Home Техника виновен

виновен



Общ преглед

Софтуерът "winny" се появи през декември 2002 г. Това е популярен софтуер за мрежов обмен на файлове в Япония. Потребителите могат да го използват, за да изтеглят интересни файлове като филми, музика и игри в Интернет. Ако намерят файловете, от които се нуждаят, в споделените папки на компютрите на други "winny" потребители, те могат изтеглянеthematwill.

winnyisamoreadvancedp2psoftware.winnyisbasedonthefreenet(freenetwork)model.Theipaddressisencrypted,sotheconfidentialityisstrong.Supportsoftwaresearch,itiseasytofindwhatyouwantinthevastsharedlibrary.Atthesametime,itsupportsmulti-threadeddownloading(fastdownloadingspeed),resumabledownloadingatbreakpoints,andcaneffectivelybreakthroughthefirewall.What'smore,ithasrealizedtheformofp2pforum,whichhasrealizedtherevolutionfromserverforumtodistributedforum.Don'tthinkitisunknown,itisthemostusedp-2-psoftwareinJapan,with2millionusers,anditisincreasing.

Произход

В началото на 2009 г. в интернет BBS се появи съобщение за „Изтекли тайни на морските сили за самоотбрана“. Тези „поверителни документи“ съдържат подробности като сигнали за повикване, формуляри за използване на пароли, спешни повиквания и дори записи за обучение и бойни действия, използвани от разрушител на име Chaoxue. Какво 'по-страшно е, че сред публикуваните"изключително големи тайни" (Японската агенция по отбраната разделя секретните документи на три категории според важността им: "тайни", "изключително големи тайни", и "изключителни тайни".) Има също и Япония. Морските сили за самоотбрана не са използвали парола и сортиращия сериен номер на файла с пароли и т.н. Седмица след разпространението на информацията в Интернет, Японската агенция по отбраната потвърди, че тези секретни документи са "верни". Това изтичане на разузнавателна информация беше наречено от военни експерти най-голямото akdisasterin "история на отбраната на Япония."

Coincidentally,onemonthafterthe"Asakusa"leak,thebusinessinformationoftheJapanGroundSelf-DefenseForceandtheAirSelf-DefenseForce,andthesearchinformationofthepoliceinOkayamaandAimeeprefectureswereleakedagain.Inaddition,manycompanieshaveleakedtradesecrets.

AseriesofleaksshockedJapan.Atthetime,JapanesePrimeMinisterKoizumiorderedtheDefenseAgency:Itisnecessarytothoroughlyinvestigatethetruthofthe"Asashuki"leak.Afterinvestigation,thechiefculpritwholeakedthesecretwasthe41-year-oldChiefHaiCao,amemberoftheSelf-DefenseForceofthe"ChaoXue"destroyer.Asatelecommunicationsofficer,heisresponsibleforhandlingallexternalliaisonandcommunicationaffairsofChaoxue.Thetelecommunicationsroomisanimportantplaceontheship,andthelevelofconfidentialityisevenhigherthanthatofthe"combatcommandpost."Telecommunicationsofficersarespeciallyauthorizedconfidentialpersonnel.AlthoughtheJapaneseDefenseAgencystrictlyforbidstheteammemberstomoveandstorework-relateddata,itisthisimportantsecretpersonwhomadethedocumentscommonlyusedintheworkintoaCD,tookthesecretdatahomewithoutauthorization,andcopiedittoapersonalcomputerconnectedtotheInternet.

Astheinvestigationprogresses,theinvestigatorsfoundthatHeisōChangusuallylikestouseJapan'smostpopulardownloadcommunicationsoftware"winny"todownloadsongsandmovies.Theinternalstaffofotherunitsinvolvedinaseriesofinformationleakageincidentsalsousedpersonalcomputersequippedwith"winny"softwaretohandleofficialduties.

Afterthe"Assuki"leak,theJapaneseDefenseAgencyimmediatelysetupa"radicalcountermeasurereviewmeeting"toseekcountermeasurestopreventsimilarincidentsfromhappeningagain.Thecountermeasuresgivenbythe"EffectiveCountermeasuresReviewMeeting"include:for"confidential"and"extremelysecret"levelsecretinformation,ifthereisaleak,theleakershallbesentencedtoafixed-termimprisonmentofnotmorethan5yearsaccordingtotheSelf-DefenseForceAct,andevenifitisnegligent,hemustberemovedfromoffice.;AlldatastoredinCD-ROMandotherinformationcarriersshallbeindividuallyencrypted,otherwisetheinformationwillbe“discussed”byleakinginformation.Atthesametime,theJapanesegovernmentrequiresthatbasicindustriessuchasfinanceandaviation,whicharecloselyrelatedtonationallifeandsocialandeconomicactivities,takethoroughmeasurestopreventleaks.Atthesametime,majorJapanesecompanieshavedevelopedfilteringsoftwarefor"winny"oneafteranother.

FrequentlyAskedQuestions

However,the"winny"softwareisalsoahotbedofsomecomputerviruses.Oncethefilesdownloadedusingthissoftwarehidevirusessuchas"Antinny",theuseronlyneedstodouble-clickthedownloadedfileicon,andthecomputerwillbeinfectedwiththevirus.Thisviruscanfreelycompressthefilesinthecomputerandplacetheminthesharedfolder.OncethecomputerisconnectedTheInternetwillleadtoinformationleakage.Inaddition,sincethissoftwareisapeer-to-peernetworkfileexchangesoftwarebasedonthefreenetworkmodel,itsupportsdirectdataexchangebetweencomputerswithoutaserver,andcannotrecordtheuser'sIPaddress,whichincreasesthedifficultyofconfidentialitysupervisiontoacertainextent.Becausethecomputeritselfdoesnotappearabnormal,usersoftendonotrealizethatthecomputerisinfectedwithavirusuntiltheyarenotifiedbyothersthattheirpersonalinformationhasbeenleaked.Tomakemattersworse,thelostfileswillberecordedinmanycomputersanditisalmostimpossibletorecoverthem.

AccordingtoXinhuaNewsAgency,inmid-December2006,YuKaneko,whoworkedattheGraduateSchooloftheUniversityofTokyoanddevelopedanddistributed"winny"software,wasfined1.5millionyen(approximately)bytheKyotoDistrictCourtofJapan.(US$12,800)becauseitviolatedthecopyrightlaw.HewasfoundguiltyinthefirstinstanceonDecember13ofthesameyear.Anappealwasfiledthatday.OnOctober8,2009,theOsakaHighCourtoverturnedthefirstinstanceverdictandruledthatKanekowasnotguilty.ThefocusoftheentiretrialwaswhetherWinnywasdevelopedforthepurposeofpiracyandcopyrightinfringement.Thismarksthevictoryof"technologicalneutrality".

JustwhenallpartiesinJapanaretakingemergencymeasurestostoptheleaking"skylight"of"winny",therearestillmanysoftwaredownloadwebsitesinmycountrythatprovidethelocalizationof"winny"software.Version,somelargewebsiteshaveevendownloadedtensofthousandsoftimes.TheleakinJapanhassoundedawake-upcallforus.Ontheonehand,wemustdoagoodjobofprotectingthe"winny"software.Ontheotherhand,itisnecessarytostrictlyabidebytheregulationsthatsecret-relatedcomputersmustnotbeconnectedtotheInternetorotherpublicnetworks,andthatsecret-relatedinformationshouldnotbeprocessedoncomputersconnectedtotheInternet,soastopreventleaksfromhappeningatthesource.

This article is from the network, does not represent the position of this station. Please indicate the origin of reprint
TOP