Because people's desires are endless, restraining oneself is not an easy task. If a person is not infected by bad habits, happiness is near.
The worst in life is to talk about others' lives; the worst in life is to hear one's mistakes. Give one point back and ask for one point cheaper. One more point of enjoyment, one point less fortune.
There is nothing to conceal, this is a big deal.
To be jealous of others and hate others is tantamount to surrendering life to others. If you don't do frowning in your life, there should be no gnashing people in the world.
The wise men plan according to the times, while the fools move against the times. The mind is small, the more troublesome, the mind is broad, and the wisdom is abundant.
Reduce your desires to the lowest point.
But Miao Miao does not hide the status quo. Since you want to be a good hacker, you have to do a sensational thing.
In fact, Miaomiao knows that she can't do it at all. If you really want to be a good hacker, you have to constantly enrich your brain. Only in this way can you gain a foothold in the online world.
Although Miao Miao understands some hacking skills, she still doesn't know how to do it. Now she is watching the hacking skills in the Hacker League in Internet cafes every day.
Only since the last time I did it in the Internet cafe, the network management of the Internet cafe is now tight. It is really difficult to try to download the Trojan horse, but no one manages the hacker technology when you surf the Internet.
Miao Miao saw a hacking technique in the Hacker League, but it wouldn't be the case if you really use it.
If you want to use this technique, you can download the software, but if you use it, your privacy will be exposed to the creator of the software after you steal the privacy of others.
To put it bluntly, you are catching other people’s loopholes while also giving your own loopholes to others, and what you get may not be the first-hand material.
If you don't want to be controlled by others, you have to modify the downloaded hacker software yourself, especially the code source.
If you want to change these code sources, you must have excellent software technology, not a simple modification.
At the same time, after the modification, there is still the function of maintaining the original software. According to the current level of Miao Miao, it is impossible to achieve it. The only thing to do is to "learn from it, maybe you can find a good solution, that is to say, that other people's things Serve yourself.
But it's hard to talk about it, but Miao Miao has her own set of methods that is to download many old hacker software at a time, and then mix their codes together.
In this way, the same code is cut down and none of them are retained, so that this trojan horse that has been downloaded in an insignificant way has changed its appearance.
Become a weird guy who can be said to be a Trojan horse, not a Trojan horse, and a virus not a virus, which is very peculiar.
But Miaomiao is still not sure whether he made this home useful or not. She downloads some hacker software every day, mixes them with her own weird guy, and assembles them with some experience she knows. .
Miao Miao secretly scared his assembly goods onto the computer in the Internet cafe when the network manager was useless.
"Start, wait"~
Miaomiao's heart was tense for a while, she didn't know what would happen to her own stuff, and she didn't know what the result would be, she just waited.
Suddenly, Miaomiao suddenly burst out with a light, like a flash of lightning in the dark night, and like a walker in the desert suddenly discovered an oasis, it was so excited, and the heartbeat accelerated~
Miao Miao skillfully tapped the keyboard, and a reduced DOS interface appeared on the computer screen. On the interface, every DOS command is typed up. This is to collect information before the invasion. As a hacker, it is very important to collect the information of the target host to be invaded. Only by knowing yourself and the enemy can you win every battle.
The message sent was quickly responded. Rows of white characters of the other party’s host information were displayed on the DOS window. According to the returned message, Miao Miao can determine the type and version number of the operating system used by the other party. After mastering these, Miao Miao can according to the version. To find the system vulnerabilities that have not been announced in the current version as soon as possible.
"Report!"
"Report!"
The UAR_I router returns a message that someone is scanning the host address of our base. "
In an unknown area, it can be said that a soldier in a dungeon wearing a colonel's uniform was reporting to his superiors in a panic.
Immediately find out the other party’s real address and monitor it. If the other party has intrusion and sabotage, we will stop it immediately. Don’t ask them to discover where we are
There is a computer in a corner of the dungeon, said the officer behind the computer.
"Yes!"
The soldier retreated under his command.
"Military IPs are generally dedicated internally. What does the scanning person or organization want to do? How does he know this IP address?"
The officer sitting behind the computer guessed suspiciously.
Now Miao Miao is based on the returned port information.
It can be judged that the other party has opened a special firewall in addition to the firewall that comes with the system. I really haven't seen this firewall before, and I'm puzzled.
At this moment, the entire Internet cafe exploded, and some people were yelling, what this is so interesting, and some immediately understood and shouted: This is me, there are no masters here, he is invading, he is calling us Everyone will play this invasion with him. This is a military network, which is really great~
The webmaster of the Internet cafe was so frustrated that he didn't even notice that it was just like this. This hacker is really too harmful~
Information is accumulating more and more. From the early port to the later open service, these pieces of information are not only abundant, but also chaotic, but as a hacker with all-round technology.
Miao Miao now only knows that he must guess the information one by one in order to achieve the most secure intrusion effect.
After spending half an hour, Miaomiao finally found a relatively stable way to invade. As long as the opponent's router's autonomous defense has a slight loophole, she and everyone in the Internet cafe can take advantage of the opportunity to enter.
First of all, open the folder hidden in the computer and take out a router breakthrough software made by yourself. This is a fool-style cracking software. Just fill in some non-default data on the software.
But Miaomiao modified it and now I don’t know if it will work? And all the netizens in the Internet cafes are now conquering this sudden information. They are no longer chatting and playing games. This is more enjoyable than playing games and chatting. Everyone is now going to see who can be the first to invade. There is really a sense of pride. Even the network administrators have joined the ranks of this intrusion. It is really a mobilization of the whole people.
In fact, all the Internet cafes in the city now, of course, including private computers and companies, suddenly can’t display this program on the display screen. No matter what you are doing or even working, you don’t have to do it anymore. You can only join the invasion Ranks.
Some people are still thinking that it may be that the Ministry of National Defense or the Network Supervision Bureau has discovered a cyber threat from a hostile country, and all the Internet users are asked to destroy the hostile cutting-edge network.
The base of this dungeon is really unspeakable now, and the number of invasions written in such a sudden increase can not be counted.
"Report~"
"Report!"
Our server was attacked, a very violent attack. According to the message returned by the UAR_I router, it can be judged that the other party should be an extraordinary hacker organization.
They dispatched tens of thousands of computers at once, and they are still increasing. At the same time, we have also detected that they are increasing in different cities and different areas, and we can't stand it anymore.
It seems that the awareness of prevention in this country is really too strong, and there are really too many network masters. I just had this idea, but it was discovered by others before it was implemented.
It seems that we have to give up this base, but is there no chance for us to resist at all? The officer asked rhetorically.
"Report sir!"
"It's okay for the time being. Although the attacks are frequent, they are still under the control of the firewall. As far as I can see, this is a premeditated attack.
The other party is not only familiar with the vulnerabilities of the current operating system, but the attacks launched are also continuous. This is the first time I have encountered this multi-faceted attack method.
In the past, no matter what kind of opponent they met, they would always find a breakthrough point and then chase after it.
But this time is different. They have adopted a multi-threaded and multi-angle attack method, which makes it impossible to defend against people. If there is no UAR_I router, I don't know how long the research institute can survive. "
, Now the first wave of the opponent's attack is so violent, this can't help but make everyone nervous.
On the computer screen, various data changes rapidly. The staff dare not be sloppy. They are very skilled at tapping the keyboard with both hands, and the various data obtained are analyzed through the computer.
It seems that I haven't left here anymore. If our secrets are told to take them away, the consequences will be disastrous, leaving the green mountains without fear of firewood.
The officer decisively decided that all base personnel in the dungeon began to evacuate.