Xiao Yao: "..."

  Followed by.

  In his mind, there is a lot of information about computer technology and C language...

  What is Hong Ke?

  Hongke is a spirit.

  It is a spirit of loving the motherland, upholding justice, and pioneering and enterprising.

  Anyone who has this spirit and loves computer technology can be called a red guest.

  Hongke usually uses its own technology to maintain the security of domestic networks and fight back against foreign attacks.

  In today's country, red has a specific meaning of value.

  Justice, morality, progress, power, etc.

  Someone will say.

  Hackers are bad, honkers are good.

  In fact, this definition is ignorant.

  Hackers and honkers, both responsible for construction and defense.

  The really bad ones are the so-called 'hackers'.

  Hackers will be destructive, such as illegally intruding into other people's computers to break the loop and steal data, attack some important servers to bring inconvenience or even danger to users, and create Trojan horse viruses.

  Red guest, hacker and hacker have different meanings. Who calls Chinese so broad and profound?

  Just changing the word has different meanings, maybe someday there will be green customers, purple customers, white customers...

  There was once a person with strong network technology who said such a sentence.

  "I thought I was a hacker at first, and I became a red guest for a while two years ago, but others said I was a hacker, and I don't even know who I am anymore."

  Maybe.

  This also shows the status quo and confusion of the domestic hacker industry.

  Everyone doesn't know who they are.

  in short.

  In a broad sense.

  Hongke is a patriotic hacker working in the cybersecurity industry.

  Hong Ke is a clear love and hatred, evil and hatred, must be patriotic.

  Almost all the 'skills' given to Xiao Yao by the system are the technical means of positive network computers.

  And it is also stated: If the host uses these technologies to commit crimes, he will be the first to withdraw the 'Red Guest' skill and punish him, randomly erasing the three abilities that Xiao Yao himself acquired!

  What made Xiao Yao laugh or cry the most was that.

  The information in the 'Hong Ke' given through the system.

  He just found out.

  domestic.

  in the computer network world.

  There are actually five factions...

  Hacker: A person who is enthusiastic about computer technology, has a high level of computer expert, and conducts research on computer vulnerabilities.

  Hong Ke: Safeguard national interests, love one's motherland, nation, peace, and strive to safeguard national security and dignity.

  Lanke: Belief in freedom, use your own strength to maintain the peace and stability of the network.

  Grey Guest: Chong good at personal technology, with the main purpose of improving personal technology, neither destroying like a hacker, nor maintaining like a red guest, but more for personal improvement.

  Hackers: Some criminals who use computers to commit crimes.

  These five factions are all computer masters, and the substantial differences are very large.

  Xiao Yao rolled his eyes.

  My own 'system' is actually quite patriotic!

  Ignore the system skills for the time being, just get familiar with them slowly in the future.

  Xiao Yao began to think about the case in front of him.

  Talk about the case in front of you.

  The scariest place means that it will not happen in the future.

  It's what's already happening, or even what's happening.

  The dark web does exist.

  From the day the web appeared, it was possible for them to exist...  

  Like the 'No. [-] room' incident that was exposed in a certain country.

  Numerous women and young children were persecuted.

  A small country with a total population of tens of millions.

  There are [-] people who are members of 'a certain room'.

  The dark web where the exposed 'room of a certain' is located has a trading scope spanning many countries, and its business scope is extremely dark. It is called 'a treasure' in the dark world.

  There are news reports.

  Some of the apps that people usually use today have also been exposed to monitor user privacy.

  Some companies use these APPs and certain software to monitor people's computers and mobile phones, steal privacy and collect information.

  It can also use microphones and cameras to monitor and monitor people's conversations and daily life.

  Why is this so?

  Because many people do not understand network security.

  When installing some APPs, it will give it the permission of the mobile phone.

  For example, positioning, photo album, voice, video, microphone, camera, address book, system control...

  Such questions are well understood.

  For example, a game software.

  During the installation process, it is common to ask for microphone permissions, camera permissions, address book permissions, album video permissions, mobile phone system permissions...

  For a game, maybe you need the microphone permission and the album permission to be normal.

  But what do you want the permission of the address book, the permission of the camera, and the permission to control the phone?

  People have not thought about it.

  When you give these permissions to these apps, what will happen?

  Ha ha!

  This is also indirectly proved.

  Any behavior of the public on the Internet may be monitored.

  In the era of technology and intelligence becoming more and more popular.

  People's privacy has also become less and less.

  under the supervision of the normal network.

  Can restrain the behavior of many people.

  If it is some mercenary network technicians and companies.

  Through the network, through software, through illegal means.

  After watching some people.

  Steal your indecent photos, steal some of your indecent videos, record your voice in life, record some of your life videos, and even steal some secret files and identity information on your mobile phone.

  So can these criminals control you?

  If you can.

  This will also make some people fall into the endless abyss.

  Seriously terrified! .

Chapter 271

  "Where the victim is, the branch is all over the country."

  "The residual IP of the killer's laptop also appeared all over the country."

  "It can be seen from this that the murderer is a fugitive."

  "All criminal transactions and video transactions will be carried out through the dark web."

  "The dark web software on the killer's laptop cannot be ported to other computer hosts because it is set with a self-destructing program."

  "If you want to break it, there is no way."

  "And if you want to enter the dark web, you have to go through this software."

  A network security officer in his twenties with a pair of glasses pointed at his laptop and explained to Xiao Yao: "But using this software means that everything you have is being monitored or even manipulated by the other party. It can block your network, destroy your software, and even use software to control your computer permissions and destroy your computer!"

  If it is in the past.

  Xiao Yao would definitely think that the security officer in front of him was bragging.

  Destroy someone else's computer?

  This is impossible in the eyes and imagination of many computer novices.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like