Current location - Education and Training Encyclopedia - Educational institution - Black gold education system
Black gold education system
More than a decade ago, even today, excessive use of electronic products such as computers or mobile phones is an act that affects physical health and destroys people's spiritual will. Indeed, whether from personal experience or through scientific verification methods, this is the correct cognitive behavior.

And this has always been a common and well-known common sense. However, this has not affected the technical update and development of mobile phones and computer electronic products, nor has it affected the emergence of people with special talents and those who use computer and mobile phone technology. With the times and the development of electronic products such as computers and mobile phones, some talents who use electronic products such as computers and mobile phones are highly valued and called "technology flow", but there are certain age and time restrictions on using electronic products such as computers and mobile phones.

For example, in the eyes of the general public, especially parents, children, especially those who are in the learning stage, are seriously prohibited or considered as bad behavior habits to play various computer games or mobile games for a long time, even if they only use computers and mobile phones for a long time, they will be prohibited or controlled for a certain period of time.

And this kind of bad behavior will even be called "Internet addiction teenager". But we can't just watch one thing at a time. Although many young students are addicted to playing mobile phone games and computer games, this does not prevent some so-called geniuses from appearing in the use of mobile phones and computer technology.

A gifted "little genius"

Some children use computers and other electronic products, and they also have some extraordinary skills. They are a gifted "little genius". Zhengyang Wang, for example, is called the smallest hacker "genius" in China.

Zhengyang Wang was born in 200 1 year. At that time, when computers and other electronic devices emerged, primary school students usually came into contact with some electronic products, such as computers, and Wang Zhengyang was no exception. He began to contact computers when he was very young. In 2009, Zhengyang Wang, who was in the second grade of primary school, began to touch some computer games. At first, he played the popular "vegetable stealing game" with his classmates. However, for him, this game did not make him addicted to it, but made him feel a little bored and boring, so he began to explore in other directions.

For his behavior, his parents didn't object to his playing computer at first, because in the eyes of his parents, he thought he could control the time of using the computer by himself, and he also had some confidence in Zhengyang Wang. After discussion, his parents think that Zhengyang Wang should know more about electronic products under normal study. If children are interested, they can learn more about electronic products and work in the field of electronic product technology in the future, which is also a good choice to stimulate children's interest.

So with the support of parents, parents often buy Wang Zhengyang some books about computer applications. These books are boring for ordinary people, and they can't understand them, let alone primary school students. However, in Zhengyang Wang's eyes, these computer-related books are like fish in water, which makes him indulge in them with relish. So he started his own creation and exploration, and began to do some small programs.

A "little oolong"

The story happened seven years ago. Zhengyang Wang hacked the school website because he didn't want to do his homework, because there was too much homework. In the eyes of ordinary people, no one would think that it was a child, especially a pupil. Zhengyang Wang's parents can also see the strength and potential of Zhengyang Wang.

And asked and understood the fact that he hacked the school website. I know my child's outstanding performance in computer, but Zhengyang Wang's parents didn't blame him too much. Knowing this, I gave Zhengyang Wang the correct guidance. It is also because of the correct guidance of parents that Zhengyang Wang realized his wrong behavior. Teach Zhengyang Wang how to be a "white hat" on the Internet, instead of breaking social rules with the technology he knows.

catch sb's attention

After the Oolong incident, Wang Zhengyang began to make a website. 20 1 1 year, Wang Zhengyang bought a website to store his own programs with the change saved by eating popsicles. On October 20 13 1 1 month, Wang Zhengyang began to research and make its own website.

After the junior high school of biology in primary school, Zhengyang Wang's thought began to mature, and he realized how naive and ridiculous he was when he was on the black school website. So he decided to do something within his power to make up for his behavior and become a small network security officer. 20 14 April, Wang Zhengyang submitted the system vulnerabilities of 100 educational websites to the library belt plan of 360 company. This makes Zhengyang Wang completely exposed to the public eye.

The road ahead is long.

After this battle, Zhengyang Wang, who was only thirteen years old, was completely exposed to the public, and people lamented that a thirteen-year-old child had such amazing talent in computer. In September of the same year, Zhengyang Wang was invited by China Internet Conference and became the smallest "hacker" in China.

In Congress, Zhengyang Wang showed maturity different from that of children. The engineer of Library Belt Project thinks that although the program submitted by Zhengyang Wang is only a primary loophole, his awareness of network technology and network security far exceeds that of his peers. This made Zhengyang Wang stand out at the conference, but it also brought him some comments and opinions on the Internet, but Zhengyang Wang also made a positive response.

In an interview, Zhengyang Wang said in his own evaluation: I prefer to be a "white hat" in the network. Unlike malicious attacks by hackers, "white hats" are well-intentioned. In the network system, the "white hat" can identify the vulnerabilities of the computer system or the network system, without malicious attacks, but it can't afford the vulnerabilities, and the system can repair its own vulnerabilities before malicious use.

That's what Zhengyang Wang did. When he finds a loophole, he will submit it to the website in time, make suggestions and help the website to fix it. Just like doctors diagnose diseases, it is very important that I will not use technology to do anything illegal. For a child who is still excellent at this age, this is commendable, and it is even nicknamed "the child of others" by netizens.

However, this does not affect Zhengyang Wang's plans for his future life. He himself expressed the hope that he could study hard, be admitted to the university through his own efforts, and then continue to study computer, so that he could start his own business in the future, and he hoped to control his own pace rather than be controlled. Zhengyang Wang, a junior high school student in the middle school affiliated to Tsinghua University, was favored by some big companies when he graduated from high school. He tried to recruit him, but Zhengyang Wang refused. At present, he has gone to study in America. I hope he can have his own world and achieve something in the future.