Discussion on the operation of modern malicious programs

Source: Internet
Author: User

Many people have defended the word "hacker", arguing that it refers to a group of "tech freaks", and that "hackers" share tools, while scripting Boys use tools to do bad things. As more and more malicious programs turn from technical presentations to clear stealing. It makes me feel like a hacker. Groups are no more pure than secular society. When more and more people with lower levels of education join. The purpose may only be to make money quickly.

Accelerated times

Some time ago a Trojan horse maker was exposed. He also asked some very basic computer questions at the computer forum three years ago. Now he is a "red man" with hundreds of thousands of chickens. The computer industry is not as difficult as it is imagined, If you just want to do one thing. The rapid characteristics of computer technology and the security situation-the less important information security is in stark contrast. Making the so-called hacker crash easier. But the old defense system users can only be trampled.

The perfect match for thieves

"Now, most of the time, in addition to a small hacker with a password-based easy-to-language program, the group has already started fighting."
"You have to know that one cannot be proficient in all aspects, so they need to cooperate." Not only the security field of "T" talent, the black world has long been put into practice.

The following is a more complete malicious program system:

    1. Exploit search and code writing
    2. Get a station, or a bug scan.
    3. Malicious program
      1. Bypass soft technology and attack kill soft technology
      2. Stealing user Information
      3. Promotion acquisition and static installation
      4. Firewall bypass
      5. "Live and Live"-Internet cafes for the model, to prevent the installation of anti-virus programs, etc.
      6. "Frequent contact"-Dynamic acquisition of malicious program server addresses
      7. ......
    4. Combine attacks based on access to information
    5. ......

Teamwork is a mainstream trend in today's malicious programs. This also increases the likelihood of tracing the author of a malicious program. But what is the efficacy of traceability in today's legal situation and enforcement?

Black and white is not a one-read

This is a transcript of a conversation with a black man. It's just a way to make a living, and he doesn't think he's paying less for his technology. It's not just a matter of technology, you usually need a better network to get a higher advertising profit, and a distribution split. " This is a reputation of the industry. "

The gentleman continued: "I am here to offer a lock on the homepage more than once in the market. You can just lock someone else's homepage to reduce the legal risk you need to take. Because no hacker has ever been imprisoned for locking the homepage, you can say that they are immoral, but have you ever heard of being jailed for advertising stickers? But that's enough to get you a very lucrative "payoff". If you can promote a few games, you can make a fortune. "

Who can believe that the thieves "kill" the guards and destroy the bodies just to put ads in a mansion? In fact, "hackers" will be the user's computer every bit of money to move things away.

Black and white is not a thought between, when more and more young people because of the actual employment pressure and law enforcement strength and weak legal awareness of the contradiction between the way to its revered hacker .

End with the lyrics from "Hotel California".

You can checkout any time,
But can never leave!

If this article brings you some new ideas, please:

Copyright NOTICE: This article is a blogger original article, in the case of the author and the source of the circumstances can be freely reproduced.

Discussion on the operation of modern malicious programs

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.