论文部分内容阅读
前言先来看看这个: 2005年下半年,作为亚洲最大的国际网络安全专家和黑客的盛会,HITBSecConf2005在马来西亚Kuala Lumpur的Westin酒店举行,有400多人出席。这次会议涉及一系列广泛的议题,从网络黑客到移动电话病毒,无一不包。会议上活跃着很多知名的安全专家,包括工程师和电脑发烧友黑客。而威盛(VIA)赞助了本年度的黑客挑战赛,并展示了VIA StrongBox安全应用方案,并许下重奖:谁能突破StrongBox并找到其中的信息,就能获得 5000美元的奖励。最终,VIA StrongBox成功地抵御了世界最顶级黑客的攻击,奖金原封未动,无人能够领取。网络安全已经是全球范围的热点话题,随着网络越来越深入人们的生活,越来越多的有识之士认识到网络安全的重要性。Intel、VIA、Cisco、赛门铁克……大企业在行动,他们努力探究电脑安全背后的秘密,这既是挑战, 也是商机。相关的产品不断被研发出来,从杀毒软件、防火墙到安全芯片,人们努力从软件、硬件领域巩固电脑的安全;然而另一方面,同样有一群非常聪明的人,利用操作系统本身存在的漏洞,不断通过网络非法访问他人电脑,窃取和破坏他人资料,这就是黑客。世界本就是两极的,没有黑客,或许就没有网络安全产业的诞生。作为电脑最终端的用户,则处在这两大势力之间,无从选择,而对于硬件爱好者来说,对硬件的狂热程度无法保证电脑能在网络环境中长久运行。通晓硬件不是“硬”,面对来自网络的危险攻击,能够令自己的电脑系统也“硬”起来才是真本领!这就是这个时代对硬件爱好者提出的新的挑战。
Preface Take a look at this: HITBSecConf2005 was held in the Westin Hotel in Kuala Lumpur, Malaysia as the largest international cybersecurity expert and hacker event in Asia in late 2005. More than 400 people attended the event. The conference covered a wide range of topics ranging from online hacking to mobile phone viruses. There are many well-known security experts active at the conference, including engineers and computer enthusiasts hackers. VIA sponsored this year’s Hacking Challenge and presented VIA StrongBox security applications with a great deal of rewards: Anyone who breaks Strongbox and finds the information can receive a $ 5,000 reward. In the end, VIA StrongBox successfully defeated the world’s top hacker attacks, bonuses intact, no one can receive. Network security is already a hot issue in the world. As the network deepens people’s lives more and more, more and more people of insight recognize the importance of network security. Intel, VIA, Cisco, Symantec ... Big businesses are moving and they are trying hard to explore the secrets behind computer security, both as a challenge and as an opportunity. Related products are constantly being developed, from anti-virus software, firewalls to security chips, people are trying to consolidate the computer from the hardware and software security; however, on the other hand, the same group of very smart people, the use of the operating system itself loopholes, Constantly through the network to access other people’s computers illegally, theft and destruction of other people’s information, this is a hacker. The world is basically bipolar, there is no hacker, perhaps no network security industry was born. As the ultimate user of the computer, there is no choice between the two forces, but for hardware enthusiasts, the degree of fanatical hardware can not guarantee that the computer can run long-term in the network environment. Knowing hardware is not “hard,” it’s the real skill you can make your own computer system “hard” in the face of dangerous attacks from the Internet! This is a new challenge for hardware enthusiasts of this era.