Revisiting Future Path

Chapter 401: Lost Love Gets Golden Finger (2)

Chapter 401 Lost Love Gets Goldfinger (2)

In other words, because it takes money to chase Sheng Jinhuan, Jiang Wenchen felt the pain of being unable to move without money early on. However, Jiang Wenchen was born in a small citizen's home, and his parents' monthly salary is about 5,000 yuan. Even if they spoil Jiang Wenchen as much as possible for living expenses, it is difficult to provide the exquisite life Sheng Jinhuan wants.

If Jiang Wenchen wants to make money, he must do it himself.

Jiang Wenchen doesn't have any business thinking, so he puts his hope on the most profitable smartphone application in the public opinion.

Jiang Wenchen is a liberal arts student majoring in business administration, but he has no fear of computer programming, because he thinks his mathematical foundation is very solid. In the first year of high school, his scores in science courses such as mathematics and physics far exceeded those in liberal arts. In order to get closer to Sheng Jinhuan, he finally stubbornly chose liberal arts that he was not good at.

At the same time, due to the overtaking of smart phones in corners, the smart operating system has a strong impact on Microsoft Windows. At least in China, programmers agree that it is necessary for developers in the smart phone field to buy computers with smart operating systems, and the Windows system naturally lags behind the Sapientia system when developing smart phone applications. Since Jiang Wenchen decided to learn programming from scratch, he simply "has to sharpen his tools if he wants to be good at his work" psychologically and begged his parents to buy him a laptop again.

Jiang Wenchen never expected that Sheng Jinhuan would embrace others before the laptop was sent to school.

People are gone, what use is the laptop?

When Jiang Wenchen received the laptop and thought of the purpose of buying a laptop, his mood was even more depressed.

Jiang Wenchen knew the implication of exquisite life. Money is a necessary condition for a refined life. Without enough money, how can life be refined? Jiang Wenchen clearly understands the shortcomings of his family, but he is willing to work hard to change the current distressed material conditions. In order to make money, Jiang Wenchen even plans to cross the barriers of liberal arts and sciences to learn computer programming from scratch. Jiang Wenchen questioned painfully: "Jin Huan, I will get better! Give me some time to work hard and change, is it so difficult? Without you, what is the meaning of my efforts?"

Unfortunately, there is no if in the world.

Back to the dormitory, Jiang Wenchen started to check the quality, and immediately scolded: "I am a profiteer, selling my second-hand goods."

This laptop, surprisingly, is a junk that has been used for at least half a year. The hard disk stores a bunch of messy files: for example, the F disk movie directory, the previous user has downloaded more than 30 high-definition movies; for example, the E disk game directory, downloaded by the previous user Four single-player games including "Crusader_Kings_II", "Europa_Universalis_IV", "Victoria_II", and "Hearts_of_Iron_IV". Because the four stand-alone games do not support the Sapientia system, the previous user also downloaded many auxiliary tools such as the Windows system emulator.

and many more.

Jiang Wenchen's face is getting darker and darker.

Anyone who buys a laptop can buy second-hand goods, and even profiteers don’t bother to format the hard drive and reinstall the system for a bit of disguise. This year is really bad.

However, there is no way out of the mountains and rivers, and there is still another village.

Jiang Wenchen checked the D drive and suddenly saw countless treasures in the study directory.

Click on the eye-catching help file. There are 143 practical tools in the study catalog. Unfortunately, the full text is all in English. Jiang Wenchen seems to be reading a book. Jiang Wenchen's English scores are not bad. He passed Level 4 in high school, and Level 6 is also a way of finding things. But every other line is like a mountain. As a liberal arts student and a beginner in programming, Jiang Wenchen, who naturally looks at computer vocabulary, is at a loss.

Jiang Wenchen clicked on the most frequently used feature software from previous users in the frequently used list. If the name is simply and crudely translated, it can be called "communication monitoring". The program interface is also in English, but the style is very simple, like the homepage of Spring and Autumn Search or Google Search, except for the middle input box, there are only a few lines of text description and icon buttons.

Jiang Wenchen translated the English reminder inefficiently, and slowly understood how to use this functional software.

The input box in the center of the interface requires the input of the target IP, and there is a convenient option "Local Area Network" on the right side of the input box.

Jiang Wenchen's experimental psychology simply clicks the "local area network" option, and the communication monitoring software will pop up a new two-page new interface. Jiang Wenchen started to teach himself computer programming last year. He had a little understanding of basic computer knowledge and quickly understood the content of the two-page interface.

The first page of the interface shows the computer usage of the entire dormitory building, all online computers are listed; the second page of the interface shows the computer layout of the entire Panmen Institute of Technology, the structure is relatively complicated, and Jiang Wenchen is ignorant.

Jiang Wenchen focused on the relatively simple first page interface.

The dormitory IP has been pre-bound, very regular. For example, Jiang Wenchen's IP is ..0.58, roommate A's IP is ..0.59, and the bed order is just incremented by 1. Roommate B does not have a computer, but the school reserves him an IP of ..0.60: Therefore, when he reaches roommate C, his IP is ..0.61. Knowing who’s dormitory number reduces his IP to a quarter; on the other hand, knowing who’s IP number does not ask for his dormitory number.

Jiang Wenchen saw the ..0.63 online next door and clicked.

The screen flashed, and a new window the size of the desktop popped up.

The new window is actually the desktop of a certain computer, and someone on the screen is playing the online game "Lich Clash" in window mode.

Jiang Wenchen was shocked. Why did it suddenly become an online game interface?

Suddenly, Jiang Wenchen thought of a possibility. Jiang Wenchen locked the screen of his laptop and rushed into the dormitory next door. There was only one student in the dormitory next door. He was sitting at the computer table under the bed and playing. The screen interface was the "Lich Clash" that Jiang Wenchen was most familiar with. Classmate A was happy to play the game at the moment, and greeted Jiang Wenchen briefly, and his attention turned back to the wonderful game world. Jiang Wenchen walked to Classmate A's computer, remembered Classmate A's game nickname and matching players, and then returned to the dormitory with his heart beating violently.

Start the second-hand laptop.

Same nickname...

Just like matching players...

The same goes for heroes...

Jiang Wenchen trembled excitedly.

It turned out that the interface that popped up was Classmate A's computer desktop.

It turned out that he could easily invade Classmate A's computer with just a few clicks.

Jiang Wenchen knows a little about computer security. Computer security is all about authority. Hacking someone’s home’s computer is like going to a certain house in reality. You either ask the other person to open the door for you, or you try to get a key. How to enter the room as quickly as possible, how to steal the key most efficiently, how to enter the room without being discovered to check the privacy of the homeowner, and to study the level of network security. If the owner of the household or the property takes the initiative to hand over the keys by fraud, this is the social engineering that everyone talks about; if the keyhole structure is studied and a key is immediately assigned, this is usually the so-called brute force cracking, etc.

But the communication monitoring software is very powerful.

Jiang Wenchen randomly tested other IPs and found that all computers in Panmen Institute of Technology can invade like a spike.

There is no invincible adjective prefix, no universal adjective prefix, and no magical adjective suffix. The simple and simple "communication surveillance" name shows its power. The trivial operation without intermediate process indirectly proves that this functional software is highly integrated and may be a common tool for a large organization.

Communication surveillance, strong and outrageous.

Who are the former users? Install the Windows system emulator, download pirated high-definition movies, and play stand-alone games. He should not be a professional hacker or spy. Reminiscent of movie, game, study and other directory naming methods, study has the meaning of learning. Did he obtain a batch of powerful hacker tools in some way, and use these hacker tools to learn hacker attack and defense techniques?

Why was this laptop sold to me by coincidence?

Was it an accidental mistake by the previous user, or did he not want to learn anymore?

Various thoughts flashed in Jiang Wenchen's mind.

After dozens of minutes, Jiang Wenchen gradually calmed down.

Regardless of the accident, since arriving here is Jiang Wenchen's fortune.

If God doesn't take it, it takes the blame.

Before the owner searches for it, Jiang Wenchen might as well use it to fulfill his dream of hacking. Because of the emotional injury, he was thinking of Sheng Jinhuan in his heart, Jiang Wenchen suddenly had the selfish idea of ​​invading Sheng Jinhuan's computer to spy on. As he thought of it, Jiang Wenchen explored and studied the operation method of the communication monitoring function software, and soon successfully invaded the campus LAN of Panmen University, and found Sheng Jinhuan's laptop with difficulty.

Perhaps by luck, perhaps by coincidence, Sheng Jinhuan’s laptop appears to be in a hibernation state.

However, the communication monitoring software is very powerful, and the dormant notebook can also activate the camera to peep at Sheng Jinhuan’s dormitory. When the camera was activated in the surveillance mode, Jiang Wenchen was pleasantly surprised to see Sheng Jinhuan sitting on the side of the computer dressing up; at the same time, he activated the four laptop cameras in the dormitory.

Panmen City is located in the south of the Yangtze River. There is no central heating theory in winter. The girls in the dormitory have thick pajamas. Despite this, the laziness brought by the girls' unsuspecting has a different kind of charm. Some parts of Jiang Wenchen can't help but become congested.

However, Jiang Wenchen was not happy for long.

Because the girl in the dormitory suddenly asked about Sheng Jinhuan's love affair, it turned out that Sheng Jinhuan's solemn dressing was to make an appointment with Zhai Wuhao. During the talk, one cruel fact came to light. She never wanted to be alone with Jiang Wenchen so that Jiang Wenchen misunderstood her very conservative Sheng Jinhuan. Now she not only agreed to Zhai Wuhao’s date, but also prepared to have a good time with him.

If you like to re-take the road of the future, please collect it: (ltnovel.com) Re-take the road of the future. The literature is updated fastest.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like