Current location: home page >Hacker

Wu Di: Wu Yun Accomplished His Mission | Wu Yun's Memoirs (I)

The Descendants of Light 7 years ago (2017-11-13) two thousand five hundred and sixty-one
 Wu Di: Wu Yun Accomplished His Mission | Wu Yun's Memoirs (I)
Reprint description: "Memoirs of Dark Clouds" is a special topic produced by the technology we media "Light Black Technology". The vulnerability platform was shut down in 2016. A year later, I tried to visit people related to dark clouds to understand their views on network security, white hat hackers, and the world. May these records arouse more people's thinking. Everyone has his own position and reason

What the hell is infectious virus/jadtre.ex?

The Descendants of Light 7 years ago (2017-08-05) nine thousand seven hundred and fifty-three
 What the hell is infectious virus/jadtre.ex?
I haven't updated my blog for a long time, but I didn't think that the update was because my computer was infected with a virus... I can't help it. Who let me take the risk to click the trust button popped up by the anti-virus software! I remember that the last time my computer was infected with a virus in college, the virus infection seemed very serious, forcing me to clean all the grids. That painful lesson made me have the habit of using anti-virus software

Is it true that one click seamless video? Of course, it's fake. Stealing the cracked version of video software is deceptive

The Descendants of Light 7 years ago (2017-05-15) four hundred and fifty-three thousand four hundred and fifty-seven
 Is it true that one click seamless video? Of course, it's fake. Stealing the cracked version of video software is deceptive
Today Monday, I opened Baidu Statistics to watch the blog traffic, and was surprised: Top10 search words were even dominated by these keywords (how to activate one key traceless video, one key traceless video cracking version, one key traceless video mobile version, one key traceless video is true, one key traceless video is useful, one key traceless video is not exciting

Bitcoin blackmail virus file repair, how to recover or crack the encrypted file after poisoning?

The Descendants of Light 7 years ago (2017-05-14) three thousand and twenty-one
 Bitcoin blackmail virus file repair, how to recover or crack the encrypted file after poisoning?
Two days ago, I just saw the news of Bitcoin market, saying that 1 Bitcoin has exceeded 10000 yuan. At that time, I had a ha ha. This kind of "electronic currency", which is specially used to launder money, comes to the news from time to time to brush the sense of existence, and attracts some takers to continue to raise prices. Unexpectedly, a "Bitcoin virus" suddenly appeared in the past two days. For just two days, the news was full of bitcoin blackmail viruses

How to view the leakage of resume data in 58 cities? 58 Resume data bt download?

The Descendants of Light 7 years ago (2017-03-28) two thousand two hundred and ten
 How to view the leakage of resume data in 58 cities? 58 Resume data bt download?
Today, I saw the news that the resume data of 58 cities were leaked, and 700 yuan could buy the national resume data. Another large-scale information leakage event? A resume, as its name implies, is a concise written introduction to one's education background, experience, expertise, hobbies and other relevant information. Resume is a standardized and logical written expression of targeted self introduction

Ecshop three-tier distribution mall Xiaojingdong V5.0 multi merchant version @ Jinshang China. rar back door and vulnerability details

The Descendants of Light 8 years ago (2016-08-10) five thousand one hundred and twenty-five
 Ecshop three-tier distribution mall Xiaojingdong V5.0 multi merchant version @ Jinshang China. rar back door and vulnerability details
Have you downloaded Xiaojingdong V5.0 multi merchant version | B2B2C mall system source | with touch screen version+WeChat+repair payment program of a three-level distribution mall of a source code forum? The compressed package file name is: Xiaojingdong V5 multi merchant version of the three-level distribution mall @ Jinshang China. rar. If yes, please note that the source code of this program has a back door, and it is webshe

Count the leaked databases, which are known to be public at present! No download available

The Descendants of Light Nine years ago (2015-02-11) ten thousand nine hundred and sixteen
 Count the leaked databases, which are known to be public at present! No download available
Let's take a look at this super long picture first. Here is a reminder for everyone to be careful about leaving privacy information on the network! At the same time, I often change my password. It took a long time for the siege lions and program apes on the Sky Bug Vulnerability Response Platform to sort out such a beautiful picture. What is sorted out here is only the part that has been publicized. In fact, there are a lot of databases of many enterprises circulating underground

12306 user data was leaked in a large amount, and 12306 pants were spread on the Internet

The Descendants of Light 10 years ago (2014-12-25) nine thousand and fifty-two
 12306 user data was leaked in a large amount, and 12306 pants were spread on the Internet
Another large-scale password leakage event! I think it might be on CCTV! Today, someone on the dark cloud said: "It's New Year's Day, many black cattle are dying. I saw the data of 12306 spreading just now, and I even have my own sensitive data, alas..."... PS: The data is only for dissemination and sale. At present, we can't confirm whether it is the official 12306 or the No

Analysis of NTP reflection amplification attack

The Descendants of Light 10 years ago (2014-12-23) three thousand four hundred and eighty-one
 Analysis of NTP reflection amplification attack
The server did not know which domain name was attacked by NTP, so it came to study the countermeasures. The following article is reproduced: NTP amplification attack was very active a while ago, now let's briefly analyze it. Attack principle: 1. Take advantage of the natural vulnerability of UDP protocol, that is, you can directly send data to the client without establishing a connection in the early stage; 2. On the Internet

What should I do if the server is blocked by IP due to heavy traffic attacks?

The Descendants of Light 10 years ago (2014-12-16) fourteen thousand three hundred and ninety-seven
 What should I do if the server is blocked by IP due to heavy traffic attacks?
Today, the server was inexplicably blocked by the computer room's IP address, saying that it was attacked by a large amount of traffic (all of them are websites without weight, who would be bored to attack?), so I quickly changed an IP address and installed a version of the security dog server on the server. I thought I would not be afraid of being attacked now! Unexpectedly, the IP was blocked again after half a day. What's the matter? Ask the space merchant