Crime time for Chinese net users

The figures, from security firm Ciphertrust, come amid spiralling rates of internet use in China.
China already has the second biggest net-using population in the world, even though only 8% of its people go online.
Now spam and viruses are becoming big problems, since the government relaxed controls on the net, an expert says.
Net use is growing fast and by 2007 the number of people using broadband in China should surpass those in the US.
But China is not just keeping up on ordinary net use and users, it is also setting the pace on computer crime too.
Typically the hijacked PCs fall under the remote control by malicious hackers when the machines fell victim to a virus such as a worm or Trojan.
Often the controllers of these so-called zombies do not live in the same nation as the machines under their sway.
Ironically much of the spam sent via these hijacked machines may not reach Chinese people at all.
-
- Login or register to post comments
Printer-friendly version
- 1341 reads
PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
Events: Video Conferences, Code.gov, and LibreOffice
| GitLab Web IDE
|
Record Terminal Activity For Ubuntu 16.04 LTS Server
At times system administrators and developers need to use many, complex and lengthy commands in order to perform a critical task. Most of the users will copy those commands and output generated by those respective commands in a text file for review or future reference. Of course, “history” feature of the shell will help you in getting the list of commands used in the past but it won’t help in getting the output generated for those commands.
| Linux Kernel Maintainer Statistics
As part of preparing my last two talks at LCA on the kernel community, “Burning Down the Castle” and “Maintainers Don’t Scale”, I have looked into how the Kernel’s maintainer structure can be measured. One very interesting approach is looking at the pull request flows, for example done in the LWN article “How 4.4’s patches got to the mainline”. Note that in the linux kernel process, pull requests are only used to submit development from entire subsystems, not individual contributions. What I’m trying to work out here isn’t so much the overall patch flow, but focusing on how maintainers work, and how that’s different in different subsystems.
|
Recent comments
3 hours 55 min ago
3 hours 55 min ago
3 hours 57 min ago
7 hours 3 min ago
7 hours 15 min ago
14 hours 7 min ago
1 day 16 hours ago
1 day 17 hours ago
1 day 22 hours ago
2 days 23 hours ago