Chapter Ninety-Seven: Codename: Tang!
γLewenγ. Alas, for you to read wonderfully.
The Internet can be said to be a huge breakthrough invention in the development of human history. The unclear and intangible, Internet, linked all the countries of the entire water blue star, and at one time even put forward the idea of the water blue village.
At home, with the click of a mouse on a computer and the Internet, you can know what is happening thousands of miles away, you can appreciate the customs of a foreign country, and you can connect lovers who are separated from each other, and time and space cannot be an obstacle.
In the face of the prevalence of the Internet, this is the trend of the times, it is unstoppable, the trend of the times is rolling in, in order to protect their privacy, countries are trying their best to develop the so-called firewall to ensure the security of all kinds of data.
And the hackers who were able to break these firewalls and go back and forth freely in the network, the legendary hackers were undoubtedly god-like.
As long as the system is cracked and the permission is obtained, the various data hidden in the computer by anyone is like opening the lock door, allowing them to browse, watch, download and copy.
Hackers are a group of people who love and hate at the same time.
In a huge space, countless electronic screens display various complex electronic circuit diagrams. A man crossed Erlang's legs, chewed gum in his mouth, and kept crackling on the computer with his hands, what was the matter?
In an instant, a red glow flashed on the computer screen, and various alarms sounded.
"Interesting, is it too late to start the containment now? β
"Stupid, this is my own artemia, as long as you dare to chase it and be able to reproduce yourself, when the blockage comes, you will be clogged to death. β
"Yes, it's really good to chase after me, but is your 100,000 broiler as Lao Tzu fake?"
I don't know if it's because I've been alone for a long time.,The boy cursed while quickly hitting all kinds of commands in his hand.,Along with the commands issued by the keyboard.,Operate.γ
Moments later, the red-flashing sirens on the countless screens in front of the man cleared and turned a safe green.
"Congratulations to the Finder for completing the hacking skills practice assessment!"
The hacker instructor in a black hat appeared in the void, a faint smile appeared on the corner of his mouth, and then his figure slowly faded.
What the?
Is that done?
This is considered a successful assessment.
Cheng Yiping's lingering learning,Compared with other finding things in the consciousness space of finding objects,Cheng Yiping is really addicted to the hacker's piece.,I didn't feel any boredom at all.,On the contrary, I have a sense of accomplishment and pride after successfully invading the other party.γ
In a flash, this is a practical exam for hacking techniques.
The next moment, Cheng Ping returned to the director's room of Guangming Hospital again, and at this moment, a trace of confusion shot out of his eyes, and he didn't seem to have reacted from the consciousness space.
After a while, Cheng Yiping's confused eyes regained their clarity, and their eyes fell sharply on the computer on the dean's desk, bursting with brilliant brilliance, just like a practitioner meeting his beloved toy, with an extremely familiar feeling.
"Hey, what's the boot password, what's the point?"
Cheng Yiping smiled and just touched the computer keyboard with both hands, and then groped in his arms for a long time, found a pair of gloves, and put them on.
It can be said that hackers who expose their identities are no different from pigs and sheep in captivity, and they have lost their threatening power.
Cheng Yiping, who was wearing gloves, was quickly typing on the keyboard, and a series of instructions that were unfamiliar but now familiar and abnormal came out, and the computer in front of him seemed to be a group of wild horses that were being tamed, obediently tamed under the operation of Cheng Yiping.
"Password open!"
With the correct password, after logging in successfully, he directly and violently unlocked the password lock on the dean's computer, and then entered the computer.
Cheng Yiping tapped on the keyboard with both hands quickly, and the information on the computer screen of the dean's office jumped out one by one and deleted it, and soon Cheng Yiping found the hidden file, and was surprised when he clicked on it.
"This is it!"
In the hidden folder of the computer in the dean's office, various organ transplants and organ donation events are recorded, and even how the donor is forced to donate organs is clearly written, how much money is spent on the purchase, and the donor is forced to donate organs by some means.
Even those patients who buy organs for transplantation are useful, and many of them are still in high power, and if this document is circulated, it will definitely cause a monstrous wave in the United States.
No wonder the news released by Wang Xiaohuan and others on the Internet was suppressed and not leaked at all, it turned out that there was such a huge force behind it.
For ordinary people, this kind of organ trafficking and smuggling is simply a madness, after all, whoever has to hand over the organs if they are favored by the other party, what is the difference between slaves and pigs and dogs?
But for the powerful and powerful, this is their bright hospital, because it can prolong their lives in exchange for healthy organs.
The lives of ordinary people, human rights are their business?
Cheng Yiping, took a few deep breaths, and forcibly suppressed the angry anger in his heart, no one thought that there was such a dark deed that lost his conscience hidden in the free and democratic country!
"Now that I've found the evidence, it's up to me next!"
Cheng Yiping's eyes flashed, and his hands were quickly tapping on the keyboard, fortunately, the hospital has a network connection, although the principal's computer is not connected to the Internet, but how can this trivial matter be difficult Yiping, after a series of black means, the computer in the dean's office is connected to the network.
"Wait, I have to do something"
Just as Cheng Yiping was about to post these on the Internet, he suddenly shook, he must not underestimate the rights and interests of those in power, although the Internet is free, but the ghost knows if there are Internet police and other messy things.
Once you put it on and someone deletes it, if you don't pay enough attention, it will definitely be a stone in the sea.
Thinking of this, Cheng Yiping immediately typed it on the computer to make a simple virus Trojan horse and added it to the video data.
This Trojan horse is very simple, that is, if someone wants to delete this video, the Trojan virus will attack, will make unlimited copies, and send its content to nearby computers, mobile phones and electronic devices.
To put it bluntly, this is a simple Trojan that replicates and spreads.
"Hey, the show begins. β
Each hacker has his own code name, and every piece of hackers does. Hide and leave your own code name, which can be regarded as a signature.
After thinking for a while, Cheng Yiping hid and made his own hidden code name in this Trojan horse, a traditional Chinese character. Tang Dynasty!
That's right, Cheng Yiping named his hacker in the network with the code name Tang.
Then click on the video of the organ transplant with the simple Trojan horse and post it on the Internet.
Cheng Yiping didn't expect what kind of turmoil his information would cause after it was uploaded to the Internet.
Cheng Yiping, who had done all this, breathed a sigh of relief, and was just about to leave, when he suddenly thought of something, he immediately checked it with the computer, and sure enough, there was a hidden monitor probe in the dean's room.