Section 265 Minor obstacles 2
“…… What?" Philip finally understood. "Go to the school intranet and find the person who set up the rumors?What are you kidding, where do I have so much spare time now!" Of course, the last sentence was thought about in my heart, and I didn't say it.
It is important to note that his name is Philip, but he is actually of Chinese descent. And as a professional hacker, he really makes money in this industry, and can even support the person who organizes a team of professional hackers, he is proficient in many languages, including Chinese. Therefore, there is no problem for the two sides to communicate in Chinese.
"It's not just that......" The other party's voice was unmoved. "I need to go further. I need you to teach the perpetrator a lesson. ”
"Cut...... Hacking into his computer, and in turn, making rumors about him? I warn you, it's more like a child's vindictive, worthless, and stupid. It's really successful, but it probably won't affect anything. Philip scoffed. From the voice of the phone, you can tell that the other party is still a young man. It's not uncommon for young people to have their brains rushed. The most important thing is that it is not worth much money to do such a thing, and there is no reputation to be made.
Hacking into the database of a large company and stealing confidential technology, then he is very interested, and it can even be said that firstly, the remuneration is expensive, and secondly, once it succeeds, it is worth bragging about. But hack into the computer of a little guy who likes to spread rumors and find evidence that he slanders others...... No matter how perfect it is, it's not a glorious resume.
"Yes, not a difficult thing. Their intranet facilities are old and their firewalls are not strong. Actually, I can do it myself, but I have urgent matters to deal with right now. It is not difficult to hack into the school intranet, but to find that person, you need enough time to monitor, find one account after another, and eliminate them one by one to finally find the rumor-monger. It takes a lot of time, and I don't have time right now. ”
"Okay, okay, little kid's thing...... I'll just find him and get him in some trouble, right?"
"No, I have a better way here. The voice said. "There's an important event at their school......"
"It's cruel enough to poke out those dirty things and let those foreign experts know, and then let him be expelled from school!" Philip pouted after hearing what the other party said. This is indeed more than the level of a child's vindictiveness. But it's just exceeding, and it doesn't interest him. "Well, how much are you willing to pay for this. ”
"You make an offer. ”
"One hundred thousand...... Dollars?"
"Well said. ”
"The money will be sent to me first. Philip expertly reported a series of bank account numbers. Of course, the specific work will have to wait until he finishes writing the program. This programming time ...... That's two or three months. In the hacker community, the $100,000 commission is the sky that some people look up to, but the floor under the feet of others. For Philip, this is a good number, just in time to soothe the mood of the computer expert who is disturbed.
He waited for a few minutes and immediately heard the tone of his phone. It was a text message from the bank, proving that $100,000 had been credited. It's really ...... Philip couldn't help but whistle. Yes!
So, just as he had just thought, he hung up the phone and went back to his programming. As he focused on thinking about how a stack would be composed, the phone rang again. He had to interrupt his train of thought and pick up his phone instead. Well, although it is annoying, but how to say that it is also a hundred thousand dollars. As the saying goes, a goose that lays golden eggs is fine no matter how noisy it is, and the owner is absolutely reluctant to kill it.
"I'm going to deal with it right away. The other party reminded. "Immediately!" the voice seemed to change slightly, but it was impossible to tell what had changed.
"I know, I'll ...... as soon as I'm done with what I'm doing"
"I've already paid. The other party interrupted Philip. "And as I said, it's not a difficult job, it's not that I can't do it myself, it's just that I don't have time for the time being. ”
"Oh, then you should be more considerate of me, it's not that I don't want to do it, I really don't have time. Philip replied in a lighthearted tone. "After I finish what I have at hand, I'll do it right away. ”
"You probably don't understand......" There was a strange smell in the other party's voice. "Do you know XXX@#$%?"
It's a very awkward name, or rather, not a name, but an ID, an account number. Others may not know what this means, but Philip understands it right away. Isn't this the one in the hacker chat room? In the chat room, although everyone doesn't know their real names, they know their IDs.
"You're XXX@#$%?" But this ID didn't shake Philip, in fact, although the two sides were okay in the chat room, he was actually very upset with each other. Because the guy stole the limelight in the chat room several times. Although the technique is good, and many of the insights and proposals are refreshing, Philip does not like him at all. And recently, a colleague in the chat room complained that someone hacked his computer...... Stealing everything and overwriting it with junk data. The hapless guy suspected that it must have been done by someone in the same chat room, and he immediately suspected the ID. "Oh, it was you, I didn't expect it...... But what matters are really important right now. ”
"Do you think that the money has arrived, and I can't help you?"
"Haha...... Haha......" Philip in front of the computer laughed, it was really the funniest joke he'd heard in recent times. "Of course. It took a long time for him to stop laughing. Even if he is a hacker, and he is the best hacker, he does not believe that the other party has the ability to hack into the banking system and get the money in his account back. "What can you do now? We're in two countries! Or do you want to hack into my computer?" he whistled again. "That's fine, let's take a gamble, if you can hack into my computer, then everything is up to you......"
"I'm just sorry that you've just programmed half of the software. The other party replied coldly. "A good idea. ”
How did that guy know? Philip thought to himself! Did I bring it up in the chat room? Or did this guy already ......
He subconsciously clamped the phone around his neck and switched to using both hands to control the keyboard and mouse.
As a good hacker, it is natural to be wary of your computer. He has a bunch of monitoring software on his computer, monitoring everything that goes wrong. Even if you can't stop someone from invading, at least you can know if someone is doing it.
Several monitoring software all clearly stated that there was no external data flow at all during this period of time. After all, as mentioned earlier, he is programming, and this thing does not need network support. Maybe you'll need it when you're done debugging the software, but not now. So it's impossible for the other party to know that he's programming...... Maybe he missed a bit when he was talking just now, or maybe he inadvertently mentioned it in the chat room before? After all, it's a chat room, and I don't know what to say.
"Okay, let's try it. Have the ability to hack me......"
Before his voice could speak, the programming software on the computer screen was running directly. Someone typed "You think I can't do it?" directly into the text box.
Philip's jaw almost fell off the keyboard. He quickly called up a few monitor windows, and sure enough, there was a strange stream of data transmitting. Just a matter of what happened.
Normally this is impossible, but the truth is in front of him - before he is completely aware of it, the other party has already hacked in and planted a Trojan horse. This is obviously not just planted, but has been prepared for a long time. I can't say exactly how long ago, but the guy just sneaked in without knowing it, planted some kind of Trojan horse that was apparently specially made, and waited to see the show.
Although Philip is a hacker, hacking someone and being hacked by someone else are two different things. Hacking into other people's computers and doing things recklessly, adding, deleting and modifying them at will, that's a very cool thing. But being hacked in unconsciously is very unpleasant.
Damn! He immediately mobilized his defenses to interrupt the flow of data. It's a pity that on the one hand, it has been planned for a long time, and on the other side, it is rushed to fight. In this case, there is no way to help the other party, and the defense system clearly shows that the software firewall was quickly dismantled, and control was almost seized. Fortunately, his firewall was modified by himself, and it more or less lasted a little time at the critical moment, allowing him to react in time and intercept the other party's invasion with manual control.
"Well, so I've won, right?" the phone rang in that particularly frustrating voice.
"You ......" Philip wanted to say that you were unprepared, plotted against me in advance, planted a Trojan horse for me, which was not a win at all, but when the words came out, he was forced to press in his throat.
Because a thought involuntarily appeared in his heart, which made his anger disappear without a trace, and a sneer appeared at the corner of his mouth.
"What is this? the ability to say 'I won't win' on my screen. If you can do it," he said, keeping his hands on for half a second. "I'll throw in the towel, give you back $100,000, and help you do it with a perfect finish. Not only that, but I also recognize you as a teacher! Of course, if you lose, I'll laugh at your $100,000! I'll talk about your business until I'm done with the work at hand. ”
As he spoke, he had reached out and unplugged the network cable.
This means that his computer has been completely disconnected from the network, physically cut off, and has no data communication with the outside world. Depending on how strong the other party's hacker is and how cunning his methods are, in the case of such a physical disconnection, it is all blind.
Then he accepted the $100,000 with peace of mind. Belch...... I have to say, this is a lot of money.
He laughed with his phone, but before the laughter was over, he saw that his computer was operating automatically, deleting a small part of the software he had programmed, and then unfolding a line of words on the screen.
"I won, Philip. ”
Philip looked at the screen, then at the cable he had pulled out in his hand, and suddenly let out a scream. He was so panicked that he didn't even make the simple action of getting up from his chair, and he fell to the ground with his chair.