Joke Collection Website - Public benefit messages - What is the official website of Social Work Library?

What is the official website of Social Work Library?

What is the official website of Social Engineering Database is as follows:

Social Engineering Database is a product of the combination of hackers and big data methods. Hackers integrate and analyze leaked user data. , and then archive them in one place. The Social Work Database is a database query platform built using the data databases of major website users. “Human flesh search” is sometimes performed by querying the Social Work Database information.

"Social engineering" means social engineering. In the hacker circle, it refers to a method of hacking to obtain intelligence and information. "Human flesh search" on the Internet is an application of social engineering.

Extended knowledge:

Hacker is a Chinese word, both derived from the English hacker. With the emergence of Gray Pigeon, Gray Pigeon has become a hacking technique used by many people to control other people's computers in the name of hackers. , so there was a separation between "hackers" and "hackers". The movie "Hacker" produced by the Movie Channel Program Center in 2012 has also begun to use the word hacker, showing the convergence of Chinese usage habits.

In fact, the meanings of hacker (or hacker) and the original English words Hacker and Cracker cannot be completely translated. This is due to the differences formed in the respective development of Chinese and English language vocabulary.

The word "Hacker" originally referred to computer experts who were enthusiastic about computer technology and highly skilled, especially programmers. It was gradually divided into white hats, gray hats, black hats, etc. Among them, black hats ) is actually cracker. In media reports, the term hacker often refers to software crackers, while the opposite of hackers (black hats) is white hats.

Hackers are a group of technicians who hang around on the Internet. They are familiar with the design and maintenance of operations; they are good at finding out user passwords, are proficient in computers, and are masters of entering other people's computer operating systems, including some people who The insiders actually refer to technicians and computer experts.