Reborn Super Hacker
Chapter 447 Analyzing Viruses
Main text [Rise of the Dragon] Chapter 440 Analysis of Viruses Ding Peng sat down after hearing what Li Hua said, and handed a glass of water to Li Hua, "Brother Li, what happened?" Huh?" Ding Peng asked.
"Your '《Growth》fans' forum information page was installed with a Trojan horse program. There are many victims now, do you know about this?" Li Hua's tone was very anxious.
"What?" Ding Peng was shocked, the cup in his hand fell to the ground and broke.
Ding Peng's expression was expected by Li Hua, because Ding Peng always thought that it would be very safe for his server to be hosted in the same computer room as Meida Company, but he never thought that such a problem would occur, but the fact is not that the server appeared problem.
Ding Peng was stunned for a while before he could react. "Then, Brother Li, what should we do now? Tell me about your specific situation." Now Ding Peng's tone became very anxious.
Li Hua paused for a moment, and then said: "Your forum news page has been linked to a Trojan horse. This Trojan horse was discovered by Brother Wen of Jianmeng. If it wasn't for him, I might still not believe your news. The website is linked to a horse. This Trojan horse is very harmful. It will automatically read the information of Internet users and monitor the progress of the browser. If it is found that the user has logged in to online banking or Taobao and paid with the payment password, the virus code will Infect your browser quickly, and then the virus code will automatically detect whether the main program has functions that trigger file operations, such as: open, close, copy and other common operations, and hook these operations to infect them Function, because it is necessary for the virus to unknowingly send the bank account password and certificate of the person who has been hit by the Trojan horse to the author of the virus program. When I came out to find you, there were already more than 3000 cases of users' online property in Huaxia. I think it was all because of the Trojan horse virus that was transferred," Li Hua explained.
After listening to Li Hua's words, now Ding Peng finally understood why some people in the forum said that the money from the online bank disappeared. It turned out that his website was hacked by a Trojan horse.
"Then what should we do now? Brother Li, I..." Ding Peng was at a loss now, and he didn't know what to say.
Li Hua immediately stood up from the sofa at this moment, and said to him, "Take me up right now, and I'll see if your computer has been hacked." In fact, Li Hua originally wanted to check the server first. , but after thinking about it, he found that Ding Peng's computer was probably the target.
"Okay." Ding Peng quickly agreed, and then he took Li Hua upstairs, walking very fast, because they all knew that if one step slower, one more person might be recruited.
"Xiao Peng, who is here?" Ding Peng's mother shouted at him from the room.
"It's my friend, mom, it's none of your business, just keep practicing your yoga!" After Ding Peng finished speaking, he led Li Hua into his room.
When Li Hua saw Ding Peng's computer, he smiled, "You guy actually bought this one." Li Hua said.
"Hey, no matter who told them, they released 5 sets. I bought them at double the price, and they are not bad." Ding Peng said.
Li Hua didn't argue with him about the computer, but moved the mouse, and the desktop was displayed. The system is the latest Microsoft system, "windows7 Ultimate Edition". Li Hua looked at the task bar in the lower right corner. Yes, the icon of the perfect guard is displayed on it. Li Hua opened the system log with anxiety, but found nothing, but Li Hua was not discouraged. Next, Li Hua opened the personalized management dedicated to windows7, and finally checked the trash An abnormality was found when the file was opened, and there was a large amount of stack data. "Did you leave the computer in the morning?" Li Hua asked.
When asked by Li Hua, Ding Peng nodded immediately. He remembered that when he had lunch, his mother asked him to go over to eat. At that time, he left the computer, "Yes, I left the computer during lunch. ..." Ding Peng replied.
"What were you doing on the computer when you left?" Li Hua continued to ask.
Li Hua's question really hit the point, and Ding Peng suddenly realized at this time, "I was still in the management panel of the forum when I left, and I was logged in." Now Ding Peng finally knows why the screen saver is so early. It's too early, it turned out that his computer was hacked.
Upon hearing this, Li Hua said, "It really is." Li Hua said.
"Brother Li, what should we do now?" Ding Peng regretted it now.
"What else can I do? Now that things have happened, the criminals are aiming at the time before you leave the computer to operate your computer. You have become their broiler, which is equivalent to their puppet. They want your Computers can do whatever they want. The reason why they can commit crimes immediately after you leave the computer must be because your computer camera is forced to open, and these are not enough. A few years ago, foreign hackers already had the ability to control the sound card. Yes, with the appearance of monitoring Trojan horses, the conclusion is that your every move is under their surveillance." When Li Hua said this, he immediately opened the recycle bin, and he inserted a USB flash drive he carried into the computer. .
But now Ding Peng was shocked into a cold sweat, "Brother Li, according to what you said, the content of our current conversation and us have been seen by them? Can we still catch people?" Ding At this moment, Peng suddenly said worriedly.
Suddenly Li Hua showed a smiling face, "You just lack the knowledge and experience. What you know is only one-sided. Hackers are never as powerful as imagined, but it is not easy. To tell you the truth, people who can make programs alive They are the best hackers. Proficiency in programming knowledge is always the highest standard for hackers. Therefore, if you want to be a qualified hacker, you don’t have to catch chickens. You can call it a few websites, because anyone can do these things. After all, the tools are Others, other people can do the same with this tool, so everyone's standard for measuring hackers is different. In my eyes, 'God is stupid' is the only one who can be regarded as a super hacker, because There is nothing he can’t do in the online world, isn’t there? Other hackers can only be regarded as top hackers, because the difference between top and super is not one or two points. You can see it. Also, when I moved the mouse to exit the screen saver and activate the desktop, I had already disconnected from the Internet, do you think I would not have thought of this, ha ha." Li Hua smiled, and then opened the USB flash drive drive letter.
Ding Peng was stunned for a while, but now he suddenly understood a lot of truth from Li Hua's words, "Thank you, brother Li, you let me understand a lot." Ding Peng smiled.
Li Hua patted Ding Peng on the shoulder, and then said meaningfully: "After all, you are still young, and when you come into contact with many things and realize some events, you will understand that a computer is actually a very wonderful thing. For example, some people like to play games on the Internet. This kind of people are people who are played by computers, because the sources of computer games are all written by people, and the pictures are also rendered by people. The things you make play with you, and they are better than you. There is another kind of people who really play with computers. You don’t need me to tell you about this kind of people. They are those who write programs or make game engines. Of course, hackers Including, they are all proficient in computers and have thoroughly studied the system. Basically, they can completely personalize the computer, such as creating their own operating system. As far as I know, there are countless operating systems in the world. It is much better than Microsoft's Windows system, but those people will not easily share their sweat with others. Therefore, playing with the computer and being played by the computer are two different things, which one you belong to depends on yourself. "Li Hua said another long word.
At this time, Ding Peng respected Li Hua even more, not because Li Hua knew a lot, but because of his unique vision and insights. This time Ding Peng did not speak, and he calmed down and watched Li Hua's next operation.
I saw that Li Hua ran a software called "Super Recovery" from the USB flash drive. The interface of the software is very simple, with only two buttons, recovery and repair. When the software is opened, it automatically reads the data that was deleted on the computer. Then you only need to click Recover, and you don’t need to repair bad sectors like other programs. At this time, Li Hua finally found clues from the recycle bin. There was a hacktom.exe file in it. Knowing that this must be a hacking program, he chose to restore the program without hesitation. The recovery speed was very fast, which can be described in seconds. After a while, the hacktom.exe Trojan horse program reappeared in the recycle bin. Hua ran the perfect antivirus without internet connection, but he didn't check it out. Li Hua thought that this Trojan horse's antivirus did a good job, even the vc's antivirus engine couldn't find it.
At this time, Li Hua clicked on the common folder on the USB flash drive, and found a software called "Virtual Analysis". It will be restored to the moment when it was run, so there is no need to be afraid of being infected with a virus at all, and Ding Peng can't help but sigh at this time, people in the Internet Information Department have a lot of such super software. What a profit it brings.
Li Hua ran the software at this time. After running the software, the software will automatically create a snapshot of the system, which is equivalent to "copying" the system first. If there is an accident, you can "paste" it back in time, which is very convenient. The configuration of Peng's computer is very top-notch, so the working speed of the software has also been accelerated a lot.
"Your '《Growth》fans' forum information page was installed with a Trojan horse program. There are many victims now, do you know about this?" Li Hua's tone was very anxious.
"What?" Ding Peng was shocked, the cup in his hand fell to the ground and broke.
Ding Peng's expression was expected by Li Hua, because Ding Peng always thought that it would be very safe for his server to be hosted in the same computer room as Meida Company, but he never thought that such a problem would occur, but the fact is not that the server appeared problem.
Ding Peng was stunned for a while before he could react. "Then, Brother Li, what should we do now? Tell me about your specific situation." Now Ding Peng's tone became very anxious.
Li Hua paused for a moment, and then said: "Your forum news page has been linked to a Trojan horse. This Trojan horse was discovered by Brother Wen of Jianmeng. If it wasn't for him, I might still not believe your news. The website is linked to a horse. This Trojan horse is very harmful. It will automatically read the information of Internet users and monitor the progress of the browser. If it is found that the user has logged in to online banking or Taobao and paid with the payment password, the virus code will Infect your browser quickly, and then the virus code will automatically detect whether the main program has functions that trigger file operations, such as: open, close, copy and other common operations, and hook these operations to infect them Function, because it is necessary for the virus to unknowingly send the bank account password and certificate of the person who has been hit by the Trojan horse to the author of the virus program. When I came out to find you, there were already more than 3000 cases of users' online property in Huaxia. I think it was all because of the Trojan horse virus that was transferred," Li Hua explained.
After listening to Li Hua's words, now Ding Peng finally understood why some people in the forum said that the money from the online bank disappeared. It turned out that his website was hacked by a Trojan horse.
"Then what should we do now? Brother Li, I..." Ding Peng was at a loss now, and he didn't know what to say.
Li Hua immediately stood up from the sofa at this moment, and said to him, "Take me up right now, and I'll see if your computer has been hacked." In fact, Li Hua originally wanted to check the server first. , but after thinking about it, he found that Ding Peng's computer was probably the target.
"Okay." Ding Peng quickly agreed, and then he took Li Hua upstairs, walking very fast, because they all knew that if one step slower, one more person might be recruited.
"Xiao Peng, who is here?" Ding Peng's mother shouted at him from the room.
"It's my friend, mom, it's none of your business, just keep practicing your yoga!" After Ding Peng finished speaking, he led Li Hua into his room.
When Li Hua saw Ding Peng's computer, he smiled, "You guy actually bought this one." Li Hua said.
"Hey, no matter who told them, they released 5 sets. I bought them at double the price, and they are not bad." Ding Peng said.
Li Hua didn't argue with him about the computer, but moved the mouse, and the desktop was displayed. The system is the latest Microsoft system, "windows7 Ultimate Edition". Li Hua looked at the task bar in the lower right corner. Yes, the icon of the perfect guard is displayed on it. Li Hua opened the system log with anxiety, but found nothing, but Li Hua was not discouraged. Next, Li Hua opened the personalized management dedicated to windows7, and finally checked the trash An abnormality was found when the file was opened, and there was a large amount of stack data. "Did you leave the computer in the morning?" Li Hua asked.
When asked by Li Hua, Ding Peng nodded immediately. He remembered that when he had lunch, his mother asked him to go over to eat. At that time, he left the computer, "Yes, I left the computer during lunch. ..." Ding Peng replied.
"What were you doing on the computer when you left?" Li Hua continued to ask.
Li Hua's question really hit the point, and Ding Peng suddenly realized at this time, "I was still in the management panel of the forum when I left, and I was logged in." Now Ding Peng finally knows why the screen saver is so early. It's too early, it turned out that his computer was hacked.
Upon hearing this, Li Hua said, "It really is." Li Hua said.
"Brother Li, what should we do now?" Ding Peng regretted it now.
"What else can I do? Now that things have happened, the criminals are aiming at the time before you leave the computer to operate your computer. You have become their broiler, which is equivalent to their puppet. They want your Computers can do whatever they want. The reason why they can commit crimes immediately after you leave the computer must be because your computer camera is forced to open, and these are not enough. A few years ago, foreign hackers already had the ability to control the sound card. Yes, with the appearance of monitoring Trojan horses, the conclusion is that your every move is under their surveillance." When Li Hua said this, he immediately opened the recycle bin, and he inserted a USB flash drive he carried into the computer. .
But now Ding Peng was shocked into a cold sweat, "Brother Li, according to what you said, the content of our current conversation and us have been seen by them? Can we still catch people?" Ding At this moment, Peng suddenly said worriedly.
Suddenly Li Hua showed a smiling face, "You just lack the knowledge and experience. What you know is only one-sided. Hackers are never as powerful as imagined, but it is not easy. To tell you the truth, people who can make programs alive They are the best hackers. Proficiency in programming knowledge is always the highest standard for hackers. Therefore, if you want to be a qualified hacker, you don’t have to catch chickens. You can call it a few websites, because anyone can do these things. After all, the tools are Others, other people can do the same with this tool, so everyone's standard for measuring hackers is different. In my eyes, 'God is stupid' is the only one who can be regarded as a super hacker, because There is nothing he can’t do in the online world, isn’t there? Other hackers can only be regarded as top hackers, because the difference between top and super is not one or two points. You can see it. Also, when I moved the mouse to exit the screen saver and activate the desktop, I had already disconnected from the Internet, do you think I would not have thought of this, ha ha." Li Hua smiled, and then opened the USB flash drive drive letter.
Ding Peng was stunned for a while, but now he suddenly understood a lot of truth from Li Hua's words, "Thank you, brother Li, you let me understand a lot." Ding Peng smiled.
Li Hua patted Ding Peng on the shoulder, and then said meaningfully: "After all, you are still young, and when you come into contact with many things and realize some events, you will understand that a computer is actually a very wonderful thing. For example, some people like to play games on the Internet. This kind of people are people who are played by computers, because the sources of computer games are all written by people, and the pictures are also rendered by people. The things you make play with you, and they are better than you. There is another kind of people who really play with computers. You don’t need me to tell you about this kind of people. They are those who write programs or make game engines. Of course, hackers Including, they are all proficient in computers and have thoroughly studied the system. Basically, they can completely personalize the computer, such as creating their own operating system. As far as I know, there are countless operating systems in the world. It is much better than Microsoft's Windows system, but those people will not easily share their sweat with others. Therefore, playing with the computer and being played by the computer are two different things, which one you belong to depends on yourself. "Li Hua said another long word.
At this time, Ding Peng respected Li Hua even more, not because Li Hua knew a lot, but because of his unique vision and insights. This time Ding Peng did not speak, and he calmed down and watched Li Hua's next operation.
I saw that Li Hua ran a software called "Super Recovery" from the USB flash drive. The interface of the software is very simple, with only two buttons, recovery and repair. When the software is opened, it automatically reads the data that was deleted on the computer. Then you only need to click Recover, and you don’t need to repair bad sectors like other programs. At this time, Li Hua finally found clues from the recycle bin. There was a hacktom.exe file in it. Knowing that this must be a hacking program, he chose to restore the program without hesitation. The recovery speed was very fast, which can be described in seconds. After a while, the hacktom.exe Trojan horse program reappeared in the recycle bin. Hua ran the perfect antivirus without internet connection, but he didn't check it out. Li Hua thought that this Trojan horse's antivirus did a good job, even the vc's antivirus engine couldn't find it.
At this time, Li Hua clicked on the common folder on the USB flash drive, and found a software called "Virtual Analysis". It will be restored to the moment when it was run, so there is no need to be afraid of being infected with a virus at all, and Ding Peng can't help but sigh at this time, people in the Internet Information Department have a lot of such super software. What a profit it brings.
Li Hua ran the software at this time. After running the software, the software will automatically create a snapshot of the system, which is equivalent to "copying" the system first. If there is an accident, you can "paste" it back in time, which is very convenient. The configuration of Peng's computer is very top-notch, so the working speed of the software has also been accelerated a lot.
You'll Also Like
-
The Great Arcanist Who Traveled Through the World of American Variety Shows
Chapter 389 2 hours ago -
Survival in the Sea: Awakening the All-Seeing Eye at the Beginning
Chapter 121 2 hours ago -
My girlfriend is a cello player
Chapter 123 2 hours ago -
My Hero Academia: Dark Ages
Chapter 337 2 hours ago -
Longevity begins with marrying your eldest sister-in-law
Chapter 438 2 hours ago -
The Ancient Vast Realm
Chapter 849 2 hours ago -
Primordial Era: I Am the Auspicious Cloud of the Heavens, Creating Infinite Worlds
Chapter 98 2 hours ago -
Farming and raising insects: I have a daily intelligence system
Chapter 108 2 hours ago -
Honghuang: Reincarnation Purple Lotus, I opened up the virtual and real demon world
Chapter 309 2 hours ago -
I, Hierophant Elden, join the chat group
Chapter 266 2 hours ago