Rebirth Online Entertainment
Chapter 59: Jack the Hacker
Chapter 59: Hacker jk
My name is jk, not much to do with jk in titanic. 【
Aishang Reading Network] I am just a computer enthusiast, strictly speaking, I am a hacker.
Unlike most hacker groups, I'm just one.
Because, in the world of hackers, I don't want to trust anyone.In the face of the absolute price, any of your friends may become the target of betraying you.Therefore, since I stepped into the hacker circle, I have been very careful, very careful, never revealing my identity or making friends.In the Internet, I only have one code name, the name is eth.
Yes, Grim Reaper, I am the Grim Reaper that hackers all over the world call.
Maybe I'm smarter than others, or others are simply too stupid.My biggest hobby is to operate the computer in my hand and enjoy the Internet all over the world.Whether it's the -government's - Pentagon, or the White House, or the Western European Special Forces.As long as the Internet is accessible, there are my footprints.Still, they'll never know I've been there.
I am like a god high above the sky, looking down on the sky and the earth.I don't need others to understand, because this honor, others will definitely understand it.Occasionally, I travel around the world.Using my unique hacking skills, I am carrying out different hacking intrusions.
This is just a hobby of mine, and I still respect one of the rules of hacking, under normal circumstances, I will not destroy anyone's computer data.Even if it is grasped, I will destroy them all.It's just that I'm obsessed with hacking.I run around the entire Internet day and night, just to complete the invasion again and again.
I don't know what each intrusion is for, until now, it seems that intrusion has become my instinct.Just like being hungry and needing food, when I'm idle, I only think about invasion.After that kind of invasion, cracking one system after another, solving one problem after another, the exhilaration in it just makes me excited.
Maybe, I'm just addicted to this excitement.
Some time ago, I learned that a powerful hacker appeared in the far east.For that mysterious country, although it is now lagging behind other countries, whether it is education, technology, or the Internet, China is relatively far behind.However, I have never underestimated this country.
Because I have the achievements I have now, a large part of the factor is that the wisdom of China gave me the answer.For example, the Book of Changes.However, I am different from the vast majority of scholars who study the Book of Changes in China, they only use the study of the Book of Changes.But I used the hexagrams in the Book of Changes in the computer.Just like Professor "Leibniz" who invented binary, the I Ching, an ancient Chinese book, carries too many philosophical thoughts.
Perhaps one day, in the ancient oriental country, he will surely return to its former prosperity.
Well, I was too emotional.
After I learned about the hacker, I sneaked into the Chinese Internet world.
It is reported that the first time this hacker appeared was on the official homepage of the Hacking Union.I tried my best and finally found the chat room of China Hacking Alliance.It's just a pity that this chat room does not know who wrote it.It was actually built as solid as gold, without a single loophole.Of course, there is no loophole in this, but I can't find it for the time being.I believe that as long as you give me time, I will be able to find a way to crack it.
However, as a smart hacker, I will not go down the alley.I can't crack the chat room in front of me for the time being, so I will find a way to get around it.If you haven't learned this kind of thinking, I believe you can't become the top hacker in the world.
Just right, Microsoft's newly released wnows2000 system, after several months of research.Coupled with the comparison of experts on the Internet, I finally discovered a loophole in Microsoft's e-browser.Of course, before this, it seems that I heard that a master discovered more than a dozen bugs in the wnows2000 system in a short period of time.Who is this person, I will see.If possible, I would really like to meet him for a while.
Taking advantage of this loophole in Microsoft's e-browser, I easily implanted a piece of code into the websites of major portals in China.This piece of code is very deceptive - even if the computer management personnel find it, they will only think it is a piece of ordinary code.However, this code is actually a program.A program that steals other people's data, to be precise, is what we often call a Trojan horse.
After a period of screening, I filtered out all the useless information, leaving only the information about the Hacking League.After several days of hard work, I got the p-address of a hacker alliance member from the information sent back from the Trojan horse.Of course, this p address is not the real address of that person, but just a meat machine address.But it doesn't matter, as long as there are clues, touch all the way, and you will eventually find it.
Unexpectedly, the technology of this hacker member is quite good.Many security patches were also applied to the multiple meat machines he grabbed.However, even so, I broke through many of his meat machines and found the real p of the alliance member.When I gained the highest control over his computer, I discovered that this person is actually the vice president of a member of the alliance.
I didn't use his chat room account to log in, because I was afraid that even if I entered the chat room and implanted a Trojan horse program, I might be exposed.I don't want to startle you, I just want to meet some old hacker from the East.Taking the opportunity of a chat room update, I quietly implanted this Trojan horse program into the chat room.
Everything is done, the following tasks, just wait for the fish to appear.
"It seems that this one is not."
Today I cracked several meat machines and found that these members are not the people I was looking for.Just when I sighed and was about to continue cracking, the notepad function was automatically opened on my computer port.
"Hello, I'm b."
Seeing this, I know that I have been hacked.
I can't believe that a hacker with my skills will be invaded by others one day.It's just that the facts in front of me tell me that everything I see is real, and I have to believe it.
"calm."
I told myself, must be calm.
"Who are you."
I took his words on the notepad and returned to the unknown intruder.Moreover, after sending the information, I turned on another computer to prepare for anti-intrusion.
"Your Excellency Death, it's useless, please stop all your efforts, otherwise, you will know the consequences."
Seeing this, I gave up all efforts.
This intruder has already mastered all my information, no matter how I counterattack, it will not help.
【
Aishang Reading Network]
My name is jk, not much to do with jk in titanic. 【
Aishang Reading Network] I am just a computer enthusiast, strictly speaking, I am a hacker.
Unlike most hacker groups, I'm just one.
Because, in the world of hackers, I don't want to trust anyone.In the face of the absolute price, any of your friends may become the target of betraying you.Therefore, since I stepped into the hacker circle, I have been very careful, very careful, never revealing my identity or making friends.In the Internet, I only have one code name, the name is eth.
Yes, Grim Reaper, I am the Grim Reaper that hackers all over the world call.
Maybe I'm smarter than others, or others are simply too stupid.My biggest hobby is to operate the computer in my hand and enjoy the Internet all over the world.Whether it's the -government's - Pentagon, or the White House, or the Western European Special Forces.As long as the Internet is accessible, there are my footprints.Still, they'll never know I've been there.
I am like a god high above the sky, looking down on the sky and the earth.I don't need others to understand, because this honor, others will definitely understand it.Occasionally, I travel around the world.Using my unique hacking skills, I am carrying out different hacking intrusions.
This is just a hobby of mine, and I still respect one of the rules of hacking, under normal circumstances, I will not destroy anyone's computer data.Even if it is grasped, I will destroy them all.It's just that I'm obsessed with hacking.I run around the entire Internet day and night, just to complete the invasion again and again.
I don't know what each intrusion is for, until now, it seems that intrusion has become my instinct.Just like being hungry and needing food, when I'm idle, I only think about invasion.After that kind of invasion, cracking one system after another, solving one problem after another, the exhilaration in it just makes me excited.
Maybe, I'm just addicted to this excitement.
Some time ago, I learned that a powerful hacker appeared in the far east.For that mysterious country, although it is now lagging behind other countries, whether it is education, technology, or the Internet, China is relatively far behind.However, I have never underestimated this country.
Because I have the achievements I have now, a large part of the factor is that the wisdom of China gave me the answer.For example, the Book of Changes.However, I am different from the vast majority of scholars who study the Book of Changes in China, they only use the study of the Book of Changes.But I used the hexagrams in the Book of Changes in the computer.Just like Professor "Leibniz" who invented binary, the I Ching, an ancient Chinese book, carries too many philosophical thoughts.
Perhaps one day, in the ancient oriental country, he will surely return to its former prosperity.
Well, I was too emotional.
After I learned about the hacker, I sneaked into the Chinese Internet world.
It is reported that the first time this hacker appeared was on the official homepage of the Hacking Union.I tried my best and finally found the chat room of China Hacking Alliance.It's just a pity that this chat room does not know who wrote it.It was actually built as solid as gold, without a single loophole.Of course, there is no loophole in this, but I can't find it for the time being.I believe that as long as you give me time, I will be able to find a way to crack it.
However, as a smart hacker, I will not go down the alley.I can't crack the chat room in front of me for the time being, so I will find a way to get around it.If you haven't learned this kind of thinking, I believe you can't become the top hacker in the world.
Just right, Microsoft's newly released wnows2000 system, after several months of research.Coupled with the comparison of experts on the Internet, I finally discovered a loophole in Microsoft's e-browser.Of course, before this, it seems that I heard that a master discovered more than a dozen bugs in the wnows2000 system in a short period of time.Who is this person, I will see.If possible, I would really like to meet him for a while.
Taking advantage of this loophole in Microsoft's e-browser, I easily implanted a piece of code into the websites of major portals in China.This piece of code is very deceptive - even if the computer management personnel find it, they will only think it is a piece of ordinary code.However, this code is actually a program.A program that steals other people's data, to be precise, is what we often call a Trojan horse.
After a period of screening, I filtered out all the useless information, leaving only the information about the Hacking League.After several days of hard work, I got the p-address of a hacker alliance member from the information sent back from the Trojan horse.Of course, this p address is not the real address of that person, but just a meat machine address.But it doesn't matter, as long as there are clues, touch all the way, and you will eventually find it.
Unexpectedly, the technology of this hacker member is quite good.Many security patches were also applied to the multiple meat machines he grabbed.However, even so, I broke through many of his meat machines and found the real p of the alliance member.When I gained the highest control over his computer, I discovered that this person is actually the vice president of a member of the alliance.
I didn't use his chat room account to log in, because I was afraid that even if I entered the chat room and implanted a Trojan horse program, I might be exposed.I don't want to startle you, I just want to meet some old hacker from the East.Taking the opportunity of a chat room update, I quietly implanted this Trojan horse program into the chat room.
Everything is done, the following tasks, just wait for the fish to appear.
"It seems that this one is not."
Today I cracked several meat machines and found that these members are not the people I was looking for.Just when I sighed and was about to continue cracking, the notepad function was automatically opened on my computer port.
"Hello, I'm b."
Seeing this, I know that I have been hacked.
I can't believe that a hacker with my skills will be invaded by others one day.It's just that the facts in front of me tell me that everything I see is real, and I have to believe it.
"calm."
I told myself, must be calm.
"Who are you."
I took his words on the notepad and returned to the unknown intruder.Moreover, after sending the information, I turned on another computer to prepare for anti-intrusion.
"Your Excellency Death, it's useless, please stop all your efforts, otherwise, you will know the consequences."
Seeing this, I gave up all efforts.
This intruder has already mastered all my information, no matter how I counterattack, it will not help.
【
Aishang Reading Network]
You'll Also Like
-
A five-year-old Daluo Jinxian? I simulated binding with the prehistoric world.
Chapter 88 15 hours ago -
I got rich by extracting skills from games
Chapter 204 15 hours ago -
Houfu Key Class
Chapter 548 1 days ago -
The Record of Righteousness
Chapter 227 1 days ago -
God rewards hard work: Farming and cultivating immortality
Chapter 552 1 days ago -
I work as a security guard at Marvel.
Chapter 173 1 days ago -
Wizard: I have an inventory
Chapter 65 1 days ago -
The Unspeakable Diary
Chapter 583 1 days ago -
Since the Spring and Autumn Period and the Warring States Period, he has been regarded as a god.
Chapter 232 1 days ago -
Iron Cross Fire
Chapter 5120 1 days ago