police first encountered this strange rub network case.
successfully circumvent Internet cafe monitoring system, under the eyes of the network, a large living even free Internet access for 21 days. When the man was seized and turned over to the police station, his modus operandi, their behavior is illegal, in violation of the law and so on which are to enable the police headache. Yesterday, the people of North station communications network in this rub from a rare case of a suspected breach of Wu,
not been online for 21 days billing
11 月 5 morning, the people of North into Wah Street to a large Internet cafe Internet cafe owner in view, found a man lying prone sleeping, before the computer is turned on. Come checkout curious boss intends to look at how long this person in the end on the network. I did not realize is that this computer is actually in the system turned off.
how could the computer off the Internet? The boss will shake that were friends, this man scared of his answer daylights - in this computer, who has been a continuous 21 days of the Internet! Internet cafe owners to verify that this computer does have 21 days supreme line records.
his way around the Internet cafes in what monitoring and billing system? Feel incredible cafe owner called the police.
decipher the system is homeless
even more incredible is that the police investigation found that Internet cafes were monitoring system to decipher the strange man, not a computer genius, but a long-term in the vicinity wandering tramp. Man surnamed Wu, junior middle school education, 27 years old, Chongqing, Dazu County. His father died many years ago, the mother regardless. Mainly by picking up litter and other leftovers for a living.
Taurus Public Security Bureau's Internet police can not imagine: how to decipher the name of homeless cafe monitoring system - this system is difficult to break even the professionals.
working hard and making pick up leftovers to eat for 21 days
Wu a, said he learned from the Internet deciphering method, but because the computers do not understand, know they are cock destruction system that if she left off, it can not decipher a success. In order not to lose this excellent free access to the Internet, they stick on this computer for 21 days.
police handling the case description: In order not to off the assembly line, Mr Wu could not bear to live ordinary people the The first few days, his body still a little money, you can call lunch or eat noodles, half a month ago, he was penniless,
Wu a, if not to be found, he may continue to keep this computer, he believed to be discovered, but that is beating up and was out of Internet cafes.
network had never paid attention to him
Wu, how is this a 21-day period, before the success of the network stealth it?
the staff cafe: Wu is the cafe of an old acquaintance, the choice is a very remote corner, very easy to attract attention. For staff to sit in cafes, even saw him, thought it would come on a class. Hundreds of computers in Internet cafes, one by one the staff can not be checked at any time, not to mention never encountered anything like this.
Internet cafe owner said: According to calculations, Wu secretly access a 21 days, should pay 800 yuan.
■ settle a lawsuit is entangled
spirit of the homeless re-operation is not
how to decipher? Internet police speculate the two moves
department found that almost impossible to decipher, the cafe is no exception. / p>
Wu said a police, is online learning to decipher was successfully tested many times before, but have lost count of how you do it the. Wu, a network once again came to police with the cafe, allowed to repeat his operation, but several have tried without success.
reporter then search through the network, . Most of these methods allegedly used Internet cafe software are valid.
Taurus Public Security Bureau Internet police Internet cafes system under actual conditions, analysts believe that: Wu successful escape of a monitoring system, there may be two ways:
professional theory: the first one Users do not just get up and leave → → network to reach the cash register checkout does not lock the computer by manipulating → fast before taking over the computer, and quickly transferred out of control during this period to modify system files, uninstall → Last on the computer Restore Wizard software, so that after reboot the computer can not be restored to its original state bar set. However, police believe that this series of operations must have considerable expertise, and know the relevant software is installed, most people almost impossible,
ed hardy trucker hats, let alone a tramp.
Opportunity: The regulars at a number of online course may be surprised to discover that through their own network account password, log in at this computer and manage the host. Wu, a network management operation in mind the operation of the administrator's login information.
■ qualitative but also entangled
open book Add to ask the police arrested him 15 days to theft
addition to the modus operandi of a certain Wu, also let the police tangle, but also on how to conduct qualitative him.
Lu Wang said: five tenth paragraph: knowingly received stolen communication lines to others, copy others telecom numbers of telecommunications equipment, facilities use, and theft by legitimate users to pay the amount of telephone charges calculated. amounts of theft can not be directly identified, should be legally users of telecommunications equipment, facilities, then stolen, copied after deducting the monthly fee for 6 months before being copied, the average telephone charges projections. penalty of 15 days administrative detention.
laws: a fine of at five hundred; serious cases, more than ten days, fifteen days of detention, may impose a fine of one thousand yuan.
Press Gang