Chu Hao paused, giving the audience in the live broadcast room time to react.

This time, he is not talking about the common sense knowledge of computer technology, but in the real sense, leading these audiences to touch the field of hackers.

"As the saying goes, do as the locals do, and since I've decided to teach you something practical today, let's start with hacker jargon. "

"There are rules for each trade, and there are also hackers, and I have compiled twenty-one of the more common ones. "

To put it simply, it refers to those computers that can be controlled by us at will! Whether it is a win system or a macOS system! It can be a personal computer or a large server... We can operate them as if we were our own computer, without the other person noticing. "

"2. Trojan horses! are programs that appear to be normal, but when they are run by the program, they gain control of the entire system. There are a lot of hackers who are just keen to use Trojans to take control of other people's computers..."

“......"

This kind of is very common, you know it when you browse the web, especially some small websites!"

It is to put a web Trojan in someone else's website file, or sneak the code into the other party's normal web page file, so that the viewer is defeated. "

After the intruder successfully controls the target host by using some methods, it can implant specific programs in the opponent's system, or modify certain settings... It is difficult to detect, but the intruder can use the corresponding program or method to easily establish a connection with the computer and regain control of the computer, as if the intruder had secretly assigned a key to the owner's room, so that he could enter and exit at any time without being discovered by the owner. "

......

WebShe11 is a command execution environment in the form of web pages such as ASP, PHP, JSP or CGI, which can also be called a web page backdoor. "

"After hacking a website, hackers usually mix these asp or php backdoor files with normal web pages in the web directory of the website server... Get a command execution environment to control the web server. You can upload and download files, view databases, and execute arbitrary program commands..."

......

15. Intranet: Generally speaking, it is a local area network, such as Internet cafes, campus networks, company intranets, etc. Check the IP address if it is within the following three ranges, it means that we are in the intranet: 10.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, 192.168.0.0-192.168.255.255!"

......

"19, no-kill!, that is, through packing, adding, feature code, flower instructions and other technologies to modify the program, so that it can escape the detection and killing of antivirus software. "

......

"21. Flower instructions: It is a few assembly instructions, so that the assembly statement can make some jumps, so that the antivirus software can not judge the structure of the virus file normally. Here's the point: Antivirus software looks for viruses in order from head to toe. If we turn the head and feet of the virus upside down, the antivirus software will not be able to find the virus!"

......

"These 21 common attack methods are very important! I will actually operate them in a while! Let you have a deeper understanding!" Chu Hao made a systematic explanation while releasing this information in the live broadcast room.

Compared with Chu Hao's serious talk about hacker knowledge, the condemnation of the "super hacker" live broadcast room has been noisy.

Countless viewers shouted in the live broadcast room, hoping that their anchor could defeat the god-level hackers.

"Anchor, that god-level hacker doesn't fight anymore!What should I do?"

"Anchor, he's cowardly! Haha! Our anchor is the most powerful hacker! Punch god-level hackers, kick Brother Ebao Dao! Vertical and horizontal domestic Internet, unmatched!"

......

Seeing the barrage of these audiences, Kong Shan smiled and said: "It's okay, he doesn't dare to fight, it means that he has no confidence! This also shows from the side that his strength is not good! He is just an Internet celebrity hacker!"

"For this kind of anchor who is ruined by the outside world, if we deal with him again, won't we fall behind? The ancestor religion has guided us, and we have to spare and spare people!"

"It doesn't matter if you let the god-level hackers go, anyway, justice is in the hearts of the people. "

Listening to Kongshan's words, those audiences admired Kongshan's broad Xiong Huai!

However, immediately, another audience jumped out and angrily brushed the barrage, expressing their dissatisfaction.

"Anchor, the god-level hacker next door is so hateful!

"That is, the most hateful thing is that he actually said, Lao Tzu does not argue with children! He compares you to children!"

"Anchor, I just went over to reason with them, and guess what they did to me?"

"Tell me upstairs, what did they do to you? Don't be afraid, our anchor will help you!"

Kong Shan's curiosity was also aroused, and he immediately asked, "This old iron, what did those people do to you?"

"It's so hateful! They actually banned me! That god-level hacker said, if I go to make trouble again, I'll block my account! Oh my God! Am I going to make trouble? I'm explaining the facts..."

"It's too much of a deception! What kind of human thing is this?"

"Streamer, disc it!"

Now, the empty mountain is also on fire.

"How can this be reasonable! He actually dared to ban the speech of the audience in my live broadcast room! He also threatened to ban the account! I want to see, he doesn't have the courage to do so!"

——————

The college entrance examination is coming tomorrow, and I hope that at this time, everyone will put away the humility and everything in the past, and be ruthless to yourself. Since someone has to take the first place in the exam, why can't that person be me? No matter how beautiful a beautiful woman is, she will marry a wife after all, why can't this person be me?

Therefore, I wish all the students who take the college entrance examination, as well as those who are about to take the high school entrance examination, the title of the gold list. _

To see the ununderlined version of the novel, please download the Fei Lu novel

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like