The hacker hacked into a harmless.

Source: Internet
Author: User
Keywords Attack Hacker some turn network security

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest stationmaster buy cloud host technology Hall

some small or informal network security products are motivated by the interests of hackers, and then let customers buy their products to achieve the ultimate commercial purpose.

This May, the Beijing Municipal Public Security Bureau Network Supervision Department received the report of the joint Public Company: its hosted in Beijing, Shanghai, Shijiazhuang, several computer servers have been attacked to varying degrees, and the time up to nearly 1 months, so that normal users can not access, the company's official website and the operating network games were forced to stop service, the economy lost millions.

A few days after the company was attacked by unidentified companies, a Shanghai technology company contacted its technology department, saying that the firewall device they developed could effectively prevent external attacks and restore the server to normal. In the use of a variety of domestic and foreign well-known firewall products invalid circumstances, the company decided to rent the company's equipment in Shanghai first.

After using the company's firewall, attacks against gaming companies dropped sharply. However, after deactivating the technology company's firewall device, the gaming company's servers began to be attacked on a massive scale, and the momentum was more intense than last time.

The police realize that hackers are targeting the audience and are conducting purposeful attacks. Through investigation and forensics, the police soon identified the technology company manager Luo and the product sales staff Li, Huang MoU and other people have a significant crime suspicion.

At the end of June, Luo MoU, Li MoU person is captured by the police, according to Li MoU, in order to increase product sales, he uses the hacker method to Beijing, Hangzhou many network game operation Company's computer server launches the attack, and after the attack succeeds, sells own firewall equipment to the attacker.

At present, such behavior has been acquiesced by some network security enterprises, and gradually become an unspoken rule in the industry. Some small or informal network security product manufacturers are motivated by the use of hackers to enable customers to buy their products, in order to achieve the ultimate commercial purpose.

Similar to attacking the company's hacker behavior is no longer a simple sabotage, but has a strong purpose and industry characteristics.

Last September, a number of large Internet cafes in the city of Zunyi were hacked, the occurrence of irregular drop line, resulting in a sharp loss of tourists. Through the police investigation, the mysterious behind the hacker is a "strategic master" of a large Internet café, the attack of the colleague's motive is only to crowd out competitors.

At a hacking conference held in Las Vegas, USA, August 1, participants agreed that cyber-crime is now motivated more by money and ideology than by challenging a computer system or Web site for security protection technology.

At the hacking conference, some hackers began to discuss the latest findings of computer security vulnerabilities and urged big companies to take steps to tighten their defenses. Compared with these enthusiastic hackers, some of the Internet industry practitioners have begun to walk on the edge of morality, and even become hackers, to profit from it.

In contrast to the usual sense of hackers, these engaged in the Internet industry practitioners are more frightening. For example, those who provide network security products, as the network security "security" but in the inside. As a result, users ' concerns about network security will be further aggravated, which may affect the development of the network security industry.

We are not unable to regulate these hacking actions. Our country "criminal law" stipulates, violates the state stipulation, the computer information system function deletes, modifies, increases, the interference, causes the computer information system not to be able to operate normally, the consequence is serious, the place 5 years imprisonment or the criminal detention; The consequence is particularly serious, the place is imprisonment for 5 years.

However, the legal provisions of the express but can not resist the temptation of profiteering, which, in addition to the interests of the drive, and the legal system of our country to further improve the sound has a great relationship. Although the criminal law has the treatment of similar acts, but the corresponding legal rules and even the entire Internet industry supervision system still need to be further improved.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.