latest desktop operating system, MacOS X, are the only players who successfully break the target system. At the same time he was also compromised Winike free trainer 3.0 running
ndows8.1, takes only 20 seconds, the same scene only winners. Last November, at the Pwn2Own contest in Tokyo, Keen with 30 seconds to break Apple's iOS 7.0.3 phone system in the field of information security to become China's first world champion. How to attack Liang is done on the "target computer" to build their own browser and enter the URL, after they run on their computer attack code; within half an hour if it can manipulate the target computer, such as the computer can monitor keystrokes order, even if successful. "'I do not know to attack, how can we know the anti-' offensive purpose of our study is to better carry out security and defense." Keen belongs to Shanghai Science and Technology Co., Ltd. · earthquake cloud computing, the company's co-founder, COO said. Has sought to focus on the cause of the loss of his girlfriend's international vision Keen team is not always like to use Chinese "hackers" from that because people feel the word is mysteriously do "black thing", constant use, also known as he is a "white hat hacker." Liang from Shanghai, was born in 1986, graduated from the undergraduate and graduate respectively, Shanghai Jiaotong University and Fudan University. To prepare for these two Pwn2Own competition, Liang every time before the game "retreat" for two months. The so-called retreat, is to put himself in a small rented room, basically cut off contact with the outside world, thanks to takeaway meals, staying at home every day, in addition to six hours of sleep, the other time in front of the computer how to find the target system vulnerabilities. Of course, the total code of the operating system up to tens or hundreds of millions of lines, line by line to find loopholes impossible, "If that's the case,
I am afraid that a decade's worth it." He will use logic and some of the Keen team internally developed tool to exclude those apparently not vulnerable code. Looking to find loopholes in the right direction, is the focus of research for. Recent retreat, Liang until two weeks before the race on March 1 evening to find a breakthrough. During that time, his daily sleep time has been reduced to 4-5 hours. "That is already eleven o'clock at night, what is the feeling of being hit by a sudden inspiration, think that idea will be able to, so thoroughly insomnia, and quickly test on the computer." After the success, he is like in the tens of millions ofnike free tr running shoes
lottery as excited. Liang focus on one thing for such a process, "enjoyed", but had a sense of loss after the award. He admitted that he usually would have some "home", "because it more able to sit still." He can not accept too much focus on the cause, is a former girlfriend and his reason for the split. China to become the world's leading security technology in fact, not just Chen Liang, Keen entrepreneurial team of eight people, is now a member of the core technology, almost all of them are information security field, "Daniel" are top hackers with "one of the three two" to summarize the characteristics of their team: "One-half of the top students from all over the calendar year, one-half mathematics, half from Microsoft." And these people are also called "Frankenstein." The most classic story is that this group of researcher time out together to eat hot pot, happily discuss the "mathematical beauty." Many hackers like math, math rules and logic, and high-level hacking are interlinked. Liang recalled that when we talk about, a lot of jargon from the group of young people
jumped out of the mouth, they drank, talking very loudly, have argued that there is laughter. They have gone through this desk attendant rolling his eyes, then quickly finished the dishes stay away - "a group of Frankenstein." Three years ago, this group of "Frankenstein" in the Shanghai Science and Technology Co., Ltd. was set up to calculate. Lv Yiping said that the reason why we take the name of the team to Keen, take the word "warm, sharp" means. And this meaning can be said almost synonymous with the hacker spirit. He said that his mind has been a dream, is to make China become the world's leading security technology. Lv Yiping repeatedly stressed that, Keen This team is determined to draw a line with a black Nissan, which is the circle of "moral cleanliness", once a person intends to engage in a black Nissan, will no longer be accepted information security circles. According cheap nike free run 3 womens
to Xinmin Weekly, Liberation Daily, party secretary of China Association Shen Weichen Central Discipline Inspection Commission investigation department membersPetroChina: 148 Commission for Discipline Inspection on-site debriefing or written debriefingRecently, the China National Petroleum Corporation Discipline Committee held a debriefing meeting for the year 2013, on the basis of affiliation 120 written debriefing on the Discipline Committee, organized a 28-site debriefing Unit Discipline Committee. Group party members, the discipline inspection team leader Wang Lixin attend the debriefing meeting, the Ministry of Personnel, monitoring bureau to participate in on-site review group consisting of council. Debriefing of four groups, which lasted four days. Discipline Committee debriefing on the performance of duties in 2013, the main problems exist in the work, analysis and countermeasures, ideas and suggestions for future work and other content debriefing, evaluation group and debriefing questions live scoring