Computer Information

Want to know computer information? we have a huge selection of computer information information on alibabacloud.com

Vehicle Administration ghost change 8000 driving license information

Southern Metropolis Press Li Yakun correspondent Wang Linfeng hides in the body's driver's license, quietly been deducted points. Many people in Shenzhen encounter black hand. Southern reporter learned yesterday from the Shenzhen Municipal People's Procuratorate was informed that on July 17, the Municipal Procuratorate on suspicion of undermining the crime of computer information system, the vehicle control staff of the bright car in an approved arrest. In a use of work facilitation, secretly modify more than 7900 driver's license phone number information. According to the documented situation, more than 2,700 of these driver's licenses have been stolen for 9 to 11 minutes. Driver's license in hand, points were taken away public Mr. Tao an online search found that driving ...

New opportunities of security industry in the era of large data

The advent of the multimedia data age means that data for 21st century is growing at a geometric explosive rate. This brings a great challenge to the modern computer information technology in the aspects of data processing, transmission, storage and application. In the age of data inflation, we both feel the advantages of convenient data sharing, but also difficult to data processing problems. The development of information technology has driven the whole society towards an unprecedented new era of change, people like Mu Spring Breeze, in the feeling of a variety of mobile terminals, intelligent electronic equipment for our lives to bring convenience ...

Trojan Theft game account 3 days illegal profit 30,000

The Yangtze River Business News reported late July this year, Enshi Chinese Academy of "192 virus group" Lin Tian Hua Gang case to make a first-instance judgment: Lin Tianhua, Chen We guilty of illegal access to computer information System data crime, respectively sentenced to 3 years 6 months, imprisonment for 3 years; the defendant Xia Junzi committed the crime of intrusion into computer information system Tools,   A fine of $20,000 per place. List of the top ten virus groups exposure last year, the domestic well-known Internet security manufacturers announced a list of the top ten Internet virus groups, the top ten virus groups, are to produce, spread virus trojan and use virus Trojan to obtain ...

The special level qualification mainly revolves around the dense profession the large-scale industry informationization application integration ability

Special-level qualification mainly around the dense industry-related large-scale industry information application integration capabilities, the market has a strong entry barriers and technical service content, the future size of the service-related industry will become a distinction between the general contractor and the general subcontractor important watershed. Ministry of Industry Computer Information System integration first intended to award the special level of enterprise publicity, shortlisted list includes China software, Neusoft Group, Wave software, Tai Chi shares.   Yesterday, the stock of 4 companies all trading. Kwong Card Senior researcher Cong to south all reporters that the current qualification system is a large number of qualified, vicious competition ...

Dongcheng Court, the defendant is in court

Yesterday, the Dongcheng court, the defendant was in court. Yesterday, the Dongcheng court, the defendant was in court.   Due to the non-payment of wages, was responsible for the network management of any, wrote a can delete the original company office platform data files, and remote login at home to invade the company's Office platform, the implementation of the document, resulting in "former club" direct economic loss of more than 200,000 yuan.   He was tried in the Dongcheng court yesterday morning on suspicion of damaging the computer information system. At the age of 30, he graduated from university with a bachelor's degree, and was a commercial management company (hereinafter referred to as Guo Rui ...) in Beijing.

Oracle Database Security Policy and implementation method (1)

Database security issues have been the nightmare of database administrators, the loss of database data and the intrusion of databases by illegal users make the database administrator physically and mentally exhausted. With the rapid development of computer technology, the application of database is very extensive, in-depth to various fields, but with the resulting data security problems. The security of large amount of data in the database of various application systems, the problem of stealing and tamper-proof of sensitive data are paid more and more attention by people. The database system is the information gathers the collective, is the computer Information System core component, its security is vital, relates to ...

Joint-public technicians repeatedly generated game coins to be sentenced to 3.5

Washington (correspondent Fan Jing Li Chinpeng) 25-year-old computer company Technician Xu Wenhao use of work to facilitate the modification of recharge records, will be repeatedly generated by the joint public currency, game beans and other Low-cost resale profit for more than 460,000 yuan.  The Haidian court said today that the defendant Xu Wenhao was sentenced to 3 years and 6 months in prison for violating the computer information system. From September 2008 to February 2009, Xu Wenhao used the working conditions of the technician of the Haidian District computer company to use the company's internal network and secretly uploaded the specific computer program written by the company's server.

Christmas network paralysis Suspect netted, he's 18 years old.

Cyber hacker suspected of Christmas network paralysis 18 years old a teenager from Merseyside, England, was arrested for suspected involvement in a distributed Denial-of-service attack (DDoS) with the Xbox Live Network (PSN). According to Sky News, this time a joint operation by the Organized Crime Investigation Unit (SEROCU) in the southeastern United Kingdom and the FBI, an 18-Year-old was arrested on suspicion of illegal use of computer information and death threats, and electronic devices searched from the teenager's home ...

Golden Hill computer system hacked five internet thieves

Shanghai QI Tim Travel Network Technology Co., Ltd. Li 5 netizens, using Trojans and other procedures to enter the Beijing Jinshan Company's computer system, modify the company's operating "swordsman World" game data and profit from 3 million yuan.  Yesterday reporter learned from the Haidian court, Li and other 5 people suspected of damage to the computer information system crime was sued to the court. The 5 defendants prosecuted were all of them, the youngest 26 years old. Among them Li and Zhang Tian are Shanghai Qi Tim Network Technology Co., Ltd. is the legal representative and responsible person, Yang Hailen Shanghai Magic Bay Network Information Technology Co., Ltd. employees, ...

How to check the computer's hard drive serial number

Hard disk serial number, the English name for the Hard Disk Serial Number, the number is the factory manufacturer to set the difference between products, as everyone's ID number, unique, can not be modified. In the units, schools and other office places, will ask to see the computer's hard drive serial number, statistics. Or, you are interested can also check the play. Computer hard drive serial number is an important computer information, in addition to hard disk space, memory and so on. Baidu search hard disk serial number query tool, download, as shown: double-click serial number viewer, ...

5 hackers illegally acquire online games and 3.1 million are sentenced

Hackers such as Yang Shixiong into the company's computer systems, illegal access to the system of online games, sold to game users, a short two months to profit more than 3.1 million yuan.  Yesterday, reporters learned that 5 people were Yang Shixiong by Haidian court to damage computer information systems, respectively, sentenced to 2 years to 4 years of imprisonment for 10 months, and confiscated its ill-gotten gains of 300,000 yuan. The hacker group, the oldest 31-Year-old, the youngest 26-Year-old. With the exception of the defendant Yang Shixiong from Guangdong, the remaining 4 per cent came from Shanghai. Among them, Li and Zhang Tian are Shanghai Qi Tim Travel Network Technology Co., Ltd.

Drilling online loopholes for the benefit of the supernumerary

Morning News (chief reporter WB) to write the loopholes of the online drilling, in exchange for game props, profit up to tens of millions of yuan, Haidian court will be held on the day of the trial of suspected damage to computer information systems, Chen and other people a case. The procuratorial organ accuses, "Dream West Swims" the Net Easy Information Technology (Beijing) Limited Company produces a network game. May 2011, the defendant Chen found that the network game program has a technical loophole, to write their own plug-in, the game server storage, processing, transmission of the data to modify, so that it can be in the game to replace high-value props to consume, ...

Stealing virtual goods is hard to convict

Recently there are gangs, first through the phone to steal the resident QQ number for Q coins, and then through the network to sell those stolen Q coins. A few days ago, the criminal gang was arrested by the police in Jinan. The main criminal suspect Wu, Cai and other 4 people were captured.   According to the police, this is the first time in Shandong province to uncover the theft of virtual goods of criminal gangs, but also the first to be suspected of theft to transfer the procuratorial organs of the theft of virtual property cases, which aroused our deep thinking. The crime: steal dozen resident telephone recharge Q currency This March 29, in Shandong province Jinan North Tan District, two people in Hubei mouth ...

State-supported Information security key Enterprise claims to bring 100 million revenue

Absrtact: At the meeting of the Politburo of January 23, the review of the national Security Strategy outline, including the basic content of 10 aspects, in 2013, after the exposure of prism time, China's information security assurances to the degree of unprecedented height. At this January 23 's meeting of the Politburo, the review of the national Security Strategy outline, including the basic content of 10 aspects, in 2013 "Prism Time" exposure, China's information security assurances to the degree of unprecedented height. This meeting stressed the need to ensure information security, ...

The question of human flesh search leads to controversy

Standard human flesh search, it should be regarded as whether the disclosure of information is beneficial to the public interest, or whether it is lawful to carry out the news in the first of Zhejiang Provincial Information Promotion Ordinance (draft) to disseminate the information of other people, so it is considered to be legislation to prohibit "human flesh search"   And the cause of the widespread concern. Although the drafting Department of the Ministry of Economic and Information technology in Zhejiang Province, the relevant head of the Committee has repeatedly reiterated that the above provisions are mainly to protect the privacy of the parties, "not against the" human flesh search ", but still did not quell the parties ...

Uncover the virus industry chain: the annual flow of virus group income billion

Absrtact: Behind the glossy internet, the virus group behind the huge virus industry chain is emerging. Recently, the "first financial daily" exclusive learned that in the last year caused the industry's attention to the top ten domestic virus group, the second largest virus group HYC case has been Hubei glossy internet behind the huge "virus" industry chain behind the virus group gradually surfaced. Recently, the "first financial daily" exclusive learned that the industry has caused concern last year in the domestic "Top ten virus Group" in the second largest virus group HYC case has been basically identified by Hubei police, the procuratorial organs will timing five of the case ...

Theft gang rampant, half a year net earn nearly 600,000

Theft gang 1 days to steal up to 50,000 QQ number by Alipay resale.   After the prosecution of the Ningbo Beilun District procuratorate in Zhejiang Province, the court recently sentenced the defendant to Wang Mingyu imprisonment for 06 months, suspended for two years, and fined 5000 yuan for the crime of illegally acquiring computer information system, and sentenced the accused He Shida to imprisonment for one year, suspended for one year and 06 months, and fined 3000 yuan. Around August 2010, Chen Xian friend Liu from Ningbo to Anhui to play. Chen Xian is telling Liu, Trojan virus software to steal other people's QQ account can make money, he can provide Trojan disease ...

Virus groups are emerging

Absrtact: Behind the glossy internet, the virus group behind the huge virus industry chain is emerging. Recently, the "first financial daily" exclusive learned that in the last year caused the industry's attention to the top ten domestic virus group, the second largest virus group HYC case has been Hubei glossy internet behind the huge "virus" industry chain behind the virus group gradually surfaced. Recently, the "first financial daily" exclusive learned that the industry has caused concern last year in the domestic "Top ten virus Group" in the second largest virus group HYC case has been basically identified by Hubei police, the procuratorial organs will timing five of the case ...

Can't shake the license plate, force the engineer to black

Since 3 o'clock in the morning last December 23, many people have received SMS from the Passenger Car index office, and some people think they have shaken the number of cars, carefully read the message, the content is "SMS Authentication Code". More than a year to shake the car number of Zhang, using their own knowledge of the computer, design "soldier registered" software, malicious visit to the website 3000余万次, registered mobile phone number of the site to send a verification code more than 920,000, to the Traffic Committee website loss of SMS costs more than 40,000 yuan.   Zhang was tried in Chaoyang court yesterday. Shortly thereafter, many people received a message, "registered second kill artifact, small ..."

If you can't talk, you'll find a hacker attack.

Absrtact: Every year 315 consumer rights protection days after the day, there will be a number of fake and inferior commodities are concentrated exposure. Someone exposed on the public relations, interest driven, some delete the company came into being, by helping customers remove negative information on the network profit, delete the annual "3 15" consumer rights and interests protection days after the day, there will be a number of fake and inferior commodities are exposed. Someone exposed someone "PR", the interests driven, some "delete the company" came into being, rely on helping customers delete the negative information on the network profit, delete the post will also employ hacker attack network ...

Total Pages: 2 1 2 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.