The real official website of China Red Hacker Alliance
Red Alliance website is: www.中国红客联盟.com
China Red Hacker Alliance, also known as H.U.C. China Red Hacker Alliance was founded at the end of 2000, led by hacker legend LION to form the organization, which absorbed many hacker masters from all over the country. H.U.C. was founded at the end of 2000, led by hacker legend Lion. Its members once reached more than 80,000 people, and became the world’s fifth-ranked hacker organization. The organization mainly counterattacks the attacks of some foreign hackers. On December 31, 2004, the fourth anniversary of the founding of the Red Hacker Alliance, published an open letter on its website, announcing its dissolution, and at the same time closed the website. 9/22/2011 announced that it was reorganized, and the new website was opened on November 1, 2011, and the new website is now open.
What is the URL of China Reddit Union?
The only official Red Alliance URL now is: www.中国红客联盟.com
Who can give me China BT Alliance home page URL
Too many sites are useless, there are a few of the following will be sufficient
< p>http://www.btchina.net/BT@China (very powerful BT publishing site)
http://bt.fkee.com/飞客BT搜索引擎 (very powerful BT search engine)
http://bbs.cnxp.com/影视帝国 (the best BT Forum)
http://bt.5qzone.net/5Q地带 (also a very powerful BT publishing site)
http://www.tiantianbt.com/天天BT下载 (also very powerful, I use Liaoning Netcom, the fastest speed, I do not know how other places and telecommunications)
http://917173.com/BT精品下载 (nothing famous, there are very few movies, but the quality of the movies are very good, I like it very much)
http://www.bitcomet.com/BT官方网站 (nothing useful)
http://www.verycd.com/ eDonkey download (this site is generally known, eDonkey is not as good as BT, but the resources on this site are not comparable to any BT site, and the stuff in it is of high quality, and it’s not bad to use an eDonkey, and how BT doesn’t have such an authoritative resource station)
What is hacking? What is the history of hacking?
A hacker (hacker) is a person who enjoys using their intellect to push the limits of their brain power through creative methods, especially in their areas of interest, such as computer programming or electrical engineering.
Hacker is derived from the English word hacker, which in the early days had a positive connotation in the U.S. computer world. However, in media reports, the term hacker is often used to refer to those who are “softwarecrackers” (软件骇客).
The term “hacker” was originally used to refer to computer specialists, especially programmers, who were passionate about computer technology and were highly skilled.
But today, the term hacker has come to be used to refer in general to those who specialize in using computers for sabotage or mischief. The correct English term for these people is cracker, which some people translate as “hacker.
The fundamental difference between a hacker and a slasher is that hackers build, while slashers destroy.
The term hacker has four general meanings:
A person who knows enough about a programming language (in a field) to create useful software without thinking about it for a long time.
A person who maliciously (generally illegally) attempts to crack or compromise the security of a program, system, and network. This meaning is often so troubling to hackers who fulfill condition (1) that they suggest the media refer to this group as “crackers”. Sometimes the group is also called “black hat hackers”.
A person who tries to crack a system or network in order to alert the owner of the system to a security breach. This group of people is often called “white hat hackers” or “sneakers” or rednecks. Many of these people are employees of computer security companies and attack a system in a perfectly legal manner.
A person who, through knowledge or guesswork, makes (often good) modifications to a program and changes (or enhances) its use.
“Script kiddies” are those who have no or little hacking skills, but simply follow instructions or run some kind of hacking program for cracking purposes
Richard Stallman – the traditional big hacker. Stallman was hired as a programmer at the MIT Artificial Intelligence Laboratory in 1971.
KenThompson and Dennis Ritchie – programmers in the Computer Science Operations Group at Bell Labs. The two invented the Unix operating system in 1969.
John Draper (known as Captain Click, CaptainCrunch) – invented the free phone call with a plastic whistle
Mark Abene (known as PhiberOptik) – inspired countless teenagers across the U.S. to “Learn” how the U.S. internal phone system works
Robert Morris – Cornell grad who accidentally spread the first Internet worm in 1988.
KevinMitnick – first hacker to be placed on the fbi’s most wanted list.
KevinPoulsen – Poulsen won a radio-sponsored listener game with prizes in 1990 when he managed to take control of all phone lines coming into the Los Angeles area’s KIIS-FM radio station.
Vladimir Levin – The mathematician who led the Russian hacker group that defrauded Citibank into distributing $10 million to it.
Steve Wozniak – One of the founders of Apple Computer.
TsotumuShimomura – breached the bank account of Steve Wozniak, then the most famous hacker, in 1994.
Linus Torvalds – He developed the famous Linux kernel in 1991, when he was a computer science student at the University of Helsinki, Finland.
Johan Helsingius – Helsingius developed the world’s most popular anonymous reply-to-message program, known as “penet.fi”, after he closed his small store in 1996, and his troubles began to follow. One of the most tragic was a raid by Finnish police in 1995 after the Church of Sceintology complained that a penet.fi user had posted church secrets on the Internet, and he later sealed the reply program.
TsutomuShimomura – can remember him because of the capture of Mitnick.
EricRaymond – Eric Raymond has been active in the computer world since then, working on a wide variety of computer system development. At the same time, EricRaymond was more enthusiastic about the development and promotion of free software, and wrote articles, gave speeches, and actively promoted the development of the free software movement, making great contributions to free software. The articles he wrote, such as “Cathedral and Bazaar”, are classic and beautiful articles in the free software world. Netscape decided to open up their source code under the influence of this article, making the browser an important member of the free software family
[Reddit] — a name that makes people stand up in awe!
Honker is a name given to Chinese hackers. The English word “honker” is a translation of the word “red”.
The Honkers are a group of hackers who fight to defend China’s sovereignty!
Their spirit is admirable!
Crackers – enjoy exploring software programs!
Crackers – Cracker
Crackers, they target some software that requires registration. They usually utilize Debug to find out the passwords in memory.
[Blues] – Hackers who are particularly fond of the color blue!
Bluecoasters, too, belong to the hacker group.
Blue Hackers, are people who exploit or discover system vulnerabilities, D.o.S (DenialOfService) systems, or cause a personal operating system (Windows) to blue screen.
The term “bluer” was coined in September 2001 by the China Bluer Alliance (www.cnlanker.com). At the beginning of the Blue Guest Alliance (China Blue Guest Alliance) is a non-commercial civil network technology institutions, the alliance to carry out organized and planned computer and network security technology research, exchange, collation and promotion of work, and advocate the principle of freedom, openness, equality and mutual assistance. At the same time is also a civil patriotic groups, blue alliance action will always be closely integrated with the current political, blue alliance of all statements and actions are built on the basis of patriotism and safeguard China’s dignity, sovereignty and territorial integrity of the blue alliance of the voices and actions of the Chinese nation’s temperament embodied. The League of Chinese Blue Guests (LUC), referred to as the Blue Union, was formed on October 1, 2001. In April 2002, the public security department was pressured by the Ministry of Foreign Affairs to begin investigating the incident, and the core staff of the Blue Union was summoned by the public security authorities and investigated that month, and their computers were seized and sent to the higher-level public security department for evidence collection and investigation. After the alliance was told to unconditionally and indefinitely close the site, and permanently stop using the name “blue league”.
On June 2, 2002, the League held a “Farewell Meeting of the Chinese Blue Hakkas League” on the IRC channel, in which hundreds of netizens learned about and witnessed the formation of the League and the inner workings of the forced closure of the League.
There is only one China Lanker Alliance, that is, cnlanker.net between October 2001 and June 2002, that is our good memories, that is
the only witness that we used to share the joy of victory together, and pass through those gray days together. Unfortunately, the domain name is no longer in our hands.
Beginning in June 2002, any organization or website that calls itself the Bluehost Alliance or the Blue League belongs to other netizens’ spontaneous personal behavior, and has nothing to do with the original Blue League
The current cnlanker.com is a reminiscence of the group of people who originally formed the Blue Alliance, which will never be rebuilt.
[Flyer] – A pioneer in telecom networking!
Flyers, often utilizing loopholes in program-controlled switches, accessed and researched telecommunication networks.
Though they are not famous, they have made a great contribution to the telecommunication system!
Blue Guest’s user guidelines
Chapter I General Rules
Article 1, China Blue Guest Alliance Forum is created by the Blue Guest Alliance team (LUCTEAM), is to exchange computer security technology-based online community.
Article 2, in order to protect the healthy development of China LUCEAM Forum, safeguard the legitimate rights and interests of users, and regulate the behavior of information dissemination, according to the relevant state laws and regulations, the formulation of this approach.
Article 3, members of this forum are independently responsible for their own published content, China Lancers Union Forum does not involve any political topics, please understand.
Chapter 2 Community Users
Article 1, all users of this forum must comply with the relevant laws and regulations of the People’s Republic of China and the provisions of this forum. It is strictly prohibited to publish rumor-mongering, insults, defamation of others, incitement to subvert state power and disclose state secrets; it is strictly prohibited to publish violence, obscenity, pornography, superstition, promote racial discrimination, and undermine the unity of the nation’s remarks and messages; the articles published by the user only represents his personal views, and has nothing to do with the Blue Hakkas Union; the user shall bear all the civil, administrative or criminal liability resulting directly or indirectly from his own actions. In any case, the League of Blue Guests does not assume any responsibility for the accuracy, legality, completeness of the content, as well as any loss or damage caused by the content. The content published by users only represents their personal views, and has nothing to do with the Blue Hakka Alliance.
Article 2: Users need to provide detailed personal information in accordance with the prompts to register in the Blue Hakkas Union, and ensure the authenticity of the information. In the event of changes in personal information, the user is responsible for timely revision of personal information. If the personal information provided by the user is inaccurate, the League of Blue Guests reserves the right to end the user’s right to use the network services provided by this site. In the event that a user needs help or a dispute arises, the user shall bear all the consequences of not being able to confirm the identity of the user and his/her right to use the account, and not being able to provide the user with the corresponding help.
Article 3, without the authorization of the user, the Bluehost Alliance will not disclose, edit or disclose their personal registration information.
Article 4, once a user registers successfully and becomes a legal user of China Lancel Alliance, he will get a password and a user name, through which the user can use all the community services of Lancel Alliance. Users will be fully responsible for the security of their user name and password. Each User is solely responsible for all activities and events conducted under his/her User Name. Users may instruct to change their password at any time. Users should immediately notify the Bluehost Alliance of any illegal use of user accounts, passwords, or security breaches.
Chapter III Community Speech Rules
Article 1, the community users enjoy the right to freedom of speech; users must be responsible for their own speech, the user moderately has the right to modify, delete their published articles.
Article 2, the community users shall not publish in this community contains the following content of speech:
(a) violation of the basic principles established by the Constitution;
(b) endangering national security, leaking state secrets, subversion of state power, undermining the unity of the country;
(c) damage to the national honor and interests of the country;
(d) incitement to ethnic hatred, ethnic discrimination, undermining national unity;
(e) undermining the state’s religious policy, promoting cults and feudal superstitions;
(f) spreading rumors, disrupting the social order, undermining social stability;
(g) spreading obscenity, pornography, gambling, violence, terrorism, or abetting a crime;
(h) insulting or slandering others
(i) inciting illegal assembly, association, procession, demonstration, gathering of people to disrupt the social order;
(j) activities in the name of illegal civil organizations;
(k) contains other content prohibited by laws and administrative regulations.
(xii) Vicious flooding posts.
Definition of pernicious flooding: sending a large number of posts of the same content in a row to send a large number of meaningless text graphics a large number of copies of other people’s content of the flooding (to solve the technical problems of the copy is not included) in the technical problems of a large number of replies to the flooding of the content of the third, the community users in the relevant discussion forums to publish articles, in addition to complying with the terms of this article, you should also comply with the relevant provisions of the discussion forum.
Article 4: Without the consent of the Lancel Alliance, it is prohibited to publish any form of advertisement in this community.
Chapter 4: Community Management
Article 1: This community has set up a hierarchical management system consisting of community administrators – large moderators – small moderators.
Article 2: The administrator of this community is an important core member of the China Lancers Union; the administrator exercises all the duties and powers of station management of this community; the administrator represents the official position of this community, and the remarks of any community moderators and netizens other than the administrator are borne by him/her and have nothing to do with the position of this community.
Chapter V bylaws
Article 1, the community between users through the community acquaintance, interaction occurs or may occur in any psychological and physical harm and economic disputes and losses, the Blue Hakkas Union does not assume any responsibility, the user can contact the management of this community in a timely manner.
Article 2: Any conflict between these guidelines and national regulations shall be subject to national regulations, and the guidelines can be re-modified. Lancel Alliance has the final interpretation of this guideline. This article is effective from the date of publication!
Introduction of Lanker Union
LankerUnionofChina (LankerUnion), referred to as LankerUnion, also known as L.U.C. It is a non-commercial civil network technology institutions, the alliance to carry out organized and planned research, exchange, collation and promotion of computer and network security technology, and to advocate the principles of sharing, freedom, equality and mutual assistance. At the same time, the Blue League is a civil patriotic group, the Blue League’s actions will always be closely integrated with current affairs, the Blue League of all statements and actions are based on patriotism and the maintenance of China’s dignity, sovereignty and territorial integrity of the foundation, the Blue League of the voice and action is the embodiment of the Chinese national temperament.