Section 1 The Island of the Mask of Supremacy
The world is becoming more and more computers, and countless fiber optic cables and satellite signals are connecting them together to form the largest network ever built.
All these computers are like one pile after another all over the world, and these fiber optic cables and satellite signals are like invisible but stronger ropes. When these ropes are connected to these stakes, they divide the seemingly vast world into pieces.
And we were only allowed to enter a very small crushing area.
We are like a donkey tethered to a tree, looking around at a space of 30 square meters, but thinking that we know the whole world. Then, under the planning and guidance of the computer, we live with unprecedented obedience.
We stood obediently at the door of the company every morning, numb with a numb expression on the wrist badge on the sensor at the door, with a "ding" sound, and began our own life.
We obediently pay traffic tickets, pay off bank credit cards, and pay phone bills according to the single printed out by the computer, and when we question the numbers on these printed sheets, the other party will look at you in amazement and say, "Please, this is displayed on the computer." ”
At this time, when we look around again and feel the ubiquitous flow of electrons, one may realize that we are imprisoned by what we have created - we have created computers, but we have been subjected to computers to live our lives.
However, there are people who are different from us, they are like eagles in the night, with wings of the same color as the night sky. This pair of wings helps them soar freely in the sky.
These people with wings, people call them hackers.
Every hacker is different, but the real hackers have the same thing, which they call the hacker spirit. There are many ways to express the spirit of hacking, but at the end of the day, it can be summed up in four points.
First, contempt for authority and rebellion against tradition.
A person who follows the rules and only knows how to survive within the rules and regulations drawn by superiors, elders, and authorities cannot become a real hacker. Hackers don't mean to challenge society, but they don't do it just because everyone did it before. They don't believe that there is anything that cannot be done, they do not believe that there is anything that must not be done, they only live according to their own standards, they only act according to their own will, and their greatest happiness often comes from breaking the shackles of tradition.
Second, always explore and always innovate.
Only those who know to rebel against authority and tradition are either adolescent teenagers or peasant rebels, and hackers are neither. For them, exploration and innovation are more important than resistance. All real hackers are people who like to explore the mysteries of computers. They are like the largest telescopes in their hands, looking at the sky of programs and systems, looking for loopholes in them as if they were discovering every planet in the universe. While discovering these vulnerabilities, they are also happy to come up with creative solutions to solve them.
Third, it's all about money.
Hacking is an identity, but it is never a profession, and it cannot be used to make a living or make a profit. Every true hacker absolutely adheres to this rule. Those who attack other people's computers, or even engage in technical blackmail, are not real hackers.
As a real hacker, his greatest pleasure is to take the initiative to find and find problems in the computer world, and solve them with the most innovative and perfect means. Not only do real hackers not use their technology for illegal gains, but all the hacking software they write is completely free to share, and some even have the source code public.
After the real hackers help you, they will always ask you only one thing - to help others as you grow up.
Fourth, freedom!
Freedom is the meaning of the existence of hackers.
The invisible, endless computer network can lock up the vast majority of people in the world, but it can't lock hackers. In the world of computers, they are as free as dolphins in the ocean.
Hackers are hackers in pursuit of this unfettered freedom.
Freedom, this is the ultimate destination of the hacker spirit.
The sea is the sea because there are countless droplets gathered together, and hackers couldn't understand it. Therefore, believing in freedom and being willing to help each other are the most basic characteristics of hackers.
In real life, hackers are mostly reticent and can seem a little helpless and shy when faced with strangers. However, on the web, they tend to become passionate and have a wide range of friends.
There are so many hacker forums on the Internet, and hacker websites are where they communicate and converge. Hackers also tend to form various groups because of the forums they frequent.
With the rapid development of the world's computer networks in the nineties of the twentieth century, there are more and more groups like this.
And among all these hacker groups, the most mysterious and the most desirable for hackers all over the world is a team called "Mask Island". This team is called Mask Island because the URL of this hacker team is:
The homepage is a program encrypted with a chaotic algorithm, and hackers must find a vulnerability to this program, and after successfully penetrating it, they will have a chance to see the registration page of the mask island.
For hackers all over the world, the proudest and most coveted thing in this life is to be able to see the registration page of the "Mask Island".
Legend has it that since the "Mask Island" was founded in 1990 by five super-top hackers, its membership has increased at a rate of one per year in the past ten years, and by the time the millennium comes, it has had fifteen members.
Generally speaking, hackers are more arrogant, and it is very difficult for them to admit that others are better than themselves. However, the hackers all agree without disagreement that the members of the Mask Islands represent the highest standards of hackers in the world.
In the world of hackers, the island of masks symbolizes the unchallengeable.
For ten years, Mask Island has released the source code of several hacking software every New Year's Day, as well as several hacking articles with theoretical surnames. Then, the trend of hacking technology and hacker culture this year starts from here.
For hackers all over the world, the Mask Island is their Jerusalem.
Since the Mask Islands have such a terrifying influence in the hacking world, it is only natural that there will be many people who want to know their identities. These people include the CIA of the United States, the new KGB of Russia, the intelligence department of the United Kingdom, the Mossad of Israel, and other top intelligence and secret services in the world.
However, a full decade has passed, and no one knows the true identities of these fifteen people.
And the four most well-known spy organizations in the world mentioned above don't know more about these fifteen people than any ordinary person - all they know is the fifteen ids, sky-engine, admin, user, code, evil, fly, killer, panda, find, lost, october, dispute, forver, lord, and dancer.
Maybe I'm tired of being tracked down by those cyber agents. In 1997, the admin, who had always been the publisher of the Mask Islands news, wrote at the end of the article when he published the Mask Islands hacker article - "No one can find us unless we want to." Therefore, the best way to find us is to sit on a stool and wait for us to come to you, and all other methods are in vain. ”
;