Chapter Ninety-Eight: Disordered Array (I)
Chapter Ninety-Eight: Disordered Array (I)
Probably checked the system, Zhang Yang didn't find anything wrong, if you do a thorough inspection, you still need to analyze the software, Zhang Yang stood up and walked to the attached box, rummaged through it, found the server's dedicated network cable, and then connected the server to the apartment's network.
Although the senior brother pulled over is a dedicated 10M optical fiber, its external gateway still uses the school gateway, so even if their dormitory is a reading fiber, the public IP is still the school, the difference is that there is no need to use 10M optical fiber in one building like other dormitory buildings.
Connected the network cable, turned on his computer, and copied the analysis software he used. It's different from analyzing other people's computers, because Zhang Yang himself is in the system, so the analysis of the information is also a lot more comprehensive, about 20 minutes, Zhang Yang got the result he wanted.
Looking at the dense analysis results, Zhang Yang's face became a little strange, this analysis software is adapted by Zhang Yang after six years, although in the eyes of most people, the computer technology after six years and the current computer technology seem to be more powerful except for the hardware surname, nothing else has changed, and the XP should be used or XP.
But in fact, many of the core technologies of system software can be described as earth-shattering, after analyzing the entire system, Zhang Yang found that the hard disk array of the entire server is not only 600G, but there are 80G of space that is hidden.
And the entire Linux system can be described as perfect, except for some vulnerabilities that will be found after a few years scanned by the analysis software, all other vulnerabilities have been filled! Even a few vulnerabilities that won't be made public until a year later have been patched!
Master, looking at the results of the analysis software, Zhang Yang is a burst of emotion, don't underestimate these two cabinets, after the entire server array is combined, its computing surname can be even more advanced than the millions of servers that are larger than s, and then Zhang Yang can see that this server is not just a blade server.
Its arithmetic capabilities are quite good, and it is also equipped with billions of high-definition image processing chips and systems. Disk hiding is not a sophisticated technology, many people who have just learned the computer for a long time will use it, but the disk hiding in this server is different, it is not like the blades at the beginning were turned off from the outside, these disks are still running, the difference is that it carries out a technical level of masking.
And unlike any technology that Zhang Yang had ever seen, even a few years later, Zhang Yang had never seen this way, he tried to find this kind of disk space, but Zhang Yang soon discovered a hidden trap. If Zhang Yang cracks it out with brute force, it will completely detonate this trap and destroy the entire hidden disk space, and the data in it will naturally be nothing.
And the whole system is very clean, so clean that there are no other programs except the system itself. After hesitating for a moment, Zhang Yang quickly downloaded a hard drive recovery tool from the Internet, found a disk partition and began to recover these hard disk spaces that were not hidden. Zhang Yang wanted to see if there was anything in it that could indicate where the server came from.
The recovery of the data is very fast, about more than 20 minutes, Zhang Yang completed the data recovery of this 20 G size partition, there is no important thing in Zhang Yang's mind, it is all some messy data, just by the data itself, Zhang Yang just looks like some experimental data, but he can't see what kind of data these data are The data on the experiment, the complicated formula looks at Zhang Yang dizzy, this is not just a high number, many formula symbols Zhang Yang has never even seen, it should be chemistry, Or physics or something like that.
Some formulas were copied partially, Zhang Yang thought about it, and simply deleted the data again, and Mao didn't use it. It seems that the most important things are in the hidden space of 80 g.
After deleting these data, Zhang Yang is ready to redo the system, although the whole system is very clean according to the analysis software, without any other software or traps. But this server is a very important thing at first glance, and although I don't know how to get out, it is clear that its owner has taken precautions.
The server is used by a computer master, Zhang Yang doesn't want to be manipulated, God knows what traps are hidden in this system.
Directly deep formatted all hard disks, as for the obscured disk space, if you can't crack the trap outside it, and its password, no matter how deep the formatting will not affect it. It will take some time for a 600 g disk to be deeply formatted.
It took more than an hour for Zhang Yang to format all the disks to ensure that no data in them remained, and then Zhang Yang began to rebuild the system. Zhang Yang is also accustomed to using the Linux system, and rebuilt the Linux system, and Zhang Yang completely patched all the vulnerabilities in the entire system, including those found a few years later.
After installing his firewall, Zhang Yang carried out another scan, until he confirmed that there was no problem, and then Zhang Yang began to crack the obscured disk space.
After carefully analyzing the traps on the periphery, Zhang Yang immediately determined that this trap was a well-known disordered array in the hacker world, and the disordered array was just a name, but it showed the clever surname of this trap, just like the two computer viruses involved in Zhang Yang were based on the mutation law set up according to the DNA sequence of AIDS and Ebola, and this disordered array was also set up according to a certain law, it was like a formation in Chinese Taoism.
If you don't know the exact way to enter and exit the formation, you won't be able to get around this trap completely! After carefully checking the entire enclosed disk space, Zhang Yang once again confirmed that the data in this disk space is definitely highly encrypted, if you don't crack this outside trap, or the decoding method, even if you get those data materials, I'm afraid it is a bunch of useless 0 and 1, without arranging according to the decoding method, you can't get what data is inside.
After confirming that it was a disordered array, Zhang Yang was a little depressed, but he was also relieved, because the disordered array is also a normal access to crack the method, it can be set by the setter in any way, it can be a problem, it can be a game, it can be an animation, and it can even be some problems that need to be calculated. Or you can think of it as a piece of software that, after you access it, follow the questions set by the setter, step by step, and then unlock it.