Urban Denon
Chapter 116 Jade Dynasty Wind and Cloud Hardware Forum
After finishing these tasks, it was already the end of get out of class in the afternoon, so Xiao Yihan took his notebook and Xia Xiaoyu drove back to the villa, thinking about how to invade Perfect Company at night.
Just after dinner, Xiao Yihan asked Xia Xiaoyu to go to rest first, claiming that he would study computer at night, Xia Xiaoyu knew that Xiao Yihan was doing something very important, since Xiao Yihan didn't tell him, he must be afraid that he was worried, Xia Xiaoyu told Xiao Yihan to take care of his body He walked into the bedroom alone.
Xiao Yihan was sitting in front of the computer at this time, frowning slightly. This time he invaded not ordinary users, but Perfect Company. As a company like Perfect, I believe it must be a place visited by many hackers. If this is the case, then believe Perfect. Where will the level of technical staff be?
How to invade?Xiao Yihan frowned, Xiao Yihan, who had no actual experience in hacking operations, fell into deep thought.
After half a sound, Xiao Yihan raised his head and quickly clicked his fingers on the keyboard keys. After a while, Xiao Yihan wrote a small self-destructing program. Xiao Yihan installed this program and the self-destructing program together in the selected On those twenty broilers, if the other party finds out at that time and traces it, the Tianlong system in those broilers can also help me block it for a period of time. During this time, I can erase my own intrusion path, and wait When a perfect technician cracks and invades the broiler with the Tianlong system installed, the self-destruct program is triggered at this time, so what the perfect technician can catch is the final real address of the cracked broiler. Xiao Yihan at that time had already wiped off all his footprints, and when the other party came to that house, he would definitely see a computer with a Windows operating system installed on it.
Now Xiao Yihan has already planned his way out, but how to attack?The perfect server is not comparable to my own laptop. If the computing speed and response speed are reduced by sending a lot of junk messages to slow down the server, it will definitely not work. Thinking of this, I saw Xiao Yihan's face Showing a sinister smile, using poison.
As every hacker, writing viruses is a compulsory course for them. Xiao Yihan also collected a large number of viruses during this period. After analysis and his own adaptation, Xiao Yihan now divides those viruses into three categories in Xiao Yihan's computer hard drive.The first type is that the virus mutates after the invasion, and will replicate exponentially. The replication speed is thousands of times per second. After 10 minutes, these viruses will self-destruct.The other party's computer was safe and sound.
The second type is the same virus, but Xiao Yihan didn't write a self-destruct program in it, and the final result is that the other party's computer is completely flooded with viruses, and there is no other way but to redo the system.
The third category is the most abnormal cih virus. The abnormality of this virus is that it can directly damage the other party's hardware, such as the motherboard, cpu, hard disk, etc.This virus has no damage to systems above nt (win nt, 2000, xp, 2003, vista, etc.), but after Xiao Yihan modified it, now this virus is not immune to the vista operating system, even the unix operating system.However, Xiao Yihan only used this as the ultimate method. If someone was about to chase him to the door or the other party was too evil, Xiao Yihan would throw this virus out.
From writing his own Tianlong system or firewall to the current virus writing, Xiao Yihan has always adopted the principle of borrowing, and added some codes and programs of his own, because Xiao Yihan knows that since these programs are so famous, there must be his own merits. Xiao Yihan first understands other people's source code in detail before he can understand the principle of the author's code. At this time, what Xiao Yihan has to do is to integrate his own thoughts with the original author's thoughts. Mastery of principles.
Sometimes it is not difficult to write a program by yourself, but the difficult thing is how to add your own ideas to other people's programs, and integrate your own programs with other people's programs to exert greater power.
Xiao Yihan saw that the time displayed on the computer desktop was only eleven o'clock, and Xiao Yihan was still waiting. He would not invade the perfect server until 02:30 to three o'clock at night, because this time is the most sleepy time, Xiao Yihan To invade the perfect server when the perfect technician is most relaxed, modify the attributes and equipment of the game character he registered in the database.Seeing that there were still more than three hours to wait, Xiao Yihan entered the computer hardware forum in Baidu, because Xiao Yihan bought this computer at the beginning just to deceive others, Xiao Yihan knew that the performance of using this computer for hacking activities was too poor, and he was helpless today Xiao Yihan's idea is to find a way to make a computer that is portable, unobtrusive, and has good performance. As for what it looks like, Xiao Yihan has no idea what it will look like.
But after a while, many forums about computer hardware appeared before Xiao Yihan's eyes, but many forums seemed to be advertisements for computer sellers.
In the end, Xiao Yihan chose to come to a foreign hardware forum. Xiao Yihan saw that there were quite a lot of people, all of whom were posting posts in English, and those posts seemed to be very high-quality, completely different from the general flooding posts. For every post published, people who discuss it can put forward their own doubts or pertinent suggestions.
Xiao Yihan browsed for about half an hour and saw that most of the above were showing off his computer configurations. Those configurations made Xiao Yihan almost salivate. Some of those configurations were the top configurations in the domestic market, and most of them were hardcore configurations , and then Xiao Yihan wanted to register a user name to participate in posting, how about using the above user name?Then I saw Xiao Yihan write China in the user name, then set an [-]-digit password, and entered the forum.
At this time, Xiao Yihan saw a computer that claimed to be the best, and when he sent out his configuration, most people exclaimed, but at this time, he saw a strange post, the content was, it’s okay, Words like passable.The person who posted the post, Xiao Yihan, had noticed it a long time ago. This person should be a hardware expert. He analyzed everyone's configuration clearly and logically, with reasons and evidence.That person is called mak on the Internet.
Xiao Yihan then sent him a secret message (in English): "Hello, I hope you can help me build a computer, money is not a problem."
After a while, Mak replied: "Money is not a problem, the most important thing is whether you are qualified to use the computer I made."
"How can I test whether I am qualified?"
"I have already controlled the server of this forum, and have completed its security system. Within 72 hours, as long as you break into this server, I will build a computer for you for free."
"It's a deal." Afterwards, Xiao Yihan quit the forum, checked the time, it was already 02:30, well, we can start to act.
Knife for collection
Just after dinner, Xiao Yihan asked Xia Xiaoyu to go to rest first, claiming that he would study computer at night, Xia Xiaoyu knew that Xiao Yihan was doing something very important, since Xiao Yihan didn't tell him, he must be afraid that he was worried, Xia Xiaoyu told Xiao Yihan to take care of his body He walked into the bedroom alone.
Xiao Yihan was sitting in front of the computer at this time, frowning slightly. This time he invaded not ordinary users, but Perfect Company. As a company like Perfect, I believe it must be a place visited by many hackers. If this is the case, then believe Perfect. Where will the level of technical staff be?
How to invade?Xiao Yihan frowned, Xiao Yihan, who had no actual experience in hacking operations, fell into deep thought.
After half a sound, Xiao Yihan raised his head and quickly clicked his fingers on the keyboard keys. After a while, Xiao Yihan wrote a small self-destructing program. Xiao Yihan installed this program and the self-destructing program together in the selected On those twenty broilers, if the other party finds out at that time and traces it, the Tianlong system in those broilers can also help me block it for a period of time. During this time, I can erase my own intrusion path, and wait When a perfect technician cracks and invades the broiler with the Tianlong system installed, the self-destruct program is triggered at this time, so what the perfect technician can catch is the final real address of the cracked broiler. Xiao Yihan at that time had already wiped off all his footprints, and when the other party came to that house, he would definitely see a computer with a Windows operating system installed on it.
Now Xiao Yihan has already planned his way out, but how to attack?The perfect server is not comparable to my own laptop. If the computing speed and response speed are reduced by sending a lot of junk messages to slow down the server, it will definitely not work. Thinking of this, I saw Xiao Yihan's face Showing a sinister smile, using poison.
As every hacker, writing viruses is a compulsory course for them. Xiao Yihan also collected a large number of viruses during this period. After analysis and his own adaptation, Xiao Yihan now divides those viruses into three categories in Xiao Yihan's computer hard drive.The first type is that the virus mutates after the invasion, and will replicate exponentially. The replication speed is thousands of times per second. After 10 minutes, these viruses will self-destruct.The other party's computer was safe and sound.
The second type is the same virus, but Xiao Yihan didn't write a self-destruct program in it, and the final result is that the other party's computer is completely flooded with viruses, and there is no other way but to redo the system.
The third category is the most abnormal cih virus. The abnormality of this virus is that it can directly damage the other party's hardware, such as the motherboard, cpu, hard disk, etc.This virus has no damage to systems above nt (win nt, 2000, xp, 2003, vista, etc.), but after Xiao Yihan modified it, now this virus is not immune to the vista operating system, even the unix operating system.However, Xiao Yihan only used this as the ultimate method. If someone was about to chase him to the door or the other party was too evil, Xiao Yihan would throw this virus out.
From writing his own Tianlong system or firewall to the current virus writing, Xiao Yihan has always adopted the principle of borrowing, and added some codes and programs of his own, because Xiao Yihan knows that since these programs are so famous, there must be his own merits. Xiao Yihan first understands other people's source code in detail before he can understand the principle of the author's code. At this time, what Xiao Yihan has to do is to integrate his own thoughts with the original author's thoughts. Mastery of principles.
Sometimes it is not difficult to write a program by yourself, but the difficult thing is how to add your own ideas to other people's programs, and integrate your own programs with other people's programs to exert greater power.
Xiao Yihan saw that the time displayed on the computer desktop was only eleven o'clock, and Xiao Yihan was still waiting. He would not invade the perfect server until 02:30 to three o'clock at night, because this time is the most sleepy time, Xiao Yihan To invade the perfect server when the perfect technician is most relaxed, modify the attributes and equipment of the game character he registered in the database.Seeing that there were still more than three hours to wait, Xiao Yihan entered the computer hardware forum in Baidu, because Xiao Yihan bought this computer at the beginning just to deceive others, Xiao Yihan knew that the performance of using this computer for hacking activities was too poor, and he was helpless today Xiao Yihan's idea is to find a way to make a computer that is portable, unobtrusive, and has good performance. As for what it looks like, Xiao Yihan has no idea what it will look like.
But after a while, many forums about computer hardware appeared before Xiao Yihan's eyes, but many forums seemed to be advertisements for computer sellers.
In the end, Xiao Yihan chose to come to a foreign hardware forum. Xiao Yihan saw that there were quite a lot of people, all of whom were posting posts in English, and those posts seemed to be very high-quality, completely different from the general flooding posts. For every post published, people who discuss it can put forward their own doubts or pertinent suggestions.
Xiao Yihan browsed for about half an hour and saw that most of the above were showing off his computer configurations. Those configurations made Xiao Yihan almost salivate. Some of those configurations were the top configurations in the domestic market, and most of them were hardcore configurations , and then Xiao Yihan wanted to register a user name to participate in posting, how about using the above user name?Then I saw Xiao Yihan write China in the user name, then set an [-]-digit password, and entered the forum.
At this time, Xiao Yihan saw a computer that claimed to be the best, and when he sent out his configuration, most people exclaimed, but at this time, he saw a strange post, the content was, it’s okay, Words like passable.The person who posted the post, Xiao Yihan, had noticed it a long time ago. This person should be a hardware expert. He analyzed everyone's configuration clearly and logically, with reasons and evidence.That person is called mak on the Internet.
Xiao Yihan then sent him a secret message (in English): "Hello, I hope you can help me build a computer, money is not a problem."
After a while, Mak replied: "Money is not a problem, the most important thing is whether you are qualified to use the computer I made."
"How can I test whether I am qualified?"
"I have already controlled the server of this forum, and have completed its security system. Within 72 hours, as long as you break into this server, I will build a computer for you for free."
"It's a deal." Afterwards, Xiao Yihan quit the forum, checked the time, it was already 02:30, well, we can start to act.
Knife for collection
You'll Also Like
-
They don't want me to try anymore.
Chapter 182 10 hours ago -
One Piece: Trying 200 times harder, but being too overbearing.
Chapter 238 10 hours ago -
Transforming into twin actresses, offering a glimpse into the cutthroat world of entertainment.
Chapter 667 10 hours ago -
A Bizarre Adventure Starting with One-Punch Man
Chapter 388 10 hours ago -
Republic of China: My great warlord, many children, many blessings.
Chapter 285 10 hours ago -
Juri Ueno from Kuroko's Basketball
Chapter 164 10 hours ago -
Under One Person: With unparalleled comprehension, I become the Celestial Master!
Chapter 248 10 hours ago -
I'm on Star Iron, and I've loaded the Commander Simulator.
Chapter 120 10 hours ago -
American comic book: The Heavenly Path of the Bright Realm! Dimensional Demon God!
Chapter 363 10 hours ago -
Film and Television World Life Record
Chapter 588 10 hours ago