The Lopis were frozen.

Confused and dazed.

Before you start cracking it, you’ve been tortured to death by this software?

Do you want to be so ruthless?

Su Shen is too much, so he has the mentality of our predecessors in hackers.

We just want to crack the virus software you made once, is it so difficult?

Luo Fei was in a complicated mood, took a few deep breaths, and then made up his mind.

If you can’t open it, you won’t open it.

If it doesn’t open, I can crack it too.

He zoomed in on the run bar and tapped his hands quickly on the keyboard.

His hand speed was fast at first, but immediately, his speed slowed down.

There are four steps to cracking the software.

Take off the shell, disassemble, and look at the source code.

The source code has been copied a lot before, Luo Fei has a general understanding of the basic composition of the entire software program, and now what he needs to do is to break the algorithm shell of this program.

After breaking the shell of the algorithm, he can start to modify the code of the software program, and after the modification is completed, the software will be successfully cracked.

Here’s how it works…

It’s just that……

As soon as he began to come into contact with the algorithm shell, Luo Fei fell into a deep confusion again.

There are many algorithm shells, in addition to UPX, ASPack, PePack, PECompact, P, ·ack… There are a lot of these, and there are even combinations of algorithm permutations.

Su Ziang was able to put so many algorithms on top of the software program, which was already shocking to him.

And now, on top of the original basic algorithm shell, Su Ziang has added some permutations and combinations of algorithms.

Bubble Sort – Adjacent swaps.

Select Sort – Each time the min/max row is in the corresponding position.

Insert Sort – Inserts the next one into the sequence.

Shell (She11) sorts a shrinking increment…

Merge sorting, quicksorting, heap sorting, topology sorting, tournament sorting, cardinality sorting…

So many permutation algorithms…

Even Luo Fei, seeing so many sorting algorithms, felt dizzy in his head.

Now!!

The difficulty of cracking the whole is not only increased by dozens of times!!

That is, Luo Fei’s own strength is extraordinary, and he is the chief cybersecurity expert of Penguin, and he has seen the world.

If it is an ordinary hacker, I am afraid that just seeing such a terrifying algorithm shell, I have lost the idea of cracking it.

It’s already a thing to be thankful for not to be scared away.

Luo Fei gritted his teeth, but he still decided to try to break through.

The algorithm shell is still quite simple, no matter how many basic algorithm shells there are, the method of cracking is almost the same.

The most difficult thing is simply the sorting algorithm added by Su Shen.

His eyes were fixed on the screen, and his hands tapped quickly on the keyboard.

He quickly typed in code and executed commands.

Soon the basic algorithm shell has been cracked.

At this time, Luo Fei has a big forehead.

It’s a little difficult, but I can still hold on.

He rubbed his fingers and twisted his neck, “Okay, I didn’t expect this basic algorithm shell to be cracked by me so easily, continue!!!”

After saying that, he continued to work hard.

Just a few minutes later.

Luo Fei took his hands off the keyboard in desperation.

He hugged his head and began to cry.

[ Read more novels by visiting our website: Knight Novels ]

Look up to the sky and shout: “No!!!!

“There are so many sorting algorithms!!It’s so hard!!It’s so hard!!”

“I won’t do this question, I won’t do it!!”

“It’s too hard!!”

In the air around him, there was a faint singing of “snowflakes fluttering, the north wind is Xiaoxiao”.

……

Hacker No. 1 forum.

The latest post was made by Feng Zhang, the current chief technical architect of Sharks.

[I have been superimposed by Su Shen’s “Su Shi Love Language” algorithm under the shell of several algorithms, and the whole person collapsed, and now I want the help of all the big guys, the following are my personal thoughts on the first bubbling sorting. 】

“voidBubbleSorArray(),·

forinti=1ini++),

forintj=0in-ij++)··

if(jaj+1)//compare swap adjacent elements,

intemp

temp=ajaj=j+1aj+1=temp

“,

[Summary: Efficiency O(2).It is suitable for sorting small lists, if you want to crack it, it seems that you must start with “inttem·p”. 】

Under Zhang Feng’s post, there were countless hacker messages.

“Fengshen, seriously, you can still break through the algorithm sorting, we can’t even break the most basic algorithm shell…”

“yes, there are too many shells in this algorithm!!”

“Even if it is the largest Internet company in our country, the defense system of the APP software produced by it is not so powerful, right?”

“Oh my God, it’s so tightly protected against a virus… As for it…?”

“Su Shen really has no face, it seems that he is not ready to give us these former waves, the old-timers have left…”

“……”

In addition to eating melons and complaining, there are also hacker bosses who put forward their professional opinions.

Luo Shen: “Recently, I have studied Su Shen’s system architecture and many defense systems, and I found that although there are many algorithms, they are not separated. ”

“Do you remember what Su Shen said about ‘part and unity’?”

“Perhaps, so many algorithms are sorted and combined, and when they look together, they are also a whole?”

Zhang Jianren: “That’s right, Luo Shen is so right, Su Shen’s system architecture, his algorithms, and his commands are all posted to his concept.” ”

“It’s technically difficult, but as long as you get the hang of it, it’s not that hard. ”

Zhang Feng saw Luo Fei’s message, and hurriedly replied below Luo Fei and asked, “Luo Shen, have you cracked it?”

Roselle: “…”

“Nope…”

“Don’t ask…”

“I haven’t even figured out the first algorithm sorting, so let’s continue the discussion and let me close the meeting. ”

Countless hacker bosses: “…”

They all looked at each other.

Even the top hacker bosses in China like Roselle are helpless against Su Shen’s program defense system.

Is it true that only the people of the national team can crack it?

When they think of this, they can’t help but feel sad in their hearts.

“Is there really such a big gap between people?”

“I won’t do this question, I won’t do it!!”

“We, the seniors in the hacker world, really haven’t shown any of our predecessors. ”

“Su Shen, I’m convinced of you!!”

“It’s so hurtful, we’ve been in the hacker world for so many years, and we can’t stand up by such a young man…”

The entire Hacker No. 1 Forum is shrouded in the shadow of being dominated by Su Ziang. _

Feilu reminds you: three things to read – collect, recommend, and share!(146610


Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like