Chapter 249: Bit Messenger Official Version

readx;?Full text no ads Chapter 249 Bit Messenger official version

The development of Bit Messenger has gradually become gradual from the initial explosive growth. Pen | fun | pavilion www. biquge。 info

Everyone also no longer regards this software as a dragon slayer artifact or a flood beast as it did at the beginning.

The technology it uses is actually not new, and point-to-point transmission technology has actually been around the Internet for a long time, but it has not yet been applied as such.

As the number of users stabilized, everyone accepted the existence of this software by default. Actually, it doesn't work if you don't accept it, this software has no center at all, and it's impossible to stop it.

Basically, technicians who have a bit of encryption needs will use this software to communicate, and even some staff in government departments secretly use it.

In this atmosphere, the bit messenger v1.0 version, that is, the official version, was quietly released to the public.

The main feature of this upgrade is the introduction of a new routing algorithm and the addition of file sharing functions.

Prior to this release, there had to be a directory server on the network to maintain the topology of the entire network, and once the directory server disappeared, each client would have to spend a long time searching the network for other clients to establish contact.

In fact, this situation is intolerable for communication, and it is basically the same as not being connected.

After the release of Bit Messenger v0.2, the FBI not only searched the "Bit Messenger Family", but also seized several directory servers, which caused the communication of Bit Messenger to come to a standstill for a while, and then it was restored to normal levels after someone rearranged the directory servers abroad.

Therefore, Lin Hong introduced a new routing algorithm in the new version.

Instead of requiring the directory server to maintain the client's network topology, it is completely changed to individual clients.

In this new algorithm, each client maintains a small range of routes, and the IP addresses of their respective friends are encrypted and stored locally in the client, so that many clients are cross-combined, so as to realize the routing and addressing of the entire bit messenger network.

The second important feature of the edition is file sharing.

This function Lin Hong actually wanted to join in for a long time.

It's just that I haven't thought about the distributed algorithm before, so I postponed it to the subsequent upgrade version.

The file sharing protocol of Bit Messenger is based on the TCP/IP protocol and the application layer of the TCP/IP structure. The protocol itself also contains a number of specific content protocols and extension protocols, such as the IRC protocol and the P2P protocol.

On the one hand, the file sharing function of Bit Messenger can be directly shared peer-to-peer, just like sending a message to a friend, directly to the other party.

In addition, users of Bit Messenger can also share their local file content externally.

However, in order to use this step, you must make an "envelope" file through BitMessenger, and then post the envelope file to the forum, so that others can download the envelope file to a specific file on their computer.

This kind of file sharing is also based on a peer-to-peer protocol, which does not require the existence of a server, and when sharing, it is directly sharing files from your own computer. And, once someone successfully downloads the file, they may also become the file server and serve the later downloaders.

According to this principle, the more people who download the file, the faster it will be, because there are many clients on the network that act as servers to provide them with download services, and each client only needs to bear a small piece of data.

An "envelope file" is essentially a text file that holds two parts, the routing information and the file information.

The routing information is the IP address of other client servers during the download process, and this route is only for file sharing, which is completely different from the routing structure of your friends.

The main principle of the file information is to virtually divide the file for download into blocks of equal size, the block size must be 2k to the power of integers, and write the index information and hash verification code of each block into the envelope file; Therefore, the envelope file is the "index" of the downloaded file.

After the release of Bit Messenger v1.0, it immediately attracted significant attention from all parties again.

Business software companies such as Microsoft, Apple, Sun, ...... and so on, all of which are regarded as great enemies. Because BitMessenger's file-sharing feature will make it easier to spread pirated software.

Bill Gates said in an interview with the media: "This is sad news. ”

And Apple CEO John Scully also said: "This is a very big blow to the software industry. ”

Contrary to their views, Richard Stallman said that "the Bit Messenger is another important step towards freedom, and it will promote the progress of society." He also called on the authors of Bit Messenger to open up the source code of this software as soon as possible and join the camp of the GUN project.

What everyone didn't expect was that the day after Richard's speech, a post called "Bit Messenger Source Code Officially Open Source" appeared on the Bit Messenger family, which only had a short sentence:

"For the sake of freedom, BitMessenger is thoroughly open source! In the new version, the automatic update function has been removed, and the subsequent maintenance of this software will be carried out by the community independently, and the original author will no longer participate. ”

After this paragraph, there is a bit messenger envelope file download address.

At first, everyone thought it was a phishing post or a prank, but when the first person tried to download it, he suddenly found that what he downloaded was really the bit messenger source code!

The news spread throughout the underground hacker world in an instant, and the vast majority of people, including white hat hackers and black hat hackers, immediately logged in to the Bit Messenger Forum.

……

Perhaps influenced by Richard Stallman, the father of free software, the author of Bit Messenger, on the second day of Richard's call for open source, posted the envelope file of the source code of Bit Messenger to the Bit Messenger forum, all hackers immediately went crazy for it, and the Bit Messenger was paralyzed because it could not withstand the huge traffic, but fortunately, the official version of Bit Messenger has a file sharing function, and there is no need for a special download server, otherwise no server can withstand the huge download volume at that time...... ”

A few years later, the author of a book called "The Heroes of Computer Hacking" described the scene firsthand, a major event in the history of computer software.

The open source of Bit Messenger has made many people breathe a sigh of relief, and they have completely let go of the worries they have been thinking about.

Although we haven't found anything wrong with Bit Messenger, but this encryption software itself is a very sensitive software, since you want to use this software, you naturally don't want to expose your own things, the software is not open source, after all, they feel a little unsteady, for fear that the author of this software will add something to the software. Listen to the back door and eavesdrop on your own secrets.

Some people even speculate that this software is likely to be written by the government department itself, in order to make it easier to monitor. Listen. There are also various other bizarre rumors.

Although Bit Messenger has been around for so long, there are still many people who only believe in themselves and do not trust others, and still use their own way to communicate and exchange information.

And the open source of Bit Messenger has completely eliminated all rumors and speculations.

While many hackers are excited about the news of the open source of BitMessenger, the security makers of the SPAN network are suffering from the proliferation of the Tree worm.

When the tree worm breaks into a computer, it immediately starts replicating itself, and then starts sending a copy to other computers connected to the computer, it travels along the network cable, if it finds an active computer, it will start trying to connect, and if it needs a password and an account number, it will call the most commonly used password from the password dictionary to brute-force it.

When brute-force is cracked, the accounts and usernames used are the most common in the VMS system, and most of them are the default accounts and passwords when they leave the factory.

For example, accounts such as "system" and "et" usually have the same password. The worm will use these default account information to guess at the first time. In fact, this strategy is so successful that many computer users don't modify these account information at all, and just use the default account.

Because in their opinion, a computer like their own, in the vast sea of the Internet, is simply a drop in the ocean, and the probability of hackers trying to find themselves is similar to winning the lottery.

Therefore, their passwords are usually set very simply, such as a few letters or numbers in a sequence, or they can even use the default password without changing it. They thought that hackers were manually guessing the account password stolen, but they didn't know that these processes had already been automated.

Write a brute-force cracking program, and then put common and simple passwords in the password dictionary, and automatically compare them one by one, and it is only a matter of time before they are cracked. If the computer is well configured, the cracking time can be greatly reduced.

If the common password cannot be successfully logged in, the tree worm will try again from the collected user password.

Many times, multiple accounts like to use the same password, because people have a tendency to be lazy, and remembering many passwords is a big burden, so it is common to use the same password for all accounts. This gives the Tree worm another opportunity.

The anti-tree security team worked overtime to analyze the source code of the Tree worm and finally had some clues.

This worm does have the ability to steal data, and they specialize in collecting it for a specific purpose. If you find the keyword, you will make a copy and send it to the designated e-mail address.

There is not just one, but a lot of them, and these e-mails are free to apply.

The security team had to split into two parts, one continuing to work on ways to eliminate the tree worm, and the other beginning to follow up on the emails.

Fortunately, as the worms spread, so did the number of members in their safety team, which was no longer limited to NASA members.

After working overtime, Edward finally wrote the first worm antivirus program.

!#

(Full text e-book free download)