OpenWrt 的世界︰樹莓派 3B 【路由器】移星轉斗《四‧六》木馬屠城‧遁甲

Albrecht_Dürer_-_Adam_and_Eve_(Prado)_2
夏娃的蘋果

Golden_Apple_of_Discord_by_Jacob_Jordaens
金蘋果事件

640px-Newton's_tree,_Botanic_Gardens,_Cambridge
牛頓的蘋果

青蘋果
圖靈的蘋果

根據《聖經‧創世記》記載︰

亞當和夏娃二人住在伊甸園中,後來夏娃受『』的哄誘,偷食了『知善惡樹』所結的『禁果』,也讓亞當食用,二人遂被上帝逐出伊甸園。

□︰禁果是蘋果嗎?
○︰莫宰羊!
□︰那蘋果是禁果嗎?
○︰煩惱即菩提!!

也許希臘神話中關鍵之因緣生法的一顆『金蘋果』── 獻給最美女神 ──,引發 → 帕里斯的評判,導致 → 特洛伊戰爭。明示了『蘋果』與『誘惑』的關係,至於說怎麼聯繫上了『知識』,那只能問『牛頓』的了?

雖說『牛頓』並沒有創造『機械的宇宙』,如果仔細考察『運動定律』,假使再加上『物質組構』的『構造方程式』與『初始條件』── 位置和動量 ──,那麼該物之『運動軌跡』就被『確定』了。這演示了一種『軟體設計』之方法學,它以『資料驅動』為中心。或許艾倫‧圖靈非常了解那個『抽象機械』,所以創想發明了『萬有圖靈機』。只不過人類的知識還很難駕馭那樣的『仙女計算機』,然而隨著一九六零年代以來『硬體描述語言』 HDL hardware description language 的發展,也許我們終將受邀進入『計算機械的世界』,一探『軟硬體的真諦』!『圖靈的蘋果』正述說著『尊重』與『寬容』,如今想來他早已『知道』這些『演算法』了的吧 !!

─── 《大樹底下好乘涼 ︰ 《大哉問》

 

天機深,所以遁甲

甲骨文作一

甲骨文作二

甲骨文作三

△★ 坊

《説文解字》:,起也。从人,从乍。

本義:木匠用刀具砍斫削刻,制作器物。

《説文解字》:,邑里之名。从土,方聲 。古通用埅。

原意:邊塞的防護墙。

─── 摘自《《派生》 Python 作坊【甲】尋本溯源

如果水土平,可以『 癸 』癸度;那麼天機深,只能藏『 甲 』甲的了。維基百科講︰

奇門遁甲

奇門遁甲大六壬太乙神數並稱三式。為中國神秘學中預測學的一個特有門類。乃利用洛書軌跡,九宮八卦以及五行相生相剋的道理,來預測地理方向的優劣,進而規劃一個人的行程,最終達到對自己最有利的目的,為算命相術所兼用。

簡介

奇門遁甲以稱為三奇;以休、生、傷、杜、景、死、驚、開稱為八門,故名「奇門」。天干中「甲」最尊貴而不顯露,六甲常隱藏於「戊、己、庚、辛、壬、癸」六儀之內,三奇、六儀分布九宮,而甲不獨占一宮,故名「遁甲」。

在古代,民間流傳只有帝王附近如軍師、欽天監、國師等重要大臣才通曉奇門遁甲之術。此法後來被神化為一門法術,以至於一些小說將其描寫為有「飛天遁地」之本領的法術。亦有人稱之為帝王學 。

歷史

傳說

煙波釣叟歌中記載,奇門遁甲起源於傳說時代,黃帝炎帝聯軍和蚩尤在涿鹿展開的一場大戰,蚩尤身高七尺,鐵頭銅身,刀槍不入 ,能呼風喚雨並在戰場上製造迷霧,使得炎黃聯軍陷入不利境地。黃帝於是向天祈禱,終於獲得九天玄女給的河圖洛書和彩鳳銜來的太乙、六壬、遁甲之書,黃帝以此發明了指南車,逆轉了戰局,取得了勝利。黃帝令風后演繹天書,並最終演繹成三式之法:大六壬 太乙神數、奇門遁甲一千零八十局(陽遁、陰遁各五百四十局) 。後來該術數為姜子牙所習得,由姜子牙刪減為七十二局(陽遁、陰遁各三十六局),再經過姜子牙傳給黃石公,再由黃石公傳給張良,最終由張良將其精簡為現今的一十八局(陽遁、陰遁各九局) 。

史實

錢大昕在《十駕齋養新錄》指出《史記・龜策傳》中衛平替宋元王解夢之法為遁甲術,而近代嚴敦傑指出所用的方法應該是六壬。
東晉煉丹家葛洪在其著作《抱朴子》中記載「余少有入山之志,由此乃行學遁甲書,乃有六十餘卷,事不可卒精,故鈔集其要,以為囊中立成,然不中以筆傳」。但書中並無記載軍事上的應用。

南北朝梁簡文帝蕭綱所寫的《從軍行》中有「三門應遁甲」,何丙郁認為這暗示遁甲與軍事有關。

南北朝時期遁甲已經流行,《隋書・經籍志》中所記載的帶有「遁甲」的書目數量超過五十,並且存在南北朝遁甲書的記載。

《崇寧國子監算學令》記載,三式為北宋司天台學生的考察科目 。

……

,誠以人性為依歸。物理中『量子』有奇異行為,宇宙裡『時空』可『重力』波動。『預測』一事總在『幽明』之間!故從把握今朝到開創明天的『機率』才是大的乎?因此於『舊探索』將『終』,『新研究』伊『始』之際,

─── 摘自《W!O+ 的《小伶鼬工坊演義》︰ 一窺全豹之系統設計‧探索‧癸

 

說『誘惑』也!

特洛伊木馬

特洛伊木馬木馬屠城記裡,希臘軍隊在特洛伊戰爭中,用來攻破特洛伊城的那隻大木馬。值得注意的是,木馬屠城記並非於古希臘詩人荷馬的兩部著作伊利亞特奧德賽裡記載,而是在羅馬帝國時期的詩人維吉爾所寫的史詩《埃涅阿斯紀》中, 才第一次被記載。木馬屠城記一直被現代科學人視為神話故事,直至十九世紀時,業餘考古學者海因里希·施利曼(Heinrich Schliemann)才證實特洛伊城的遺址。

《The Procession of the Trojan Horse in Troy》,Domenico Tiepolo (1773)。

戰爭起因

荷馬希臘神話所載,這個故事的起因是源自一個金蘋果。 這個故事的開端,就是海洋女神忒提斯(Thetis)與希臘國王佩琉斯(Peleus)的婚禮,原本宙斯與忒提斯相戀,但那時傳說忒提斯的兒子(也就是未來的阿基里斯(Achilles))會比他的父親還強大,宙斯害怕當年推翻他父親的事重演,於是將她嫁給了著名英雄佩琉斯,避免影響他的政權。婚禮上邀請了很多神,唯獨麻煩女神埃里斯(Eris)沒有被邀請。她很生氣,便拋出一個金蘋果,刻著「獻給最美麗的女神」。智慧女神雅典娜、愛神阿芙羅狄忒和天后赫拉都認為自己最有資格冠上蘋果上最美麗女神的美譽。為了解決這個難題,最後她們飛到艾達山請求特洛伊王子帕里斯仲裁。三個女神都試圖賄賂帕里斯:雅典娜答應讓帕里斯成為世界上最睿智的學者;希拉答應讓帕里斯成為天底下最有權勢的君王;阿芙羅狄忒則以世界上最美麗的女子作為賄賂。最後帕里斯忠於感官天性選擇了阿芙羅狄忒。作為回報,阿芙羅狄忒施行魔咒,讓斯巴達王國的王后,公認為世界上最漂亮的女人海倫和帕里斯共墜愛河。海倫為了愛情拋棄了她的家鄉,丈夫墨涅拉俄斯還有稚女。帕里斯的行動惹怒了斯巴達國王墨涅拉俄斯,其怒不可抑,於是向兄長阿伽門農求援,並聯合希臘各城邦向特洛伊宣戰。

 

心難測,故而生

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive wooden horse that led to the fall of the city of Troy.[1][2][3][4][5]

Trojans are generally spread by some form of social engineering, for example where a user is duped into executing an e-mail attachment disguised to appear not suspicious, (e.g., a routine form to be filled in), or by clicking on some fake advertisement on social media or anywhere else . Although their payload can be anything, many modern forms act as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.[6] Trojans may allow an attacker to access users’ personal information such as banking information, passwords, or personal identity. It can infect other devices connected to the network. Ransomware attacks are often carried out using a Trojan.

Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves.[7]

Origin of the concept

This terminology occurs for the first time in a US Air Force report in 1974 on the analysis of vulnerability in computer systems.[8] It was made popular by Ken Thompson in his 1983 Turing Award acceptance lecture “Reflections on Trusting Trust”,[9] subtitled:

 

To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust: the people who wrote the software.

He mentioned that he knew about the possible existence of Trojan horses in a report on the security of Multics of which he was unfortunately unable to find a reference. However Paul Karger and Roger Schell affirm that this is their above cited report.[10][8][11]

Malicious uses

Trojan in this way may require interaction with a malicious controller (not necessarily distributing the Trojan) to fulfill their purpose. It is possible for those involved with Trojans to scan computers on a network to locate any with a Trojan installed, which the hacker can then control.[12]

Some Trojans take advantage of a security flaw in older versions of Internet Explorer and Google Chrome to use the host computer as an anonymizer proxy to effectively hide Internet usage,[13] enabling the controller to use the Internet for illegal purposes while all potentially incriminating evidence indicates the infected computer or its IP address. The host’s computer may or may not show the internet history of the sites viewed using the computer as a proxy. The first generation of anonymizer Trojan horses tended to leave their tracks in the page view histories of the host computer. Later generations of the Trojan tend to “cover” their tracks more efficiently. Several versions of Sub7 have been widely circulated in the US and Europe and became the most widely distributed examples of this type of Trojan.[12]

In German-speaking countries, spyware used or made by the government is sometimes called govware. Govware is typically a Trojan software used to intercept communications from the target computer. Some countries like Switzerland and Germany have a legal framework governing the use of such software.[14][15] Examples of govware Trojans include the Swiss MiniPanzer and MegaPanzer[16] and the German “state trojan” nicknamed R2D2.[14]German govware works by exploiting security gaps unknown to the general public and accessing smartphone data before it becomes encrypted via other applications.[17]

Due to the popularity of botnets among hackers and the availability of advertising services that permit authors to violate their users’ privacy, Trojans are becoming more common. According to a survey conducted byBitDefender from January to June 2009, “Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the world.” Trojans have a relationship with worms, as they spread with the help given by worms and travel across the internet with them.[18] BitDefender has stated that approximately 15% of computers are members of a botnet, usually recruited by a Trojan infection.[19]

耶?若

/pwnat

The only tool to punch holes through firewalls/NATs where both clients and server can be behind separate NATs without any 3rd party involvement. Pwnat uses a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, router administrative requirements, or spoofing required. https://samy.pl/pwnat/

pwnat - http://samy.pl/pwnat

pwnat, by Samy Kamkar, is a tool that allows any client
behind a NAT to communicate with a server behind a
separate NAT with *no* port forwarding and *no* DMZ
setup on any routers in order to directly communicate
with each other.

There is no middle man, no proxy, no 3rd party, no UPnP
required, no spoofing, no DNS tricks. The server does
not need to know the client's IP address before connecting.

More importantly, the client can then connect to any
host or port on any remote host or to a fixed host and
port decided by the server.

Simply put, this is a proxy server that works behind a NAT,
even when the client is also behind a NAT.

You can read the paper published in IEEE and presented at
the IEEE P2P'10 Conference here: http://samy.pl/pwnat/pwnat.pdf

 

之言推論,『危險』恐在指尖呦★