1 / 16

The condition of Chinese hacker

The condition of Chinese hacker. Liying Yu a106964. overview. The development of Chinese hacker The problem of Chinese hacker The trend of the development of the Chinese hackers Conclusion. T he origin of Chinese hackers (1994-1996).

urbain
Télécharger la présentation

The condition of Chinese hacker

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The condition of Chinese hacker Liying Yu a106964

  2. overview • The development of Chinese hacker • The problem of Chinese hacker • The trend of the development of the Chinese hackers • Conclusion

  3. The origin of Chinese hackers (1994-1996) • That period is just beginning to develop Chinese Internet in the hazy period • Chinese Internet door finally opens to the public • Computer enthusiasts around the greatest pleasure of those small games and COPY DOS software products, COPY is a genuine mode of transmission for the computer users.

  4. crack software and registration code • That's nota traditional Internet, but the most primary BBS server, the communication way rely on the dial the phone number is connected directly to the BBS server. Football and software encryption to be the hottest topic, the registration codes in exchange for many people enthusiastic. BBS server appear in major cities, cracked exchange software become the most popular topic,Linux can sell for 120 eur.

  5. The growth of Chinese hackers (1997-1999) • In the early 1997 s, YAHOO search engine can only search out seven related with hackers simplified Chinese web. the contents of the website translate or repeat on abroad. • The highest technology for primary hacker is only by mail bombs, and most are foreign tools, they did not have completely own hackers weapons.

  6. The annual hackers conference announce " Back Orifice" hacker software by a called "the dead ox worship", and with release the source code together. The software brings a globalnetwork security problems, and promote the "Trojan horse" rapid development. after announcement, 'Trojan horse" spread to Chinasoon.

  7. At the same time,CIH attack mortherboard BIOS for main target, which brought the tens of billions of losses for China, also let chinese hackers first felt the ambition and threat from outside. • in 1998, Chinese Trojan horse also was born, this is NetSpy.

  8. The Chinese honker • Indonesia broke out mass murder chinese events on July and August 1998. Many Chinese women were savage killed, the Chinese supermarket plundered completely, they sent a lot of picture to the Internet. This issues enrage Chinese hackers, they gathered in IRC chat room, they sent spam to the Indonesian government mailbox, against Indonesia with web site by Ping way. These naive attack method make the first Chinese hackers have unity and strong spirit, which became the basis formation of honker.

  9. in 1999,the bomber bombed Chinese embassy in Yugoslavia.-----Chinese hackers got together again, they began to attack the United States website. • In July, lee teng-hui suddenly raise two state theory, the relationship was nervous between mainland and Taiwan. Chinese hackers rely on experience from US, they attacked the executive web sites of Taiwan, installed Trojans Taiwan server, cause a lot of independence advocates web server were paralyzed for long time.

  10. In early 2000, "DongShiLang nanjing massacre" event aroused against the nationalist, partial hackers launched the attack against Japan website and Taiwan website. Althought there was not much impact, but it appeared a lot of hackers organizations.

  11. The problem of Chinese hacker • 1. A: huge number but the qulity is not so high • China has a huge number of Internet users. According to CNNIC 24 th Internet statistics reports, users size is3,38 bil. By June 30, 2009. • There has been no one organization form of them together. some "hackers" quality is too low, they wanted to become hacker because of the mysterious and bad motives. A few professionals foces on technology level, they do not care how to use it.

  12. 2. Lack of strategic goals, social responsibility and the crisis consciousness • In the west, some hackers organization already have intergrated with clear goals in order to increase powerful force. chinese hackers are not aware theirs social responsibility and mission, illegal criminals often use them

  13. 3. Illegal crime is rampant • The CNNIC report points out, there were 1.95 bil Internet users who suffer from the virus and Trojan attacks, 1.10 bil Internet users had stolen name or password. • 4. Legislation. Information industry develop rapid, the network criminal issues brings new problem. The development of legislation can not catch up

  14. The trend of the development of the Chinese hackers • The trend of the development of the Chinese hackers: • 1, Hacker is young. with the Chinese internet spread, more and more people have access to the network and information resources, and more and more students enter this field. • 2, The hacker is destructive. The development of electronic government and commerce make social more depend on the Internet, the economic lost is bigger than before by hackers. • 3, Hackers technology popularize fast. we can easily find the hacker tools and teaching on line. BBS published online system vulnerability, these exchanges make hackers technical spread quickly. • 4, Hacker tools expend quickly. People get hacking tools easily,operation is easy also. • Hackers organize together. Now people has the stengthen consciousness of cyber security, improve the safety performance of the product. Defects and the vulnerability are difficult to find out, so hackers organize together, exchange of experience, in order to get success.

  15. Conclusion • Relative to the current situation for chinese hackers, commercial criminal behavior is not much. Although Chinese hacking to some extent reflects the patriotism, but major hacking is individual behavior, it may be become a network crime, if there is no guidance. But Chinese hackers action promotes Chinese network security. there is no hacker, there is no network security.

  16. Thanks for your attention • Reference: • [The current situation and further of Chinese hacker] • Http://www.alixixi.com/zz/a/2009072557053.shtml • Http://www.alixixi.com/zz/a/2009072557053.shtml • [The history of Chinese hacker] • Http://www.cnbeta.com/articles/47247.htm • [The development history of Chinese hacker] • Http://pcedu.pconline.com.cn/soft/virus/safe/0801/1210931.html • [The situation of Chinese hacker] • Http://www.hack50.com/article/sort01/sort068/info-63428.html • [The record of Chinese hacker] • Http://www.heibai.net/article/info/info.php?Infoid=4624

More Related