首先,是最显着的:在任何特定的顺序
在名单的第一部分列出了谁拥有真正的黑客技术和人才。 大多数人通常不会在电视或看到这些入侵黑客网站“黑客”,谁在电视上报道的仅仅是大多数黑客底部。 例如,熊猫的作者,其实,技术不高,在黑客界大多数人只是作为一个玩具病毒。 精湛的技术内容类似的病毒释放的第29A条。
笔者介绍一下自己。 他毕业于哈尔滨工业大学,黑客在2001年环登场,有超过黑客在国多年的论坛潜水。 参加了2004年国家顶级黑客会议XCon的(安全焦点问题首脑会议)(注:废话。)于2003年在国际顶级搜索引擎公司谷歌,后因个人原因离开就职典礼。 有一个在黑客社区基金会一定的知名度。 因此,本文具有一定的权威性。 至于我是谁,以免被追杀,或未知的话。 启动以下文字:
列表的资深黑客的第一部分。 中国黑客早期的技术是养牛业的人。 是真正的主人。 现在是一个世纪前的技术或最,最好的,普通老百姓是不能。
在下面的手这些人反对的人很多未发表的漏洞很多。 是一个圆称为〇天。 这么大的伤害○天可以在黑市上出售通常几百上千万元。
这种原始发布地址:通过https://docs.google.com/Leaf?ID=1rO9CxzojOO0Qho-VOIUpGjwfZhAqcuRWnVXAbluCk4I&sort=name & layout = List & NUM = 50
所有博客原创内容除上述注意:下面的列表只对黑客的一部分,当然,也有一个高级黑客很多。 只有现在基本上告别科技产业。 在以下领域的人物大多也是有关的活动,优先名单。
sunwear
QQ: 47347
Microblogging: http://t.qq.com/sunwe4r
Blog: http://hi.baidu.com/patricksunwear the Japanese do not seem to baby brother. Core members of EST. Hand many of his circle have not publicly known vulnerabilities. Vulnerability aspects of invasion and infiltration expert, who was programming the kernel cattle. Has invaded the world’s top hackers Metasploit, University of Cambridge and many other high-end institutions. A few years ago the world’s top two defcon and blackhat hackers have the General Assembly has been reported to him.
Barbed
QQ: 32750912
Microblogging: http://t.qq.com/aullik5
Blog: http://hi.baidu.com/aullik5
Thorn brother, brother wind. Tall thin. Is a purely technical hackers hacking circles Phantom Brigade founder. One of China’s top hackers. Taobao is currently working for the company as network security sector. Is holding a lot of people did not open holes. 0day lot of great influence are from Phantom Brigade. WebZine promoter. And develop over WIKI system. Has also traveled to the United States Conference of the World’s top hackers, blackhat. .
dm
QQ: unknown micro-Bo: http://t.qq.com/zoeluk
Blog: http://hi.baidu.com/int3
China’s top underground hacker organizations, 0 × 557 core members. Is a loophole mining, use of a master. Needless to say, the vulnerability is much hands can wholesale the. Currently working world-renowned anti-virus anti-virus software company McAfee (intel has just been acquired.) Now writes in the iphone, ipad under the security software. Appears to be a versatile player.
flashsky
QQ: 38062 & 16202253
Blog: http://hi.baidu.com/fs_fx
Microblogging: http://t.qq.com/flash-sky
Xing Fang. Brother empty flash. Famous hackers core members of the Security Focus. WINDOWS 2003, the history of the most serious security flaws are global launch details, hundreds of high-risk level security vulnerability discoverer, served as Venus, the United States EEYE, Chair of the U.S. Microsoft security experts, U.S. Microsoft BLUEHAT the first Chinese speakers, members of the Security Focus, Source Information Technology Co., Ltd. Nanjing Hanhai founder and CEO. On the vulnerability of research is quite profound. I wish the company well.
tombkeeper
QQ: 644909
Blog: http://hi.baidu.com/tombkeeper
Microblogging: http://t.qq.com/tombkeeper
Certain. Tk legendary leader. Famous hackers core members of the Security Focus. Worked NSFOCUS, commonly known as gynecological Kathrine. On the windows operating system and other aspects of vulnerability can be said to be very proficient. The focus in the security forum, in recent years has been regarded as a leader of TK. For other areas of science also has a unique perspective. Writing is thinking of is also very unique.
glacier
QQ: 1973435
Microblogging: http://t.qq.com/glacier
Huang Xin. Columbia Glacier. Huang total. With the well-known hacker organization for domestic security focus of the core members. Shenzhen Dacheng world is one of the founders. Remote Control is the first Trojan horse “ice,” the author of the well known security scanning tools to “x-scan” of the author. Master hacker programming for network protocols, encryption security, and have a deep understanding of software engineering. Female hackers wollf husband. A humorous person. From the micro-Bo can be seen on the. Has a father, of course, the child is not Trojan, is a handsome guy. And then look for this blessing.
swan
QQ: unknown micro-Bo: http://t.qq.com/Swan557
0 × 557 (SST) core members, for linux, windows operating system vulnerabilities can be described as well known.
goodwell
QQ: 19558287
Microblogging: http://t.qq.com/goodwell
Gong Wei. Security To Information Technology. Green Corps early hackers in China, founder of the legendary godfather of Chinese hackers. Have received the visit CCTV. World of Warcraft is that the senior players.
xundi
QQ: 518860
Microblogging: http://t.qq.com/idnuxzhang
Di Zhang Xun. Early organization of domestic security focus of the famous founder of hackers. Introduced not too specific, because they do not know, ha ha.
lion
QQ: 21509
Microblogging: http://t.qq.com/coollion
Yong Lin. Honker Union of China founder. With the most Internet users are aware of the Internet Alliance, China Honker different. This is the real Honker Union of China. As for the so-called sharpwinner, I can only use one word to describe the term civilization sensitive “SB” “mud horse.” Now as the year for the technology, and has had a farewell from technology.
isno
QQ: 1070681
Microblogging: http://t.qq.com/isnoblah
Core member of the security focus. Currently working in Beijing HuntKey letter to the company. Overflow vulnerability has written many aspects of use of the article (WEBDAV, IDQ, IDA, etc.). exploit also wrote a lot. Now more low-key.
Sky
QQ: 911189
Microblogging: http://t.qq.com/tian_xing like do not use one of the first generation of hackers. Was launched in 1999 with attacks on foreign websites. Network assassin, network guards are representative works. His exploits on the overflow and also has studied, such as RPC exploits. And he wrote back door is very good.
quack
Microblogging: http://t.qq.com/wulujia
Wu Lujia. Founder of Shenzhen reached the world. Trojan China Xin Huang a good relationship with the father. Security the focus of early active person, ID: quack.
icbm
QQ: Unknown
http://t.qq.com/icbmx2 basic no Zhao Wei. Chong Yu know that one of the founders. Information security has worked for the company famous Venus of active defense laboratories. Of the operating system and third-party software vulnerabilities have a deep understanding, a lot of men’s vulnerability is not public. Including some of the unique aspects of web-based vulnerabilities.
sowhat
QQ: Unknown
Xue. Worked for a security unit. Went to the United States participated in international top-level hacker conference blackhat. Hand many unpublished vulnerabilities. This year, China’s top hacker event seems to still draw in a xcon a PS3.
vxkQ: 86879759
Microblogging: http://t.qq.com/cvcvxk
A few years ago the virus active in the famous forum for CVC. Is the leading virus experts. And programming of the operating system kernel, reverse, break very proficient. Procedure can be described as all-around experts.
refdom
Microblogging: http://t.qq.com/refdom
Core member of the security focus. Honker Union of China was once a member.
watercloud
Microblogging: http://t.qq.com/watercloud
Chong Yu know that one of the founders. Very good relationship with the icbm. Core member of the security focus. Of vulnerability, such as encryption and decryption have those years of research experience, trends and developments in network security has a unique perspective. The most important thing on the vulnerabilities, 0day regard, 0day hand the number of very objective.
alert7
QQ: 415451
Blog: http://hi.baidu.com/weiwang_blog
Core member of the security focus. Who took office with the well-known anti-virus software MCAFEE. Currently working in Nanjing Hanhai source (Flashsky the company). Of research experience on linux for 10 years. For linux and other open source systems overflow vulnerability analysis using fingertips.
Yuan Gebo off: http://hi.baidu.com/yuange1975
Yuan Colombian legend. Yes, China’s top hackers of all circles who all admire. To only NSFOCUS. Yuan brother in mathematics, programming, vulnerability, and many other aspects of accomplishments that no one can match. Many other loopholes to the number of years earlier had been discovered and the perfect use. Called the vulnerabilities of the people. Hacker community’s top experts.
sunx
QQ: 239670
Sun Wah. China is very famous hacker programming expert and overflow with the use of loopholes and research, wrote EXPLOIT. For example, IDA loopholes and printer. 9X’s written in virus assembly. And composed the operating system backdoors.