Chapter 279 [Hacker Zhang Ye! 】

Bedchamber.

Seven o'clock in the evening, it's still early.

Zhang Ye pulled the curtain, put the computer on the table, and after trying the network and mouse, he moved his arm and prepared to act. First of all, although he has eaten two types of computer skill experience books, but he has not used them, and he doesn't know if he can do it, and he doesn't know if the experience books he ate are enough to use skills, or how much strength he can use, this kind of skill book is not enough, how much you eat seems to increase your experience, the more ability, the less skill books you eat, then it will definitely only be a scratch. The network technology is a lottery to eleven books, which is said to be a lot, but Zhang Ye still has to have a number in order to be safe.

On the Internet, Zhang Ye first found a foreign website, and then based on his computer experience in that world and the network technology skills book in his head, he quickly operated it. I found a component for the browser, and the Firefox browser application in Zhang Ye's world is called Go2-proxy, but the name is different here, the browser is different, but the meaning is actually the same. Add components, apply operations - it took about two minutes for Zhang Ye to click on the foreign website, which is actually the simplest agent.

Hot pictures jumped out one after another!

The seductive videos of foreigner beauties come into view!

Zhang Ye looked at this excellent foreign website opened with his excellent technology, and couldn't help but secretly exclaim, "Artifact", although it is not difficult to operate, Zhang Ye knows that he didn't have this technology before!

The warm-up is over!

His faith was boosted!

He began to browse some computer professional websites, studying the world's computer development, technology and software, etc., and spent a full night, until the lights in the buildings outside the community were almost extinguished at twelve o'clock at night, Zhang Ye rubbed his eyes and exhaled, he found that the computer system and hardware and software in this world are not fundamentally different from his side, the principle is the same, the difference is only in the name, such as those programming languages, this world also has, Even the typing method is the same. For example, those operating systems that are not called Microsoft but are similar to Microsoft are also present in this world, and even the form of commands is the same. After comparing for a long time, Zhang Ye preliminarily concluded that the systems and hardware in this world are slightly lower than the technical level of his world, which is several years behind, but some technologies such as server firewall antivirus software are slightly higher than Zhang Ye's earth, so the "national hackers" in his world are not so obvious here, because the security technology in this world is very high, and downloading a firewall at will can basically stop 99% of non-professionals, and even professional hackers may have to fall behind. Few people are stupid enough not to install protection software and anti-virus software, so there is no "hacking for all".

This creates a situation. There are very few hackers in this world, and they are not as rampant as Zhang Ye's side, but on the other hand, all hackers who are a little famous are quite skilled in technology, and those hackers at the top of the pyramid used to be able to call for wind and rain in the online world.

That's the difference between the two worlds.

The origin of the system hardware code programming is the same, which is a good thing, so that Zhang Ye can use his experience on the earth, even if it is a little different, Zhang Ye has also eaten network technology and programming skill books, and the experience that these skill books bring to Zhang Ye is not only the technology of his world, but also the technology application of this world, at this point, Zhang Ye does not need to worry. But the piece of network security really gave him a headache, he didn't have the addiction of hackers, and he just let a copycat firewall stop it, right?

That's got to do it too!

Li Tao can't run!

Zhang Ye's determination had already been made, and he no longer had any hesitation, he went out to the outhouse to go to the bathroom, and saw that Dong Shanshan's door was dark, obviously asleep, so he came back lightly!

Let's go!

Try your hand first!

The hacker software in this world is also open to download, but most of the software does not provide source code, and it is not open in the real sense, where is it like Zhang Ye's earth, many hackers on his side pay attention to open source, thinking that this is the rules and glory, and the concept of the two worlds is also slightly different.

Zhang Ye began to download small software - this is a hacker's knife, it is difficult for a clever woman to cook without rice, let alone hacking into the computer without these, and even the IP address of others cannot be found.

Small command plug-ins.

Remotely controlled Trojans.

Trace cleanup software.

Wait, wait, Zhang Ye went down again.

Then he began to conduct a simple test on the software and Trojans in this world, and the effect was the same as he expected, which was some ordinary hacking software, you want to say that it didn't work, right? No, the programs are all normal and effective programs, but you have to say that they work, right? This kind of hacking software that can be downloaded from the Internet is not very effective, and it may not be able to pass the firewall, especially if the world's security technology is so good, the probability of being intercepted as malicious program code is too great. Most of the real palace-level hacking software is the original work of the hackers themselves, not to mention sharing it with all netizens, and it may not be shared with other hacker friends, which is a personal secret.

Another point is why there is such a big gap between ordinary hacking software and palace-level hacking software, which is also related to the quality of the system vulnerabilities in the hands of the hacker, the ordinary level of hacking software has long been thoroughly studied, whether it is a system developer or a network security company, from which vulnerability they will invade the system, the updated patch is estimated to be noted, unless the pirated system is not updated, otherwise the genuine operating system updates the patch package normally, this vulnerability is sealed, and the utility of the hacker software is lost. I can't say that it doesn't have any effect, but it's definitely much less aggressive. But the palace-level hacking software is different, its intrusion method is generally only the software maker himself knows the operating system vulnerability, except for him, no one finds it, no one knows, the system developer wants to patch can't play, they can't find and don't know the other party's intrusion method, this kind of secrecy is the reason why the palace-level hacking software has such lethality, basically invincible, no one can stop it!

However, Zhang Ye read a post, which said that palace-level hacker software has only appeared more than ten times in this world, of course, these more than ten times have been discovered and patched, and there is no danger anymore. Although there are certainly many of them that have not been discovered, it can also be seen that the precious process of this kind of hacking software is equivalent to the weapon of a martial arts master, palace-level software or Trojan horse - that is a divine weapon, too precious, and too rare. Because it is already difficult to master a system vulnerability that even the system developer does not know, this world is much more reliable than Zhang Ye's network security company on the earth, well, the vulnerability is found, and it is even more difficult to make a seamless intrusion software or related Trojan program according to the nature of the vulnerability.

So this kind of software is probably a legend, Zhang Ye didn't think much about it, what he had to do now was to hack into the network of radio and television and find Li Tao's computer.