Chapter Ninety-Six: The Code of Hacking

"In real life, I may be a weak person who is helpless, or a lowly person who is oppressed by others, but I am a god in the Internet!"

In an instant, the surrounding high-rise buildings shattered like glass, turning into countless data streams around the surroundings, constructing a new illusory space.

In the unreal space, a man in a black hat sits in front of rows of huge computer screens.

Hacker!

Cheng Yiping's breathing suddenly became short, hackers! In reality, it is also a very mysterious existence.

They have great hacking skills but hide their identities, which gives people a very magical and mysterious feeling.

Since he showed his hand a little in the illusory space just now, Cheng Yiping felt the technological ability of hackers.

It's terrifying.

In the modern era of scientific and technological development, mobile phones, computers and other communication electronic devices are very secure, and in the hands of hackers, they can easily be invaded and the bound money, accounts, and information can be completely deleted.

It's no wonder that in reality, people are both fearful and curious about the existence of hackers, and have mixed reputations.

"The road of the seeker is bizarre and difficult, and learning hacking techniques to help the seeker get through the difficulties on the road of finding the object is smooth sailing. ”

A text appeared in the void composed of countless data streams, and the man in the hood stood up and said lightly while sitting in front of countless electronic screens at the back end.

"Seeker, welcome to Conscious Fear I'm a hacking instructor, do you learn hacking techniques?"

Does this need to be asked? Learning, of course.

"Learn!"

Just Cheng Yiping excitedly said two words,The next thing should be a theoretical teaching that is common in space,After all, Cheng Yiping has a name for self-knowledge, not to mention hackers' technology,He also knows nothing about ordinary computer maintenance,The next step must be a long theoretical knowledge study。

The hacker instructor slowly walked in front of Cheng Yiping and said

"Before you learn hacking, you first need to know the hacking rules. ”

Hacker Code, what the hell is this?

"A hacker refers to a person who is proficient in computer technology and is good at discovering vulnerabilities and proposing improvement measures from the Internet, and refers to a person who illegally invades other people's computer systems through the Internet to view, alter, or steal confidential data or interfere with computer programs. 【English Hacker】"

"Hmm. With great power comes great responsibility! Hackers have the technology to be proficient in electronic computers, therefore. It is also necessary to view it by illegally hacking into another person's computer system. Discipline yourself and follow the hacking code. ”

"The interests of the country and the nation are above all else, and we must learn to be a man before learning technology. Don't talk nonsense, make good use of all the learning tools around you, enrich yourself, be a low-key person and do things in a high-profile manner, be grateful for everything that happens around you, learn from the excellent people around you, respect others and don't laugh at others' dreams. As long as it's worth doing, do it, no reason. Instead of looking up to others, it is better to spread your wings and fly high. Hackers belong to the team and belong to the national elite, and we will dispatch anyone who harms the dignity of national interests."

"1. Do not maliciously destroy any system, maliciously occupy network channels, optical cables, power communication satellites, and do so, which will only bring you trouble. Maliciously destroying someone else's software will result in legal liability, and if you are only using the computer, it is only illegal use. Note: Never destroy someone else's files or data. ”

"2. Do not modify any system files, if you modify it in order to access the system, please restore it when you have achieved your purpose. ”

"3. Don't tell your untrusted friends about the site you want to hack from. ”

"4. Don't talk about anything about your hack on bbs/forums. ”

"5. Don't use your real name when posting. ”

"6. During the period, do not leave your computer at will. ”

β€œ7……”

β€œ8……”

β€œ9……”

β€œ22……”

With great power comes great responsibility. If there is no code, no self-compliance standards, and no bottom line, the damage will be absolutely inevitable.

Protecting and hiding oneself while maximizing the use of hacking technology to make the world a better place is the essence of hacking.

In an instant, it seems to have entered another world, hidden in the darkness, strategizing, and winning thousands of miles away, as long as there is a computer and a network cable, he can set off a monstrous wave.

That's hacking.

"Next, test the finder hacking technique. ”

After I don't know how much time has passed, the hacker rules seem to be soul shackles reflected in Cheng Yiping's mind, so that he can't forget it, and then the hacker instructor finally began to teach.

So Cheng Yiping was hit by his self-esteem again.

"Basic Hacking Knowledge – Not Qualified!"

"Basic Programming, Computer Programming – Fail!"

"Basic theoretical knowledge - unqualified!"

"Basic Computer Awareness - Unqualified!"

"Not qualified. ”

"Not qualified. ”

"Not qualified. ”

A continuous unqualified will be a flat self-esteem blow to the body, although he knows that he really doesn't know anything about black, but he still knows a little about computers.

But I didn't expect that these knowledge points that he thought he knew a little bit about were not worth mentioning in the eyes of hackers.

He admits that he is a novice hacker.

"Seekers are not qualified for hacking computer knowledge, starting with theoretical learning. ”

The hacker instructor made a final decision, and then the space composed of countless data streams around it was transformed into a huge classroom again, surrounded by countless screens, and the most basic computer knowledge was displayed on the screen at one point, from simple to difficult!

Chen Yiping never thought that learning hacking technology also requires such an understanding of computers, basically it can be said that from the first generation of computers to the latest computer development history, he quickly memorized clearly, knew various technological breakthroughs, and for hackers, the most important programming ability.

A hacker who can't program is not a good hacker!

Time is passing little by little, Cheng Yiping doesn't know how long he has been learning, fortunately in the consciousness space, no time, no fatigue and no discouragement, Cheng Yiping in this full buff state can know and continue to learn, and learn all the hacking techniques that others need years and decades to learn in the consciousness space.

Fortunately, there is no passage of time in the consciousness space, otherwise, it is estimated that a few years of learning may only be enough to become an ordinary third-rate hacker, but if you want to reach the point of being a hacker instructor, it is estimated that you don't have decades of skills, and it is not possible.

In the space of consciousness, the standard for learning and completing the search for help is to reach the top.

Looking for something to produce, it must be a high-quality product!

If Cheng Yiping can't meet the standards that hacker instructors want to achieve, he can only continue to learn in the consciousness space until he reaches it.

"The Finder Hacking Technology Theory Training is qualified, and then enter the actual teaching!"