home

search

Chapter 9 The Legendary Hacker

  Chapter 9 The Legendary Hacker

  Feng Xiang Tian had carefully considered this book "Computer Programming Language and Programming" when he first saw it. This book mainly talks about computer programming, the computer programming languages mentioned in it are completely for programming purposes. A programmer's main job is to program, but programmers also have their own strengths and weaknesses, the more skilled they are, the fewer bugs their programs will have.

  This is something Feng Xiaotian deeply understands, because he spent more than half a month writing a data conversion software. Feng Xiaotian knows that the larger the software, the more content it involves, and naturally there will be more loopholes. To reduce loopholes, the best way is to minimize the size of the program as much as possible. The smaller the program, the less content it contains, so the risk of being exploited by others is naturally reduced.

  This involves the functional issues of the program, being concise and not affecting its functionality is the ultimate goal. With the knowledge Wind Laugh currently possesses, he thinks it's not too difficult to achieve this, at least he has the ability.

  As for the vulnerability of computer operating systems, this is actually closely related to computer programming, because only those who are familiar with computer programming can find system vulnerabilities.

  What is the operating system of a computer? To put it bluntly, it's just a program, a relatively large program. So if you want to find out its own possible vulnerabilities, you must have a very deep understanding of computer programming first.

  The two main ways hackers attack are related to computer programs, which further illustrates the importance of being familiar with computer programs. Feng Xiaotian is already familiar with and has mastered this, but as for what level he is at, it's hard to say because he hasn't compared himself with others yet, and without comparison, it's not easy to make a comment.

  Feng Xiaotian is actually an independent individual outside the scope of the system, where the so-called system refers to a group of computer experts. All his knowledge about computers was self-taught and he had no exchanges with other experts. It's really not easy to achieve what he has achieved now, it's quite precious.

  At this moment, Feng Xiaotian was looking at the news about hackers and thought of many questions. The loss amount recorded on it was as high as $8 million! If converted to RMB according to the current exchange rate, that would be more than 40 million! Such a huge amount of money made Feng Xiaotian, who was poor to the point of being destitute, unable to calm down for a long time. He stared blankly for a while before muttering: "This... so much money, just gone like that?"

  Feng Xiao Tian now had a more intuitive understanding of hackers. In his view, they were a group of madmen. If they weren't madmen, how could they do something that harmed others without benefiting themselves? The hacker hadn't even gotten a single cent out of the $8 million loss. What was he doing this for?

  Feng Xiao Tian naturally couldn't understand this question, having grown up in China and formed a relatively good social value system. In his view, such things were absolutely impermissible because anyone who harmed others' interests for any reason wasn't a good person.

  Feng Xiao Tian was still relatively innocent, he didn't understand the inner world of hackers. Generally, people like this are computer experts, they crack other people's systems, control computers and do things out of personal interest and hobby, not for money, just to verify their own strength, in short, it's showing off.

  Time quickly arrived at midnight, the firecrackers outside began to explode continuously, a new year finally arrived, Feng Xiao Tian also grew one year older, he was already fifteen years old.

  At this moment, it is 12 o'clock in the Eastern United States. On the 32nd floor of the Empire State Building in New York, a young man is sitting in front of his computer, busy typing away at incredible speed. After a while, he finally stopped what he was doing, stretched his back and said with a smile: "Haha! The New York Times website has finally been hacked by me! Hmm... should I do something interesting now?"

  The young man thought for three seconds, then snapped his fingers and said: "It's settled! Just wrote a Trojan program, let's test it with The New York Times!"

  The young man, after finishing his speech, used the obtained management authority to implant this Trojan horse program on the New York Times website. This is a very hidden program, even professional personnel can hardly detect it. Its main working principle is to infect every computer that logs in to the New York Times website and then transmit the opponent's IP address back to the young man's database.

  It will then quietly lurk in the other person's computer, and once the young person sends a remote command through the already known IP address, this Trojan horse virus will automatically activate and crazily replicate itself continuously. As a result, the other person's computer will be filled to capacity due to excessive storage space occupation, until it exceeds the critical value of overflow, at which point the computer will crash.

  Although it sounds simple, it's not easy to do this. It seems that this young man is absolutely a programming master. When he implanted the Trojan virus into the New York Times website, he immediately opened his own database - this database was actually a large computer captured by him. The young man observed the information transmitted by the Trojan virus, and as the information changed line by line, the young man knew: He had finally succeeded!

  The New York Times has many readers, so it's no surprise that a number of computers infected with the Trojan horse virus belong to them, including Feng Xiaotian's.

  He was browsing various news on the New York Times website when he opened a news page, and his computer screen suddenly flashed an abnormal interface for a very short time. Although it was only for a split second, Feng Xiaotian did not ignore it. He had just read a piece of news about hackers, so his vigilance was high. Therefore, Feng Xiaotian immediately stopped browsing the news and turned to check his computer to see if there were any abnormalities.

  According to Feng Xiaotian, there are several reasons for this situation: First, due to unstable voltage, the computer monitor interface flickers; Second, because the computer processes too much information, causing the CPU to produce an excessively high operating speed, resulting in a flickering computer display interface; Third, because of sudden network congestion, the computer suddenly changes its adaptive processing speed, causing the computer display interface to flicker; Fourth, and what Feng Xiaotian is most worried about - other programs have invaded the computer without permission, causing delays in computer processing.

  Originally, the last one was the least likely to happen, because he was connected to the Internet through a jump board. Even if there was a hacker attack on him, he would have to crack this computer used as a jump board first. However, Feng Xiaotian's cautious personality determined that he would not let go of any possibility. Feng Xiaotian did not hesitate and immediately started the program search.

Recommended Popular Novels