The origin of the father of glaciers
Everyone knows that the Microsoft website was hacked because of Trojan horse software. This Trojan horse used in the Trojan War is swaggering into the territory of the Internet, and the author of this software is Xin Huang, whom we call the godfather of Trojan horse. 1999, trojans were widely used by hackers, but most of them were foreign trojans such as BO and BUS. For some novice hackers, knowing how to use these softwares and using them skillfully is undoubtedly the biggest problem on the road to hacking. In addition, most of these Trojans can be captured by antivirus software, which makes most hackers in China reluctant to use Trojans. When most hackers in China were looking for new foreign Trojan horses, a Trojan horse written by China was born quietly. This is a glacier. At the beginning of its birth, Glacier quickly became the most widely used Trojan horse for hackers because of its localization and temporary lack of antivirus software. Glaciers should not belong to Trojans. According to Xin Huang, the author of Glacier, he wrote Glacier out of his own interest and the encouragement of netizens. At first, he just wanted to write a remote control software that was convenient for him, but he never thought of writing a hacker software that was most widely used in China. After the release of Glacier 1.2, most hackers in China agree with Glacier and regard Glacier as the first choice of Trojan software. With the support and encouragement of many parties, especially hackers from China, Xin Huang has made great efforts to develop Glacier 2.0. 2.0 has added many functions and features that it didn't have before, especially it is more convenient and hidden than 1.2, so the appearance of 2.0 immediately made Glacier a well-known Trojan hacker software. Glacier's good concealment and simple use make many people in China who want to be hackers but don't understand hacking techniques deeply addicted to hackers. After using Glacier to invade personal system computers, they can use Glacier to get everything they want. Nowadays, many famous hackers take the first step of hacking with glaciers. The glaciers in Xin Huang make many people feel the pleasure of being a hacker, and also make many people understand the importance of network security. In fact, as a database development programmer, Xin Huang may not be a hacker at all. He has never hacked any website, and even when developing and testing glaciers, he uses his own and his friends' computers for testing. However, we can't deny the powerful function of Glacier, especially after the 22nd edition of Glacier is developed, which can make any novice become an extremely aggressive hacker instantly. All these reasons make Xin Huang the spiritual leader of China hackers, especially junior hackers. We can find the figure of glacier from the computer of almost every friend who wants to know about hackers. In Qian Qian, China, almost one glacier is buried in every 100 networked computers. It is not difficult to find that in large and small internet cafes, we can often hear the excited shouts of junior hackers searching for glacier victims with glaciers. Glaciers have become synonymous with Trojans in China. Glaciers have become a symbol of Internet terror. Now Xin Huang has stopped developing subsequent versions of glaciers. As a programmer's conscience, he has to face the harm of Glacier as a hacking tool. No one wants to be the public enemy of the people. It is these consciences that made Xin Huang give up the later glacier development. As a person who inadvertently promoted the development of Internet security in China, his name should be as memorable as his software. Although he only brought us a classic Trojan horse program, it still doesn't affect our respect for him at all. Glacier opened the door to our computers and our understanding of network security. When Xin Huang was a student in xidian university, Xin Huang plunged into the world of network security in order to kill viruses on his computer, and never came out again. 1999 in the first half of the year, Xin Huang compiled the ice horse software. With the rapid spread of Ice Trojan on the Internet, Xin Huang's name is familiar to more and more people. Glacier Troy has been controversial since it came out. The core of the dispute is that it can be used as both a Trojan implanted in the attacked end and a legal tool for network remote management. Xin Huang himself has never used it to hack other people's computers. Like a pure swordsman, he only cares about technology itself. In the hacking war between China and the United States, many people attacked with programs written by Xin Huang. Xin Huang has always believed that sabotage is not the goal of real hackers, and the ultimate goal of technical research is to bring everyone's expertise into play in a free and open environment. In Jianghu, any powerful "martial arts" is harmless in itself, depending on whether it is used to kill or save people. When 90% people use the "glacier" to implant wooden horses for others, Xin Huang feels that the "glacier" has lost its significance of upgrading. After he stopped developing the Ice Horse, he closed the personal website of "Trojan Ice" because this website was being turned into a communication garden of "Trojan Black Machine" by many fanatical hackers. At the end of 2000, Xin Huang joined the network security website "Security Focus", and he devoted all his energy outside his work to the development and upgrading of the well-known scanner "XSCAN" and the construction and maintenance of "Security Focus". Friends and girlfriends' comments on Xin Huang are: Glacier is practical, practical, skillful but modest, which is his personality charm. Xin Huang, the spiritual leader of Trojans. He deserves to be the top hacker software in China.