Chapter 21: The Beginning of the Broiler
Interview Ended...
"Brother Hao, who is that kid? It seems that he is very close to Zhang Yue, and it seems that the relationship is not ordinary. Even Bai Yunyun, who has always treated people with a frosty face, is also showing her face in front of this person. A voice sounded in front of Cheng Hao.
At this time, Cheng Hao looked at Zhang Yue who stepped out of the door of the activity hall in a daze, and then looked at Mu Xuan behind him.
Cheng Hao also didn't know that he had expressed his admiration for Zhang Yue many times, but Zhang Yue also ignored it, and Cheng Hao was also firm without hesitation, believing that after his unremitting efforts, he would eventually get the beauty.
Because Zhang Yue didn't talk about any boyfriend in her freshman year, this also made Cheng Hao more determined.
"That kid, I was also interviewed just now, and my resume is a freshman, could it be that Zhang Yue likes sister and brother love?" Xie Lin touched his chin and said meaningfully with poss, which he thought was very handsome.
"Go, you boy, what are you talking about? Let's go. Cheng Hao also said in a deep voice to his friend Xie Lin.
When Mu Xuan and Zhang Yue returned home, it was also dusk.
It's so beautiful. Sometimes life is very good, but the sun does not shine under life, but there are some impurities.
Dinner table, trivia...
rippled between Mu Xuan and Zhang Yue, and what spread away was the hidden warmth...
Dark night, clear sky, deep...
Window sill, Mu Xuan, contemplation...
Mu Xuan raised his head, through the window, the sky was full of stars, hanging high, looking at this star map, an inexplicable feeling of happiness and yearning for happiness, all of a sudden, like a spring...
Mu Xuan turned around resolutely, and looked back, there were more than just stars in the starry sky in the night...
At this time, Mu Xuan sat in front of the computer that had already been turned on, looking at the constantly changing and flickering data, some of the data still did not stop...
In fact, after finishing speaking to the flame last night, Mu Xuan also took some actions, in this seemingly calm network, Mu Xuan really knew what this meant, so he had to be fully prepared to deal with the uncertain factors that appeared in the network.
Of course, the number of broilers is a key thing for a hacker. We call the computer controlled by hackers broilers, and the broilers are called springboards, and the quality of a springboard is superior or not, and the quality and quantity of the broilers that make up them are good. Of course, Mu Xuan, who has always pursued perfection, wants to reach the height of his ideal in both aspects.
If you want to get broilers, you have to invade control first. To achieve this ultimate goal, it is not as simple as a sentence.
Just like Mu Xuan's computer screen, the data on the computer screen is still jumping and flashing for a day from last night to now.
A successful hack consists of five steps: searching, scanning, gaining permission, keeping in touch, and eliminating traces.
At this moment, Mu Xuan is in the second stage, scanning. The scanning is to analyze the computer data exchange found in the first stage, as well as some vulnerabilities, backdoors, etc. Scanning is also a huge project, and Mu Xuan also knows it, so he starts to scan the searched computer with a scanning tool in the search stage, which means that Mu Xuan is in two stages at the same time, of course, the last stage is not needed.
Tick...
Mu Xuan probably waited for nearly two hours, but after a ticking sound, it was announced that the scanning was over.
"Sure enough, SH City is worthy of being an international metropolis, and the technical content is also quite high." Looking at the data on the reality screen, he muttered.
The scanning results displayed on the computer screen made Mu Xuan slightly surprised, a good server unit is heavily guarded, but it is average, but it is full of loopholes, showing two extremes.
"It seems that the country's IT talent also chooses to flow there. If that's the case, then I'll meet you. Mu Xuan's eyes narrowed slightly, and he said lightly.
After speaking, he no longer hesitated, and his ten fingers slowly began to speed up the speed of his swing, as fast as ever...
A good server unit, with outstanding computing power, can carry a large amount of DOSS attacks, and if used well, it can basically achieve the effect of annihilating the enemy in one fell swoop. Not only that, the defense of a good server unit is also quite terrifying, if Mu Xuan can control it, it will play a great auxiliary role when fighting with others, of course, this kind of computer group is not a soft persimmon, there must be technicians for strict prevention and maintenance, and the internal inspection cycle is also quite short.
At this time, Mu Xuan's eyes were also in the slightly squinted eyes, revealing a fine light, staring tightly, the data on the display screen, the extremely agile fingers were also constantly tapping on the keyboard, and then the irrelevant characters on the display screen formed a logical code that only Mu Xuan could understand, and quietly transmitted to the main server of a Fallen Soul Game Company through the network.
The code edited by Mu Xuan. It's like a drop of rain falling into the rough sea. Not to mention, if it can make waves, if it can, it will be swallowed up by the unusually large amount of gamer data access traffic at the moment of splashing.
The data stream is swallowed, which does not mean that it disappears like raindrops falling into the sea, but it sneaks in according to the path given by Mu Xuan, and the data stream will be fed back to Mu Xuan Some of the data he wants.
Mu Xuan didn't know that on the periphery of the server group, that is, the area where player traffic and the company directly communicated, there was a pair of eyes like something that was examining and analyzing all this. Of course, Mu Xuan's few traffic packages disguised as player access were passed smoothly.
Looking at the feedback back, Mu Xuan was also a little stunned...
"Rather, interactive firewalls." As he spoke, Mu Xuan's eyes narrowed to the extreme, and he suddenly opened them.
"No, it seems to be a bit flawed, this is not a genuine interactive firewall." Mu Xuan carefully looked at the information fed back, but said quickly.
The firewall has also been introduced earlier, the firewall for the ever-changing virus, there is not such a good prevention effect, but for the hacker intrusion is quite a blocking effect, only by breaking through the firewall, in order to achieve the central control authority of the area, in order to be able to obtain the relevant permissions, so as to do what you want to do. In terms of breaking through the firewall, it can also be seen that a hacker is capable. After all, a good firewall is the work of an individual editor or a team. If you want to break the firewall, you need to surpass the strength of the editors.
And the firewall that Mu Xuan encountered now was an interactive firewall that he had wanted to encounter before but had never encountered.
The origin of the interactive firewall, Mu Xuan has also heard of it. Just half a year ago, Mu Xuan walked through the foreign hacker circle, and accidentally found in a hacker forum, which also said that it was amazing, Mu Xuan also paid a little attention to it, and remembered the many characteristics of the interactive firewall he said, for Mu Xuan, a BD student, it is indeed easy to memorize this little thing.
One of them is to say that the interactive firewall is the world's first firewall, for this, it really aroused Mu Xuan's heart of pursuing top technology. After searching abroad for a long time without success, he immediately abandoned it.
And now, judging from the feedback information Mu Xuan received, it was indeed extremely similar to the interactive firewall, and the name of the interactive firewall he had been looking for was quickly reflected in his head.
However, after careful analysis, Mu Xuan found that there were indeed some discrepancies with the interactive firewall described on the website. That's for sure.,This should be the Chinese version of the interactive firewall.。
For sinicization, it must be foreign Chinese languages that need sinicization, and there are many Chinese versions of foreign software on the Internet. Therefore, for this, Mu Xuan also admires those Chinese masters.
However, the reproduction of the interactive firewall also needs the original to be used as a template. As for its origin, Mu Xuan is also quite puzzled now, but he knows how difficult it is for him to find this firewall abroad.
Mu Xuan also sent a few instructions to the test surname, and immediately gritted his teeth, and began to crack...
Mu Xuan's unthinking action seemed to be a little reckless, but Mu Xuan was also careful everywhere, only by testing himself could he obtain real information, Mu Xuan didn't believe that a copy could be so powerful?
Mu Xuan's fingers were also tapping on the keyboard quickly, and with the transmission of instructions one after another, when he saw that the first layer of firewall was about to collapse...
"Huh..." The fast-jumping fingers also stopped abruptly at this point, but Mu Xuan was shocked.
It turned out that when Mu Xuan was about to solve the first layer of firewall, the point where Mu Xuan concentrated on the attack suddenly disappeared, showing a different situation.
Mu Xuan's overwhelming attack does not mean that the interactive firewall is easy to crack, on the contrary, it is extremely difficult, of course, it is nothing to Mu Xuan. However, it is difficult for others to say.
"I don't believe it..." Mu Xuan gritted his teeth again and said, ten fingers that were originally static in the middle of the process, but as if resurrected, they began to jump...
Perseverance is also very important for a hacker, just the fingers that keep tapping the keyboard, it also needs the support of perseverance, it's okay to hit for half an hour, but after a few hours of rapid tapping, you can imagine what kind of situation it will be?
What kind of feeling would it be to look at that boring data and repeat it over and over again? With all of this, hacking is a profession to be feared!!
"I see..." Mu Xuan's fingers suddenly stopped again, because there was the same situation as last time.
But at the moment when the crack point disappeared, Mu Xuan smiled...
It turns out that the interactive firewall is this method of interaction. The interactive firewall senses the weak points of the firewall, and at the moment before it is about to break, it decomposes and transfers the weak points, and so on...
Mu Xuan couldn't help but sigh that a copy of the interactive firewall could also have such ability, and immediately murmured: It is precisely because he is a copy of the interactive firewall!!
ps: 99% of other urban novels portray love rivals as bad guys, but most of them are not like this in real life, this is my writing characteristic. I strive to be authentic, not pompous.