Joke Collection Website - Cold jokes - Details of Xin Huang.
Details of Xin Huang.
Real name: Xin Huang.
Graduate school: xidian university.
Work: Network Security Website "Security Focus"
Gender: male
Age: 28 years old
Current residence: Guangxi
Website: xfocus.net
Marriage: Just married.
============================================================
Everyone knows that the Microsoft website was hacked because of Trojan horse software. This Trojan horse used in the Trojan War is swaggering into the territory of the Internet. The author of this software is Xin Huang, and we call him the godfather of the Trojan horse. 1999, trojans were widely used by hackers, but most of them were foreign trojans such as BO and BUS. For some novice hackers, knowing how to use these softwares and using them skillfully is undoubtedly the biggest problem on the road to hacking. In addition, most of these Trojans can be captured by antivirus software, which makes most hackers in China reluctant to use Trojans. When most hackers in China were looking for new foreign Trojan horses, a Trojan horse written by China was born quietly. This is a glacier. At the beginning of its birth, Glacier quickly became the most widely used Trojan horse for hackers because of its localization and temporary lack of antivirus software. Glaciers should not belong to Trojans. According to Xin Huang, the author of Glacier, he wrote Glacier out of his own interest and the encouragement of netizens. At first, he just wanted to write a remote control software that was convenient for him, but he never thought of writing a hacker software that was most widely used in China.
After the release of Glacier 1.2, most hackers in China recognized Glacier and regarded it as the best choice for Trojan software. With the support and encouragement of many parties, especially hackers from China, Xin Huang has made great efforts to develop Glacier 2.0. 2.0 has added many functions and features that it didn't have before, especially it is more convenient and hidden than 1.2, so the appearance of 2.0 made Glacier instantly become a well-known Trojan hacker software. Glacier's good concealment and simple use make many people in China who want to be hackers but don't understand hacking techniques deeply addicted to hackers. After using Glacier to invade personal system computers, they can use Glacier to get everything they want. Nowadays, many famous hackers take the first step of hacking with glaciers. The glaciers in Xin Huang make many people feel the pleasure of being a hacker, and also make many people understand the importance of network security.
In fact, as a database programmer, Xin Huang may not be a hacker at all. He has never hacked all websites, and even tested glaciers with his own and friends' computers. But we can't deny the powerful function of Glacier, especially after the development of version 22 of Glacier, which can make all novices instantly become extremely aggressive hackers. All these reasons make Xin Huang the spiritual leader of China hackers, especially junior hackers. We can find the figure of glacier from the computer of almost every friend who wants to know about hackers. In Qian Qian, China, almost one glacier is buried in every 100 networked computers. It is not difficult to find that at present, in large and small Internet cafes, we can often hear the excited shouts of junior hackers searching for glacier victims with glaciers. Glaciers have become synonymous with Trojans in China. Glaciers have become a symbol of Internet terror.
Now Xin Huang has stopped developing subsequent versions of Glacier. As a programmer's conscience, he has to face the harmfulness of Glacier as a hacking tool. Nobody wants to be public enemies. It was these consciences that made Xin Huang give up the later research and development of glaciers. As a person who inadvertently promoted the development of Internet security in China, his name should be as memorable as his software. Although he only brought us a classic Trojan horse program, it still doesn't affect our respect for him at all. Glacier opened the door to our computers, and also opened the door to our understanding of network security.
When Xin Huang was a student in xidian university, Xin Huang plunged into the world of network security for anti-virus and never came out again. 1999 in the first half of the year, Xin Huang compiled the ice horse software. With the rapid spread of Ice Trojan on the Internet, Xin Huang's name is familiar to more and more people.
Glacier Troy has been controversial since it came out. The core of the dispute is that it can be used as both a Trojan implanted in the attacked end and a legal tool for network remote management. Xin Huang himself has never used him to hack other people's computers. Like a pure swordsman, he only cares about technology itself.
In the hacking war between China and the United States, many people attacked with programs written by Xin Huang. Xin Huang has always believed that sabotage is not the goal of real hackers, and the ultimate goal of technical research is to bring everyone's expertise into play in a free and open environment.
In Jianghu, all powerful "martial arts" are harmless in themselves, but it depends on whether they are used to kill or save people. When 90% people use the "glacier" to implant wooden horses for others, Xin Huang feels that the "glacier" has lost its significance of upgrading. After he stopped the research and development of the Ice River Troy, he closed the personal website of the "Trojan Ice River" because this website was being turned into a communication garden of the "Trojan Black Machine" by many fanatical hackers.
At the end of 2000, Xin Huang joined the network security website "Security Focus", and he devoted all his energy outside his work to the research and development and upgrade of the well-known scanner "XSCAN" and the construction and maintenance of "Security Focus".
Xin Huang's comments from friends and girlfriends are: Glacier is practical and hard-working, with good skills but modest, which is his personality charm.
Xin Huang, the spiritual leader of Trojans. He deserves to be the top hacker software in China.
- Previous article:What are the classic northeast dialects?
- Next article:What did Kobe say when he first met Jordan?
- Related articles
- "Loneliness makes you happy."
- Why did you fail the exam to join coco tea shop? How can I pass the audit?
- A joke requiring 500 ~ 800 words.
- I had an appointment with my best friend to hold a concert in another place on June 5438+065438+ 10, but now I have sprained my leg, and the doctor said I need to rest and get braces, so I can't go.
- Little hero's story composition 1200 words
- Afternoon class meeting! Looking for the latest 20 riddle jokes and their answers that are difficult to guess or that few people know! Be harmonious, not vulgar...
- Ask great people and celebrities for jokes, not humor! ! ! thank you
- What do you think of the stele "Correction of Zhuge Wuhou Temple" discovered in Ye County?
- Chowder joke
- Composition How can I communicate and cooperate with classmates Chuang?