2012年3月7日星期三

wholesale direct from chinaBeijing's first computer information system case suspect was arrested

Xinhuanet.com Beijing September 30 report (reporter Tu Ming, Li Jinghua) swims lover had a homemade online games plug-in, use the server BUG fraud game coin,china wholesale fashionTianjin channel wake up, sold after the illegal profit more than yuan 300.
29 reporters from the Beijing Haidian District people's Procuratorate learns, this courtyard for alleged illegal control of computer information system approved the arrest was a crime.This is the criminal law amendment (seven) after the entry into force of Beijing City prosecutor for the first cases of the illegal control of computer information system.
The 25 year old has a secondary school after graduation has been without a stable job.In 2009 August, ceng Mou begins playing a game called "dream swims on the west" network game, produced in the game to make money.
Once a software for the game in reverse debugging, found the game BUG, if can use, can "cheat" server, achieve "out of thin air" to generate a game coin effect.Therefore, once some assembly language to do a plug-in, the adoption of plug-in to intercept packets, achieved by the use of the BUG server, virtual game money to their account recharge.
According to Haidian District's introduction, in 2009 August to 2010 March, has a by using the self-made external fraud game virtual currency,wholesale direct from china, then Taobao 100 yuan to 10000000 game coins sold.According to an account he had, by this "fraud -- scalping" game coin way,wholesale china electronic,china electronics wholesalersMicrosoft IE9 browser's new ad piece small fresh art fan (map) 56 years, gain profit 3200000 yuan, and the illegal profits in Guangzhou buy a house to buy a car.
In 2011 August, had a residence was captured in Guangzhou.The prosecution review that, once a use to write their own plug-in to intercept packets, to another server sends an illegal instruction, and through the behavior of profit, if the circumstances are serious, its behavior already was suspected of illegal control of computer information systems.

没有评论:

发表评论