Urban Denon

Chapter 107 The Birth of the Heavenly Dragon

What Xiao Yihan has to do now is to use the Unix operating system as the basis, and then strengthen this operating system, so as to make this system even more powerful.

In the computer world, there is only what you can't think of, and there is nothing you can't do, as long as you have strong theory and strong technology.

Xiao Yihan deleted the useless parts of the Unix operating system, and added some programs downloaded from the Internet after adaptation.For example, Liuguang, this software can make a person who just knows how to use a mouse become a professional hacker. It can detect various vulnerabilities in pop3, ftp, http, proxy, form, sql, smtp, ipc$, and design Different cracking schemes are developed, and the detected user password can be easily obtained on the vulnerable system.Streamer can detect vulnerabilities on win9x, winnt, and win2000, making it one of the necessary tools in the hands of many hackers, and some senior hackers also favor it.In addition, superscan is a powerful scanner with an extremely fast speed. It only takes 200 hours to detect all IP segments with a response value of less than 6ms in Taiwan.You can view the local ip address and domain name, scan all online hosts in an ip segment and their detectable port numbers.And you can save and import all detected information.

The above are all programs written by some top hackers. Xiao Yihan just fills in their deficiencies to make them more powerful.

A week passed without knowing it. During this time, Xiao Yihan has not forgotten the killer sniping incident that night. Although he was writing the program, he also took all precautions as much as possible. Every night, he closed the windows of all houses. It is tightly covered, and from the outside, there is no light from the whole house. If someone comes to assassinate, there is no other way but to break into the door. He was shot by Xiao Yihan's hidden weapon.

However, in the early hours of Sunday morning, Xiao Yihan finally successfully integrated the firewall and the operating system he wrote. After installing it, Xiao Yihan found that the program was running well, and the results of his many days of burning lights and night battles were finally realized. Xiao Yihan couldn't help shouting out of joy :"yeah."

Looking at the program that runs well on my own display screen, this program can be described as a bastard. There are unix operating systems, firewall programs such as firewall pro, and programs such as superscan in it, as well as a scanning program written by myself. So what should the system be called?

Xiao Yihan thought for a long time, he is a dragon, this system is called Tianlong.I saw Xiao Yihan's hands and fingers jumping rapidly on the keyboard, and after a while, a blue dragon with a dragon's mouth wide open and its head facing the sky appeared in the center of his monitor, which seemed to have that kind of visual impact.In the meantime, Xiao Yihan clicked a button at random, and the Windows operating system was displayed on the desktop, and then Xiao Yihan quickly clicked a few buttons, and the Tianlong system appeared on the desktop.

At this time, Xiao Yihan opened Xia Xiaoyu's notebook, and Yue Feng tried to use the Tianlong system to hack into Xia Xiaoyu's computer.

Of course Xiao Yihan knew the IP address of Xia Xiaoyu's computer, and when Xiao Yihan tapped his finger, the Tianlong system immediately began to scan Xia Xiaoyu's computer. Xia Xiaoyu installed a Windows operating system, but within a few seconds, Xiao Yihan's Tianlong system showed that it had been found With more than twenty loopholes, Xiao Yihan can be said to have directly driven in. After a while, the desktop of Xia Xiaoyu's computer was displayed on Xiao Yihan's screen. Through remote control, Xiao Yihan helped Xia Xiaoyu fill in all the loopholes that were scanned.After that, Xiao Yihan erased the traces of intrusion and quit Xia Xiaoyu's computer.

Collection

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like