1 2

6 facts and secrets about the Pirates of the North Korea, the dreaded and merciless Avengers!




Last week, Sony Pictures films saw piracy attacks widely: was this diversion network movies and a lot of confidential information. The FBI says suspects may be from North Korea, and the attack was by the pirate groups #GOP (guards of Peace peace "Gardian"). these pirates sent a letter to company staff that all computers company secrets stolen, will soon become known all over the world, if it does not react with Sony in the implementation of their demands. As a result of this attack the digital infrastructure for Sony known damage: that staff over a week have been forced to use the telephone and fax numbers of the contact paper notes.
In addition to publishing many copies of several movies and instantly posted on the Internet. Including "rage" starring Brad Pitt, and in the early days of the movie more than once!. Also, some sensitive data captured by the pirates and posted publicly on the Internet, we are talking about Passport and Visa data and other personal information for actors and crew, including John Hill, Cameron Diaz and Angelina Jolie. The leaked information about the salaries of company: and that will be a pretext for accusations of racism and sexism by Sony
.
6 حقائق وأسرار حول قراصنة كوريا الشمالية،المرعبون و المنتقمون بلا رحمة!



















1. North Korea pirates have their own style


The Wall Street Journal quoted the Federal Bureau of investigation says attack on Sony reminds us of the power of the "process of Seoul in the darkness" Operation Dark Seoul. That was a year ago by unknown hackers, suffered many companies and banks in this attack on South Korea. Then accused Seoul of "northern neighbours, but Pyongyang and officially does not recognize it. The FBI believesthat the working methods of the pirates in both cases are very similar.

2. North Korea has reason to launch this devastating attack on Sony


The main reason why most experts doubted that the attack stands behind Pirates of the North Korea is approaching the premiere of the film "interview" The Interview that filmed plot Seth rugen and James Franco to kill Kim Jong Eun, the leader of North Korea. Pyongyang has strongly criticized the image produced by Sony on its neighbour since the latter made a complaint at the United Nations in a statement, the film is a provocation which deserves "severe penalties". "Cyber-attacks" is a very attractive way of expressing anger North Korea and to demonstrate the capabilities of the country.



3. not be underestimated in the ability of Pirates of Korea


North Korea is almost out of the World Wide Web and are more closed countries in the world, although we are in the 21st century. but though the ability of Korea in hacking and cracking cannot be underestimated. The company's security section Hewlett Packard released in a detailed report, which describes the country's capacity in the area of information technology, particularly hacking. It is also noted that schools in North Korea are a special focus on mathematics, and is the basis for teaching programming and programmers in the future.

4. Pirates of the North Korea are more organized than we imagine


Pirates of the North Korea organized a successful electronic attacks on the United States, which targeted a particularly military digital infrastructure. Against external enemies of North Korea's leadership has created numerous private collections in the area of piracy as a "121" and "lab 110". According to some data, these groups and individuals were trained in China and Russia and Iran two years ago, Pyongyang and Tehran signed an agreement of cooperation to defeat the "common enemy in cyberspace."



5. part of the Pirates of the North Korea working in a luxury hotel in China


In 2004, one of the defectors from North Korea said that most of the pirates are working at a hotel in the Chinese city of Shenyang, which there are a few hours away from the border between the two countries.

6. North Korea pirates yhgom on holidays and events


Often the pirates Korea attack during important events. For example, an attack last year on the South Korea during "operation Seoul darkness" on the anniversary of the Korean war on July 4, 2009, independence day, tried to break through a few u.s. Government sites.



Of course even if the attack by hackers, North Korea (despite all the reasons mentioned above), however, is in any case a triumph of Kim Jong UN and his aides.
Comments
0 Comments
  • The latest news about the new phone Samsung Galaxy S6
    The latest news about the new phone Samsung Galaxy S6

    We are a few hours after the end of 2014, only a few days on the famous CES 2015 Technology…

  • 21 reasons why you should thank your dog! The 14 had all happen to us at least once...
    21 reasons why you should thank your dog! The 14 had all happen to us at least once...

    All dog owners will…

  • A new design of Google goggles smart Google Glass
    A new design of Google goggles smart Google Glass

    During the recent period there have been a lot of news, analysis and data that indicate desire Google…

  • What falls faster: Bowling ball or feather?
    What falls faster: Bowling ball or feather?

    Interesting experience finally gives the answer to this intriguing question In early modern…

  • HOW TO PLAY A HOT GIRLS GAME AND BEAT HER AT IT. (AVERAGE LOOKING GUYS, LISTEN UP)
    HOW TO PLAY A HOT GIRLS GAME AND BEAT HER AT IT. (AVERAGE LOOKING GUYS, LISTEN UP)

    Those are the words of a wise (and funny) man called Groucho Marx. And it is also what I learned in…

  • YouTube is testing a new mechanism to create animated images in Gif format
    YouTube is testing a new mechanism to create animated images in Gif format

    Still, Google is betting on new updates to its stand for YouTube video, these updates include a new…

  • 6 petites leçons de management que chacun devrait absolument connaître. La 2 est vraiment trop drôle !
    6 petites leçons de management que chacun devrait absolument connaître. La 2 est vraiment trop drôle !

    Vous connaissez ces articles qui vous donnent des conseils pour réussir votre vie professionnelle ? Eh bien…

  • How to become more intelligent
    How to become more intelligent

    Have you ever thought on what it means to be smart or what intelligence originally some people judge…

  • Unlike expected. Apple is the most innovative companies!
    Unlike expected. Apple is the most innovative companies!

    No doubt the idea prevailing among many users is that the American company Apple is number one in…

  • The detection of the first Smartphone labeled
    The detection of the first Smartphone labeled "VAIO"

    "VAIO " is a name associated with SONY known as giant, for many years, this company is known for its…

  • The Israeli army is
    The Israeli army is "hackers" the Moroccans on top of the pyramid of his enemies

    The army of the Zionist hackers Moroccans in pyramid online enemies as an Israeli investigation in…

  • 'Mum, someone needs you!': what it really means to be a mother...
    'Mum, someone needs you!': what it really means to be a mother...

  • Critical gap for WordPress sites
    Critical gap for WordPress sites

    Display the number of operating sites on the WordPress platform for targeting by the electronic attack…

  • Strangest kinds one could not eat chocolate!!!
    Strangest kinds one could not eat chocolate!!!

    In the study, statistical currency this manufacturer Chocolate show it after buying…

Welcome to Bets kyO blog

Writer

Welcome to the Best kyO is a blog for bloggers

Search in blog

Subscribe to receive all new

Get updates on the blogging moment by moment subscribe now