City: Attack, Fat House
Page 290
But in reality. 16
Hackers do have the ability to control other people's computers.
Use technology to destroy computer memory and hard disks, or implants in certain hardware.
There is nothing wrong with saying that the core of a computer is the CPU, the heart.
But to the real core.
Let's talk about memory and hard drives.
Because of these two pieces of core hardware.
Equivalent to the human brain and cerebellum.
If the data in it is destroyed, it will be erased.
Equivalent to turning a human into an idiot.
People have become idiots, and they are all very vegetative.
Also the heart and other organs have eggs!
Someone will say.
Can't the hard drive be recovered?
is recoverable.
But the premise is that the data traces are not damaged, not maliciously overwritten, altered or completely erased.
If the data traces are damaged, maliciously overwritten, altered or completely erased, the gods will not be able to restore them.
Now has the 'Red Guest' skill.
Xiao Yao is very clear that the other party's words have no water in the slightest.
But he still wanted to try.
From owning the system.
Every time the skills and abilities given by the system have never let him down!
"Help me prepare a better laptop, not the original hardware."
Xiao Yao said to Zhao Mingjun who was beside him.
Zhao Mingjun and the six members of the team do not know why.
When the cybersecurity officer heard Xiao Yao's words, his eyes lit up, and he asked, "Peer?"
Hackers rarely use desktop computers, but mostly use laptops.
So why do hackers like to use laptops and never use desktops?
First of all, what hackers do often violate the law and cybersecurity laws.
This requires hackers to be ready to run away at any time.
Desktop computers are noticeably cumbersome.
Hackers will obviously drag themselves down with it.
Once someone finds out that their computer cannot be taken away in time.
Then the data in your computer will be obtained by others.
In order not to expose your own computer model, or your own computer data.
Hackers also go shopping for hardware themselves.
Or buy hardware from some specialized channels.
Assemble again.
Also, from a security standpoint.
Hackers often have large amounts of data on their computers.
Once own IP address is locked.
That would be equivalent to becoming a living target for other people.
So to keep your data safe.
They need to keep changing IPs.
Laptops can also solve this problem perfectly.
As for why you should buy the hardware assembly yourself?
Because these hardware are not ordinary hardware, most of them have been 'modified'.
Some of the 'implants' above will be erased, or replaced.
What is an 'implant'?
Take a simple analogy.
As soon as ordinary people's mobile phones are turned on, they are connected to the Internet.
Phone makers can figure out how many people are using their phones.
Why does the manufacturer know?
Because of some hardware 'implants' in the phone!
The same goes for computers.
Some computer hardware will come with certain 'implants'.
This is not alarmist!
and so.
Some top hackers hardly ever use original computer hardware.
Most are 'modified' or 'homemade'.
There are even manufacturers that specialize in making these hardware.
This can also prevent 'hardware hackers' from exploiting vulnerabilities in original hardware programs.
For example, some mobile phones are cracked and jailbroken through hardware.
These things are not accessible to ordinary people.
too far from people.
Everyone understands!
Hackers will use the two core points of the laptop.
'Portable' and 'Safe'!
There is such a legend on the Internet.
People who are good at playing desktop computers are not necessarily hackers.
But people who are good at playing with laptops are very likely to be hackers.
"No."
Xiao Yao looked at the security personnel in front of him and asked with a smile, "Your surname?"
"It's free, Hao Tian!"
Hao Tian said politely: "Brother, don't make fun of you, you know that people who don't use the original hardware computer will have no easy things."
big brother?
I'm not as old as you!
Xiao Yao smiled without saying a word.
The rest of Guoan Group [-] looked at Xiao Yao suspiciously.
soon.
The gunman brought a notebook.
The military kind!
Hao Tian's eyes were fixed on Xiao Yao.
Staring at the laptop in front of Xiao Yao.
After booting.
Xiao Yao checked the 'military system' on the computer.
The military system is safe, but because it is too safe and has a strong defense, it is impossible to 'invade' with such a system!
The corners of his mouth twitched a few times.
Skill: Red Guest!
moment.
Xiao Yao's hands danced fast on the computer keyboard, bringing up a dazzling afterimage.
The people from Guoan Group [-] still didn't know what Xiao Yao was doing.
But Hao Tian looked at it, and the whole person was not well.
Not only was he stunned, his mouth was already open.
He found a somewhat unacceptable fact.
Xiao Yao is actually programming his own computer system!
Many people know it.
There are roughly four types of computer systems on the market.
windows, linux, MacOSX, Unix...
But few people know.
You'll Also Like
-
Era: Starting with the struggle to refuse being taken advantage of
Chapter 382 19 hours ago -
Old Domain Bizarre
Chapter 53 19 hours ago -
I Alone Am Immortal: My Rebirth and Leisurely Cultivation
Chapter 484 19 hours ago -
Immortality and cultivation begin with full comprehension.
Chapter 869 19 hours ago -
The younger generation, starting from where the wind blows...
Chapter 365 19 hours ago -
F1: The Making of a Racing God
Chapter 287 19 hours ago -
Invasion Myth: Starting with the Schoolteacher
Chapter 1076 19 hours ago -
Swords emerge from the human world
Chapter 106 19 hours ago -
I was reborn without dreams
Chapter 218 19 hours ago -
Playing with fantasy beasts in the martial arts world
Chapter 233 19 hours ago