Let s talk about the 6 Chinese and foreign hacker wars between 1998 and 2002

Updated on society 2024-02-12
5 answers
  1. Anonymous users2024-02-06

    Result: "China Hacker Alliance", "China Hawks Alliance", "China Red Guest Alliance", etc., rose in this campaign. It can be said that the Sino-US hacker war has promoted the pace of Chinese hackers The "China Red Guest Alliance" has shocked global hacker organizations with a total attack of 80,000 members, allowing them to deeply experience the true strength of Chinese hackers!

  2. Anonymous users2024-02-05

    Look at the world over the wall, break through the shady scenes, and understand the real machine!

  3. Anonymous users2024-02-04

    The 1998 trial laid the groundwork for the first Sino-US hacker war in 1999. After the US military mistakenly bombed the Chinese Embassy in Yugoslavia in 1999, a large number of netizens began to think about taking action, and a large number of netizens who only knew simple computer knowledge learned a little bit of hacker knowledge and participated in the hacker war (they were contemptuously called script children), and China's crowd tactics were formally formed.

    Then came the NATO bombing of the Chinese embassy in 1999, and Chinese hackers once again united on a large scale and launched attacks on the United States. The day after the bombing of the Chinese Embassy, the first Chinese Red Guest**, "Chinese Red Guest's Motherland Solidarity Front" In 2001, the Sino-US hacker war, 80,000 Chinese hackers acted together, making the Chinese red flag fly at the White House in the United States for two hours. They called themselves the "Great Patriotic War".

    The three major hacker organizations, the China Red Guest Alliance, the China Hawks Alliance, and the China Hacker Alliance, have become the main force in this Sino-US hacker war. For a time, Lion of the Red Alliance and Wan Tao of the hawks became Chinese hacker heroes.

    The former preached the spirit of the red guest and gave himself a unique name - "red guest".(honker), hoping to prove the legitimacy of his attacks with the justice of his political stance.

    Hackers are an industry that only a very small number of people can enter, every hacker has a period of cruel youth, the vast majority of people are interested in computer assembly language in the first and second years of middle school or college, and then, they must spend a lot of time on basic learning, so as to enter the road of hacker advancement, the vast majority of people are difficult to overcome this challenge and choose to give up. Hacking is also an industry that only young people can engage in, and the older generation of Chinese hackers who call themselves old people are only 30 years old, while the new generation may not be in their 20s.

    In the name of culture or patriotism, around 1999, a large number of script kids challenged the barrier to entry for hackers. At that time, hacking technology was as popular as today's blogs, and hastily printed hacker primers and hacker magazines were hastily printed on bookstalls on the streets of Chinese cities. Chinese netizens may have heard the legend of hackers at this time.

    In May 1999, that is, after the US bombing of the Chinese Embassy in the Federal Republic of Yugoslavia, the Chinese red guests attacked some of the **** in the United States, including the Ministry of Energy and the Ministry of the Interior. There was a large-scale attack, and it also caused the ** failure of the White House for three days. The Chinese hack made headlines in major American newspapers at the time.

  4. Anonymous users2024-02-03

    Let's go to the Eagle League**. There is a detailed introduction in it, because the webmaster is the party.

  5. Anonymous users2024-02-02

    1.China Red Guest Alliance.

    2.China Blue Customer Alliance.

    3.Green Corps Organization.

    4.China Anti-Hacker Alliance (

    5.Sentimental Technology Alliance.

Related questions
4 answers2024-02-12

In a poll of the 1,000 most popular sheets of all eras, the band appeared in the news the most times, and was the first and only group to threaten the Beatles in recent times. Their next one, which will take a long time to record, is called "Kid A," and it is widely expected that this one will be the most shocking work. Instead of their more robust production model, this time they're moving away from the guitar and performing in a style that may be closer to the space-age vibe of Pink Floyd, Kraftwerk and Tangerine Dream. >>>More

10 answers2024-02-12

S1 Gladiator (currently completely eliminated) S2 Brutal Gladiator (just the year, can be exchanged for honor) S3 Revenge Gladiator (almost eliminated, all you buy are stupid X, except for the shoulder**) S4 Savage Gladiator (coveted, many people fight for it) A total of 4 seasons, each time the best equipment in PvP will be released, and each time the attributes will be improved a lot. >>>More

9 answers2024-02-12

The latest in 2009 should be the 9130 and 0902, but the 0902 is a customized version of the 9020. That is, the 3G version. >>>More

7 answers2024-02-12

This year is the year of the auspicious star of the zodiac ox friends, the zodiac ox in the palace has a good omen wearing purple clothes, this year's fortune is profitable, thanks to the protection and help of nobles, so that the cause of the higher level. This year's Tai Sui Mao Mu is a feminine wood of flowers and plants, and the ugly soil of the Zodiac Ox is moist wet soil, which can moisten the flowers and plants of Mao Rabbit Tai Sui, and the branches and leaves are lush and multiplying, so the Mao Rabbit Tai Sui has the grace of nurturing, and will get Tai Sui's gratitude and favor. Therefore, there are many opportunities for the zodiac ox in this year, the development space is larger, there are many nobles to help each other, there are great achievements in the career, the wealth is quite rich, the marriage is also happy and emotional, and there is a good marriage and beauty. >>>More

7 answers2024-02-12

Workflow is "the automation of part or all of a business process in a computer application environment", and it mainly solves the problem of "automating the process of transferring documents, information or tasks between multiple participants according to a certain predefined rule, so as to achieve a desired business goal, or to promote the achievement of this goal". >>>More