home

search

Chapter 10: The First Encounter with Hackers

  Chapter 10: The First Encounter with Hackers

  After a few seconds, Feng Xiaotian noticed something was off, the familiar computer operating system had an extra 1.5 GB! Who would remember the size of their computer's operating system so clearly? Only someone like Feng Xiaotian, a freak, would do such a thing.

  Since the system had an extra 1.5 trillion spaces, Feng Xiaotian would not ignore it, he immediately began to find out what this extra part was. Feng Xiaotian opened the computer operating system and quickly browsed through the information on it. In less than two minutes, he finally found the extra content.

  This is a very inconspicuous program, in order to hide itself, it disguised itself as the system's graphics processing program. If Feng Xiaotian wasn't so familiar with the entire system, it wouldn't be easy to find this guy.

  Feng Xiao Tian didn't hesitate at all, and immediately started to clear it out. However, when he clicked "delete", this program suddenly went crazy and began to rapidly replicate itself!

  So why is that? The reason is simple, because the activation command of this Trojan virus is "delete"! This young man who wrote the Trojan virus was indeed a mastermind, he understood people's psychology very well and knew that when people find an extra program on their computer, the first thing they think of is to get rid of it. How can you get rid of it? The simplest and most direct way is to delete it, so the young man would use "delete" as the activation command for this Trojan virus. No matter who it was, as long as they clicked "delete", the virus would erupt instantly.

  Feng Xiao Tian stared at the program as it crazily replicated itself, the computer's limited storage space being eroded by its constantly growing size. He froze for a few seconds before springing into action!

  Feng Xiao Tian's method was simple: he re-established an empty system folder, moved the virus into it, and then deleted the folder.

  Although Feng Xiaotian had never written a virus program, he knew the main way this virus ran. In his understanding, the self-replication of the virus had only one purpose: to fill up the entire disk space and eventually "suffocate" the computer. Because the virus could not be deleted directly and it was in the core position of the system, there was almost no solution. At that moment, Feng Xiaotian thought of a very simple but effective method - that is, to put the virus into a new folder and delete it without going through its own process.

  It's obvious that this method still works, sometimes the solution to a problem is not as complicated as imagined, but it's easy to overlook. Feng Xiao Tian was able to think of this because he was very calm and his way of thinking was special, so he succeeded.

  As the virus disappeared from his computer, Feng Xiaotian sat in his chair deep in thought. This was the first time he had encountered such a thing. He hadn't expected to run into the legendary hacker so quickly. Although they hadn't directly clashed, this gave Feng Xiaotian a more intuitive sense of the hacker. Some things seemed distant, but might suddenly descend upon you when you least expect it.

  Feng Xiang Tian thought for a while and then took action. He had a very bold idea, to let his computer be infected with the virus again, and then analyze and crack it!

  Feng Xiaotian didn't hesitate, he clicked on the New York Times website again, and his computer screen flickered once more. With ease, Feng Xiaotian opened the system folder and effortlessly found the virus program.

  This program isn't big, only 1.5G. Feng Xiaotian started analyzing the operating principle of this program and in less than ten minutes, he had the result. It turned out that this virus program wasn't complete. If you want to run it, you have to perfect it. How do you perfect it? The answer is very simple - input the activation command.

  What is called an activation command is actually this unfinished part of the program. It's very obvious that the "delete" command is what this program is missing.

  Of course, the "delete" command itself does not have this capability, as it is a function of the system itself. However, one point that cannot be ignored is that the operation of the system itself also requires data processing. To illustrate, when you want to delete a file from your computer, you will right-click to open the dialog box and then left-click on the "delete" command. The computer receives this command, calculates the result internally through computation, and completes the command through the system program.

  That's the magic of computers, where any instruction is pre-established, to execute a certain command, you must choose a matching program from pre-set data, and when you issue the command, the computer will also calculate according to the pre-set method, and get the corresponding result.

  This virus program runs on this principle, it is associated with the "delete" instruction in the computer. Once the data related to the "delete" instruction is run in the computer, it will take it as an activation instruction and then follow up and run.

  As for the operating principle of this virus, Feng Xiaotian has already mastered it. Now what he needs to do is how to crack this virus. I don't know what this problem looks like to others, but in Feng Xiaotian's view, it's very simple. First, he took this segment of the virus as a template and rewrote many programs inside it. Through his rewriting, this segment of the virus became a program that was completely opposite to the original one.

  To put it simply, the original virus had the ability to infect and replicate itself. After Wind Laughing Sky's modification, it has become a specialized killing program for this type of virus. Any program with a similarity rate of over 70% will be found by it on the computer. Once found, it will take action - it will proactively set up a folder, include itself and the target program inside, and after completing all this, it will execute its final instruction - delete the folder.

  Of course, there is a prerequisite here. To complete the task of clearing the virus, it must first infect the computer with the relevant virus. Faced with this problem, Feng Xiaotian hesitated.

  Feng Xiao Tian spent only ten minutes writing this killer tool, but the next thought took him a moment, because he was not sure if he wanted to embed this killer tool into The New York Times website.

  This is a hacker behavior, even if Feng Xiaotian is doing good deeds, intentionally invading websites is essentially not allowed. But if he doesn't do so, this virus will have very serious consequences. How to choose between the two?

Recommended Popular Novels