V for Vendetta and Anonymous

Posted: April 24, 2013 by drazsz in Uncategorized

I’m sure you most of you have watched the movie V for Vendetta and you can see some similarities between the goals of V from the movie and Anonymous of course Anonymous also wears the Guy Fawkes mask.  Even though V doesn’t hack like Anonymous or use any type of computers he’s trying accomplish the same thing Anonymous wants. In the movie he is creating chaos and forcing the government to pay attention and for the people to see the truth and rise up against corruption and control. Anonymous on the other hand is making chaos in a different way and its not just one person but many. Anonymous is trying to make the government pay attention by hacking and making a point that they are not so protected that they are vulnerable. They are proving just like in the movie that they can do the things they do because they can. You can see a few clips from the trailer here.

“People shouldn’t be afraid of their government. Governments should be afraid of their people” – V for Vendetta


8. Go and Check Out Your Computer Right Now!

Posted: April 5, 2013 by chrischanhui in Uncategorized

you've been hacked


Windows have more various contents than Mac.

But, it is more risky, and exposed to hacking.

To avoid hacking, what can we do?

For this time, I will give you some simple tips to avoid hacking.



First, change password to complicated one.

You might think your password is very safe and hackers never find it.

However hackers would not think like that.

Visit this site and check how secure your password is.



It will give you some tips.



Second, do not download equivocal Active X

ActiveX is the technology which used to develop the object-oriented components by Microsoft.

There so many kinds of ActiveX, these components would provide you more contents on internet.

But because of its multiformity, some hackers plant hacking files like Trojan on this.

Internet Explorer is also decent but I recommend you to use Google Chrome or Firefox.



Third, do not write your personal information on the internet

It is super easy to search information today (thanks Google).

So, if you note your phone number or address, someone could abuse that.


Simple way to erasing hacking tool (Windows only)


First, press start and open Windows exec cmd (if you can not find it, you can just type cmd and search)



You may see this, if you open cmd.

Type cd.. and enter twice



After enter twice, the front part would change to C:W>

Type del usp10.dll lpk.dll midimap.dll midimap 32 .dll imm32.dll comres.dll /a /s



After wait few minutes, you would see this screen.

If it said it erased something, it is better to change your password of your accounts.



I think the best way to avoiding hacking is downloading vaccine and let it scan while you use computer.



7. Types of Hacking

Posted: April 5, 2013 by chrischanhui in Uncategorized


As technology evolves, there are diversifying the kinds of hacking.

People no longer save important file as the form of paper, they save it in their computer.

It means, if you hack other’s computer, you may find valuable information.


Yesterday, the international hacker group Anonymous hacked North Korea social accounts.

(if you want to see more about it, click here)

Last year, North Korea warned that they would attack South Korea.

I was not quite sure they would really attack South Korea. Because this pattern is routine in recent years.

But after 3rd nuclear bomb test on 12 February 2013, North Korea move to make war.

So, Anonymous was angry with North Korea’s head Jung en  Kim who threat the security of the world.


Anonymous hacked North Korea’s social network accounts and personal information of members of the site.

Due to their work, “North Korea’s provocation to world” became popular.

Anonymous have been make so many issues through hacking.

You guys might curious how they hack and the types of hacking.

For this time, I will give you information about the types of hacking .

I did not know and have not hear the hacking terms aside from DDoS. So, I searched some ways.

1) DDos (Distributed Denial of Service) attack

You may see this DDos attack on the newspaper, blog or somewhere these days.

I want to say DDos attack is the most easy way of “hacking”.

Strictly speaking, DDos attack is not hacking, but it is the first step to hacking.

DDos Attack

Just like the picture, put inordinate traffic or abnormal access on the victim server.

Due to this work, the hacker could monopolize the server.

Because of this waste of resources, the server could not sustain itself and could not provide normal service.

It is very easy, so there so many tools to use DDos attack on the internet, you may find and download it (be careful the virus!)

2) SYN flood

This way abuse the vulnerability of connection process of TCP, 3-way handshaking.

Basically, communication between the server and the client configured by three-step structure.


First, the client initiates the connection by sending information to the server, such as a serial number and packet size.

Second, the server responds with the information by sending the client session.

Lastly, the client agree on the information received from the server.


Sending thousands of messages to require TCP connecting (SYN). At this time, changing the IP address to one no longer use.

Then the server would response as SYN/ACK (which is not work or exist) to make the new contraction.

At this time, server would wait till ACK coming from the client which respond SYN/ACK, but the server would not get ACK message.

As the result, server would keep open till get the ACK respond, and the system would be down and the server quit the service itself.

3) Sniffing

Dog sniffing

You can imagine a dog is sniffing to find bones which he smuggled.

The way to sniffing is starts with wiretap the network packet.


Collecting packet information which is not encrypted.

This way is more closer to stocking or information thief.


I give you three examples of hacking.

If you want to try hacking, visit here.

제목 없음

Hack this site

Seems very attracted to people who are interested in hacking.

That hacking means legal hacking and this page is for the people who want to study how to protect their computer from the hackers, not the malicious intrusion like cracker.


6. Achievements of Anonymous

Posted: March 22, 2013 by chrischanhui in Uncategorized

the legion


Nobody would know the detail information of when Anonymous started activities.

There are many incidents that Anonymous has an opportunity to become famous.

But, the first momentum which made Anonymous famous is the “war” against Los Zetas.



Los Zetas is a Mexican mafia which is famous for smuggling drugs and weapons.

Especially, they retaliate brutally to their enemies or the people who slandering them.

(So, I do not recommend you to searching about Los Zetas on Google, it would be cruel.)


Just like other days, Los Zetas kidnapped all of the people who were in the Mexican pub to catch their enemy mafia members.

Suddenly, someone contact to a executive member of Zetas.



“You guys kidnapped a member of Anonymous. If you guys do not release him, we will publish Zetas’ irregularities and the current location of executives.”

Of course, he just laughed first.

But after one hour, a member of Anonymous was released due to a piece of fax which Anonymous send to Zetas’ hideout where ordinary people would not know absolutely.

There was all the information about Zetas’ irregularities and the current location of executives, even their siblings’ location.

(Anonymous Hacker Group Threatens Mexico’s Zetas Drug Cartel)


Zetas was super famous at this time. So after this incident published, Anonymous became famous.

I want to say that this incident made the awareness of today’s Anonymous.


There are some major actions of Anonymous.


1. There was an internet site which called “Megaupload”. People could share their files.

But American government removed this site, because it is a violation of copyright law.

So, Anonymous declared “cyber war” to government. They said it is the repression of information sharing.



(internet sites which Anonymous attacked)

Anonymous knock downed several major internet sites.


2. Anonymous declared war against Syria government

제목 없음


Because Syria government shut down the internet which is the place of communication today.


3. Protest about Aaron Swartz’s suicide

Anonymous hacked the machinery law of America and suggesting the possibility of a spill classified document.

But Anonymous did not revealed it, they just gave pin key to decode password.

Anonymous warned them.


I posted three major incidents, but they achieved more (You may easily find on Google)

I want to say mass media can really change (or affect) the world.

5. Guy Fawkes and V for Vendetta

Posted: March 22, 2013 by chrischanhui in Uncategorized





This mask might very friendly for anyone who is interested in Anonymous.


Anonymous wearing this mask when they express their official position on YouTube or Twitter.




Where the mask which representing Anonymous originated from?


In general, people might know this mask from the movie V for Vendetta.


v for vendetta


Background of the movie is after the 3rd World War, Great Britain, in 2040.

A shadowy freedom fighter known only as “V” uses terrorist tactics to fight against his totalitarian society.

Upon rescuing a girl from the secret police, he also finds his best chance at having an ally.


The main hero V is fighting in invisible place against the violence and repression, by his conviction.

V is very similar with Anonymous, the hactivist.

Because, the mother of “V” and Anonymous is same; Guy Fawkes.


guy fawkes


(Guy Fawkes; 1570. 4. 13 ~ 1606. 6. 19)


In every November 5, the spectacular fireworks will be held in United Kingdom.

It is called Guy Fawkes Day.

This day is for praising Guy Fawkes who was a Captain in England.

He was religious Catholic, who dreamed “revival” of Catholic.

He was preparing the terror, which could slain all the parliaments who are against Catholic.

He set the gunpowder with Robert Catesby.

But, their plan was revealed, before only few hours of succession.

In the followed interrogation Guy Fawkes claimed himself as John Johnson, and did not leak information about the terror.


(Guy Fawkes’ revelation and torturing)

Because of the terrible torturing which lasted few days, finally Guy Fawkes confessed the whole story of the incident and co-conspirators.


(His last handwriting; might hard to write this because of the terrible torture)

Finally, Guy Fawkes and his conspirators were all arrested and executed.

His corpse was divided into four pieces and dispersed in Great Britain.

It showed the warning to people who was plot the rebellion.

This incident is called The Gunpowder Plot.

(information cited from wiki)


The similarity between Guy Fawkes and V for Vendetta is; they are the person who is against the group which steal freedom and abuse their public power.

I know their method is not “legal”.

But if they against the public power which brainwash people and suppress media, I am gonna back them.



4. Anonymous, The Legion

Posted: March 1, 2013 by chrischanhui in Uncategorized


I want to post about the biggest hacker group in the world – Anonymous.

Anonymous is not a person’s name, it is a name of group.

The number of members are around 3000 (estimates).

Anonymous’ faceless symbol indicate “there is no boss and everyone have equal right”.

The suit is a symbol of anonymity.


They made a new word; Hactivist.

They determine the target through Twitter or blog chat, and crashing network to using DDOS attack and SQL INGECTION.

Their ultimate purpose is grabbing the Freedom of Information and Non Censorship.

Anonymous said “Corrupt governments do not have the right to control us.”

They upload video to “enlighten” people from the corrupted government.

Anonymous became famous after some incidents (they hacked giant companies, big portal sites).

So, some people use the name of Anonymous to make their materials more popular.

The typical example is Anonymous OS.

This OS gives us information of how to hack (very basic ways like DDOS).

But, is this really from Anonymous?


I also downloaded the OS (you guys could find the file through googling) and tried it.

This OS created which based on Ubuntu.

I want to say, you can not be a “hacker” with this file.

It is too limited and basically, it just shows the process of DDOS or other basic hacking tools.

This OS became very famous and media deal with this.

If it turns out, this file is a fake one.

More precise, this file is not made by Anonymous.

This incident showed up-graded awareness of Anonymous; how they are affect on the social media.


(click the picture, linked with Tumblr page of Anonymous)

It is very hard to find the member of anonymous (there are too much people who arrogate they’re Anonymous).

But, you can find and read their Facebook page, Twitter, or Tumblr.

Anonymous uses social media as their weapon to against their enemies (groups which censoring information)


We are Anonymous

We are legion

We don’t forgive

We don’t forget



I will see how it works and what is their “justice”.

3. White and Black Hackers

Posted: March 1, 2013 by chrischanhui in Uncategorized

two face

I want to post about two different types of hackers; white and black hackers.


black hacker

First, black hackers are the people who you guys generally know about “hacker”.

Mostly, black hackers find the vulnerable part of the computer system and destroy the system or derive the personal information.

They hit the serious damage on people’s computer for their personal profit or just for fun.

Another name of black hacker is “Cracker“.

A cracker is the one who does cracking.

Cracking is the act of breaking into a computer system, often on a network.

A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there.

Some breaking-and-entering has been done ostensibly to point out weaknesses in a site’s security system.

hwite hacker


There is another type of hacker which called “white hacker”.

White hackers find the vulnerable part of the system and prevent that part from the crackers.

In other words, white hacker also known as the information security professionals.

White hackers should know not only basic information technology (IT), computer operating system, and C language but also perspective on the IT industry.

They also called as “White Hat


I want to say this age is a war of information.

Crackers attack system to get information and white hat prevent us from them.


A member of white hat; Winston Smith talked how important their work is.

But still, there are so many people do not know how to prevent their computer and information from hackers.



Of course, we are not professional (or not) computer programmer or something.

But, there are some effective ways to prevent our computer from hackers.

Let’s find the ways!