I’m Really a Superstar

Chapter 279 [Support genuine! 】

( www.du; read the full text without pop-ups)

Early morning.

The neighborhood was quiet.

Only Zhang Ye's bedroom had the light on, and this guy had no intention of resting. He was still fighting on the front line of anti-corruption alone, tirelessly trying to hack into Shanghai Radio and Television's website. However, as time went by, Zhang Ye's expression became more and more depressed and irritable. The network security of this website was very good, and the known loopholes had been perfected long ago. Zhang Ye could not break in no matter what methods he tried.

For example, he wanted to use the horse-mounting method to use the radio and television website as a way for Zhang Ye's Trojan horse to spread, and then use it to control and find Li Tao's computer. However, Zhang Ye gave up after two more attempts because he could not connect to the server. The firewall can't even be passed, it's stuck outside, and it's difficult to move forward. You can't even get into this layer, let alone hang a Trojan horse on it. It's a fantasy, don't even think about it.

Next, Zhang Ye used a hacker attack software downloaded from the Internet to get through. He tried to penetrate into the website. He didn't expect to be hacked, but at least he could get the account and password of the website administrator. However, this step also didn't work. The hacker software was too powerful. It is outdated and outdated. Even the firewall has "registration" for this software. As soon as Zhang Ye tried to invade, the firewall did not stop him this time, but directly called the police to "besiege" him. The besiege here is actually automatic tracking and killing. The meaning of information recording is to counter-track Zhang Ye's computer IP. I don't know whether it was the subjective operation of the other party's network security staff or the high-end settings of the firewall. Anyway, Zhang Ye was so scared that he pissed his pants. Fortunately, he ate eleven This network technology skills and experience book, he is still proficient in his techniques. He immediately stopped the attack and cleaned up the traces, and then quickly unplugged the computer network cable, and then he breathed a sigh of relief.

your sister

Does this world want to be so safe?

My buddy is considered a skilled hacker now, but your mother can't even get into a place with low protection like a local radio and television website?

Why do you say the level of protection there is not high?

Nonsense, Zhang Ye's fans just went to refresh the screen for half an hour before the website of Shanghai Radio and Television was paralyzed. It did not resume operation until the afternoon and evening ten hours later. The website quality is obviously not high, it should be like that The most basic network security configuration, and the level of network administrators and teams must be average. But even so, Zhang Ye couldn't get in. It shows that the network security in this world has been at the forefront of the times. Of course, it may also have something to do with the configuration of Zhang Ye's computer. His laptop has an average configuration and he usually plays games. The game is okay, but if you want to actually make a picture and play a software attack, it will be stretched. The configuration and network speed are simply not enough. It seems that it is time to change the computer, but it is useless to think about it now. You still have to consider other methods first. Invasion.

Next, Zhang Ye reconnected to the Internet and thought of a few more ways. When he was in his world, Zhang Ye was very interested in hackers. He also read some related books and scanned a lot of Internet information, although he never learned how to do it. Let’s get over it, ahem, but I understand these very well.

The third trick is that Zhang Ye used a disguised email to send a Trojan pulled from the Internet to the mailbox provided by the Shanghai Radio and Television official website. If the administrator clicks on this email and the protection measures are relatively low, the Trojan will be there. There is a certain chance that it will take effect and achieve the goal, but unfortunately, Zhang Ye's disguised email was not even sent to your mother, and was directly blocked by the other party's mailbox.

fail

fail

Still failed

Countless attempts made him frustrated, and he gained a new understanding of the world's network security. No wonder there are so few hackers on this earth. No wonder so many are paralyzed. This network security technology , it’s your mother who doesn’t leave food for hackers, let alone food, it’s your mother who doesn’t even leave food or leaves for hackers, you guys are too inhumane, right?

Rookie hacker is angry

I got off to a bad start as a hacker for the first time.

Zhang Ye thought his plan was perfect, but he didn't get through every step of it. He didn't need to think about invading the radio and television network for the time being, nor did he need to think about finding Li Tao's company computer and invading the control. What was left for him now There is probably only one way - to track down Li Tao's home computer, invade it and control it, and also hope that Li Tao's system is a pirated version and has not updated some vulnerability patches. But a new problem came again. Not to mention the system, he didn't even know Li Tao's home address, IP address, or even the account number of the network communication tool. He asked three questions and found nothing. How could he invade? Where can he find the hundreds of millions of computers in the country?

Aimlessly.

Zhang Ye did not hide or disguise his IP address this time. He just used ordinary methods to click on the Shanghai Radio and Television website and found Li Tao's information announcement.

Name.

age.

position.

wait wait wait.

There is no other information such as address.

Zhang Ye was unwilling to give in, and looked at the posting records of this ID on the website, and clicked on one of the work reports uploaded by Li Tao. There was no useful information, so he continued to click on Li Tao's reports one by one. Suddenly, a post in the middle of this year made Zhang Ye feel unexpectedly happy. This was the early stage of the crackdown. Li Tao, as the leader of one of the working groups in Shanghai, announced the scope of the crackdown, and then a report was left behind. There is also a hotline and a reporting email address for the radio and television website, and in the last line of fine print, Li Tao actually left his own private email address.

Got the mailbox

Zhang Ye's sluggish expression suddenly brightened up, and he immediately downloaded a new Trojan. This was a hidden Trojan with a picture nature, and it was very concealable. Without saying a word, Zhang Ye used technology and software to disguise a virtual Trojan that did not exist. mailbox to avoid being tracked, and then sent a yellow picture to Li Tao's mailbox through this mailbox - that is, the Trojan horse program. Zhang Ye thought about it over and over again and typed the title of the picture - Hush, Qian Don’t tell anyone else. I’ll give you a secret photo of Queen Zhang Yuanqi. If you don’t look at it, you’ll be embarrassed to say you’re a man. You’re welcome. Please call me Red Scarf.

Just say that Zhang Ye has many grandchildren.

As soon as this passage came out, no one could help but want to click on it and read it.

The email was sent quickly. The personal mailbox is different from the public mailbox of the radio and television. It must have little protection measures. This time it was finally sent successfully and was not directly filtered.

After waiting for a while, there was no response from the other party. Zhang Ye knew that Li Tao must have gone to sleep, so he stopped waiting foolishly, set an early alarm, turned over and lay down in bed.

I hope it works this time

I hope Li Tao's home is a pirated system and pirated firewall. As long as his computer is not updated with patches and anti-virus protection in time, Zhang Ye has a high degree of confidence in taking control of his computer.

For the first time in his life, Zhang Ye had such a fondness for and expectations for piracy

Of course, this is only for computer system piracy. After all, it is foreign stuff, and for domestic stuff...

especially novels

especially novels

Zhang Ye must read the original version

Domestic cultural industries must be supported

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like