Bogus Chinese hackers hype arbitrary and biased

Source: Internet
Author: User
Keywords The New York Times FT recently
Tags address attacking behavior clear computer development google google +
Absrtact: China, as one of the world's major hackers attacking countries, the government and the law against the hacker's attitude is clear.

Some media outlets, such as The New York Times and The Wall Street Journal, recently reported that cyber attacks on Google and a number of US companies came from "Chinese hackers". The accusation is arbitrary and biased.

The articles point to two Chinese schools as evidence of a computer IP address that launched a hacker attack. But in fact, hacking is a serious challenge for all the countries in the world, including China. With the rapid development of the Internet in the world, the network across national boundaries, hackers can be hidden identity log in other countries of the computer, which attacks the third country's computers. The key to capture hackers is the difficulty of identifying the real location of the hacker.

Network security technology and services in China in the initial stage of development, the majority of ordinary users still lack of security awareness and means of protection, located in China's computer is easier to become hackers "via" tool. Therefore, even if the hacker attacks the computer IP address from China, it is not enough to prove that this is what the Chinese do, this is a little network security knowledge people know.

What is more, these media articles, using vague sources, unfounded evidence and confusing logic, insinuate that "the Chinese government and the military support hacking", which is typical of trumped-up allegations. For example, the New York Times article claims that the Shandong Lanxiang Technical School, which is accused of hacking, has "military support and training computer scientists for the military", and Shanghai Jiaotong University is responsible for "a top computer project in China". Even the Lanxiang Technical school, where graduates join the army every year to prove their relationship with the military, seems to have forgotten a common sense: the age-appropriate youth army is common in China and the United States, and does not require a special relationship between schools and the military.

In addition, as one of the world's leading hackers, the government and the law are clear about the opposition of hackers to crime. Even with Chinese hackers committing crimes, linking them to the Chinese government is a trumped-up accusation.

Anti-speculation "Chinese hackers" in the United States, the attitude of the hacker behavior is questionable. U.S. media reported that the U.S. Department of Homeland Security, the Ministry of Defence and other recruitment of hackers. The Department of Homeland Security said in a job posting that applicants should be able to "think like a malicious attacker". The New York Times also reported that U.S. Defense Secretary Robert Gates formally ordered the formation of a Cyber Command last June to unify and coordinate military operations related to computer networks such as the security of U.S. military networks and cyber warfare.

The internet has become an indispensable infrastructure in the world, and hacker attacks will undoubtedly bring losses to individuals, businesses and nations. Facing this kind of illegal and criminal behavior, insisting on managing the internet according to law, strengthening international cooperation and cracking down on illegal and criminal behavior are the straight way.


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.