This article is a mirror article of machine translation, please click here to jump to the original article.

View: 8844|Reply: 2

Ma Huateng's QQ was also stolen: the hacker was both a 16-year-old moderator

[Copy link]
Posted on 11/29/2014 11:30:48 PM | | | |
The original title of the article is "What happened in China's hacker world", and the most common thing in recent years is to invade hanging horses and steal game accounts. The hacker spirit of previous generations is now gone. There are businesses engaged in national projects, businesses engaged in foreign projects, and many of them are now relatively wealthy.



In May 1998, Chinese exclusion occurred in Indonesia. Chinese hackers, who had just learned to falter, decided to support the operation and attack Indonesian websites. The attack by Chinese hackers provoked a strong reaction from the Indonesian government, blaming the actions of Chinese civilian hackers as instigation by the Chinese government.

After the bombing of the Chinese embassy in 1999, on May 9, a temporary organization called the China Hacker Emergency Conference Center was born. Later, the White House said that the sheer volume of emails had overwhelmed the White House website and shut down, the first time the White House website had gone down due to a large number of emails.

In 2000, the Supreme Court of Japan ruled that Shiro Higashimu had lost the lawsuit against him for witnessing the massacre; Japanese right-wing forces openly deny the Nanjing Massacre. Chinese hackers clearly proposed to carry out a new war of resistance against Japanese aggression on the Internet, and the appearance of tampered Japanese web pages that refuse to face up to the historical truth is a shame for Asia.

Beginning in February 2001, the Mitsubishi car incident, the JAL incident, the textbook incident, and Koizumi's visit to the Yasukuni Shrine seriously affected Sino-Japanese relations. Chinese hackers continue to attack Japanese websites. In the first five months of 2001, there were 650 website hacks in Japan.

After the collision in the South China Sea on April 1, 2001, the Sino-US hacker war broke out. On May 8, the second anniversary of the bombing of the Chinese embassy, Chinese hackers launched a large-scale sixth cyber war to defend the country. As of May 7, more than 1,600 U.S. websites had actually been compromised, including more than 900 major websites, including government and military websites. There are more than 1,100 compromised websites in China, and more than 600 major websites.

In recent years:
Gray Pigeon: A large number of websites have been compromised and implanted with Gray Pigeon Trojans. Create a huge zombie swarm in China. And some candid photos are also circulating on the Internet. I also used it, not bad.

Ma Huateng QQ Stolen: A 16-year-old moderator of the hacking base. With QQ number 10001, he once showed off in the group. Later, he was arrested. He was released on bail by a Shenzhen lawyer. Then take the commercial route. At that time, he was very rebellious, dropped out of school very early, and studied a lot on his own.

Panda Incense: Li Jun from Wuhan, this needs no introduction.

In recent years, the most thing has happened is the invasion of hanging horses. Steal game accounts. The hacker spirit of previous generations is now gone.

In recent years, Chinese hackers have become more focused on business. There are businesses engaged in national projects. There are businesses engaged in foreign projects. Many are now richer.






Previous:There is no privacy on the Internet anymore, it's just that you are not used to it.
Next:The latest HTML5 light blue style network company source code + blue atmosphere + super exquisite and beautiful + dedecms dream weaver kernel
Posted on 11/30/2014 10:34:15 AM |
The landlord's signature is so cool
Posted on 11/30/2014 3:34:14 PM |
:lol
Disclaimer:
All software, programming materials or articles published by Code Farmer Network are only for learning and research purposes; The above content shall not be used for commercial or illegal purposes, otherwise, users shall bear all consequences. The information on this site comes from the Internet, and copyright disputes have nothing to do with this site. You must completely delete the above content from your computer within 24 hours of downloading. If you like the program, please support genuine software, purchase registration, and get better genuine services. If there is any infringement, please contact us by email.

Mail To:help@itsvse.com