You can submit new articles, so we can make unique versions of them and distribute them for you.
If you want to simply publish the same article on 800 websites, you can tell us to do that.
You can see the archive and current status of all your article distributions.
You can order any number of high-quality articles - just let us know your keywords.
You can browse the archive of all the articles we have written for you.
You can order our Complete Service (10 high-quality articles plus 10 article distributions).
You can purchase more credits for our services and check your affiliate earnings.
Much more ...
The following article was published in our article directory on April 15, 2011.
Learn more about SpinDistribute Article Distribution System.
Article Category: Business
Author Name: Amanda xzh
The publicity, in bank U aegis is to protect the individual net silver-colored safety the most effective "weapon", however, the use of bank U aegis is not absolute safety.
Yesterday morning, Beijing xicheng court trial together U aegis Trojan theft case. Young hackers Ju following user's computer will Trojan implanted quietly. When the user use when U aegis into the bank on the net, Ju following from many users e-currencies worke who stole money account.
Trojan stolen net capital flow chart
Implant Trojan: use "catch chicken" tool scanning a loophole computer, about 5% of the computer can implant trojans
Looking for users: through the trojans looking for installation, silver-colored drive computer "key monitoring"
Obtain password: record users' mailboxes, QQ, BBS etc password, tested the user U aegis password
Transfer funds: while users U aegis transactions inserting machine, and go quickly logged in each other net silver money
S case representation
Computer mutation white during
29 million yuan "fly away"
Shantou victims Mr Shaw, often use icbc U aegis transactions. October 14, 2010, as a clothing factory boss this afternoon, Mr Shaw was remittance computer suddenly hang. After a while, the computer returned to normal, Mr Shaw check the account balance, found the inside bank card 29 million yuan was transferred to "LiuHongJun" account.
Mr. Shaw reports, police investigation found that after "LiuHongJun" will soon be 29 million yuan by bank transfer mode, YangXi "scattered into the" three icbc after account, in Beijing through ATM machine remove.
2010 November 13 afternoon, police will Ju following the criminal suspect in custody.
S commit crime revelation
Using the home computer "crack" U aegis
Ju following, 25, their hometown in anhui, junior high school, 2004 to Beijing to swing. He usually very like the Internet, gradually learned how to use Trojan.
In March 2010, from online search to Ju following a Trojan horse, it can remote in the other computer to get the system operation within the jurisdiction of each other, still can record the keyboard. This made him think of a ShengCaiZhiDao: if this implant users of computer, not can record the e-currency account information?
Ju enterprise itself is icbc U aegis users, he at home through several computers, finally tested explored a use Trojan "crack" U aegis way.
Implant Trojan "monitoring" net users
Ju following used a "catch chicken" tools (implanted Trojan computer users are called "chicken"), through the scanning IP HaoDuan, can find a system of computers, and loopholes in can automatically will Trojan implant users of computer, make it become the own "chicken".
After that, he went through the trojans, check whether the user's computer system in a net silver-colored driven installed on the users will be driven "monitoring objects". But, Trojan can only record net users bank account number and password, and U aegis account password cannot be Trojan records.
In order to clear up the user account password, Ju following through Trojan record and other login mailboxes, QQ, BBS password, and then when the user does not use the net silver while, use these secret
Code for the test.
30 seconds. Go net capital t1d
In getting these information, when a user use again when U aegis net, will Ju following after inserting computer, then in remote monitor user's computer screen. Wait for you over, silver-colored trading just Ju following will use U aegis haven't pulled down time, quickly logged in each other's net, turning money away.
Ju enterprise in accordance with the statement, this process is very short, less than about 30 seconds to finish, and the other fundamental to perceive.
S trial scene
He had cracked
More than 20 U aegis users
U aegis truth "in using a loophole"
At about 10 a.m. yesterday, Ju following figure thin by into court.
"Can I use your own computer monitor user's computer, the other party all operating I can see clear." Ju following said, his initial contact trojans, just as a "hobby" research just. According to Ju following says, theft targets chose U aegis users, because the line of the net users are more likely to commit crime, so most way.
And in just a few months, Ju following cracked than 20 U aegis user account and password and U aegis password, and four theft grab.
In the face of media interviews, Ju following wouldn't remember specific crime process, "nothing really technical content", "bank U aegis using on a loophole, hackers can always come up with a solution."
Prosecutors said, compared with the average theft crime, Ju following through Trojan theft net silver social harmfulness bigger, suggest court in 12 years to 13 years imprisonment for its between sentencing. "My heart there has always been a kind of guilt." Ju following said in the last statement.
The court will make a judgment on the election.
U aegis, namely icbc 2003 gain national patent launch USBkey, is the customer certificate provided for icbc online banking high level security tools. It shaped like U disk, as a shield to protect the bank on the net, the time the capital is safe
Keywords: walkie talkie phones,cordless pleated shades,hdmi splitter cable,
Learn more about SpinDistribute Article Distribution System. We also offer one of the Best Article Writing Services out there - give us a try if you need great articles on various topics!
Each article you submit at SpinDistribute.com is sent through our innovative Article Distribution System to our network of more than 1840 publishers - about 55% of them are high-quality article directories, 30% of them are niche blogs and 15% of them are other content-rich websites.
To achieve the best possible success we only publish your article to most related websites. This means your article will show up on approximately 640 - 880 most related websites which will give you great SEO results.
We also offer a separate Professional Article Writing Service to everyone who's looking for high quality web content and well researched unique articles.