Chapter 249 Official Version of Bit messenger
The development of Bit messenger has gradually slowed down from the initial explosive growth.
Everyone no longer regards this software as a dragon-killing artifact or a flood beast as before.
The technology it uses is actually not a new technology. Point-to-point transmission technology has actually appeared on the network for a long time, but it has not been applied in this way.
With the stability of the number of users, everyone accepts the existence of this software by default. In fact, it doesn't work if you don't accept it. This software has no center at all, and it is impossible to stop it.
Basically, technicians with some encryption needs will use this software to communicate, and even some staff of government departments will secretly use it.
In this atmosphere, the bit messenger v1.0 version, that is, the official version, was quietly released to the public.
The main feature of this upgrade is the introduction of a new routing algorithm and the addition of file sharing function.
Before this version, there must be a directory server on the network to maintain the topology of the entire network. Once the directory server disappears, each client will take a long time to search for other clients on the network to establish a connection.
In fact, this situation is unbearable for communication, and it is basically the same as not being connected.
After the release of Bit Messenger v0.2, in addition to searching the "bit Messenger Home", the FBI also seized several directory servers, which once caused Bit Messenger's communication to stall for a while. Later, someone rearranged the directory server abroad before returning to the normal level.
Therefore, Lin Hong introduced a new routing algorithm in the new version.
It is no longer necessary for the directory server to maintain the network topology of the client, but to completely change to each client.
In this new algorithm, each client maintains a small range of routing, and the ip addresses of their friends will be encrypted and stored locally in the client, so that many clients cross-combine to realize the routing addressing of the entire bit messenger network.
is the second important function of the version, which is file sharing.
Lin Hong has actually wanted to join this function for a long time.
It's just that I haven't figured out the distributed algorithm before, so I delayed it to a subsequent upgrade version.
The file sharing protocol of Bit messenger is based on the tcp/ip protocol and is in the application layer of tcp/ip structure. The protocol itself also contains many specific content protocols and extension protocols, such as the irc protocol and the p2p protocol.
The file sharing function of Bit messenger, on the one hand, is to share directly point-to-point, just like sending a message to a friend, directly to the other party.
In addition, users of Bit messenger can also share their local file content to the outside world.
However, if you want to use this step, you must make an "envelope" file through the bit messenger, and then publish the envelope file to the forum, so that others can download the specific file to their computer through the envelope file.
This kind of file sharing is also based on the point-to-peer protocol, which does not require the existence of a server. When sharing, you directly share the files in your own computer. Moreover, once someone successfully downloads this file, the other party may also become a file server and provide services to later downloaders.
According to this principle, the more people download files, the faster they will be, because there are many clients on the network as servers to provide download services for them, and each client only needs to bear a small piece of data.
"Envelope file" is essentially a text file, which contains two parts, namely, routing information and file information.
The routing information is the IP address of other client servers during the download process. This routing is only for file sharing, and the routing structure is completely different from that of your friends.
The file information is generated according to the specific algorithm of the target file. Its main principle is to divide the file provided for download into blocks of equal size. The block size must be an integer power of 2k, and the index information and hash verification code of each block are written into the envelope file; therefore, the letter A sealed file is the "index" of the downloaded file.
After the release of Bit messenger v1.0, it immediately attracted great attention from all sides.
Commercial software companies, such as Microsoft, Apple, sun... and so on, regard it as a big enemy. Because the file sharing function of Bit messenger will make the dissemination of pirated software easier.
Bill Gates said in an interview with the media: "This is regrettable news."
And Apple's ceo John Scully also said: "This is a very big blow to the software industry."
Contrary to their view, Richard Stallman said, "The bit messenger is another important step towards freedom, which will promote the progress of society." And call on the author of the Bit messenger to open the source code of the software as soon as possible and add it to the camp of the gun project.
What everyone did not expect was that the day after Richard's speech, there was a post called "The Bit messenger source code officially open source" appeared on the home of the bit messenger. This post only had a short sentence: "For the sake of freedom, the bit messenger is completely open source! The automatic update function has been removed in the new version. The subsequent maintenance of this software will be carried out independently by the community, and the original author will no longer participate.
After this passage, there is a bit messenger envelope file download address.
At the beginning, everyone thought it was a phishing post or a prank, but when the first person tried to download it, he suddenly found that what he downloaded was really the source code of the bit messenger!
The news immediately spread all over the underground hacker world. Most people, including white hat hackers and black hat hackers, immediately logged in to the Bit messenger home forum.
......
"Perhaps influenced by Richard Stallman, the father of free software, the author of the bit messenger, the day after Richard called on the other party to open source, published the envelope file of the bit messenger source code on the bit messenger home forum. All the hackers were immediately crazy about it. On that day, the bit messenger home because there was no The method was paralyzed by huge traffic. Fortunately, the official version of Bit messenger has a file sharing function, and there is no need for a special download server, otherwise no server can withstand the huge download volume at that time..."
A few years later, a book called "The Legend of Computer Hackers" described the situation at that time. The author of the book experienced this major event in the history of computer software.
The open source of the bit messenger made many people breathe a sigh of relief and completely put down their worries.
Although you haven't found anything wrong with the bit messenger, this kind of encryption software itself is a very ** software. Since you want to use this software, you naturally don't want to expose your affairs. The software is not open source for a long time, which always makes them feel a little unsteady and afraid of the author of this software. What monitoring should be added to the software? Listen to the back door and eavesdrop on your secrets.
Some people even speculate that this software is likely to be written by the government department itself in order to make it easier to monitor. Listen. In addition, there are all kinds of strange rumors.
Although the bit messenger has been appearing for so long, there are still many people who only believe in themselves, do not trust others, and still use their own way to communicate and communicate information.
And the open source of Bit messenger completely eliminates all rumors and speculations.
While many hackers are excited about the open source news of the bit messenger, the security bankers of the span network are having a headache because of the spread of the tree worm.
When the tree worm breaks into a computer, it will immediately start to copy itself, and then start to send a copy to other computers connected to this computer. It goes along the network cable. If it finds an active computer, it will start to try to connect if a password is needed. And the account, it will call the most commonly used password from the password dictionary for brute force cracking.
When cracking violently, the account number and user name it uses are the most common in the vms system, and most of them are the default account number and password when leaving the factory.
For accounts such as "system" and "decnet", the password is usually the same. The worm will use these default account information for guessing at the first time. In fact, this strategy is very successful. Many computer users will not modify these account information at all and directly use the default account.
Because in their opinion, a computer like themselves, in the vast sea of the Internet, is simply a drop in the ocean. The probability that hackers want to find themselves is about the same as winning the lottery.
Therefore, their passwords are usually set very simple, such as a few letters or numbers arranged in order, or even without even changing, using the default password directly. They thought that hackers stole account passwords and guessed them manually, but they didn't know that these processes had been automated for a long time.
Write a violent cracking program, then put the common simple passwords in the password dictionary, and automatically try to compare them one by one. It's only a matter of time before they are cracked. If the computer is well configured, the cracking time can be greatly shortened.
If the common password cannot be logged in successfully, the tree worm will try again from the collected user password.
In many cases, multiple accounts like to use the same password, because people tend to be lazy. Remembering many passwords is a big burden, so usually all accounts will use the same password. This gives the tree worm another opportunity to take advantage of.
The anti-tree security team worked overtime to analyze the source code of the tree worm, and finally had some clues.
This worm does steal information. They specialize in collecting specific levels. Once the key word information is found, it will be copied and sent to the specified email address.
There is not only one email address, but a lot of emails. These emails are open to the public for free.
The security team had to be divided into two parts, one continued to study ways to eliminate tree worms, and the other began to track these emails.
Fortunately, with the spread of worms, there are more and more people in their security team, which is no longer limited to NASA members.
After working overtime, Edward finally wrote the first worm antivirus program.