Rebirth Online Entertainment
Chapter 58: Hello, I'm ABC
Chapter 58: Hello, I am b
Fortunately, the members of the alliance are still relatively cautious about entering the Internet. 【
Aishang Reading Network] Even entering the chat room of one's own alliance, one has to go through several springboards.After the members withdrew, in the mailboxes of the alliance, they reported their own safety and were not tracked by others.However, a few of them sent emails, saying that the meat machines they seized have all been hacked by others, and their real p-address may have been exposed.
After Bing Hun, the station master, heard the news, he immediately notified these members, saying that he was asked to destroy all computer data and move out immediately.It was only after a while that these alliance members sent a letter saying, "It's okay to destroy all the materials, but it's just because of personal problems, I can't leave."
This personal question is easy to understand.It is definitely because there are parents in the family, and a wife and children in the family, how can they just leave.Just when Binghun persuaded him, saying that if he didn't leave, trouble would happen sooner or later.In times of great calamity, it is always good to come out first to avoid the limelight.Even if you are separated from your family, it is better than dying.
"Let me figure out a way."
Seeing that Binghun was embarrassed and told Chen Jiayi about this matter, Chen Jiayi was on the sidelines, thinking of ideas from time to time.
"Boss Ice Soul, the security system in our chat room is already very good, why is it so easy for someone to plant a Trojan horse?"
Although the strength of the Hacker Union is not very good, the security settings for the chat room are still relatively strict.Moreover, after Chen Jiayi came to this chat room, he specially patched this chat room.After all, he has also been in this chat room before, if someone breaks through, he will be ashamed.But no matter what, the chat room was still hacked by others.
"This one……"
If Chen Jiayi hadn't informed the alliance members that the alliance chat room had been hit by a Trojan horse, no one would have been able to discover the Trojan horse.By the time it is actually discovered, maybe all members of the alliance have been exposed to the Internet.Chen Jia asked Bing Hun suddenly, thinking about it, he was still in a daze.
Seeing Binghun like this, Chen Jiayi didn't ask any more questions.So, Chen Jiayi searched the entire chat room member records.It was found that all members were normal and did not make any similar actions.In this way, the situation where Trojan horses are installed inside the alliance members is excluded.In fact, it is also difficult for members of the alliance to let go, not just let go.When Chen Jia did this, he just ruled them out one by one.
Since the Trojan horse was not released internally by members of the alliance, then this Trojan horse must have come from the outside, that is, the intruder.It's just the intruder, what kind of method the intruder used, which made Chen Jia puzzled.
Logically speaking, with the security level of the alliance chat room, it is impossible for intruders to easily invade.It's just that in fact, the intruder has successfully completed the intrusion work, and, in the chat room, placed the Trojan horse.After thinking for a long time, Chen Jiayi realized that if there is nothing wrong with the chat room, then the way for the intruder to successfully invade must be to take advantage of the loopholes in the system.
After thinking about it, Chen Jia grabbed a few meat machines and logged into the Internet in the form of several meat machines.
"I see."
Just when Chen Jiayi controlled the meat machine and entered the Internet.Chen Jiayi was surprised to find that almost all the major domestic portals had been planted with Trojan horses.
A web page Trojan horse refers to a Trojan horse that only exists in a web page.
When the user visits the webpage, if he is not careful, he will hit these Trojan horses.If it is a small website, it is okay to say that if you think these websites are unreliable, you may have some precautions. However, for domestic portal websites, not only ordinary users may not take any measures, but even professionals will not take special measures. defense.
Because of Chen Jiayi's own computer, what he built is like gold soup.Those portal Trojans were isolated by Chen Jiayi's system in an instant.Therefore, he really didn't know about the linked horses on various portal websites.
"Damn e, damn Microsoft."
The principle of this web Trojan horse is very simple. In fact, it uses a bug in Microsoft e-browser.
When a user accesses the Internet through the e-browser, e-browser will download a certain amount of data in the background.Of course, in this download process, in order to prevent Trojan horses, Microsoft has also made certain settings.However, Microsoft still hasn't done it well, and there are still loopholes in this e-browser.The hacker who knew this vulnerability implanted a piece of code into the html webpage, and when the user browsed and watched it, the Trojan horse was automatically downloaded in the background.
In this way, hackers can easily complete the intrusion work almost without spending any time.
The last time Chen Jiayi blackmailed Microsoft for 1000 million, all the bugs were reported to Microsoft, but he forgot about this e-browser bug.Unexpectedly, there are so many wizards in the world. After a few months, others also knew about the loopholes in Microsoft e.Therefore, this vulnerability was exploited and a piece of code was implanted in major web portals in China.Moreover, this piece of code is very hidden, even if the network administrator checks it, it will only be considered as a piece of common code, and it will not be considered as a Trojan horse program at all.
"You have Zhang Liangji, I have a wall ladder, and today I will fight with you."
As soon as Chen Jia became interested, he wanted to know who was the one who implanted the Trojan horse.
We know that since a Trojan horse is planted by others, he must transmit the data to the terminal, that is, transmit the stolen information back to the person who put the Trojan horse.Otherwise, this Trojan will lose the meaning of stealing information.What Chen Jiayi has to do now is to find the service terminal.However, this service terminal may also be just a meat machine.A clever hacker will certainly not be so stupid as to set the receiving address as his real p.
"Sure enough."
Chen Jiayi followed the p-address exposed in the Trojan horse and touched it along the way, which proved that his guess just now was correct, the receiving terminal was just a meat machine of the intruder.But it doesn't matter, this meat machine still has a certain connection with the intruder.As long as this meat machine is cracked, and you follow the vine again, you can go straight to Huanglong, and finally find out the real p of the intruder.
"It's a tough character."
The intruder's technology is very strong, and the meat to be grabbed is not an ordinary meat machine, but a server or something like that.Moreover, the operating system used by these servers is not Microsoft's Wnows. Among the three meat machines, two of them use unx as the operating system.This supercomputer-based operating system is suspected to be much lower in bugs than Microsoft's wnow.However, no matter what the system is, it has bugs. No software or system can be perfect without any loopholes.Chen Jiayi, who has a lot of Internet information for later generations, just searched casually, and found out a lot of bugs about unx.
"Okay, it's all done."
Finally, the last meat machine was cracked open, and the real IP address of the intruder was exposed under Chen Jiayi's eyes.
"Hello, I'm b."
Chen Jiayi smiled, and sent a friendly message to the other party.
【
Aishang Reading Network]
Fortunately, the members of the alliance are still relatively cautious about entering the Internet. 【
Aishang Reading Network] Even entering the chat room of one's own alliance, one has to go through several springboards.After the members withdrew, in the mailboxes of the alliance, they reported their own safety and were not tracked by others.However, a few of them sent emails, saying that the meat machines they seized have all been hacked by others, and their real p-address may have been exposed.
After Bing Hun, the station master, heard the news, he immediately notified these members, saying that he was asked to destroy all computer data and move out immediately.It was only after a while that these alliance members sent a letter saying, "It's okay to destroy all the materials, but it's just because of personal problems, I can't leave."
This personal question is easy to understand.It is definitely because there are parents in the family, and a wife and children in the family, how can they just leave.Just when Binghun persuaded him, saying that if he didn't leave, trouble would happen sooner or later.In times of great calamity, it is always good to come out first to avoid the limelight.Even if you are separated from your family, it is better than dying.
"Let me figure out a way."
Seeing that Binghun was embarrassed and told Chen Jiayi about this matter, Chen Jiayi was on the sidelines, thinking of ideas from time to time.
"Boss Ice Soul, the security system in our chat room is already very good, why is it so easy for someone to plant a Trojan horse?"
Although the strength of the Hacker Union is not very good, the security settings for the chat room are still relatively strict.Moreover, after Chen Jiayi came to this chat room, he specially patched this chat room.After all, he has also been in this chat room before, if someone breaks through, he will be ashamed.But no matter what, the chat room was still hacked by others.
"This one……"
If Chen Jiayi hadn't informed the alliance members that the alliance chat room had been hit by a Trojan horse, no one would have been able to discover the Trojan horse.By the time it is actually discovered, maybe all members of the alliance have been exposed to the Internet.Chen Jia asked Bing Hun suddenly, thinking about it, he was still in a daze.
Seeing Binghun like this, Chen Jiayi didn't ask any more questions.So, Chen Jiayi searched the entire chat room member records.It was found that all members were normal and did not make any similar actions.In this way, the situation where Trojan horses are installed inside the alliance members is excluded.In fact, it is also difficult for members of the alliance to let go, not just let go.When Chen Jia did this, he just ruled them out one by one.
Since the Trojan horse was not released internally by members of the alliance, then this Trojan horse must have come from the outside, that is, the intruder.It's just the intruder, what kind of method the intruder used, which made Chen Jia puzzled.
Logically speaking, with the security level of the alliance chat room, it is impossible for intruders to easily invade.It's just that in fact, the intruder has successfully completed the intrusion work, and, in the chat room, placed the Trojan horse.After thinking for a long time, Chen Jiayi realized that if there is nothing wrong with the chat room, then the way for the intruder to successfully invade must be to take advantage of the loopholes in the system.
After thinking about it, Chen Jia grabbed a few meat machines and logged into the Internet in the form of several meat machines.
"I see."
Just when Chen Jiayi controlled the meat machine and entered the Internet.Chen Jiayi was surprised to find that almost all the major domestic portals had been planted with Trojan horses.
A web page Trojan horse refers to a Trojan horse that only exists in a web page.
When the user visits the webpage, if he is not careful, he will hit these Trojan horses.If it is a small website, it is okay to say that if you think these websites are unreliable, you may have some precautions. However, for domestic portal websites, not only ordinary users may not take any measures, but even professionals will not take special measures. defense.
Because of Chen Jiayi's own computer, what he built is like gold soup.Those portal Trojans were isolated by Chen Jiayi's system in an instant.Therefore, he really didn't know about the linked horses on various portal websites.
"Damn e, damn Microsoft."
The principle of this web Trojan horse is very simple. In fact, it uses a bug in Microsoft e-browser.
When a user accesses the Internet through the e-browser, e-browser will download a certain amount of data in the background.Of course, in this download process, in order to prevent Trojan horses, Microsoft has also made certain settings.However, Microsoft still hasn't done it well, and there are still loopholes in this e-browser.The hacker who knew this vulnerability implanted a piece of code into the html webpage, and when the user browsed and watched it, the Trojan horse was automatically downloaded in the background.
In this way, hackers can easily complete the intrusion work almost without spending any time.
The last time Chen Jiayi blackmailed Microsoft for 1000 million, all the bugs were reported to Microsoft, but he forgot about this e-browser bug.Unexpectedly, there are so many wizards in the world. After a few months, others also knew about the loopholes in Microsoft e.Therefore, this vulnerability was exploited and a piece of code was implanted in major web portals in China.Moreover, this piece of code is very hidden, even if the network administrator checks it, it will only be considered as a piece of common code, and it will not be considered as a Trojan horse program at all.
"You have Zhang Liangji, I have a wall ladder, and today I will fight with you."
As soon as Chen Jia became interested, he wanted to know who was the one who implanted the Trojan horse.
We know that since a Trojan horse is planted by others, he must transmit the data to the terminal, that is, transmit the stolen information back to the person who put the Trojan horse.Otherwise, this Trojan will lose the meaning of stealing information.What Chen Jiayi has to do now is to find the service terminal.However, this service terminal may also be just a meat machine.A clever hacker will certainly not be so stupid as to set the receiving address as his real p.
"Sure enough."
Chen Jiayi followed the p-address exposed in the Trojan horse and touched it along the way, which proved that his guess just now was correct, the receiving terminal was just a meat machine of the intruder.But it doesn't matter, this meat machine still has a certain connection with the intruder.As long as this meat machine is cracked, and you follow the vine again, you can go straight to Huanglong, and finally find out the real p of the intruder.
"It's a tough character."
The intruder's technology is very strong, and the meat to be grabbed is not an ordinary meat machine, but a server or something like that.Moreover, the operating system used by these servers is not Microsoft's Wnows. Among the three meat machines, two of them use unx as the operating system.This supercomputer-based operating system is suspected to be much lower in bugs than Microsoft's wnow.However, no matter what the system is, it has bugs. No software or system can be perfect without any loopholes.Chen Jiayi, who has a lot of Internet information for later generations, just searched casually, and found out a lot of bugs about unx.
"Okay, it's all done."
Finally, the last meat machine was cracked open, and the real IP address of the intruder was exposed under Chen Jiayi's eyes.
"Hello, I'm b."
Chen Jiayi smiled, and sent a friendly message to the other party.
【
Aishang Reading Network]
You'll Also Like
-
Weird asylum, you're taking in a human being like me?
Chapter 1038 6 hours ago -
Fishing Druid in Another World
Chapter 480 12 hours ago -
Star Lords: My Starfleet is a Billion Points Stronger
Chapter 344 12 hours ago -
I signed in to the Ice Emperor Palace at the beginning, and I became invincible!
Chapter 882 12 hours ago -
At the beginning, he had a very high level of understanding, and quietly cultivated himself to becom
Chapter 122 12 hours ago -
The Witch of the Roll Never Gives Up
Chapter 274 12 hours ago -
The Nameless of the Common Clans
Chapter 746 13 hours ago -
New Shun 1730
Chapter 1517 13 hours ago -
Villain: I forcibly marry the protagonist's master at the beginning, I am invincible
Chapter 445 13 hours ago -
Watch the movie "Collapse of the Stars", and the second creation will save the world!
Chapter 170 23 hours ago