Urban Denon
Chapter 107 The Birth of the Heavenly Dragon
What Xiao Yihan has to do now is to use the Unix operating system as the basis, and then strengthen this operating system, so as to make this system even more powerful.
In the computer world, there is only what you can't think of, and there is nothing you can't do, as long as you have strong theory and strong technology.
Xiao Yihan deleted the useless parts of the Unix operating system, and added some programs downloaded from the Internet after adaptation.For example, Liuguang, this software can make a person who just knows how to use a mouse become a professional hacker. It can detect various vulnerabilities in pop3, ftp, http, proxy, form, sql, smtp, ipc$, and design Different cracking schemes are developed, and the detected user password can be easily obtained on the vulnerable system.Streamer can detect vulnerabilities on win9x, winnt, and win2000, making it one of the necessary tools in the hands of many hackers, and some senior hackers also favor it.In addition, superscan is a powerful scanner with an extremely fast speed. It only takes 200 hours to detect all IP segments with a response value of less than 6ms in Taiwan.You can view the local ip address and domain name, scan all online hosts in an ip segment and their detectable port numbers.And you can save and import all detected information.
The above are all programs written by some top hackers. Xiao Yihan just fills in their deficiencies to make them more powerful.
A week passed without knowing it. During this time, Xiao Yihan has not forgotten the killer sniping incident that night. Although he was writing the program, he also took all precautions as much as possible. Every night, he closed the windows of all houses. It is tightly covered, and from the outside, there is no light from the whole house. If someone comes to assassinate, there is no other way but to break into the door. He was shot by Xiao Yihan's hidden weapon.
However, in the early hours of Sunday morning, Xiao Yihan finally successfully integrated the firewall and the operating system he wrote. After installing it, Xiao Yihan found that the program was running well, and the results of his many days of burning lights and night battles were finally realized. Xiao Yihan couldn't help shouting out of joy :"yeah."
Looking at the program that runs well on my own display screen, this program can be described as a bastard. There are unix operating systems, firewall programs such as firewall pro, and programs such as superscan in it, as well as a scanning program written by myself. So what should the system be called?
Xiao Yihan thought for a long time, he is a dragon, this system is called Tianlong.I saw Xiao Yihan's hands and fingers jumping rapidly on the keyboard, and after a while, a blue dragon with a dragon's mouth wide open and its head facing the sky appeared in the center of his monitor, which seemed to have that kind of visual impact.In the meantime, Xiao Yihan clicked a button at random, and the Windows operating system was displayed on the desktop, and then Xiao Yihan quickly clicked a few buttons, and the Tianlong system appeared on the desktop.
At this time, Xiao Yihan opened Xia Xiaoyu's notebook, and Yue Feng tried to use the Tianlong system to hack into Xia Xiaoyu's computer.
Of course Xiao Yihan knew the IP address of Xia Xiaoyu's computer, and when Xiao Yihan tapped his finger, the Tianlong system immediately began to scan Xia Xiaoyu's computer. Xia Xiaoyu installed a Windows operating system, but within a few seconds, Xiao Yihan's Tianlong system showed that it had been found With more than twenty loopholes, Xiao Yihan can be said to have directly driven in. After a while, the desktop of Xia Xiaoyu's computer was displayed on Xiao Yihan's screen. Through remote control, Xiao Yihan helped Xia Xiaoyu fill in all the loopholes that were scanned.After that, Xiao Yihan erased the traces of intrusion and quit Xia Xiaoyu's computer.
Collection
In the computer world, there is only what you can't think of, and there is nothing you can't do, as long as you have strong theory and strong technology.
Xiao Yihan deleted the useless parts of the Unix operating system, and added some programs downloaded from the Internet after adaptation.For example, Liuguang, this software can make a person who just knows how to use a mouse become a professional hacker. It can detect various vulnerabilities in pop3, ftp, http, proxy, form, sql, smtp, ipc$, and design Different cracking schemes are developed, and the detected user password can be easily obtained on the vulnerable system.Streamer can detect vulnerabilities on win9x, winnt, and win2000, making it one of the necessary tools in the hands of many hackers, and some senior hackers also favor it.In addition, superscan is a powerful scanner with an extremely fast speed. It only takes 200 hours to detect all IP segments with a response value of less than 6ms in Taiwan.You can view the local ip address and domain name, scan all online hosts in an ip segment and their detectable port numbers.And you can save and import all detected information.
The above are all programs written by some top hackers. Xiao Yihan just fills in their deficiencies to make them more powerful.
A week passed without knowing it. During this time, Xiao Yihan has not forgotten the killer sniping incident that night. Although he was writing the program, he also took all precautions as much as possible. Every night, he closed the windows of all houses. It is tightly covered, and from the outside, there is no light from the whole house. If someone comes to assassinate, there is no other way but to break into the door. He was shot by Xiao Yihan's hidden weapon.
However, in the early hours of Sunday morning, Xiao Yihan finally successfully integrated the firewall and the operating system he wrote. After installing it, Xiao Yihan found that the program was running well, and the results of his many days of burning lights and night battles were finally realized. Xiao Yihan couldn't help shouting out of joy :"yeah."
Looking at the program that runs well on my own display screen, this program can be described as a bastard. There are unix operating systems, firewall programs such as firewall pro, and programs such as superscan in it, as well as a scanning program written by myself. So what should the system be called?
Xiao Yihan thought for a long time, he is a dragon, this system is called Tianlong.I saw Xiao Yihan's hands and fingers jumping rapidly on the keyboard, and after a while, a blue dragon with a dragon's mouth wide open and its head facing the sky appeared in the center of his monitor, which seemed to have that kind of visual impact.In the meantime, Xiao Yihan clicked a button at random, and the Windows operating system was displayed on the desktop, and then Xiao Yihan quickly clicked a few buttons, and the Tianlong system appeared on the desktop.
At this time, Xiao Yihan opened Xia Xiaoyu's notebook, and Yue Feng tried to use the Tianlong system to hack into Xia Xiaoyu's computer.
Of course Xiao Yihan knew the IP address of Xia Xiaoyu's computer, and when Xiao Yihan tapped his finger, the Tianlong system immediately began to scan Xia Xiaoyu's computer. Xia Xiaoyu installed a Windows operating system, but within a few seconds, Xiao Yihan's Tianlong system showed that it had been found With more than twenty loopholes, Xiao Yihan can be said to have directly driven in. After a while, the desktop of Xia Xiaoyu's computer was displayed on Xiao Yihan's screen. Through remote control, Xiao Yihan helped Xia Xiaoyu fill in all the loopholes that were scanned.After that, Xiao Yihan erased the traces of intrusion and quit Xia Xiaoyu's computer.
Collection
You'll Also Like
-
I couldn't take it anymore; when I went home for Chinese New Year, the family genealogy book ha
Chapter 262 1 days ago -
I became a movie star at the age of three; Dilraba and I are childhood sweethearts.
Chapter 184 1 days ago -
When I woke up, the entire cultivation world was talking about my master.
Chapter 180 1 days ago -
Gender-swapped Saintess: A Survival Diary on Hell Difficulty
Chapter 198 1 days ago -
After becoming a widow, I became the apple of a rough man's eye.
Chapter 172 1 days ago -
A bizarre resurrection: I, Yang Jian, am bound by a contract with the school beauty!
Chapter 143 1 days ago -
Reborn in the 1980s: Nine Stunning Beauties Get Pregnant Before Marriage
Chapter 294 1 days ago -
Sky Curtain: The opening scene explains the four major cases of the Ming Dynasty plus the early Ming
Chapter 355 1 days ago -
Help! My hunky roommate is begging me to touch his abs!
Chapter 132 1 days ago -
No? You've really mastered the Five Thunderbolts of Orthodox Magic from online shopping?
Chapter 137 1 days ago