Welcome to YLOAN.COM
yloan.com » Home-Securtiy » Black Horse Into The Billions Of Years Of Anti-chain Imperative - Trojan, Black Chain - Security
Family Home Improvement Kids & Children Parenting baby Babies-Toddler Crafts-Hobbies Elder-Care Holidays Home-Securtiy Interior-Decorating Landscaping-Gardening bedroom lake apartments hardwood shower generation generator contractors patio roofing locksmith bleach housing jaw appliance domestic

Black Horse Into The Billions Of Years Of Anti-chain Imperative - Trojan, Black Chain - Security

HC Network Security According to Voice, "the Central Canton News" 10:08 reports

, most recently, the implementation of the network computer Trojans Crime Cases emerging, such as stealing bank account passwords, game equipment, and even privacy. There are numerous people very hard to detect. An invisible, intangible Hacker Industrial chain has been formed. Insiders estimate that China's horse industry chain revenue this year alone more than 10 billion yuan. Hubei Macheng police recently uncovered a network of manufacturing spread Trojan criminal gangs smashed this is the first complete upstream and downstream industry chain Trojan crime.

The large network of criminal cases is disconnected from a network event exposed. October 7, 2007, Hubei Province Area Ma Bridge City Golden Telecom Internet, suddenly interrupted across the board, resulting in the bridge area 45 gold enterprises paralyzed the work of all, up to 3 days. In the telecommunications sector struggling to find the cause of time off network, Zhao Macheng a certain Internet cafe owner reported to come to the Public Security Bureau. Zhao said the unidentified bars received a Figure Threat. Internet cafes often claims dropped, not telecommunications, but their attack was. If you want the normal operation of Internet cafes, it is necessary to give them 8,000 yuan to buy their software, or Internet cafes called paralysis.

Deeper investigation into the police eradicate black horse industry chain

Hubei Province Public Security Bureau deputy director Huang Shaokui Macheng introduced after police received a report, in time to report to public security organs at higher levels. Corps of Hubei Province Public Security Bureau Network monitoring and network monitoring Huanggang Municipal Public Security Bureau sent a detachment rapidly effective Technology Personnel and experienced investigators and Macheng police handling the case jointly. Province and county levels policemen study suggests that this is not an ordinary network problems, should be more serious with Network Security Criminal.


Police analysis, the Internet cafes in the field should be some criminal suspects to provide the IP address of Internet cafes. Policemen quickly is a captured high Internet cafe. According to one account of the high, because of the Internet cafe owner is dissatisfied, he told friends in Jinan, Shandong "Black Liangdian" attacks on Internet cafes. After more than seven months of investigation, the police finally "black POINT" brought to justice. At this point, the police found, "Black POINT" is not an ordinary player in online spoof, but a black horse traffic commercial and industrial chain Agents . Police immediately instructed, the four on Shijiazhuang, five under the Guangzhou, Shenzhen, Guangzhou, Anhui, and the "black POINT" last line "when the snow of the moment" and off the assembly line, "good mood, and others" captured.

Clear division of these suspects. Trojan writers write specifically for criminal identity theft online account weight, remote control Trojan horse, Trojan horse downloaders and other kinds of Product And hacking tools; some dedicated software, wholesale, distribution and agency; some for others to use Trojans to steal QQ accounts and online games account and is responsible for selling the game equipment, to obtain illegal gains. They started from October 2008 online co-production, sales, communication Trojan, in less than six months, nearly 2 million yuan of illegal profits.

by: gaga
Why Safe Locksmiths Can Give You Added Security Security Systems and CCTVs for Protecting Your Property Is Your Enterprise Mature To Handle Security And Compliance Solutions? Furthering Career Prospects: Information Security Courses Microsofts Patch Tuesday To Fix 40 Vulnerabilities Found By Information Security Researchers Making Sure You Get The Best Out Of Your Cctv Security System Security Systems Charlotte Hefei: 35 Years, Attendance Is Expected To Achieve "smart Card" - Hefei, Card - Security Guide-Information Security Quiz: True or False? How Security Hologram Stickers are Important Summary: Review Of Methods Commonly Used In The Securities Exam Review Summary - Review Of Methods - Use Of Weak Authentication Parameters Puts Information Security Of Over Million Individuals At Risk Securityshieldfraud Refuses To Be Removed - How To Get Securityshieldfraud Away From My Pc
print
www.yloan.com guest:  register | login | search IP(216.73.216.125) California / Anaheim Processed in 0.035811 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 12 , 3566, 221,
Black Horse Into The Billions Of Years Of Anti-chain Imperative - Trojan, Black Chain - Security Anaheim