SlideShare a Scribd company logo
Data Storage and Security Strategies of
           Network Identity
             (YOCSEF Report)
               Antiy Labs
               12/30/2011
Self Introduction
Identity: Xinguang, Xiao (real name); Haike, Jiang (online name);
Seak (English name);
Profession: antivirus researcher, not algorithm researcher;
Major: Automation Control, not Computer Science;
English skill: poor, but like using acronyms such as AV.
Wish: do not embarrass an antivirus researcher.




8/2/2012                     Security Every Day                Page 2
Terms in This Report
 Encryption/cipher text: Encryption is the process of
  transforming plain text to cipher text.
 Computation speed: As for the computation speed of hash
  and other encryption algorithms, there is no consensus of
  whether we should use the length of plain text/computation
  time, or the computation number in unit time.
 Zhang’s Theorem/ Zhang’s Hypothesis: Zhang is the CTO of
  Antiy. Whenever any hypothesis occurs to me, I name it as
  “Zhang’s Theorem”. In order to differentiate the ideas of us
  two, the idea Zhang comes up with is “Zhang’s Hypothesis”.
Outline
 Background
 Cipher text attack methods and current solutions
 Find suitable security products
 Extra topics




8/2/2012                    Security Every Day       Page 4
When Moore Law becomes a disaster.
    BACKGROUND


8/2/2012                   Security Every Day   Page 5
Computation Speed
           Host Environment:
           Core 2 (T7250) 2.0 G, 2M cache, 4GB RAM, 64-byte
           Windows server 2008

           VM Environment:
           Vmware Server, Ubuntu 10.04, 512MB RAM

           Compute MD5 of the 16 bytes in the virtual machine, the
           computation number in 2.99 seconds is 1,759,393.




8/2/2012                           Security Every Day                Page 6
Computation Resources
Low-cost cloud computation          Super Computer: GPU




8/2/2012                 Security Every Day               Page 7
Node Resources
 Botnet




8/2/2012       Security Every Day   Page 8
Plain Text Resources

           Infected                          Infected accounts
           Vendors/Websites
           Sony                              101,600,000
           Sega Corporation                  1,300,000
           City Bank                         200,000
           CSDN                              6,000,000
           Duo Wan                           8,000,000
           Tian Ya                           30,000,000




8/2/2012                      Security Every Day                 Page 9
Rainbow Table/Online Query


Name                                      Functionality                                                   Application scenarios
md5                                       Encrypt the passwords by MD5                                    Lots of common websites
md5(md5($pass))                           Encrypt the MD5 value by MD5                                    Lots of common websites
md5($pass.$salt)                          Connect the password with the salt to form a new password, and open source CMS operating system such as
                                          then encrypt the new password by MD5                            Joomla
md5($salt.$pass)                          Connect the password with the salt to form a new password, and open source electrical business system
                                          then encrypt the new password by MD5                            osCommerce
md5(md5($pass).$salt)                     Connect the MD5 value with the salt, and then encrypt the newly Forum systems such as Vbulletin, IceBB, and
                                          generated password by MD5                                       Discuz
md5(md5($salt).$pass)                     Connect the MD5 value of the salt with the password, and then
                                          encrypt the newly generated password by MD5
md5($salt.$pass.$salt)                    Connect the salt with the password, and then encrypt the newly Online P2P systems such as TBDev
                                          generated password by MD5
md5($salt.md5($pass))                     Connect the salt with the MD5 value of the password, and then
                                          encrypt the newly generated password by MD5
md5(md5($pass).md5($salt))                Connect the MD5 value of the password and the MD5 value of the
                                          salt, and then encrypt the newly generated password by MD5
md5(md5($salt).md5($pass))                Connect the MD5 value of the salt and the MD5 value of the Forum systems sucha s ipb and mybb
                                          password, and then encrypt the newly generated password by
                                          MD5
MD5(Unix)                                 Encrypt the password by MD5, and then save the value with Unix Forum systems such as phpBB3; blog system s
                                          shadow format                                                   such as WordPress
md5(unicode)                              Encrypt the Unicode of the password by MD5                      Unix/Linux systems
sha1                                      Encrypt the password by SHA-1                                   Lots of common websites
sha1($salt.$pass)                         Connect the salt with the password, and then encrypt the newly
                                          generated password by SHA-1
sha1(lower($username).$pass)              Connect the lower-case user name with the password, and then Forum systems such as SMF
                                          encrypt the newly generated password by SHA-1
sha1(upper($username).’:’.upper($pass))   Connect the upper-case user name with “:”, and the upper-case Online game server systems such as ManGOS
                                          password, and then encrypt the newly generated password by
                                          SHA-1
sha1($username.’:’.$pass)                 Connect the user name with “:” and the password, and then
                                          encrypt the newly generated password by SHA-1
sha256                                    Encrypt the password by SHA-256
sha512                                    Encrypt the password by SHA-512
mysql                                     Encrypt the password of MySQL accounts                          MySQL database (Version 4.0 and earlier versions)
mysql5                                    Encrypt the password of MySQL accounts                          MySQL database (Version 5.0 and later versions)
mssql                                     Encrypt the password of SQL Server accounts
Des(unix)
                                                                  Resources that can be queried SQL ServerMicrosoft
                                          Encrypt the password by DES, and save the value with Unix Unix/Linux systems
Current cipher text attack methods; some wrong methods;
    our open-source samples
    CIPHER TEXT ATTACK METHODS AND
    CURRENT SOLUTIONS

8/2/2012                    Security Every Day            Page 11
Attack Statistics
High Frequency Match (Continued)




8/2/2012                Security Every Day    Page 13
Plain text Password Match
Normal Speed


                          After GPU Acceleration




                             引自http://www.insidepro.com/eng/egb.shtml
Some Wrong Methods
 Use standard hash algorithms
 Use several hash values
 Use non-unidirectional algorithms
 Add salt
 Design algorithms




                                                 引自安天2010.03《基于内存对象对26种HASH方法的测试结果》

8/2/2012                    Security Every Day                                Page 15
Antiy Password Mixer
Introduction                                    Resources
• Algorithm                                     • Open source
       – RSA, SHA256                                      – http://code.google.com/p/pa
                                                            ssword-mixer/
• User/Salt
       – Accounts
       – The salt table
       – UID and registration time
• Provide restoration mode




8/2/2012                             Security Every Day                             Page 16
Not every security product is useful. We should recognize the fake ones.

    FIND SUITABLE SECURITY PRODUCTS


8/2/2012                           Security Every Day                     Page 17
Design Slow Hash
Questions                  Perspective
• Fake slow hash
                           • It’s difficult to design a slow
   – Another algorithm
                             hash algorithm. Such a
• User’s experience          algorithm is of low payload
• DDoS attacks               for X86 CPUs. Moreover, it is
                             difficult to bypass certain
                             software and hardware.
Biometric Recognition
Question                                     Perspective
• It is not what we are talking              • The identity recognition
  about here.                                  technology based on the Internet
• It’s not renewable.                          is widely used; it is disastrous
                                               since users’ information might be
                                               stolen.
                                             • Some websites advocate the
                                               identity recognition technologies.
                                               They might be driven by
                                               economic interests.

                                                 You seem
                                                   quite
                                                 tired, try
                                                  Dabao.
8/2/2012                          Security Every Day                         Page 19
Zhang’s Hypothesis
 Any Web/DB targeted logon strategies must be based on the
  following conditions.
   – open source algorithms
   – Rapid hash algorithm
   – The rainbow table is only limited by storage.
Avoid Using Frequently Used Passwords
 Don’t use Frequently Used
 Passwords                                 Dynamic Balance
• Check the passwords that are used        • Microsoft Hotmail
  for several accounts;
                                                     – Frequency balance
• High frequency password and
  leaked passwords                                   – Shortcomings




 8/2/2012                       Security Every Day                         Page 21
Encryption Hardware Used for WEB/DB
                  Scenarios
       Idea                            Design
• Protect passwords and
  parameters via hardware
  design;
• Acceleration functionality;
• Support VM scenarios




8/2/2012                    Security Every Day   Page 22
Operation and Maintenance
The following problem must
be settled                           Try the following one
• Counter password and the           • Protect records via records
  online passwords should be                   – Create lots of bot users;
  different.
                                               – Misled by algorithms
                                               – Fake table




8/2/2012                  Security Every Day                                 Page 23
The pseudo propositions …
    EXTRA TOPICS


8/2/2012                   Security Every Day   Page 24
Some Pseudo Propositions
 Unidirectional security?
           – Cracking situation(MD5 security is not relevant with this event)
           – intensity
 Dual factor security?
           – Financial institutes should bear the responsibilities.




8/2/2012
                                         Security Every Day                     Page 25
References
 Password related article:
           – http://blog.csdn.net/antiy_seak


 Antiy Password Mixer
           – http://code.google.com/p/password-mixer/


 Speed of GPU acceleration related algorithms
           – http://www.insidepro.com/eng/egb.shtml



8/2/2012                          Security Every Day    Page 26
Thank You
   www.antiy.com
   seak@antiy.com
http://Weibo.com/seak

More Related Content

PDF
Password Security
PPTX
Passwords presentation
ODP
Password Security
PDF
Password (in)security
PPT
9 password security
PDF
Passwords good badugly181212-2
PDF
Cryptography in PHP: use cases
PDF
Password Storage And Attacking In PHP - PHP Argentina
Password Security
Passwords presentation
Password Security
Password (in)security
9 password security
Passwords good badugly181212-2
Cryptography in PHP: use cases
Password Storage And Attacking In PHP - PHP Argentina

What's hot (20)

PDF
Application Security around OWASP Top 10
KEY
RIPE64 - DNS and DNSSEC in the .se Zone
PPTX
Web application Security
PDF
Breaking vaults: Stealing Lastpass protected secrets
PDF
Cryptography For The Average Developer - Sunshine PHP
PDF
Redis basics
PPTX
Yihan Lian & Zhibin Hu - Smarter Peach: Add Eyes to Peach Fuzzer [rooted2017]
PDF
Kicking ass with redis
PDF
Advanced Redis data structures
PDF
MongoDB World 2018: Load Spikes, GDPR, & Natural Disasters... Oh My! Scaling ...
PDF
Encryption: It's For More Than Just Passwords
PDF
Black Hat Europe 2017. DPAPI and DPAPI-NG: Decryption Toolkit
PDF
JSON Web Tokens (JWT)
PDF
ドキュメントデータベースとして MySQLを使う!? ~MySQL JSON UDF~
PPTX
I Left My JWT in San JOSE
PPTX
Advanced Sharding Features in MongoDB 2.4
PDF
Even the LastPass Will be Stolen Deal with It!
PPTX
Choosing a Shard key
PDF
New Methods in Automated XSS Detection & Dynamic Exploit Creation
PPTX
Webinar: MongoDB 2.4 Feature Demo and Q&A on Hash-based Sharding
Application Security around OWASP Top 10
RIPE64 - DNS and DNSSEC in the .se Zone
Web application Security
Breaking vaults: Stealing Lastpass protected secrets
Cryptography For The Average Developer - Sunshine PHP
Redis basics
Yihan Lian & Zhibin Hu - Smarter Peach: Add Eyes to Peach Fuzzer [rooted2017]
Kicking ass with redis
Advanced Redis data structures
MongoDB World 2018: Load Spikes, GDPR, & Natural Disasters... Oh My! Scaling ...
Encryption: It's For More Than Just Passwords
Black Hat Europe 2017. DPAPI and DPAPI-NG: Decryption Toolkit
JSON Web Tokens (JWT)
ドキュメントデータベースとして MySQLを使う!? ~MySQL JSON UDF~
I Left My JWT in San JOSE
Advanced Sharding Features in MongoDB 2.4
Even the LastPass Will be Stolen Deal with It!
Choosing a Shard key
New Methods in Automated XSS Detection & Dynamic Exploit Creation
Webinar: MongoDB 2.4 Feature Demo and Q&A on Hash-based Sharding
Ad

Similar to Data Storage and Security Strategies of Network Identity (20)

PDF
2012 03 The Death of Passwords
PPTX
FYP1 Presentation
PDF
Password Storage and Attacking in PHP
PDF
PDF
Secure password storing with saltedpasswords in TYPO3
PDF
Cracking Salted Hashes
PDF
Cryptography in PHP: Some Use Cases
PDF
Cryptography For The Average Developer
ODP
All Your Password Are Belong To Us
PDF
Hacknbeers sqli and cryptography
PDF
Strong cryptography in PHP
PPTX
Rainbow Tables
PPTX
TM112 Meeting12-Cryptography.pptx
PPTX
Choosing strong passwords
PPTX
Using Cryptography Properly in Applications
PPT
Kieon secure passwords theory and practice 2011
PPTX
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
ODP
User Credential handling in Web Applications done right
PDF
The slower the stronger a story of password hash migration
ODP
Passwords
2012 03 The Death of Passwords
FYP1 Presentation
Password Storage and Attacking in PHP
Secure password storing with saltedpasswords in TYPO3
Cracking Salted Hashes
Cryptography in PHP: Some Use Cases
Cryptography For The Average Developer
All Your Password Are Belong To Us
Hacknbeers sqli and cryptography
Strong cryptography in PHP
Rainbow Tables
TM112 Meeting12-Cryptography.pptx
Choosing strong passwords
Using Cryptography Properly in Applications
Kieon secure passwords theory and practice 2011
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
User Credential handling in Web Applications done right
The slower the stronger a story of password hash migration
Passwords
Ad

More from Antiy Labs (8)

PDF
Malware in Mobile Platform from Panoramic Industrial View
PDF
Development, Confusion and Exploration of Honeypot Technology
PDF
Security Challenges of Antivirus Engines, Products and Systems
PDF
The Evolution Theory of Malware and Our Thought
PDF
Virus Detection System
PDF
Virus Detection Based on the Packet Flow
PDF
PE Trojan Detection Based on the Assessment of Static File Features
PDF
Embeddable Antivirus engine with high granularity
Malware in Mobile Platform from Panoramic Industrial View
Development, Confusion and Exploration of Honeypot Technology
Security Challenges of Antivirus Engines, Products and Systems
The Evolution Theory of Malware and Our Thought
Virus Detection System
Virus Detection Based on the Packet Flow
PE Trojan Detection Based on the Assessment of Static File Features
Embeddable Antivirus engine with high granularity

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Approach and Philosophy of On baking technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Empathic Computing: Creating Shared Understanding
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation
Approach and Philosophy of On baking technology
Chapter 3 Spatial Domain Image Processing.pdf
Programs and apps: productivity, graphics, security and other tools
Reach Out and Touch Someone: Haptics and Empathic Computing
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Understanding_Digital_Forensics_Presentation.pptx
Unlocking AI with Model Context Protocol (MCP)
Per capita expenditure prediction using model stacking based on satellite ima...
Cloud computing and distributed systems.
Encapsulation_ Review paper, used for researhc scholars
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
20250228 LYD VKU AI Blended-Learning.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Big Data Technologies - Introduction.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Empathic Computing: Creating Shared Understanding
“AI and Expert System Decision Support & Business Intelligence Systems”

Data Storage and Security Strategies of Network Identity

  • 1. Data Storage and Security Strategies of Network Identity (YOCSEF Report) Antiy Labs 12/30/2011
  • 2. Self Introduction Identity: Xinguang, Xiao (real name); Haike, Jiang (online name); Seak (English name); Profession: antivirus researcher, not algorithm researcher; Major: Automation Control, not Computer Science; English skill: poor, but like using acronyms such as AV. Wish: do not embarrass an antivirus researcher. 8/2/2012 Security Every Day Page 2
  • 3. Terms in This Report  Encryption/cipher text: Encryption is the process of transforming plain text to cipher text.  Computation speed: As for the computation speed of hash and other encryption algorithms, there is no consensus of whether we should use the length of plain text/computation time, or the computation number in unit time.  Zhang’s Theorem/ Zhang’s Hypothesis: Zhang is the CTO of Antiy. Whenever any hypothesis occurs to me, I name it as “Zhang’s Theorem”. In order to differentiate the ideas of us two, the idea Zhang comes up with is “Zhang’s Hypothesis”.
  • 4. Outline  Background  Cipher text attack methods and current solutions  Find suitable security products  Extra topics 8/2/2012 Security Every Day Page 4
  • 5. When Moore Law becomes a disaster. BACKGROUND 8/2/2012 Security Every Day Page 5
  • 6. Computation Speed Host Environment: Core 2 (T7250) 2.0 G, 2M cache, 4GB RAM, 64-byte Windows server 2008 VM Environment: Vmware Server, Ubuntu 10.04, 512MB RAM Compute MD5 of the 16 bytes in the virtual machine, the computation number in 2.99 seconds is 1,759,393. 8/2/2012 Security Every Day Page 6
  • 7. Computation Resources Low-cost cloud computation Super Computer: GPU 8/2/2012 Security Every Day Page 7
  • 8. Node Resources  Botnet 8/2/2012 Security Every Day Page 8
  • 9. Plain Text Resources Infected Infected accounts Vendors/Websites Sony 101,600,000 Sega Corporation 1,300,000 City Bank 200,000 CSDN 6,000,000 Duo Wan 8,000,000 Tian Ya 30,000,000 8/2/2012 Security Every Day Page 9
  • 10. Rainbow Table/Online Query Name Functionality Application scenarios md5 Encrypt the passwords by MD5 Lots of common websites md5(md5($pass)) Encrypt the MD5 value by MD5 Lots of common websites md5($pass.$salt) Connect the password with the salt to form a new password, and open source CMS operating system such as then encrypt the new password by MD5 Joomla md5($salt.$pass) Connect the password with the salt to form a new password, and open source electrical business system then encrypt the new password by MD5 osCommerce md5(md5($pass).$salt) Connect the MD5 value with the salt, and then encrypt the newly Forum systems such as Vbulletin, IceBB, and generated password by MD5 Discuz md5(md5($salt).$pass) Connect the MD5 value of the salt with the password, and then encrypt the newly generated password by MD5 md5($salt.$pass.$salt) Connect the salt with the password, and then encrypt the newly Online P2P systems such as TBDev generated password by MD5 md5($salt.md5($pass)) Connect the salt with the MD5 value of the password, and then encrypt the newly generated password by MD5 md5(md5($pass).md5($salt)) Connect the MD5 value of the password and the MD5 value of the salt, and then encrypt the newly generated password by MD5 md5(md5($salt).md5($pass)) Connect the MD5 value of the salt and the MD5 value of the Forum systems sucha s ipb and mybb password, and then encrypt the newly generated password by MD5 MD5(Unix) Encrypt the password by MD5, and then save the value with Unix Forum systems such as phpBB3; blog system s shadow format such as WordPress md5(unicode) Encrypt the Unicode of the password by MD5 Unix/Linux systems sha1 Encrypt the password by SHA-1 Lots of common websites sha1($salt.$pass) Connect the salt with the password, and then encrypt the newly generated password by SHA-1 sha1(lower($username).$pass) Connect the lower-case user name with the password, and then Forum systems such as SMF encrypt the newly generated password by SHA-1 sha1(upper($username).’:’.upper($pass)) Connect the upper-case user name with “:”, and the upper-case Online game server systems such as ManGOS password, and then encrypt the newly generated password by SHA-1 sha1($username.’:’.$pass) Connect the user name with “:” and the password, and then encrypt the newly generated password by SHA-1 sha256 Encrypt the password by SHA-256 sha512 Encrypt the password by SHA-512 mysql Encrypt the password of MySQL accounts MySQL database (Version 4.0 and earlier versions) mysql5 Encrypt the password of MySQL accounts MySQL database (Version 5.0 and later versions) mssql Encrypt the password of SQL Server accounts Des(unix) Resources that can be queried SQL ServerMicrosoft Encrypt the password by DES, and save the value with Unix Unix/Linux systems
  • 11. Current cipher text attack methods; some wrong methods; our open-source samples CIPHER TEXT ATTACK METHODS AND CURRENT SOLUTIONS 8/2/2012 Security Every Day Page 11
  • 13. High Frequency Match (Continued) 8/2/2012 Security Every Day Page 13
  • 14. Plain text Password Match Normal Speed After GPU Acceleration 引自http://www.insidepro.com/eng/egb.shtml
  • 15. Some Wrong Methods  Use standard hash algorithms  Use several hash values  Use non-unidirectional algorithms  Add salt  Design algorithms 引自安天2010.03《基于内存对象对26种HASH方法的测试结果》 8/2/2012 Security Every Day Page 15
  • 16. Antiy Password Mixer Introduction Resources • Algorithm • Open source – RSA, SHA256 – http://code.google.com/p/pa ssword-mixer/ • User/Salt – Accounts – The salt table – UID and registration time • Provide restoration mode 8/2/2012 Security Every Day Page 16
  • 17. Not every security product is useful. We should recognize the fake ones. FIND SUITABLE SECURITY PRODUCTS 8/2/2012 Security Every Day Page 17
  • 18. Design Slow Hash Questions Perspective • Fake slow hash • It’s difficult to design a slow – Another algorithm hash algorithm. Such a • User’s experience algorithm is of low payload • DDoS attacks for X86 CPUs. Moreover, it is difficult to bypass certain software and hardware.
  • 19. Biometric Recognition Question Perspective • It is not what we are talking • The identity recognition about here. technology based on the Internet • It’s not renewable. is widely used; it is disastrous since users’ information might be stolen. • Some websites advocate the identity recognition technologies. They might be driven by economic interests. You seem quite tired, try Dabao. 8/2/2012 Security Every Day Page 19
  • 20. Zhang’s Hypothesis  Any Web/DB targeted logon strategies must be based on the following conditions. – open source algorithms – Rapid hash algorithm – The rainbow table is only limited by storage.
  • 21. Avoid Using Frequently Used Passwords Don’t use Frequently Used Passwords Dynamic Balance • Check the passwords that are used • Microsoft Hotmail for several accounts; – Frequency balance • High frequency password and leaked passwords – Shortcomings 8/2/2012 Security Every Day Page 21
  • 22. Encryption Hardware Used for WEB/DB Scenarios Idea Design • Protect passwords and parameters via hardware design; • Acceleration functionality; • Support VM scenarios 8/2/2012 Security Every Day Page 22
  • 23. Operation and Maintenance The following problem must be settled Try the following one • Counter password and the • Protect records via records online passwords should be – Create lots of bot users; different. – Misled by algorithms – Fake table 8/2/2012 Security Every Day Page 23
  • 24. The pseudo propositions … EXTRA TOPICS 8/2/2012 Security Every Day Page 24
  • 25. Some Pseudo Propositions  Unidirectional security? – Cracking situation(MD5 security is not relevant with this event) – intensity  Dual factor security? – Financial institutes should bear the responsibilities. 8/2/2012 Security Every Day Page 25
  • 26. References  Password related article: – http://blog.csdn.net/antiy_seak  Antiy Password Mixer – http://code.google.com/p/password-mixer/  Speed of GPU acceleration related algorithms – http://www.insidepro.com/eng/egb.shtml 8/2/2012 Security Every Day Page 26
  • 27. Thank You www.antiy.com seak@antiy.com http://Weibo.com/seak