There are still more than two hours before Chu Hao's live broadcast.

But apparently, fermentation has already begun on the Internet.

Major forums have been swiped by posts related to "god-level hackers".

Especially for large websites such as scarfs, the top three on the hot search list are all related to "god-level hackers".

After many people knew that the "god-level hacker" was a salted fish anchor, they flocked to the salted fish platform.

But what awaits them is that there is no live broadcast room yet.

At the same time, the "god-level hacker" VX fan support group also exploded.

"It's over! Finished! I can't hide the events of '99! "

"It's wrong, it's the anchor who can't hide it!"

"Oops, I seem to see countless people competing with me for the lucky audience appear! What to do, my 99-meter machete, it hasn't been sharpened yet!! "

"Plans can't keep up with the changes! It's horrible! "

"Guys, what are you waiting for? I'm already advertising on major websites! Since I can't cover it up, I'm going to be the most arrogant communicator! Anyway, now the Internet police don't care! Let's play. "

"I'll tell you something! I've edited the video I recorded earlier! Plus the content of the press conference! Posted on Douyin! In order to strengthen the spread of the spread, I charged 10,000 soft girl coins! Now, if you swipe Douyin casually, you can see the video I posted! Hahaha! "

"Soft sister coin players, I can't afford to mess with them! Can't afford to mess with it! "

"Abominable Kryptonite players! said that you were standing on the same running line, but you secretly charged money behind my back to drain the traffic! "

"It's not the point that the money is not the money! The point is, I want the anchor to pump me! Whip me hard and you're done! "

......

Back in the dormitory, Chu Hao began to prepare for today's talk.

Chu Hao's dormitory is a single dormitory, so he doesn't worry about someone coming to disturb him.

Approaching eight o'clock, Chu Hao opened the live broadcast room.

Suddenly, he was taken aback by the hot popularity.

He remembers that the last time he went offline, he was only a hundred thousand popular.

Now that I look at it, it has still soared to more than 500,000!

Moreover, before he officially started broadcasting, the live broadcast room had already brushed up a barrage.

"Five minutes left, what about the anchor? Not here yet? Which Taoist friend uses urine to nourish the anchor! Wake him up! "

"Diabetic lean back, don't let the anchor taste the sweetness!"

"Uremia comes first, let him suffer!"

Looking at the screen full of riotous words, Chu Hao smiled helplessly.

"Judging from this data, there should be tens of thousands of real viewers! In addition, today is the weekend, and the popularity will definitely skyrocket in a while! Chu Hao thought about it in his heart, and then opened the live broadcast room.

For a while, the barrage in the entire live broadcast room was boiling.

"The anchor is here!"

"Capture the anchor alive!"

"Anchor, who are you doing tonight? In a word, a million armies are killed! "

"It's who is black tonight..."

"Anchor, I just want to ask, did you drag the executive of Xianyu into the water? No, no, it's thrown into the water! "

"Yes, anchor, I'm curious too! It's gone crazy on the internet now! "

Facing the audience's questions, Chu Hao smiled faintly and said, "That's right, it's indeed me." I saw him at large, and I was not happy, so I threw him into the water. "

For a while, the entire live broadcast room set off a wave of fanatical worship!

"It's a loss!"

"I can't afford to mess with it! The most rigid and unprovoked anchor on the whole network! "

"Anchor, ask weakly, can you find out about bedwetting when I was a child?"

“......"

"Ahem." Chu Hao coughed lightly and signaled that the live broadcast had started, "Everyone, pay attention, the live broadcast has begun!" "

"Last time I talked about some basics, today we will talk about some hacker attack methods, and defense methods."

"At present, the rapid development of science and technology, although it has brought me a lot of convenience, but there are also many dangers hidden behind it."

"Information security is especially important!"

"Everyone knows about Zhibao's 'Brother Dao'! It is really with the existence of technical talents like them that our Zhibao can be used as much as we want, without worrying about property damage caused by hacking. "

"Of course, many times, some personal information that we don't care about will become a means of attack for hackers."

"Below, I have listed more than a dozen hacking methods for you to take as a warning."

"Type 1: Data-Driven Attacks!"

"A data-driven attack is an attack that a hacker sends or copies to a target computer with a special program that appears to be harmless on the face of it."

"The attack allows hackers to modify files related to network security on the target computer, making it easier for hackers to hack that target computer next time."

"Data-driven attacks mainly include buffer overflow attacks, formatted string attacks, input validation attacks, synchronization vulnerability attacks, trust vulnerability attacks, etc."

"Type 2: Falsification of information attacks!"

......

"The third type: attack against the weakness of the information protocol!"

......

"Fourth: Remote manipulation!"

......

"Type Twelfth: Jump Attack!"

"This, as a more common attack method of hacker attacks, needs to be understood."

"In the Internet, many websites use the UNIX operating system for their servers or giant computers."

"Hackers would try to log in to one of the UNIX-equipped computers, exploit a vulnerability in that operating system to gain system privileges, and then use that as a base to access and hack the rest of the computers, which is known as a jump."

"Hackers tend to do this a few times before attacking the ultimate target computer. And those that are . The computer that controls it is also called a broiler! "

"For example, a hacker in the United States may log in to a computer in Asia before entering the network of the American Federal Bureau of Investigation!"

"From there, log in to a computer in Toyo and jump to Europe!"

"In the end, he would even launch an attack on the FBI network from a computer in France."

In this way, the attacked computer, even if it finds out where the hacker launched the attack on itself! However, it is also difficult for managers to find hackers. "

What's more, once a hacker obtains the system privileges of a certain computer, he can delete the system log when he exits and cut off the "vine"! "

"This kind of method was not uncommon in the Internet hacker wars of the Chinese Dynasty and the United States imperialism!"

"All the behaviors of the users of hacked computers on the network will be presented to hackers like a movie!"

"This is also the same as why the poisoned computer will cause great economic losses to the user!"

Speaking of this, Chu Hao paused, took a sip of water, and put all the knowledge on the interface so that the audience could see it.

"Is there any audience willing to sacrifice a little bit to be the object of my lecture!" Chu Hao said casually.

For a while, the audience in the live broadcast room expressed their willingness.

"Streamer, even if you don't smoke me, I still hope you can hack into my computer!"

"Come on, drag the first floor out and wake up! lest he talk nonsense! "

"Anchor, hurry up, come and invade me! The pose is set! "

......

Chu Hao was about to draw lots at random, when a striking red barrage floated past his live broadcast room.

"Please note! Please note! Since your live stream involves illegal technology, please pause the stream! Please pause the stream! Otherwise, you will be banned! "

Immediately after, a barrage jumped.

"Salted fish is bold, not afraid of death! Seal one, and dare to come back to the second one? "

"Is the anchor going to take the salted fish again? Why can't I stop laughing? "

The moment he saw that barrage, Chu Hao smiled: "It seems that they don't have a long memory!" Then use the account of Salted Fish Super Tube as teaching materials! "

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like