I’m Really a Superstar

Chapter 278 [Hacker Zhang Ye! 】

bedroom.

It's seven o'clock in the evening, which is still early.

Zhang Ye drew the curtains and put the computer on the table. After trying the Internet and mouse, he moved his arms and was ready to take action. First of all, although he has eaten two types of computer skills experience books, he has not used them yet, and he doesn’t know if he can do it, let alone whether the experience books he has eaten are enough to use his skills, or whether he can use them. No matter how hard you exert it, there is never enough skill book like this. No matter how much you eat, it seems to increase experience. The more you have, the greater your ability will be. If you eat less skill books, you will definitely only scratch the surface. There were eleven books in the lottery on network technology, which was supposed to be a lot, but Zhang Ye still had to have a number first in order to be on the safe side.

On the Internet, Zhang Ye first found a foreign website, and then based on his computer experience in that world and the network technology skills in his mind, he quickly started operating. I found a component for the browser. This thing was called - in the Firefox browser application in Zhang Ye's world, but here the name is different and the browser is different, but the meaning is actually the same. Adding components and applying operations - it took about two minutes for Zhang Ye to successfully click on the foreign website. This is actually the simplest proxy.

Hot pictures popped up one after another!

Seductive videos of foreign beauties come into view!

Zhang Ye looked at this outstanding foreign website that he had opened with his excellent technology, and couldn't help but secretly exclaimed, "It's an artifact." Although it's not difficult to operate, Zhang Ye knew that he didn't have this technology before!

Warm-up is over!

His confidence has greatly increased!

He began to browse some professional computer websites, studying the world's computer development, technology, software, etc., and spent a whole night until almost all the lights in the building outside the community went out at twelve o'clock at night. Zhang Ye just rubbed his eyes and exhaled. He found that the computer systems and hardware and software in this world were not fundamentally different from those in his world. The principles were the same. The only difference was the names. For example, those who programmed There are various languages ​​in this world, and even the typing methods are the same. For example, those operating systems that are not called Microsoft but are similar to Microsoft are also in this world, and even the command forms are the same. After comparing for a long time, Zhang Ye initially came to the conclusion that the systems and hardware of this world were slightly lower than the technical level of his world, by several years. However, some technologies, such as server firewalls and anti-virus software, were slightly lower than the technical level of his world. It is higher than Zhang Ye's Earth, so the "national hackers" in his world are not so obvious here, because the security technology in this world is very high, and just downloading a firewall can basically block 99% of them. Non-professionals, and even professional hackers may be in trouble. Very few people are stupid enough not to install protection software and anti-virus software, so there is no such thing as "hackers for all".

This creates a situation. There are very few hackers in this world, and they are not as rampant as Zhang Ye. However, on the other hand, all hackers with a little bit of fame are quite skilled. Those hackers at the top of the pyramid used to be able to do anything in the online world.

This is the difference between the two worlds.

The origin of system hardware code programming is the same, which is a good thing. It makes it easier for Zhang Ye to use his experience on the earth. Even if there are slight differences, Zhang Ye has learned network technology and programming skills books. These skill books bring The experience given to Zhang Ye is not only the technology of his world, but also the application of technology in this world. From this point of view, Zhang Ye does not need to worry. But the aspect of network security really gave him a headache. He had not become addicted to hacking, so he could just let a copycat firewall stop him, right?

You have to do it!

Li Tao can't run away!

Zhang Ye had already made up his mind.

Without any further hesitation, I went out to the outhouse to use the bathroom. I saw that Dong Shanshan was dark in the crack of the door. He was obviously asleep, so he came back quietly!

let's start!

Try it first!

The hacker software in this world is also open for download, but most of the software does not provide source code, and it is not really open. It is nowhere like Zhang Ye's earth, where many hackers pay attention to open source code. , thinking that this is the rule and honor, the concepts of the two worlds are slightly different.

Zhang Ye started to download small software - this is a hacker's knife. It is difficult for a clever woman to make a meal without rice. Without these, let alone hacking into the computer, it is estimated that even the IP address of the person cannot be found.

Small command plug-in.

Remote control Trojan.

Trace cleaning software.

Wait, wait, wait, Zhang Ye did it again and again.

Then he started to conduct simple tests and experiments on the software and Trojans in this world. The results were as he expected. They were just ordinary hacking software. Do you want to say it has no effect? No, the programs are all normal and effective programs, but you want to say they work, right? This kind of hacking software that can be easily downloaded from the Internet is not as effective as other hacking software. It may not be able to pass the firewall. Especially in this world with such excellent security technology, the chance of being intercepted as malicious program code is too high. Most of the truly top-notch hacking software is created by the hackers themselves. Not to mention sharing it with all netizens, it may not be shared with other hacker friends and is considered a personal secret.

Another reason why there is such a big gap between ordinary hacking software and top-level hacking software is also related to the quality of system vulnerabilities that the hacker has mastered. Ordinary-level hacking software has long been thoroughly studied by others, whether it is system developers or not, Regardless of the network security company, which vulnerability they will use to invade the system, the updated patch is probably applied. Unless the pirated system has not been updated, otherwise if the genuine operating system updates the patch package normally, this vulnerability will be sealed, hacker software The effectiveness has been lost by more than half. It cannot be said that it is completely ineffective, but the offensiveness will definitely be greatly reduced. But top-level hacking software is different. Its intrusion methods are generally operating system vulnerabilities that only the software producer himself knows about. No one except him has discovered it, and no one knows about it. System developers can't patch it even if they want to, and they can't. You can't find or know the other party's intrusion method. This kind of secrecy is the reason why the top-level hacking software is so lethal. It is basically invincible and no one can stop it!

However, Zhang Ye read a post, which said that top-level hacking software has only appeared more than ten times in this world. Of course, these more than ten times have been discovered, dealt with and patched, and there is no harm in it. Sex. Although there must be many that have not been discovered, it can also be seen that this kind of hacker software is as precious as a martial arts master's weapon. Palace-level software or Trojans - they are magic weapons, so precious. It's also too rare. Because it is already difficult to grasp a system vulnerability that even the system developer is not aware of. This world is much more reliable than Zhang Ye's network security company on Earth. Well, when a vulnerability is found, it must be made according to the nature of the vulnerability. A seamless intrusion software or related Trojan horse program is even more difficult than reaching the sky.

So this kind of software was probably just a legend. Zhang Ye didn't think much about it. What he wanted to do now was to invade the radio and television network and find Li Tao's computer.

(To be continued)【】. If you like this work, you are welcome to come to Chuangshi to vote for recommendations and monthly votes. Your support is my biggest motivation. )

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like