NOTICE: We closed down Spin Distribute on December 31st, 2022. ❗
Spin Distribute has been a wonderful SEO service since early 2009. Unfortunately, after almost 14 years, it no longer meets the very strict quality criteria of our company.
We pride ourselves on only providing SEO services that are best-in-class. Unfortunately Spin Distribute no longer qualifies.
For this reason we closed down new sign-ups and new orders on Spin Distribute on December 31st, 2022.
Of course all your existing orders will be delivered in full. Thank you!

- Aaron Sustar, CEO, INFINET LLC
SmileyTech Solutions - Smile about your Online Business!

Take your IM business and SEO efforts to the next level!

Log In

Once you are logged in, you are able
to use all of our services.
Your Email Address:
Your Password:
 
What can I do when logged in?
Once you are logged in, you are able to use all of our services. This includes:

You can submit new articles, so we can make unique versions of them and distribute them for you.
If you want to simply publish the same article on 800 websites, you can tell us to do that.
You can see the archive and current status of all your article distributions.
You can order any number of high-quality articles - just let us know your keywords.
You can browse the archive of all the articles we have written for you.
You can order our Complete Service (10 high-quality articles plus 10 article distributions).
You can purchase more credits for our services and check your affiliate earnings.
Much more ...

SpinDistribute.com Article Directory

« Back to articles from category "Business"

The following article was published in our article directory on April 15, 2011.
Learn more about SpinDistribute Article Distribution System.

One person have stolen 29 million within 30 seconds using the loophole of the u aegis

Article Category: Business

Author Name: Amanda xzh

The publicity, in bank U aegis is to protect the individual net silver-colored safety the most effective "weapon", however, the use of bank U aegis is not absolute safety.

Yesterday morning, Beijing xicheng court trial together U aegis Trojan theft case. Young hackers Ju following user's computer will Trojan implanted quietly. When the user use when U aegis into the bank on the net, Ju following from many users e-currencies worke who stole money account.

Trojan stolen net capital flow chart
Implant Trojan: use "catch chicken" tool scanning a loophole computer, about 5% of the computer can implant trojans
Looking for users: through the trojans looking for installation, silver-colored drive computer "key monitoring"
Obtain password: record users' mailboxes, QQ, BBS etc password, tested the user U aegis password
Transfer funds: while users U aegis transactions inserting machine, and go quickly logged in each other net silver money
S case representation
Computer mutation white during
29 million yuan "fly away"
Shantou victims Mr Shaw, often use icbc U aegis transactions. October 14, 2010, as a clothing factory boss this afternoon, Mr Shaw was remittance computer suddenly hang. After a while, the computer returned to normal, Mr Shaw check the account balance, found the inside bank card 29 million yuan was transferred to "LiuHongJun" account.

Mr. Shaw reports, police investigation found that after "LiuHongJun" will soon be 29 million yuan by bank transfer mode, YangXi "scattered into the" three icbc after account, in Beijing through ATM machine remove.

2010 November 13 afternoon, police will Ju following the criminal suspect in custody.
S commit crime revelation
Using the home computer "crack" U aegis
Ju following, 25, their hometown in anhui, junior high school, 2004 to Beijing to swing. He usually very like the Internet, gradually learned how to use Trojan.

In March 2010, from online search to Ju following a Trojan horse, it can remote in the other computer to get the system operation within the jurisdiction of each other, still can record the keyboard. This made him think of a ShengCaiZhiDao: if this implant users of computer, not can record the e-currency account information?

Ju enterprise itself is icbc U aegis users, he at home through several computers, finally tested explored a use Trojan "crack" U aegis way.

Implant Trojan "monitoring" net users
Ju following used a "catch chicken" tools (implanted Trojan computer users are called "chicken"), through the scanning IP HaoDuan, can find a system of computers, and loopholes in can automatically will Trojan implant users of computer, make it become the own "chicken".

After that, he went through the trojans, check whether the user's computer system in a net silver-colored driven installed on the users will be driven "monitoring objects". But, Trojan can only record net users bank account number and password, and U aegis account password cannot be Trojan records.

In order to clear up the user account password, Ju following through Trojan record and other login mailboxes, QQ, BBS password, and then when the user does not use the net silver while, use these secret
Code for the test.

30 seconds. Go net capital t1d
In getting these information, when a user use again when U aegis net, will Ju following after inserting computer, then in remote monitor user's computer screen. Wait for you over, silver-colored trading just Ju following will use U aegis haven't pulled down time, quickly logged in each other's net, turning money away.

Ju enterprise in accordance with the statement, this process is very short, less than about 30 seconds to finish, and the other fundamental to perceive.

S trial scene
He had cracked
More than 20 U aegis users
U aegis truth "in using a loophole"
At about 10 a.m. yesterday, Ju following figure thin by into court.
"Can I use your own computer monitor user's computer, the other party all operating I can see clear." Ju following said, his initial contact trojans, just as a "hobby" research just. According to Ju following says, theft targets chose U aegis users, because the line of the net users are more likely to commit crime, so most way.

And in just a few months, Ju following cracked than 20 U aegis user account and password and U aegis password, and four theft grab.

In the face of media interviews, Ju following wouldn't remember specific crime process, "nothing really technical content", "bank U aegis using on a loophole, hackers can always come up with a solution."
Prosecutors said, compared with the average theft crime, Ju following through Trojan theft net silver social harmfulness bigger, suggest court in 12 years to 13 years imprisonment for its between sentencing. "My heart there has always been a kind of guilt." Ju following said in the last statement.

The court will make a judgment on the election.
U aegis, namely icbc 2003 gain national patent launch USBkey, is the customer certificate provided for icbc online banking high level security tools. It shaped like U disk, as a shield to protect the bank on the net, the time the capital is safe

About the Author: I am Amanda xzh from China Crafts Suppliers, walkie talkie phones,cordless pleated shades,

Keywords: walkie talkie phones,cordless pleated shades,hdmi splitter cable,

Learn more about SpinDistribute Article Distribution System. We also offer one of the Best Article Writing Services out there - give us a try if you need great articles on various topics!

SpinDistribute.com Network

Each article you submit at SpinDistribute.com is sent through our innovative Article Distribution System to our network of more than 1840 publishers - about 55% of them are high-quality article directories, 30% of them are niche blogs and 15% of them are other content-rich websites.

To achieve the best possible success we only publish your article to most related websites. This means your article will show up on approximately 640 - 880 most related websites which will give you great SEO results.

We also offer a separate Professional Article Writing Service to everyone who's looking for high quality web content and well researched unique articles.

1 article = 800+ backlinks

ARTICLE DISTRIBUTION

Publish 800+ unique versions of
your article on 800+ websites!
Let us do all the

ARTICLE WRITING

Need lots of keyword optimized
quality articles? Search no more.
We recommend our

COMPLETE SERVICE

We write articles. We distribute
them. You get all the gains!
Have any questions?
Feel free to check out the "Frequently Asked Questions" section, or use the email address below to contact our team. You can also register for free and contact our Support Department. Read more
Why choose
Spin Distribute?
boost your traffic and online income and crush your competitors with our great article distribution system
get more than 800 highly relevant backlinks with each article distribution (from $1.60 per distribution)
try out our "Complete Service" that puts everything on auto-pilot (we write & distribute articles for you)
have us write all the articles for you, so you can focus on your business
get detailed HTML and PDF reports for every article distribution
contact our Support Department and Live Support to get answers
get FREE access to our SEO Tips & Tricks Guide (worth $27 alone!)
join our Affiliate Program and make money with our services
 
E-mail: info
   
spindistribute.com
Smile about your Online Business!

> Frequently Asked Questions
> Terms of Use & Privacy Policy
> Affiliate Program
 
I got in online biz more than 2 years ago but I got nowhere - until I found your service a couple of months ago, that is. Now I am getting really strong in the lose-weight niche and I can't wait to see where this online business takes me. Tnx so much!!
Harold Brown