I’m Really a Superstar

Chapter 278: [Hacker Zhang Ye! 】

bedroom.

It is early at seven o'clock in the evening.

Zhang Ye pulled the curtains and put the computer on the table. After trying the Internet and the mouse, he moved his arms and was ready to move. First of all, although he has eaten two types of computer skills experience books, he hasn't used them yet, and he doesn't know if he can do it, let alone whether the experience books he has eaten are enough to display the skills, or can be said. No matter how hard you use it, this kind of skill book is not enough. It seems that you can increase your experience if you eat more. There are eleven lotteries in the network technology, which is quite a lot, but Zhang Ye still needs to know a few in order to be safe.

On the Internet, Zhang Ye first found a foreign website, and then based on his computer experience in that world and the network technology skills book in his mind, he quickly started operating it. I found a component for the browser. The Firefox browser application of this thing in Zhang Ye's world is called Go2prory, but the name is different here and the browser is different, but the meaning is actually the same. Adding components, application operations-it took about two minutes, and Zhang Ye successfully clicked on the foreign website. This is actually the simplest proxy.

Hot pictures jumped out

Attractive videos of foreigners and beauties came into sight

Zhang Ye looked at this excellent foreign website that he opened with his excellent technology, and couldn't help but screamed "artifact". Although the operation is not difficult, Zhang Ye knew that he did not have this technology before.

Warm up is over

His confidence increased

He began to browse some professional computer websites, studying the world's computer development, technology and software, etc., and spent a full night until the lights in the building outside the community were almost off at 12 o'clock in the night. Zhang Ye rubbed his eyes and exhaled.He found that the computer system and hardware software in this world were not essentially different from his. The principles were the same, and the difference was only in the names, such as those programmed. There are various languages ​​in this world, and even the typing method is the same. For example, those operating systems that are not called Microsoft but are similar to Microsoft, this world is also present, and even the command form is the same. After comparing for a long time, Zhang Ye initially concluded that the systems and hardware of this world are slightly lower than the technical level of his world, which is several years behind. However, some technologies such as server firewall anti-virus software are slightly different. It's higher than Zhang Ye's earth, so the "national hackers" in his world are not so obvious here, because the security technology in this world is very high, and just downloading a firewall can basically stop 99% of them. Non-professionals, even professional hackers may have to stumble. Few people are so stupid that they don't install protection software and anti-virus software, so there is no such thing as a "national hacker".

This created a situation. There are very few hackers in this world, not as rampant as Zhang Ye, but on the other hand, any hacker with a little bit of fame is quite skilled, and those hackers at the top of the pyramid used to be able to do everything in the online world.

This is the difference between the two worlds.

The source of the system hardware code programming is the same. This is a good thing. It is convenient for Zhang Ye to use his experience on the earth. Even if it is slightly different, Zhang Ye has also eaten network technology and programming skills books. These skills books bring The experience given to Zhang Ye is not only the technology of his world, but also the application of technology in this world. In this regard, Zhang Ye does not need to worry. But the network security really gave him a headache. Don't you have a hacker addiction, just let a fake firewall stop it, right?

That also depends on

Li Tao can't run

Zhang Ye's determination had already been made, and he no longer had any hesitation. He went out to the outhouse and went to the bathroom. Seeing that Dong Shanshan was dark in the crack of the door, he was obviously asleep, so he came back lightly.

let's start

Try first

Hacking software in this world is also open for download, but most of the software does not provide source code, and it is not really open. Where is the earth like Zhang Ye, many hackers on his side pay attention to open source code. , I think this is the rules and glory, and the concept of the two worlds is also slightly different.

Zhang Ye started to download the small software-this is a hacker's knife. It is difficult for a clever woman to cook without rice. Without these, let alone hacking into the computer, even the IP address of others is estimated to be impossible to find.

Small command plugin.

Remote control Trojan horse.

Trace cleaning software.

Wait a minute, Zhang Ye went down again.

Then he began to conduct simple tests and experiments on the software and Trojan horses in this world, and the effect was the same as he expected. It is ordinary hacker software. Would you say it has no effect? No, the programs are all normal and effective programs, but can you say that they are effective? This kind of hacker software that can be downloaded from the Internet is not very effective. It may not be able to pass the firewall. Especially in this world, the security technology is so good, the chance of being intercepted as malicious program code is too great. The real hacking software of the palace level is mostly original by hackers. Let alone sharing with all netizens, it may not be shared with other hacker friends. It is a personal secret.

There is another reason why the gap between ordinary hacker software and hall-level hacker software is so big, it is also related to the quality of the system vulnerabilities in the hands of the hacker. Ordinary-level hacker software has long been studied thoroughly, and system developers are good. Regardless of the network security company, from which vulnerability they will invade the system, the updated patch is estimated to be marked, unless the pirated system is not updated, otherwise the genuine operating system normally updates the patch package, this vulnerability will be blocked, the hacker software The utility has also lost more than half. It cannot be said that there is no effect, but the aggressiveness will definitely be greatly reduced. But the palace-level hacking software is different. Its intrusion methods are generally operating system vulnerabilities that only the software makers themselves know. No one except him has found out, and no one knows. The system developers can't fix them if they want to patch them. I don’t know how the other party invaded. This kind of privacy is the reason why the hall-level hacker software is so lethal. It is basically harmless and no one can stop it.

However, Zhang Ye read a post. It was said that the palace-level hacking software has only appeared more than ten times in the world. Of course, these more than ten times have been discovered and patched, and there is no harm. Sex up. Although there are certainly many that have not been discovered, it can also be seen that the preciousness of this kind of hacking software is equivalent to the weapon of a martial arts master, a palace-level software or a Trojan horse-that is a magic weapon, too precious. It's too scarce. Because it is already difficult to grasp a system vulnerability that even system developers don’t know about. This world is much more reliable than Zhang Ye’s earth network security company. A seamless intrusion software or related Trojan horse program is even more difficult than reaching the sky.

So this kind of software is probably a legend, and Zhang Ye didn't think much about it. What he has to do now is to invade the radio and television network and find Li Tao's computer.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like