Rebirth Online Entertainment
Chapter 38: Welcome to China Hacker Union
Chapter 38: Welcome to China Hacker Union
As a new generation of hackers, they not only need to master Internet intrusion technology, but also need to master certain computer cryptography. 【
Aishang Reading Network] However, Internet intrusion technology is a profound knowledge, not to mention computer passwords.Others learn the same thing, they are already considered elites in society, how can they master all the knowledge of computers?
In this way, although there are many masters in the Chinese forum, there are not many talents who have not been specially trained by the country for the time being in computer cryptography.As for the second question of the Hacking League, there was naturally no solution.
In fact, the second question is very simple, and this password is also very easy to crack.It's a pity that most people have never been exposed to this type of topic. They just glance at it and retreat.Of course, Chen Jiayi didn't know this, he just sighed, why such a simple password question was used as the test standard.Even if you use the password to test everyone's decryption technology, how to put it, add a fingerprint to it.
After casually muttering something, Chen Jiayi quickly cracked the forum password.
And the third question, it seems, is also very simple, just give a p address.As long as the test taker changes the home page of this p address, all the tests have been completed.Like the previous questions, it takes almost no time.It took only a few seconds for Chen Jiayi to invoke the several intrusion software compiled before, and obtained the highest authority of the website, and modified one or two words on the homepage.
……
China Hacking League.
After the last battle with the United States, the China Hacking Alliance has become more aware of the importance of talents.Moreover, after knowing that a stranger could help me, I finally realized that there are people beyond people, and there is a sky beyond the sky.China has a vast land and abundant resources, with a population of more than one billion. Among them, how many amazing and brilliant people should there be.Therefore, the three questions released this time are just to attract more alliance members.
It's just a pity that most of the netizens were stuck on the second question after it was released in various forums.Today, there finally appeared a person who broke the second question. Just when the members of the alliance were expecting him to complete the third question, this person actually stopped there without making a move at all.Seeing this, the alliance members sighed.Think about it, people who specialize in technology and can break computer passwords may not necessarily understand Internet intrusion technology.
"Hei Lang, how are you doing?"
In the secret chat room of the hacker alliance, the stationmaster Binghun suddenly went online.
"Unfortunately, I missed one today."
Hei Lang then told Bing Hun about the situation of that person just now.
"There is no way around this. In our line of work, if the skills are not comprehensive, we will definitely not be able to survive. Even if he is recruited, it is not only irresponsible to us, but also to himself."
What hackers do is shady work.
The first rule of the hacker rule is, never let the other party know who you are.
On the Internet, although your name will not be marked.However, if you access through the network, then your p address is displayed to others in your name.
To prevent the other party from knowing who you are, in addition to not disclosing yourself, you also need very powerful computer technology as a support, so that you can't be seen through by others in this Internet.
If you don't have a certain understanding of various computer technologies, even if you have very high intrusion skills, you don't know that after the intrusion, you need to destroy all evidence of intrusion.Then, the next day, you may be arrested by the public security organs.
"Yes, boss."
Hei Lang didn't know it, but it was too late for the Internet to spread to China.Besides, computers have not yet begun to spread.Even if China has billions of people, when faced with unfamiliar things, they still have to learn step by step.Possibly, this learning process will take decades.Perhaps, decades later, it will still be inferior to a certain Western power.
"Strange?"
After learning about the situation, Binghun entered the backstage of the website and began to read the web logs.
In this network log, he will record and save all computer operations.For example, who came to the site and what did they do.Did you click on an article or download a software.Wait, all of these will be recorded.A clever hacker will delete all these logs after the intrusion.Some more sophisticated hackers may forge a fake log to create the illusion that their own computer has not been invaded.
"Xiaobai, someone modified the homepage this morning as an administrator."
About ten minutes later, Binghun noticed an abnormality. On the homepage of the website, a word was changed.However, Binghun at this time only thinks that this is a normal log.Because the record on the web log is written by the computer administrator, through the background, a small modification was made to the homepage of the website.
From the revision process, only a typo in the website was corrected.
"We've been watching that guy today, phome, never making changes."
"what?"
Although only one word has been modified, the principle is the same as that of modifying the entire homepage.If the other party can modify a Chinese character on the homepage, he can touch-off your entire homepage and turn it into a blank.
Binghun was taken aback. He thought he was a member of the alliance, but he made changes in the background.But after hearing what Xiaobai said, from this point of view, this homepage has long been breached by others.
If it's just a breach, then it doesn't matter.Because this website is supposed to let people come to test the waters.If you can't break through, it also proves that you are incapable.However, after a certain netizen hacked the website, members of the Hacking Alliance didn't know anything about it, as if they didn't know anything.
This is really a big joke. You put out exam questions to recruit members, but you don't know that some members have already done the right questions?
And just when the alliance members woke up, they suddenly discovered that there was already a stranger named b in the chat room.
"Sorry, I waited for a long time, but no one came to receive me, so I had to come by myself."
This stranger named b is exactly Chen Jiayi.
After he modified the site's homepage, he had been waiting for an invitation from a member of the Hacking League.I just waited for a long time, but I didn't see any guy coming.In desperation, Chen Jia took advantage of the newly obtained administrator status to hack a website mailbox.From the mailbox, I found a secret forum chat room.
If there is no mistake, this chat room should be the headquarters of the Hacking League.
Without further ado, Chen Jiayi went there in person.It can't be that they don't find themselves, so they don't go.You know, Chen Jiayi still has a huge plan, which needs to be accomplished through domestic hacker members.
"It's us who should say sorry."
All the members of the alliance were flushed with embarrassment at this moment, which was a great shame.However, Bing Hun is the leader of the alliance after all, even if his side loses face, it's nothing, after all, his skills are not as good as others, so no wonder he is.
"Welcome to the China Hacking League."
This is Binghun's greeting to b, that is, to Chen Jiayi.
【
Aishang Reading Network]
As a new generation of hackers, they not only need to master Internet intrusion technology, but also need to master certain computer cryptography. 【
Aishang Reading Network] However, Internet intrusion technology is a profound knowledge, not to mention computer passwords.Others learn the same thing, they are already considered elites in society, how can they master all the knowledge of computers?
In this way, although there are many masters in the Chinese forum, there are not many talents who have not been specially trained by the country for the time being in computer cryptography.As for the second question of the Hacking League, there was naturally no solution.
In fact, the second question is very simple, and this password is also very easy to crack.It's a pity that most people have never been exposed to this type of topic. They just glance at it and retreat.Of course, Chen Jiayi didn't know this, he just sighed, why such a simple password question was used as the test standard.Even if you use the password to test everyone's decryption technology, how to put it, add a fingerprint to it.
After casually muttering something, Chen Jiayi quickly cracked the forum password.
And the third question, it seems, is also very simple, just give a p address.As long as the test taker changes the home page of this p address, all the tests have been completed.Like the previous questions, it takes almost no time.It took only a few seconds for Chen Jiayi to invoke the several intrusion software compiled before, and obtained the highest authority of the website, and modified one or two words on the homepage.
……
China Hacking League.
After the last battle with the United States, the China Hacking Alliance has become more aware of the importance of talents.Moreover, after knowing that a stranger could help me, I finally realized that there are people beyond people, and there is a sky beyond the sky.China has a vast land and abundant resources, with a population of more than one billion. Among them, how many amazing and brilliant people should there be.Therefore, the three questions released this time are just to attract more alliance members.
It's just a pity that most of the netizens were stuck on the second question after it was released in various forums.Today, there finally appeared a person who broke the second question. Just when the members of the alliance were expecting him to complete the third question, this person actually stopped there without making a move at all.Seeing this, the alliance members sighed.Think about it, people who specialize in technology and can break computer passwords may not necessarily understand Internet intrusion technology.
"Hei Lang, how are you doing?"
In the secret chat room of the hacker alliance, the stationmaster Binghun suddenly went online.
"Unfortunately, I missed one today."
Hei Lang then told Bing Hun about the situation of that person just now.
"There is no way around this. In our line of work, if the skills are not comprehensive, we will definitely not be able to survive. Even if he is recruited, it is not only irresponsible to us, but also to himself."
What hackers do is shady work.
The first rule of the hacker rule is, never let the other party know who you are.
On the Internet, although your name will not be marked.However, if you access through the network, then your p address is displayed to others in your name.
To prevent the other party from knowing who you are, in addition to not disclosing yourself, you also need very powerful computer technology as a support, so that you can't be seen through by others in this Internet.
If you don't have a certain understanding of various computer technologies, even if you have very high intrusion skills, you don't know that after the intrusion, you need to destroy all evidence of intrusion.Then, the next day, you may be arrested by the public security organs.
"Yes, boss."
Hei Lang didn't know it, but it was too late for the Internet to spread to China.Besides, computers have not yet begun to spread.Even if China has billions of people, when faced with unfamiliar things, they still have to learn step by step.Possibly, this learning process will take decades.Perhaps, decades later, it will still be inferior to a certain Western power.
"Strange?"
After learning about the situation, Binghun entered the backstage of the website and began to read the web logs.
In this network log, he will record and save all computer operations.For example, who came to the site and what did they do.Did you click on an article or download a software.Wait, all of these will be recorded.A clever hacker will delete all these logs after the intrusion.Some more sophisticated hackers may forge a fake log to create the illusion that their own computer has not been invaded.
"Xiaobai, someone modified the homepage this morning as an administrator."
About ten minutes later, Binghun noticed an abnormality. On the homepage of the website, a word was changed.However, Binghun at this time only thinks that this is a normal log.Because the record on the web log is written by the computer administrator, through the background, a small modification was made to the homepage of the website.
From the revision process, only a typo in the website was corrected.
"We've been watching that guy today, phome, never making changes."
"what?"
Although only one word has been modified, the principle is the same as that of modifying the entire homepage.If the other party can modify a Chinese character on the homepage, he can touch-off your entire homepage and turn it into a blank.
Binghun was taken aback. He thought he was a member of the alliance, but he made changes in the background.But after hearing what Xiaobai said, from this point of view, this homepage has long been breached by others.
If it's just a breach, then it doesn't matter.Because this website is supposed to let people come to test the waters.If you can't break through, it also proves that you are incapable.However, after a certain netizen hacked the website, members of the Hacking Alliance didn't know anything about it, as if they didn't know anything.
This is really a big joke. You put out exam questions to recruit members, but you don't know that some members have already done the right questions?
And just when the alliance members woke up, they suddenly discovered that there was already a stranger named b in the chat room.
"Sorry, I waited for a long time, but no one came to receive me, so I had to come by myself."
This stranger named b is exactly Chen Jiayi.
After he modified the site's homepage, he had been waiting for an invitation from a member of the Hacking League.I just waited for a long time, but I didn't see any guy coming.In desperation, Chen Jia took advantage of the newly obtained administrator status to hack a website mailbox.From the mailbox, I found a secret forum chat room.
If there is no mistake, this chat room should be the headquarters of the Hacking League.
Without further ado, Chen Jiayi went there in person.It can't be that they don't find themselves, so they don't go.You know, Chen Jiayi still has a huge plan, which needs to be accomplished through domestic hacker members.
"It's us who should say sorry."
All the members of the alliance were flushed with embarrassment at this moment, which was a great shame.However, Bing Hun is the leader of the alliance after all, even if his side loses face, it's nothing, after all, his skills are not as good as others, so no wonder he is.
"Welcome to the China Hacking League."
This is Binghun's greeting to b, that is, to Chen Jiayi.
【
Aishang Reading Network]
You'll Also Like
-
Weird asylum, you're taking in a human being like me?
Chapter 1038 6 hours ago -
Fishing Druid in Another World
Chapter 480 12 hours ago -
Star Lords: My Starfleet is a Billion Points Stronger
Chapter 344 12 hours ago -
I signed in to the Ice Emperor Palace at the beginning, and I became invincible!
Chapter 882 12 hours ago -
At the beginning, he had a very high level of understanding, and quietly cultivated himself to becom
Chapter 122 12 hours ago -
The Witch of the Roll Never Gives Up
Chapter 274 12 hours ago -
The Nameless of the Common Clans
Chapter 746 13 hours ago -
New Shun 1730
Chapter 1517 13 hours ago -
Villain: I forcibly marry the protagonist's master at the beginning, I am invincible
Chapter 445 13 hours ago -
Watch the movie "Collapse of the Stars", and the second creation will save the world!
Chapter 170 23 hours ago