The condition of Chinese hacker - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

The condition of Chinese hacker

Description:

Liying Yu a106964 The development of Chinese hacker The problem of Chinese hacker The trend of the development of the Chinese hackers Conclusion overview That period ... – PowerPoint PPT presentation

Number of Views:116
Avg rating:3.0/5.0
Slides: 17
Provided by: yu385
Category:

less

Transcript and Presenter's Notes

Title: The condition of Chinese hacker


1
The condition of Chinese hacker
  • Liying Yu
  • a106964

2
overview
  • The development of Chinese hacker
  • The problem of Chinese hacker
  • The trend of the development of the Chinese
    hackers
  • Conclusion

3
The origin of Chinese hackers (1994-1996)
  • That period is just beginning to develop Chinese
    Internet in the hazy period
  • Chinese Internet door finally opens to the public
  • Computer enthusiasts around the greatest pleasure
    of those small games and COPY DOS software
    products, COPY is a genuine mode of transmission
    for the computer users.

4
crack software and registration code
  • That's not a traditional Internet, but the most
    primary BBS server, the communication way rely on
    the dial the phone number is connected directly
    to the BBS server. Football and software
    encryption to be the hottest topic, the
    registration codes in exchange for many people
    enthusiastic. BBS server appear in major cities,
    cracked exchange software become the most popular
    topic,Linux can sell for 120 eur.

5
The growth of Chinese hackers (1997-1999)
  • In the early 1997 s, YAHOO search engine can only
    search out seven related with hackers simplified
    Chinese web. the contents of the website
    translate or repeat on abroad.
  • The highest technology for primary hacker is
    only by mail bombs, and most are foreign tools,
    they did not have completely own hackers weapons.

6
  • The annual hackers conference announce " Back
    Orifice" hacker software by a called "the dead ox
    worship", and with release the source code
    together. The software brings a global network
    security problems, and promote the "Trojan horse"
    rapid development. after announcement, 'Trojan
    horse" spread to China soon.

7
  • At the same time,CIH attack mortherboard BIOS for
    main target, which brought the tens of billions
    of losses for China, also let chinese hackers
    first felt the ambition and threat from outside.
  • in 1998, Chinese Trojan horse also was born, this
    is NetSpy.

8
The Chinese honker
  • Indonesia broke out mass murder chinese events on
    July and August 1998. Many Chinese women were
    savage killed, the Chinese supermarket plundered
    completely, they sent a lot of picture to the
    Internet. This issues enrage Chinese hackers,
    they gathered in IRC chat room, they sent spam to
    the Indonesian government mailbox, against
    Indonesia with web site by Ping way. These naive
    attack method make the first Chinese hackers have
    unity and strong spirit, which became the basis
    formation of honker.

9
  • in 1999,the bomber bombed Chinese embassy in
    Yugoslavia.-----Chinese hackers got together
    again, they began to attack the United States
    website.
  • In July, lee teng-hui suddenly raise two state
    theory, the relationship was nervous between
    mainland and Taiwan. Chinese hackers rely on
    experience from US, they attacked the executive
    web sites of Taiwan, installed Trojans Taiwan
    server, cause a lot of independence advocates web
    server were paralyzed for long time.

10
  • In early 2000, "DongShiLang nanjing massacre"
    event aroused against the nationalist, partial
    hackers launched the attack against Japan website
    and Taiwan website. Althought there was not much
    impact, but it appeared a lot of hackers
    organizations.

11
The problem of Chinese hacker
  • 1. A huge number but the qulity is not so high
  • China has a huge number of Internet users.
    According to CNNIC 24 th Internet statistics
    reports, users size is 3,38 bil. By June 30,
    2009.
  • There has been no one organization form of them
    together. some "hackers" quality is too low, they
    wanted to become hacker because of the mysterious
    and bad motives. A few professionals foces on
    technology level, they do not care how to use it.

12
2. Lack of strategic goals, social responsibility
and the crisis consciousness
  • In the west, some hackers organization already
    have intergrated with clear goals in order to
    increase powerful force. chinese hackers are not
    aware theirs social responsibility and mission,
    illegal criminals often use them

13
  • 3. Illegal crime is rampant
  • The CNNIC report points out, there were 1.95 bil
    Internet users who suffer from the virus and
    Trojan attacks, 1.10 bil Internet users had
    stolen name or password.
  • 4. Legislation. Information industry develop
    rapid, the network criminal issues brings new
    problem. The development of legislation can not
    catch up

14
The trend of the development of the Chinese
hackers
  • The trend of the development of the Chinese
    hackers
  • 1, Hacker is young. with the Chinese internet
    spread, more and more people have access to the
    network and information resources, and more and
    more students enter this field.
  • 2, The hacker is destructive. The development of
    electronic government and commerce make social
    more depend on the Internet, the economic lost is
    bigger than before by hackers.
  • 3, Hackers technology popularize fast. we can
    easily find the hacker tools and teaching on
    line. BBS published online system vulnerability,
    these exchanges make hackers technical spread
    quickly.
  • 4, Hacker tools expend quickly. People get
    hacking tools easily,operation is easy also.
  • Hackers organize together. Now people has the
    stengthen consciousness of cyber security,
    improve the safety performance of the product.
    Defects and the vulnerability are difficult to
    find out, so hackers organize together, exchange
    of experience, in order to get success.

15
Conclusion
  • Relative to the current situation for chinese
    hackers, commercial criminal behavior is not
    much. Although Chinese hacking to some extent
    reflects the patriotism, but major hacking is
    individual behavior, it may be become a network
    crime, if there is no guidance. But Chinese
    hackers action promotes Chinese network security.
    there is no hacker, there is no network security.

16
Thanks for your attention
  • Reference
  • The current situation and further of Chinese
    hacker
  • Http//www.alixixi.com/zz/a/2009072557053.shtml
  • Http//www.alixixi.com/zz/a/2009072557053.shtml
  • The history of Chinese hacker
  • Http//www.cnbeta.com/articles/47247.htm
  • The development history of Chinese hacker
  • Http//pcedu.pconline.com.cn/soft/virus/safe/0801/
    1210931.html
  • The situation of Chinese hacker
  • Http//www.hack50.com/article/sort01/sort068/info-
    63428.html
  • The record of Chinese hacker
  • Http//www.heibai.net/article/info/info.php?Infoid
    4624
Write a Comment
User Comments (0)
About PowerShow.com