the technical content is also very high. First of all, in the subject setting covered include SQL injection, social engineering, sensitive information leakage, etc., provided the contains a variety of history or the recent emergence of classical holes; Competition platform to fully support the use of these classic loopholes such as \"work incident\" in 2010 by use of social engineering, etc., are able to get on the platform. In addition, in work attack, both the utilization work digital cannon, such as distributed denial of service attacks on system, there are also using viruses, trojans, backdoors, holes and other attacks on users; Both attacks on cable wan, and attacks on wireless local work (LAN), basic covers the current mainstream of work information security and defense technology