HacKer

Chapter 434: The power of hackers!

Ps: Does wood have ‘like it’? The favorable index is so low that you are hurting, please support everyone! .

Wozang is a country that is both powerful and weak. Visit download txt novel

The technology level of Wozang is very developed, especially in the aspect of electronic IT products, which almost occupy half of the market in Xiaguo, and the electronic IT companies in Xiaguo are not able to lift their heads.

Not only electronic IT products, including various industrial equipment, automobiles, and even home appliances, but also the power of Xia Guo local products.

It is such a powerful Won Sang country that, in the face of Li Jianguo, is a subordinate slave. In Wausan, many regions have been occupied by Lijian, and a military base has been established, which is equivalent to renting the world.

For example, the Futenma Marine Base in Okinawa Prefecture, in the Futenma Base, has nearly 100 armed helicopters and even the most secret weapons.

The Putianma base is located in the center of the city of Ginowan, occupying 25% of the entire urban area. It has been seriously protested by local residents, but the Wonsan national zhèngfu can do its best. ..

Originally at the end of 2006, Wonsan zhèngfu and Li Jianguo zhèngfu reached the Putianmao base completely withdrawn from the city of Ginowan in 2014, but until Shi Lei was born again, he did not see any action by Lijian.

Perhaps the zhèngfu of the two countries have long known that the so-called final agreement is just a modest scorpion.

Because the Futenma base, the Wosang country and the Lijian country, filled with the battle of light or dark, Shi Lei only found the Putian base to start!

At this sensitive time, when the withdrawal agreement was signed at the end of last year, the Futenma base was the most capable of provoking the incident!

Jingyayuan, Shi Lei took the line of headsets and kept in communication with the clothes. Looking at the data on the display, put your hands on the keyboard and make the final preparations.

"Jie Shier, copy the defense system to the super computer mine, once the top does not live, immediately start the defense system, use the th super administrator privileges, get all the computing resources of Ray, to provide full support for the defense system. "Shi Lei first considered the worst plan, in case it was in the military. After being discovered, the super computer can't keep it. It's better to stick to the last time for you to clean up the connection record and protect your real IP address.

This is why Shi Lei has to win another supercomputer right. Can't you lose Yan?

"Sir, the defense system has been installed. It can be mine at any time. Open the defense system."

"So, let's get started!" Shi Lei took a deep breath, ten fingers on the keyboard, fast tapping, typing the code line by line.

The time in Wozang is only a little later than Xiaguo. It is currently more than nine o'clock in Xiaguo time. More than ten o'clock in the Wasang country, the time difference between the two sides is not large, still in the middle of the night, the main control computer of the Futenma base. There should be security guards, so Shi Lei must be very careful.

Shi Lei's main attack, clothing detection and defense, time one minute and a second past, the firewall of the main control computer of the day, obstructing the entry of Shi Lei.

Because in the military network, Shi Lei can not forcibly attack, so as not to cause the jing report of the firewall, can only constantly search for loopholes in the system.

Xia Guo time, close to eleven o'clock in the evening, Shi Lei finally found a system loophole in the Futenma master computer, and successfully entered the Futenma master computer.

Inside the Futenma main control computer, Shi Lei constantly tests the situation of the permission group, and wants to obtain the corresponding information from the permission group.

After some hard work, Shi Lei got some basic information.

The Futenma Base, as an overseas base, has great autonomy. After all, if there is an emergency, the situation will change rapidly. Can you always ask the Ministry of Defense for the Lijian State?

Although in the military network, the information of the Futenma base can be passed to the Ministry of Defense at any time, but the Ministry of Defense cannot respond to information anytime, anywhere.

Therefore, the maximum authority of the computer controller of the Futenma base has considerable autonomy. Especially for the automation weapon, the highest authority of the computer controller of the Futenma can be directly determined without the confirmation of the order of the Ministry of Defense.

Shi Lei found this information, and his heart was excited. His choice was not wrong. As long as you have the highest authority of the master computer of the Futenma base, then

How big is the power of hackers?

For ordinary people, the power of most hackers, especially for broadband access users, is because of the dynamic allocation of ip addresses, the technology is slightly worse hackers, simply can not ordinary users. The hackers with deep technical skills will not start with ordinary users unless they have a good time.

But for business users, having a fixed official website and a fixed server address is extremely vulnerable to hackers. Hackers are simply disasters for business users.

As for the general public, before December 20, 2006, hackers were just a noun for them, representing a stable person with powerful computer technology.

But in December 2006, 20ri, the earthquake hacker eq to all the people in the world, explained the hacker, how powerful it is!

Through hacking techniques, earthquake hacking eq, let Wassang's loss, the prehistoric case is powerful!

Because of the earthquake hacker eq, the general public around the world knows what a top hacker, especially a crazy top hacker, can do in this society called technology!

Now, Shi Lei is ready to let the general public around the world know what hackers can do, and how powerful the hacker is!

Shi Lei's hands, on the keyboard speed, from the Pu Tianmao base of the main control computer cāo system, slowly eroding the authority of the system.

Although the system of the Futianma base is very powerful, Shi Lei is not only the world's top-level hacker, but also has the computer technology for the next six years.

Even if Shi Lei is a half-way monk, most of the technology is learned by the Angel Council pseudo-artificial intelligence Abertier, but Shi Lei is also quite powerful!

"Sir, an abnormal data scan was detected, and we are tracking it to us!" When Shi Lei was cracking the system, he suddenly sent out a message.

Shi Lei is in a tight heart. Quickly start typing code and masquerading your own data stream.

After a while, in the internal network of the Futenma, a data scan passed, and no stone Lei was disguised. Shi Lei was relieved a little, as long as it was not found.

"Jiezheer, continue to monitor the entire internal network. Any situation, timely report!" Shi Lei gave a voice, continue to crack the base system of the Futenma base.

‘Nima, obviously has got the description of the permission to live. Why do you enter the permission group? ‘Shi Lei secretly thought, suddenly he flashed.

When a string of code is typed, when Shi Lei presses the enter key, the Putianma base master computer immediately expands the access permission of the permission group.

‘Sure! Actually it is a dual system combined system, both linux. There are windows, it is too yin dangerous! ‘Shi Lei’s heart is secretly scorned.

The range of dual system applications is narrow. Mainly the combination of dual systems is very troublesome. The degree of confidentiality is not better than a closed system. Therefore, the dual system is gradually being phased out by the closed system.

Entering the permission group of the main control computer of the Futenma base, Shi Lei first began to secretly retrieve all the users of the permission group. Shi Lei will not tamper with any information of the permission group without knowing the situation.

After all, I don’t know the protection of the permission group. If I change the information, what should I do with the jing newspaper?

When retrieving permission groups. Shi Lei has already stopped the ninth report, so it can be seen that the security of the main control computer of the Futenma base is so strict. It's just a user who retrieves a permission group. It triggered more than ten reports.

Once you really start with the permission group, how many jing reports will it be inspired?

After spending a few minutes, Shi Lei finally retrieved all the users of the permission group. In order to prevent the existence of hidden users, Shi Lei repeatedly checked three times and confirmed that there were no other hidden users, and then began to analyze each user.

Shi Lei base master computer, Shi Lei is simply a simple analysis of each user, view the corresponding permissions. Since this is a military network, Shi Lei did not use his own password dictionary to analyze the password of each privileged user.

The analysis method of the password dictionary is to test the possible passwords through multiple tests. In case the password test is repeated many times, it is very likely to cause the jing report of the master computer.

With the corresponding permissions of each privileged user, after the analysis is completed, Shi Lei finally chose the highest privileged user. Only the most privileged users can call all the automated weapons of the Futenma base.

In order to get the most privileged users, Shi Lei began to think about what to do, in order to get the highest authority. According to the analysis of the corresponding code of the permission group, Shi Lei got a message.

The most privileged users of Futenma’s main control computer, because of their great authority, can directly use all the automation weapons of Futenma without passing through the Ministry of Defense of Lijian.

Therefore, the password of the highest privilege account of the host computer of the Futenma Base will change every day. For example, today's password is abc, then tomorrow's password is definitely not abc, it may be abd, or cbd.

The password of the day after tomorrow will change!

The passwords are different every day!

Since a password is taken every day, the security of the password is greatly guaranteed to prevent hacking.

In fact, the idea of ​​changing a password every day is really effective for guarding against hackers. After Shi Lei knew this information, he was quite distressed.

Even if he wants to get a password, it takes a lot of work. Moreover, there is a certain chance that it will be discovered. The internal network of the Futenma base is included in the use of Lijian. Shi Lei can't be jealous in the military network, he must keep his own hidden xing.

‘The **** Putian base, actually took the way to change the password every day, I hate this password way! ’

After complaining a lot, Shi Lei began to carefully check the file system of the host computer of the Futenma base, and wanted to search the file system for any clues.

However, Shi Lei found something that made him laugh and cry.

To be continued. Mobile users please read. )

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like