Chapter 449: Impregnable, Shadow System
The book will be opened from June...... Up to now, there has been no break for a day, and 10,000 words have exploded every day on the shelves...... What kind of character is, everyone must know. Ask the brothers for a subscription, Bi Jing, Xiaobai depends on this to eat.
Tang Dynasty Company, I'll give you a lung.
Yes, when the Tang Dynasty Company launched the secret security card, they were dumbfounded at first glance for this kind of dynamic, completely independent of the second password on the network. Isn't the Tang Dynasty Company smashing all its jobs?
"Wang Lin, how is it. ……、
Among them, a boss-level figure looked at the computer, and then, while analyzing a secret card in his hand.
"This, Mr. Lin, for the time being, we are here, I guess there is no way."
Wang Lin is a technician in the number theft studio, although he is not the kind of hacker who is powerful. However, as long as you know more about Trojans than ordinary people, it is enough. What's more, Wang Lin still has some skills. For a second password like this, which is different from outside the network, Wang Lin thought about it for half an hour, but he didn't come up with a solution.
"Unless, steal the second secret protection formula of the Tang Dynasty Company."
At this time, Wang Lin said.
Of course, this is even more unlikely. If they have this ability, they will be depressed. Directly hack the server of the Tang Dynasty Company, or you will have it. You know, there is everything in the server of the Tang Dynasty Company. As long as it can be hacked, not to mention the game account, even the various settings of the game can be stolen back. However, there is such a ability...... That is the world's top hacker, and it is impossible for him to stay in this number theft studio and engage in number theft work.
Moreover, the more powerful the hacker, the more cautious he is, and generally does not easily do things to hack others. Bi Jing, a mountain and a mountain high, often walk by the river, how can there be no wet shoes. No matter how powerful a hacker is, he has come over slowly. For Wang Lin, he used to be a die-hard fan of the Hacker Alliance. However, since the hacker alliance washed his hands and was no longer engaged in arbitrary hacking activities, Wang Lin also relied on some of the skills he learned in the hacker alliance to come to this studio.
"Is there any news from the other studios?"
This Mr. Lin is obviously unwilling.
If all of this kind of profit is lost, their hearts will be bleeding.
Of course, they know that they are doing it against the law and a crime. It's just that everything on the Internet is a high-tech crime, and it's generally difficult for them to find incriminating evidence. Even if you suspect it, there is nothing you can do about them because there is no evidence. Moreover, such a thing, because it is a virtual item on the Internet that steals the trick, so far, it is difficult to convict, and if you are caught, you can simply pay a fine, and it will be fine. The worst is a few months...... It can be said that it is much lighter than real theft and the like.
"For the time being, there is no side on their side, and there is also research, how to break this secret card, but it is estimated that it ......"
Obviously, Wang Lin doesn't have much confidence in breaking this secret card.
This kind of second password, which is completely independent of the network, cannot be cracked by technical means.
"Wang Lin, you're thinking about it. As the saying goes, the road is one foot high, the magic is one foot high, and there is nothing in the world that cannot be broken. ”
Mr. Lin patted Wang Lin on the shoulder, as if he had handed over all the heavy tasks to him.
"Hmmm......"
Wang Lin nodded heavily.
That's a good sentence. In the world, there is really no password that cannot be broken.
Subsequently, for a whole few days, Wang Lin and some other related number theft studios were concentrating on researching the problem of cracking the secret card.
A week later.
A bright spot flashed, and Wang Lin shouted loudly............ Pregnant. ”
"How...... Wang Lin, have you thought of a way to crack it? ”
This week, this Mr. Lin is not fragrant. With the increase of secret cards, basically, they have no profit now, especially in the second half of the week, the profit of a day is about a few tens of yuan. Obviously, a large number of people, etc., have already bound the secret protection. And there is no binding, there is no equipment on the body, and there is nothing to steal, so simply, simply do not hold the ...... They steal big houses if they want to, and they don't have any interest in some of the guys in tattered clothes. It's just that, in this way, their studio will not be opened.
Bi Jing, who recruited so many people and paid salaries, they wouldn't do anything at a loss. ,
"Well, I figured it out."
Wang Lin was very excited, and then he told Mr. Lin about the principle of cracking.
It turns out that this password card, although it is a second password that is different from the network. However, this secret card, he is not omnipotent. The secret card used by Tang Dynasty Company uses a coordinate-type dynamic password. Transversely is the nephew iodine, vertically is abcdefghi. When the second password appears, the system will randomly report a coordinate. For example, 3F, this does not correspond to the number of universes, not the second password, and then, it will be obvious that there are three pairs, 4G, 6B, so, the six-digit password, it will also be displayed.
Logically, in general, according to such a password, because according to the coordinate method, his password is random.
So, even if you hack into his computer and don't have a password, you don't know his second password. Because, if you don't have this secret card, you don't know what the second password is generated by him, so you can't complete the number theft.
However, there is still a mountain high.
The password displayed in the coordinates, although it is random, but it is regular. As soon as you implant the Trojan into his computer, slowly record how he entered his second password. Of course, this process is a bit long. However, after a month of slow recording, through the calculation of the computer program, they were able to complete a password card that was exactly the same as the user's. Until then, even a second password that is different from the network will have to be compromised. Unless, every month, he automatically replaces a secret card. No, this is obviously impossible. For the average player, he doesn't have such a high level of security awareness. Even if he had, he wouldn't get it. Because, this kind of thing is too troublesome. If you change it once a month, if you accidentally lose the original password, it will be a big trouble.
Yes, yes, this is in the later generations, because of the appearance of the secret card, it also caused a series of troubles.
For example, if you lose your security card, you won't be able to enter the game even if you are yourself. You can only go to the official website and unlock the secret protection. However, often many people do not understand. Or, fill in some information, they themselves have forgotten. Therefore, at that time, I can only stare at the tuba that I have worked so hard to practice......
Of course, this is rare. Because generally speaking, for those who play games more often, he will not lose his password. And the one who lost the secret guard, that is because he has not played for a long time. And once you don't play for a long time, basically, this person won't play online games much. Because, by this time, he had no interest in online games.
"Okay, Wang Lin, I knew that you would succeed. When will the program be written......"
Mr. Lin listened to Wang Lin's introduction and was overjoyed for a while.
"Because the procedure is more complicated, unlike the previous record, it will take at least half a month."
"Okay, you try to write the program as much as you can."
Mr. Lin breathed a sigh of relief. It's a little longer, but it doesn't matter. As long as the program is written, then the business still has to be done. He doesn't believe it, Tang Dynasty Company, what else can he do to prevent me from stealing the number.
Tang Dynasty Software.
"Ziyun, how is the shadow system done?"
Ziyun was a veteran of the Hacker Alliance before, and now Chen Jiayi has pulled the entire Hacker Alliance into the right path, and these hackers, since then, have been using the technology they have learned to complete one software plan after another for Tang Dynasty Company. It can be said that the most powerful technical force of Tang Dynasty Company is the entire hacker alliance. Of course, the Red Guest Alliance has also joined the operating system Jige,. But the Red Guest Alliance, obviously, is only here to help, and besides, he is from the state, it's okay to ask him to help, if he wants to help Chen Jiayi all the time, even if they can help, Chen Jiayi doesn't dare to use it all the time.
Of course, Chen Jiayi did not regard the Red Guest Alliance as his own descendant force.
More than half a month passed, Chen Jiayi came directly to Tang Dynasty Software and said to Ziyun.
He knows that the smooth implementation of the secret card can temporarily prevent others from stealing the user's account. However, the PIN card is not a panacea. Even if it is a general order pushed out by NetEase in later generations, this more powerful dynamic password may be stolen. Therefore, to completely prevent number theft, this shadow system is the most critical.
"It's basically done, and now it's been tested with the Galaxy computer, and after three days, it can be popularized." ,
For the shadow system, Ziyun is also quite admired.
Moreover, Chen Jiayi has always attached great importance to this system. In order to complete the task, Ziyun and them, but they worked overtime and finally completed it. Fortunately, this system is not very technical. In a word, it is to build a virtual system on top of the original operating system. That is to say, when players surf the Internet in Internet cafes, the system they use is a virtual system, and no matter what you do on the virtual system, it will not affect the stability of the real system
Now, half a month has finally been completed. Moreover, in order to put it into service quickly. This time, Ziyun handed over the test task of the shadow system to the supercomputer, and it was naturally much more convenient for this supercomputer with a level of 100 billion per second to complete the detection task.
From here, we can see it too. Tang Dynasty Company's major online games, why can they do so well. Among them, in addition to the settings in various aspects, the supercomputer has also achieved a very strong effect. Without this supercomputer, the balance of the games would not have been so good. If there is no supercomputer, I'm afraid, the 3D masterpiece Zhuxian OL will not be completed so quickly.
This is other game companies, if they want to be blushing, they can't blush. ”
Well, that's going to have to be ......."
Hearing Ziyun's narration, Chen Jiayi breathed a sigh of relief.
After three days, the shadow system was complete.
It's still Pengfei Internet Cafe, this time, two staff members of Tang Dynasty Software came to Pengfei Internet Cafe.
"Boss Li, hello."
"It turned out to be a Tang Dynasty company, welcome, welcome, what, is there any activity?"
For the people of the Tang Dynasty company, Pengfei Internet Cafe, that is a great love. Let's be honest...... Think about it at the beginning, Pengfei Internet Cafe, closely followed the Tang Dynasty Company, and fully cooperated with various activities. This also made Tang Dynasty Company take special care of Pengfei Internet Cafe. Some fixed-point activities will be held in Pengfei Internet Cafe. Now that I think about it, if it weren't for the Tang Dynasty Company, Pengfei Internet Cafe would not have the scale it has today.
At this time, the boss of Pengfei Internet Cafe, Li Bo, was very happy to see the staff of Tang Dynasty Company coming.
"Come, let's sit inside."
As he spoke, Li Bo was about to welcome the two employees of the Tang Dynasty Company into the lounge.
"No, Mr. Li, let's talk about it here."
The two looked at the people who were surfing the Internet in the Pengfei Internet café and said directly...... "...... Presumably, Mr. Li recently knew about the secret insurance card pushed out by our Tang Dynasty Company. ””
Hey, how could you not know, we sell secret cards here, that's crazy. ”
For the secret card pushed out by the Tang Dynasty company, Li Boke welcomed it greatly. To be honest, it was really not easy for him to open this Internet café. Although you can make some money, the bigger the Internet café opens, the greater the risk.
For example, there are many people with bad intentions, and they will implant number theft Trojans in their Internet cafes, so that they have to hire special technicians to conduct corresponding tests every time. But even so, nearly a thousand computers, there are also uncheckable, a while ago, there was a friend, so the number was stolen.
Speaking of which, they surfed the Internet in an Internet café and were stolen, and they are really inextricably linked to their Internet café. Fortunately, they have been doing a good job of testing before, so that there will be no large-scale number theft. If you steal a few more times, a large number of people will not come to their Internet café to surf the Internet.
Now that the secret card has been introduced, it has greatly eased their work. How could they not welcome such an anti-theft measure?
"Huh...... Then congratulations to Mr. Ji for making a fortune. ”
The two smiled. ”
Where, where, compared to the Tang Dynasty company, what are we worth? ”
They are agents at most, how can they compare with Tang Dynasty companies.
"Then thanks to Mr. Li's blessing, let's get down to business."
The two nodded, and then got down to business.
"Mr. Li, I believe you also know. The security of Internet cafes has always been the number one problem in the management of Internet cafes. Even with antivirus software, it is impossible to control these Trojans. If the network security of Internet cafes is not guaranteed, it is really a blow to Internet cafes......"
"Yes, yes, so, we have hired several technicians to test the computer every day." ,
However, this test is also a troublesome matter. People are coming to the Internet, you can't detect it. There are often computers that are always on when there are hours out of the day. Moreover, when it comes to holidays, it is even worse, often for two or three days, there is no shutdown. Because, many people, are soaking all night. When they finished soaking, the next day, some people ran up, and they were really busy. Although this makes Li Botian happy, because the busier he is, the better the business. However, if this continues, there are more than 1,000 people in the Internet café...... How can they take care of it, there are some computers that have been implanted by others with Trojans, and they don't know.
It seems that it is indeed hard enough.
"However, Mr. Li rest assured, today, we have brought you a brand new system, including the safety of Internet cafes, the creation of a drip, and even, without any technicians, can manage nearly 1,000 computers?"
In this system, not all the Internet café management platforms in those days were online.
It's all online, it's just a management platform, not security software, and it doesn't play a role.
"A new system?" ”
Could it be the Tang Dynasty operating system? ”
Li Bo instantly became excited.
I heard that the Tang Dynasty company has been secretly building an operating system.
Moreover, the people of Wangan have been looking forward to the advent of this system. As Ji Bo, who opened an Internet café, he naturally knew about this big event. Could it be that today, the Tang Dynasty operating system was born? If so, it's a big event for China.
"Uh...... No. The Tang Dynasty operating system is still under development, and we don't know when it will be launched. However, although the Tang Dynasty operating system we bring you today is not the Tang Dynasty operating system, but, again, it will surprise you. ”
"Oh, what's the operation?" ”
Shadow system. ”
After speaking, the two explained to Li Bo the characteristics of this shadow system.
Half an hour later, Li Bo's eyes lit up when he heard it, and he kept nodding his head. ”
Mr. Li, that is to say, with this shadow system, it is guaranteed that your Internet café will be safe and impregnable. ”
Shanghai, or the number theft studio.
"Oh yes, it's finally uh......"
It's still a loud roar, but this roar is no longer the previous unwillingness and disappointment, but excitement and excitement......
"The secret thief, number, is finally out."
I have to say that although Wang Lin was not a member of the Hacker Alliance before, he was smart since he was a child, and with some knowledge passed down from the Hacker Alliance, he has built him into a technical hacker, much stronger than some rookie hackers. To be honest, if it weren't for this number theft studio and giving him a high salary, he really wouldn't have done anything about number theft.
You must know that the entire hacker alliance has been rumored to have been brought on the right path by Chen Jia, and it has been washed in a golden basin, and in the entire IT session, I don't know how good it is. And those who are still in the dark are in a dark place, living in an unknown world. Sometimes, Wang Lin also wants to wash his hands. It's just that every time he is tempted by money, he still insists on being here. secretly said in his heart, if he earns enough 1 million, he will leave......
"Well done, Wang Lin."
Mr. Lin was very happy, and then immediately said...... "...... Prepare for action. ”
This action is naturally to implant number theft Trojans into major Internet cafes.
An Internet café in Shanghai.
Wang Lin and Mr. Lin came forward in person, took the number theft program he wrote, and opened a machine casually.
Yes, he is about to implant his secret thief into the Internet café platform.
And, with the advantage of the local area network, all the computers in the Internet café are infected with this Trojan.
Power on, enter the system.
"But it's normal."
When he was about to enter the desktop, suddenly, a picture appeared in the desktop, with a few large characters written on it.
"Shadow system, enjoy a secure online life." ”
Shadow system. ”
What is it?
Mr. Lin pointed to this shadow system and said.
"I don't know, let's see first."
Intuition told Wang Lin that this system was obviously designed by them.
After thinking about it, Wang Lin quickly checked the computer settings, until finally he finally understood ............ Holy, virtual systems. (To be continued)