I’m Really a Superstar

Chapter 280 [Find Li Tao’s handle! ...

Saturday morning.

The alarm bell rang loudly and chirped.

Zhang Ye glanced at the still dark sky, yawned, got up and went to wash up. He moved very gently because Dong Shanshan's door was not opened and he was still sleeping. After coming back, Zhang Ye washed his face with cold water and felt a little more energetic. He sat in front of the computer and waited, waiting for the information feedback on the other party's email. If the other party's service endpoint opened the Trojan horse program sent by Zhang Ye, his side of the Trojan horse The software will give you feedback.

wait.

wait.

Why isn't this grandson online yet?

Did you not get up or turn on the computer?

at the same time.

A residential complex.

After getting up, Li Tao had breakfast with his family.

His wife asked, "Aren't you going to work today?"

"Rest." Li Tao didn't say much and replied with two words.

His wife said: "The trouble caused by Zhang Ye, you are not under a lot of pressure, right? Does it have any impact on you? There won't be any problems, right?"

Li Tao took a bite of the bun and said with a smile: "It's impossible to say there is no impact, but don't worry, he won't be able to stir up any trouble, and he's not a threat to me."

His daughter raised her head and said, "Dad, is Zhang Ye really finished?"

"He's finished." Li Tao touched his daughter's head, "He himself has aroused public anger. There are too many people who want to see his jokes. Even if I don't punish him, he will fall sooner or later."

His daughter clapped her hands and said, "Great, let him scold my Li Puyu. By the way, dad, please give me Li Puyu's autograph."

Li Tao said dotingly: "Okay, okay, when he comes to Shanghai to do a show, I will say hello to the TV station. This is a small matter."

His daughter said excitedly: "Dad, you are so good."

Li Tao said: "Haha, let's eat quickly."

After dinner, Li Tao's wife went to work, and his daughter went out to play with her classmates. He went back to the bedroom alone, turned on his computer to read the news, and logged into his WeChat account and email.

drop.

You have new mail.

Li Tao glanced at it and blinked.

If you don’t look at it, you’re not a man? Stealing Zhang Yuanqi’s secret photos?

Damn, it’s so pornographic and violent, then... you have to watch it.

Without saying anything, Li Tao immediately clicked on the picture in the email with the mouse. The network security in this world is very good, which restricts a large number of hackers or network technology enthusiasts with private purposes. For them, this is a disadvantage, but everything has two sides. Looking at it from another perspective, this is actually an advantage. In such a safe network environment, the people's awareness of prevention has been greatly reduced, and they are not as vigilant as the people in Zhang Ye's world. No, Li Tao didn't have any sense of precaution at all, so he waited expectantly for the refresh. But when the picture came out, Li Tao couldn't help but almost cursed, "Who is this foreigner, grandma? Where is Zhang Yuanqi?" Where are the pornographic and violent things? Isn’t this a lie? Do you still have humanity?

another side.

Zhang Ye's home.

While drinking tea and smoking, Zhang Ye suddenly noticed that the Trojan client lighted up. On the control interface below, there was an additional username of a computer. He had only sent the Trojan to one person, Li Tao, so this No need to ask about the computer, it must be Li Tao's

It’s done

It's finally done

This grandson is really a pirated system

Zhang Ye straightened up immediately. Today's Trojan horses basically use the 6 structure. This is the name and title of Zhang Ye's world. In this world, it is called structure, and the meaning is the same. It was very convenient and convenient. The Trojan successfully deceived the firewall of Li Tao's computer through planting and invaded into it through an old system vulnerability. It can be said that the computer is now controlled by Zhang Ye and has become one of his. Broiler - simply put, it is a clone that can be manipulated at will.

After typing in a command, Li Tao's IP address was quickly displayed. This is a dynamic IP segment. It is different every time you log in and will change. However, with the implanted Trojan, Zhang Ye doesn't need it at all. I am worried that it will be difficult to confirm the IP address every time, because this Trojan will immediately generate the IP address of the port to Zhang Ye's client every time the other party goes online. Unless the other party fills this loophole or upgrades the firewall, otherwise Basically, there is no way to escape Zhang Ye's control.

As for the language and method of inputting instructions, there is not much difference between the two worlds. After all, the first language of computers is English. English in this world has not changed, and the development of computer languages ​​is of course similar. Zhang Ye typed in a few commands, and he got the current Internet address of the other party's computer, the workgroup the computer was in, the name of the computer, the user name and the management password. Zhang Ye got them all without anyone noticing.

Zhang Ye was afraid that the other party would be disconnected from the Internet. In that case, even the most skilled hacker would be unable to do anything to him, so he quickly began to implement his ultimate goal - to view all the files on the other party's computer, including hidden files.

c drive - no.

B drive - no.

f drive - nothing worth noting either.

Li Tao's computer was actually very clean. Apart from a few games and system software, there was basically nothing else, not even movies. Zhang Ye looked through the traces on the other party's browser and found a few of them. I logged into unhealthy websites that I had browsed, but this was of no use and could not cure Li Tao at all. Zhang Ye was not satisfied and searched carefully again, but still found nothing.

You shouldn't be paralyzed

Who doesn’t have something shameful in their computer?

Zhang Ye scratched his head. This method was rejected again, but he still had another trick. Since the other party's computer was already under control, there was too much information that could be captured.

For example, turn on the camera

Zhang Ye performed this operation the next moment, but before executing it, he slightly adjusted the settings and typed in a line of instructions. Most of today's computer cameras have lights. The lights on some cameras are used for lighting. This is very common. There are also some cameras, such as small pinhole-like lights on laptops. Even fools know that they are like The lighting has nothing to do with it. The light won't even reach the needle. That light is a reminder light, which tells you that the camera is on. Therefore, this thing must be turned off, otherwise it will be easily exposed. Some hacking software comes with this function, but some do not, and it takes a lot of trouble to set it up. All of this is done to hide it. Of course, as for the system slowness caused by the large amount of memory and CPU resources occupied after turning on the camera, there is no way to block it. This is a hardware thing and is of no use to anyone.

done

The camera is on

Suddenly, a big face suddenly appeared in front of Zhang Ye. He took a closer look and laughed coldly. It turned out to be Li Tao's face that deserved a beating.

Li Tao was staring at the screen, but there was no sound from there.

Zhang Ye performed another operation - turning on the microphone of the other party's computer.

Click, click, the sound of the mouse click reached Zhang Ye's ears, and he could hear the movement in the other party's room. Everything was under Zhang Ye's control.

Afterwards, Zhang Ye ignored everything and directly turned on the video and recording function - he turned it on on his computer, recording Li Tao's every move in order to find an excuse for him. However, after doing this, Zhang Ye's computer with ordinary configuration suddenly became a little slow. Not to mention opening other things, the screen would be stuck and jump around every time he moved the mouse. So Zhang Ye smiled bitterly and hurried in the background. I closed a few unused things to relieve the pressure on the system, which made it a little better.

Another long wait.

About ten minutes later, Li Tao suddenly stood up and left the range of the camera in a blink of an eye. Because the camera coverage was limited, Zhang Ye could only tell from the sound of the door opening that Li Tao had gone to the living room outside, but he didn't. Turn off the computer and disconnect from the Internet, because Zhang Ye can still connect.

wait.

There was nothing to do but wait for him.

A few minutes later, Li Tao came back and sat in front of the computer again.

Hackers are risky, so Zhang Ye does not dare to leave for a moment. If any traces are left, an expert will easily track Zhang Ye's location.

A musical cell phone ringtone rang.

Zhang Ye subconsciously turned his head, not his cell phone.

Then he saw Li Tao in the video answering the phone, lighting a cigarette and holding it in his mouth, "Hey, Xiaoyong... um... um... how are you checking out the talk shows... ...I know there is a problem...but you can just deal with it symbolically, so as not to stop broadcasting...right...copyright? I know they plagiarized Zhang Ye's program, but is there any problem with their copyright? This part does not belong to us. It’s managed by the relevant copyright departments. If it doesn’t work, they will go to court on their own. What does it have to do with us? Just give them a warning. There is no need for a too severe punishment, but it shouldn’t be too light. At least it will give the public a symbolic You have to explain it to me, do you still need me to teach you this?"

What?

Talking about me?

Zhang Ye's eyes brightened

Then I heard Li Tao continue: "That girl in the Weiwo video, Dong or something, her show should be blocked... OK... who is it? Who called... um... I know, but no one can ask for mercy. It’s useless. She is Zhang Ye’s college classmate. If you want to handle it, let them handle it together... Yes, they are challenging our working group and causing such a big mess for us. Oh, they still want to get over it? There is no way for this maintenance to happen in the future. You should also watch my videos. If there is any problem with any program, report it directly to me... Yes, kill them as a warning. I will see who dares to rebel in the future... Haha, I didn't know that "Network Talent Show" is no problem, no problem. Let's do what anyone can do... Understand... Okay, you go ahead and do it. We must suppress this negative public opinion. If anyone is dissatisfied, tell me."

The phone was hung up.

Li Tao put out his cigarette butt and continued surfing the Internet, completely unaware that his words and deeds had been recorded by Zhang Ye on the computer.

Zhang Ye was very excited and couldn't help but slap his thigh

This is what he wants! With this, Li Tao still wants to jump around? He couldn't even jump for a day.

After waiting for another ten minutes, seeing that nothing new had been gained, Zhang Ye stopped connecting to his computer, turned off the camera and audio, and used his own network technology skills to quickly clean up the log files of the other party's computer, and The traces of the intrusion were eliminated. As for the Trojan horse program left on his computer, Zhang Ye could not delete it. There was no other way. It was just an ordinary Trojan horse software that could be downloaded from the Internet. It was of a very low level and had low technical content. , there is no program setting that automatically deletes itself, it is a palace-level hacker Trojan. But this is not harmful. Every hacker intrusion will actually leave some traces of software, emails, Trojans, etc. It doesn’t matter, as long as you remember to clean up the log traces when you leave, then there will be no problem, and others will not be able to trace it. arrive.

Exit control.

Zhang Ye disconnected the Internet for safety reasons, then re-watched the whole process he just recorded, and intercepted the most critical video

Still want to talk to me and my old classmates?

Li Tao, you're done! Even if your own father comes, he can't save you ()

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like