600 QQ, more than one million the same time >
minutes Fama Ben at Aviva
two 80 boys 90 through the network from a boy to buy after the Trojan horse, since three people to start a division of labor, the use of Trojan horse program control more than 600 million of QQ users, and force to send ads about two months to earn hundreds of thousands of the huge advertising costs. Although this high-tech means to bring them huge benefits, but also brought them trouble. Recently, Changzhou bell tower district court to illegally control the computer information systems sentenced to imprisonment for three of the 11 months.
automatically roots more than 600 million spam QQ in the drug
2009 年 9 months, small Qi (a pseudonym) is the Internet, a friend to contact him through QQ, accusing the His roots in the group spam, confused little Qi informed Tencent Research Institute technical staff. After confirmation of technical staff, a small computer Qi a special QQ group for the Trojans to send spam. Once this Trojan penetrated the computer after the user logs will QQ in the group are automatically sent after the ad information. After more and more users and small Qi QQ the same situation occurs, causing concern about Tencent. The company's technical staff through remote control of a user's computer, after the match the Trojans found a suspicious file, the file can modify the computer's registry, the Trojan will carry a link through which the user's QQ QQ group for their send, and this link is linked to a server, the server, the contents of a part-time advertising, spam, Trojan horses by the source of the query, the initial spread of the Trojan IP address of the user in Changzhou, Jiangsu, was already 654 million users infected with the trojan, Tencent then reported the matter to the police in Changzhou.
2009 year, Changzhou, Hangzhou,
polo shirts, Changzhou and the police were both in residential areas and guest caught Xiaoyu (alias), small Ho (a pseudonym), and small constant (a pseudonym), three suspects even after 80, 90,
ralph lauren uk, and they even met in the network, usually to communicate through the network links.
Xiaoyu he opened an online advertising company, usually do a small business, small companies Xiaoyu He also helped the beginning, they still rely on the normal release of online advertising to make money. The end of 2008, Xiaoyu stumbled upon an online ad network Web site, the site has a very detailed process of cooperation, such as commission rates, settlement, etc.,
ralph lauren online, as long as the promotion of the site users will be able to make money. Xiaoyu think you have found business opportunities, without hesitation, the site registered an account, start sending online advertising to make money.
the beginning, Xiaoyu brother is the most primitive way to publish ads, both of whom applied for a QQ number, and then randomly adding QQ group, made in the group advertising sites such as the speed of transmission too slow, Xiaoyu brothers busy one day will not make much money, to the first half of 2009, through the network, Xiaoyu users know the field of small constant, small constant claims that they can find people to do such a software. Since then, the trio started the cooperation of the road. To find people who write trojans, small permanent forum on a Web site made a lot of posts, and soon found a person willing to write Trojans, negotiated prices soon after, such a Trojan horse program to write is complete. After the extraordinary progress smoothly, a small constant rented a server, also responsible for uploading Trojans, and Xiaoyu brother is responsible for developing, updating advertising messages to send to the server. The Trojans enter the user's computer once, it will automatically detect and modify the user's computer QQ process, when the user logs on after QQ, QQ QQ group program will automatically send a coded message to the ad, and three of them to Xiaoyu from access to high advertising costs.
maximum daily income of several million three months hundreds of thousands of money-making
Tencent areas, according to statistics, more than two months after a short period, the Trojans controlled by the up to 600 million QQ users, and Xiaoyu boon they are starting to remove the cost, everyone has more than ten million richer. In the The beginning of cooperation,
ralph lauren clothing, the huge gains for the three bad music, and more time to be able to get thirty or forty thousand a day, less when there are a few thousand dollars. Just two months time, Xiao Yu to a small constant terms for the payment of more than ten million.
court found that a small constant, Xiao Yu, Xiao He three to obtain illegal benefits, the use of computer-implemented Trojans illegal control of others, the circumstances are serious, their behavior had constituted the crime of illegal control of computer information systems. Is a common crime. Recently,
ralph lauren sale, the court ruling, the three are guilty of the crime of illegal control of computer information systems, was sentenced to 11 months imprisonment and a fine of two hundred and fifty thousand yuan.
minutes Fama Ben
■ Links hackers 3 sin
first hacking reselling money
most common one is hacking, including the theft of QQ, online games, bank account, credit card account number, reselling game game currency, equipment, and other virtual property, this approach must not hit repeatedly, and the growing range.
second network attacks to make money
through the There are people devoted to some of the Trojan with remote control other people's computers through the network implantation, allowing them to manipulate the control of these computers to send data packets or offensive advertising, Trojans.
third type of stealing and selling information gain
stealing other people, businesses, organizations, groups, organizations or units of information stored on the server, resell for profit. Newspaper reported in May of this year's profit of Nanjing police cracked the case of sale of information, some of which do not exclude a hacker to steal information. At Aviva
illegal control of Computer Information System
refers to state affairs, national defense, cutting-edge science and technology to implement computer information systems other than the illegal control of serious behavior. According to 刑法第二百 eighty-five the third paragraph: to provide specifically for intrusion, illegal control of computer information systems programs, tools, or knowingly others to commit invasive, illegal control of the computer information system, criminal acts and to provide programs and tools , the circumstances are serious, but also in accordance with the crime of punishment.