use some technology to log in to the bank to transfer your money at the same time as you. This method will definitely give you a huge complicated process, and then let your guard down, and finally scam you out of your money without realizing it.

In terms of hacking methods

Note: I have basically stopped paying attention to the hacker world since 05, and the following is basically the dark world I saw before 05. It should be darker now. This muddy water is very deep, I just watched and didn't set foot, you can watch slowly.

6. Hacking servers

Explanation: It is not the personal computer that is invaded, but the server where one or more websites are located.

Scenario 1: Hack private server servers, such as Legend, World of Warcraft, etc.

The first method is to modify the information and sell the equipment to users privately. The income is owned by oneself.

The second method is to get all the design data of the private server, take it and build a similar server directly, or resell the design code.

Scenario 2: Intrusion into a regular large website.

The first method is to sell user data, and a set of more than 200,000 Alipay account data (without passwords) circulated on the Internet, which is caused by intrusion vulnerabilities. After marketers got this set of data, they began to bombard them with emails, and there was no peace.

The second method is to get the website source code out and then sell it, and there was once an industry saying that an 18-year-old hacker sold the source code of a big website and made 80,000 yuan.

Scenario 3: Hack the bidding or promotion website

If it is a bidding, the method is very simple, take the bidding order. Send your own products and let others pay for the bidding fee. This trick is really fierce, completely black.

If it is a promotion website, then specially modify other people's commission links to become your own links in the major CPS distribution alliances, so that they become your own commissions.

Scenario 4: Hacking sites

First, get all the data, and then use it yourself or resell it.

Second, hanging a wooden horse. Because websites have a lot of traffic, hanging Trojans are generally the most popular choice for hackers.

Scenario 5: Hacking government websites

First, sell black links to make other people's websites rank better. Search engines hate this. As an aside, a hacker in his twenties was once sentenced for hacking into government websites and selling black links.

Second, deceive Baidu Spider. Due to the extremely high weight of government websites, masters can enter the URL in the browser to open normally, but open it from the search engine to enter the pornographic website! So hackers use keyword rankings to import pornographic traffic to pornographic websites, so as to make CPA or CPS profits.

Third, hang a Trojan horse. Many government websites are hanging Trojan horses all year round.

Scenario 6: Hack the server

First, install scanning software to scan for vulnerabilities in other servers for intrusion.

Second, be a springboard and use the server to hack other servers, so that your intrusion is not detected.

7. Hacking personal computers

Explanation: The hacker is invading your personal computer, which means that hackers can control and monitor your every move on your computer. The controlled computers are collectively called "broilers" in the hacking community. So let's talk about how hackers can make a profit after hacking a personal computer.

Scenario 1: Used to attack a server

When a private server attacks, multiple computers are required, and these computers are provided by broilers. Hackers manipulate all online broilers to launch attacks on servers. Therefore, many people's computers will unintentionally become very slow.

Scenario 2: Theft of online game equipment

Hackers will develop a set of software to retrieve various online games that exist on your computer, and then implant a piracy Trojan on you. Steal all the coins and equipment in your account, and sometimes even the account. This industry is quite mature, and there are various equipment and second-hand accounts sold on Taobao, and many of these equipment and accounts are actually reversed in this way.

Scenario 3: Install the software

As mentioned earlier, there is a CPA share for installing software, and hackers can install it in batches. Someone revealed that he once relied on buying broilers and installing CPA for a month, with a net income of more than 50,000 yuan a month.

Scenario 4: Brush traffic, brush Baidu, and brush ad clicks

Many webmasters want to add advertisements to join the alliance, then the alliance has requirements for their sites, and this requirement is the ALEX index. How is this index faked? Then a lot of traffic support is needed, that is, with these broilers.

Regarding brushing Baidu, generally speaking, it is brushing Baidu-related keywords, such as searching for "weight loss", Baidu pull-down AJAX will load a prompt prompt for "current weight loss XXX products". So to achieve this effect, all kinds of people across the country need to search for weight loss and weight loss XXX products in Baidu. So broilers can be used.

The second type of brushing Baidu is to brush the Baidu index, causing false prosperity. But it makes no sense for average users because the data is fake. Who can you show it to? Investors! When investors see that the index and long-tail keyword index of the word are so high, they believe it to be true, and the company runs away with money as soon as it gets the money. How do these IPs come from? Broilers are definitely the one of choice.

The third type of brushing Baidu is to brush clicks, when a website's search keywords are clicked multiple times, Baidu will rank it first.

It is very easy to understand that advertisers pay per click, and hackers use these invalid clicks to defraud advertisers of money.

Scenario 5: Commission hijacking

This should be the most popular method at present. When the broiler buys any product, whether it is Taobao or JD.com, it will jump to the hijacker's commission link, that is, the broiler will get a commission no matter what the hacker buys.

Scenario 6: Reselling broilers

Generally speaking, the price of broilers in Jiangsu, Zhejiang, Shanghai, Beijing and Guangzhou is higher than that of other regions, and the price of foreign broilers is generally twice that of China.

Scenario 7: Privacy coercion

As we all know, the "Han Feng" sex diary door incident was exposed by hackers. In fact, we may not know more exciting inside stories, it should be said that if a hacker hacks into your computer, he can view all the private photo logs on your computer, as long as he threatens you, if you have done something wrong, there is no way at all. This is a bit similar to black PR, but it is darker than black PR.

8. Virus invasion

Explanation: It is to hack a server or personal computer

Scenario 1: Use software to implant a Trojan. When you open a certain software, it opens a virus. It must be reminded that these viruses are professionally exempt from killing. The so-called no-kill is to pass any antivirus software detection by modifying the memory signature code. This kind of exemption has become an industry, and I know a person who once told me that there was a 16-year-old child who specially gave him a free kill, which cost 500-700 yuan at a time depending on the difficulty. This child can earn more than 30,000 or 40,000 yuan a month.

Scenario 2: Exploit vulnerabilities to scan servers and PCs. This kind of vulnerability scanning must be before Microsoft releases a patch, and the really top hackers in China can read the cutting-edge technology of foreign forums, and then immediately start to do it before Microsoft patches it, and can catch tens of thousands of broilers a day.

Scenario 3: Utilize installation. In fact, hackers will insert their own Trojan horse programs into the GHOST image file and bind their backdoors with system programs. Once you have installed the machine, it will be controlled by hackers once you connect to the Internet. And the vast majority of GHOST installations are problematic. To determine whether there is a backdoor, you need to have a very professional judgment ability, you need to turn on the IP radar, and quite accurately see whether each IP connection is abnormal. The road is one foot high, and many back doors are still directly through 360.

Summary: Where there are people, there are rivers and lakes, and the world is what you can't imagine. What I wrote is just the tip of the iceberg, so I can imagine what a darker world should be like. It can only be said that these are inevitable phenomena after the development of the Internet, because human nature is unchanging.

I would like to quote Foucault's "will to power". The essence of technology is nothing but the will to power, and everyone is expanding their power while making everyone more unfree. We should pay more attention to the direction of this new history of power conflict, the Internet has always seemed to be a place that ignores the law, and is the place where the most hidden side of human nature is best exposed.

What we should pay attention to is how to promote the formation of a new Internet ethics, and how to use more words, that is, power, to find freedom in such an era, instead of living in coercion. Deriving Hu Shi's words, "Fighting for your own freedom is fighting for the freedom of the entire Internet."




Previous:Using the Ruijie client, how can I use virtual machines to network??? Prompt multi-network card???? Seeking advice,,
Next:Chai Jing's self-funded smog investigation - "Under the Dome" shocked China
Posted on 3/2/2015 8:53:22 AM |
I was dizzy to watch.
Posted on 3/2/2015 12:50:44 PM |

Are you sure you can understand?
Posted on 3/2/2015 8:14:58 PM |
No way... I can't do anything if I know.
Disclaimer:
All software, programming materials or articles published by Code Farmer Network are only for learning and research purposes; The above content shall not be used for commercial or illegal purposes, otherwise, users shall bear all consequences. The information on this site comes from the Internet, and copyright disputes have nothing to do with this site. You must completely delete the above content from your computer within 24 hours of downloading. If you like the program, please support genuine software, purchase registration, and get better genuine services. If there is any infringement, please contact us by email.

Mail To:help@itsvse.com