Chapter 14: Unconventional Path
For the first reward of this book, an extra chapter is added! Professor Vincent was shocked by Troy's words! Less than half an hour to crack this program? How did he do it?
After a while, Professor Vincent spoke up: "Troy, can you tell us about your solution method?"
Troy nodded and said, "Of course, the working principle of this virus is related to the system's own calculation, so I think the solution is to modify the system program itself, convert the 'delete' instruction into other calculation methods. Only in this way can we delete this virus. This method is a bit cumbersome, but it's the most suitable and safest solution I can think of."
Professor Vincent nodded in agreement, just as Troy said, this method was a bit cumbersome and clumsy, but it was indeed the safest way. However, that mysterious person obviously didn't use this method, he developed another specialized tool specifically for this virus!
Professor Vincent thought of this and said to Troy: "Your opponent didn't use this method. I think we can study his approach."
Troy had been wanting to do this for a long time, and as soon as he heard the words, he nodded immediately, then logged onto The New York Times website. The virus-killing tool embedded by Feng Xiaotian was still there. Troy didn't have to exert much effort to extract the tool. After just a few minutes, Troy suddenly slapped the table and exclaimed: "Oh my god! It's really too beautiful!"
Troy's reaction was a bit too big, the security guards standing not far away immediately came over, worried that Troy would make some kind of out-of-bounds move on Professor Vincent. Professor Vincent waved his hand to stop the guards and then asked: "Troy, what method did you use?"
Just look at Troy's expression and you can tell that this virus killer is absolutely awesome, otherwise why would Troy be so excited?
Troy sighed again, then explained to Professor Vincent: "This guy is really a genius! How did I not think of this method?! - Professor, you won't believe how simple it is to crack this virus! Just put the virus in a new folder and delete the folder! My god! This is the most direct, simplest and most effective way I've ever seen! He's a real genius!"
Professor Vincent heard Troy's explanation and immediately understood that this method was indeed the most effective and simplest! Although the virus itself would be activated after receiving the deletion instruction, if it bypassed the virus itself, things became much simpler!
Troy was excited, Professor Vincent was shocked, and both of their minds were not calm. After a while, Troy shouted again: "My god! This... this person is too awesome! This specialized killing tool actually has an active search function! It can search for targets similar to itself and actively run programs to delete them! I... I... I think... maybe he's the most awesome programmer in the world!"
Professor Vincent remained silent for a long time after hearing this, and then said to Troy: "Troy, are you willing to join the National Network Security Center?"
Professor Vincent made this request for a reason, he wanted to find the mysterious figure, such a formidable person, if not controlled by the country, once he did something bad, the consequences would be extremely severe, so Professor Vincent wanted to buy Troy and then through Troy's line, grasp more information about the man.
Troy was taken aback by Professor Vincent's words and immediately spoke up: "This...can I really join?"
Troy had thought that after being caught, he would at least face several years of imprisonment, but unexpectedly, Professor Vincent would recruit him. If he really joined the national department, his past misdeeds would not be pursued, which was naturally the best outcome.
Professor Vincent smiled slightly and said, "Of course you can. I can help you resolve this matter as long as the relevant procedures are completed properly. You will be able to regain your freedom, and your work and reputation will also be preserved. However, I have one requirement - you need to assist us in finding this person from now on. Do you agree?"
Troy looked very happy when he heard that, but then he hesitated and said: "Professor... are you sure we can catch him?"
Professor Vincent smiled and said, "As long as we have enough patience, we can achieve our goal. Even if we can't catch him, it's good to understand more about him. I'm very curious about him. When you launched the flood attack, his data flow was almost negligible, but he still won in the end. You must be very puzzled and curious about this, right?"
Troy nodded and said, "Indeed, I originally thought I had a sure win, but the result was an inexplicable defeat. I'm very puzzled about this point - how did he manage to do that?"
"Ahah, that's why I invited you to join us. We can work together to uncover the mystery surrounding him."
On the first day of the Lunar New Year, at 4 am, Feng Xiaotian got up as usual, washed and dressed, then went out with his snake skin bag. As the saying goes: "Even beggars have three days off during the New Year", meaning that even those who rely on begging for a living will take a few days off during the holidays, but Feng Xiaotian was not a beggar, so he didn't take a break.
If he didn't pick up trash to sell, what would he eat? How would he survive? Feng Xiao Tian wasn't used to resting, for him life was like this, if there's no one to rely on then you have to rely on yourself.
At 6:30 in the morning, Feng Xiao Tian returned home with a big sack of scrap metal on his back. Since Old Li was not working today, he had to bring all the scrap metal he collected back home and wait until the ninth day of the Lunar New Year when Old Li's shop reopens to sell them.
Feng Xiang Tian put the broken things in the backyard and then opened his computer. After last night's battle, he suddenly had an idea in his mind, which was to develop a counterattack program against hacker attacks. This sounds simple, but it's actually very difficult to do.
First, you have to know what methods hackers use to attack, and then you can take targeted measures. Feng Xiaotian is quite familiar with the methods hackers use to attack. Generally speaking, the most common hacking methods can be summarized as follows:
Trojan horse virus implantation, stealing the opponent's operational instructions, thereby controlling the opponent's computer.
(2): Flood attack, also known as data stream attack, by making a large number of meaningless access requests, causing the opponent's computer to crash due to excessive processing volume.
(3) System vulnerability, this is more severe, belongs to the method used by advanced hackers, all systems have vulnerabilities, as long as you know about this vulnerability, you can enter your computer through the vulnerability and gain control over the computer.
(4) Data tapping, the information transmission between networks is carried out in the form of data packets. Some hackers can capture data packets, crack the data in the packet, and then control the computer.
(5) Deception and enticement, some hackers will spread deceptive programs on the Internet, as long as you click on these programs, you may be deceived. Once you allow this program to run on your computer, it basically means that you have fallen into their trap.
The above five methods can be summarized into three categories. The first, fourth and fifth items are basically of the same nature, whether it is a Trojan virus or data monitoring, or deception, its essence is to obtain your computer operation instructions, which is also the most commonly used method by hackers. The second item is more violent, directly destroying your system, although there is not much technical content, but it's hard for people to defend against. The third item belongs to the problem of the system itself, this problem is not easy to solve, unless you can fix all the vulnerabilities in the system.