CHAPTER 59: JACK THE HACKER
My name is Jack, and I don't have much to do with Jack in the Titanic. I'm just a computer enthusiast, strictly speaking, I'm a hacker.
Unlike most hacking groups, I'm just one person.
Because, in the world of hackers, I don't want to trust anyone. In the face of absolute price, any of your friends may become the object of betrayal of you. So, since I stepped into the hacker world, I've been very careful, very careful, never revealing my identity and never making friends. I have only one code name on the Internet, and my name is Death.
Yes, Grim Reaper, I am the Grim Reaper as hackers all over the world.
Maybe I'm smarter than others, or maybe someone else is too stupid. My biggest hobby is operating the computer in my hand and surfing the world's network. Whether it's the Pentagon, or the White House, or even the Western European Special Organization. As long as the Internet can reach everywhere, there are my footprints. However, they will never know that I have been here.
I am like a god from above, looking down on the heavens and the earth. I don't need others to understand, because this is a glory that others will never be able to experience. Occasionally, I travel all over the world. Using my unique hacking skills, I carry out different hacks.
It's just a hobby of mine, but I still respect one of the hacker rules, and in general, I don't break anyone's computer data. Even if I get it, I'll destroy it all. It's just that I'm obsessed with hacking. I've been running around the Internet day and night in order to complete one invasion after another.
I don't know what each invasion is for, but now, it seems like it's my instinct. It's like when I'm hungry and need to eat, when I'm idle, I only think about invasion. After that kind of invasion, cracking one system after another, solving one problem after another, the refreshing feeling in it simply excites me.
Perhaps, I am just indulging in the excitement.
Some time ago, I learned that there was a powerful hacker in the far east. For that mysterious country, although it is now lagging behind other countries, whether it is education, science and technology, or the Internet, China is relatively backward. However, I have never underestimated this country.
Because I have achieved this now, a large part of the reason is that the wisdom of China has given me the answer. For example, the book I Ching. However, unlike the vast majority of scholars in China who study the I Ching, they only use it for their research on Yi Li. I, on the other hand, used the hexagrams in the I Ching in my computer. Just like Professor Leibniz, who invented binary, the I Ching, an ancient Chinese book, carries too many philosophical ideas.
Maybe one day, the ancient country of the East, he will return to the former prosperity.
Well, it's me who is too emotional.
After I learned about the hacker, I sneaked into the Chinese cyber scene.
It is reported that the hacker first appeared on the official homepage of the Hacker Alliance. I tried my best to finally find the chat room of the China Hacker Alliance. It's just a pity that this chat room doesn't know where the gods wrote it. It is actually built as solid as gold, without a trace of loopholes. Of course, there is not a single loophole in this one, but I can't find it for the time being. I'm sure I'll find a way to crack it if I give me time.
However, as a clever hacker, I don't want to go through the road. I can't crack the chat room in front of me for the time being, so I'll find a way to get around. If you don't learn this kind of thinking, I believe you will not become the best hacker in the world.
It just so happened that Microsoft's newly released WINDOWS2000 system was studied after several months of research. Coupled with the comparison of countless masters on the Internet, I finally found a vulnerability in Microsoft's Internet Explorer browser. Of course, before this, it seems that there is a master who found more than a dozen WINDOWS2000 system bugs in just a short time. I don't know who this man is. If it were possible, I'd love to meet him for a while.
Taking advantage of this vulnerability on Microsoft's Internet Explorer, I easily implanted a piece of code into the websites of major Chinese portals. This code is so deceptive that even if a computer administrator finds out, they will only think it is a plain piece of code. However, this code is actually a program. A program that steals other people's information, to be precise, is what we often call a Trojan horse. ,
After a period of sifting, I overthought all the useless information and left only information about the hacker alliance. After countless days of hard work, the information that came back from the Trojan, I got the IP address of a member of the hacker alliance. Of course, this IP address is not the real address of the person, it is just a meat machine address. But it doesn't matter, as long as you have a clue and touch it all the way, you will eventually find it.
Unexpectedly, this hacker member's skills are quite good. The multiple meat machines he grabbed also gave a lot of security patches. However, even so, I still broke through his multiple meat machines and found the real IP of the alliance members. When I gained supreme control over his computer, I discovered that this man was actually the vice president of the Alliance.
I didn't use his chat room account to log in, because I was afraid that even if I entered the chat room and planted a Trojan horse, I might be exposed. I don't want to startle the snake, I just want to meet the master hacker from the ancient East for a while. Taking the opportunity of a chat room update, I quietly implanted this Trojan program into the chat room.
Everything is done, and the rest of the tasks are just waiting for the fish to appear.
"It doesn't look like this one."
Hacked a few meat machines today and found out that these members are not the people I'm looking for. Just as I was sighing and ready to continue cracking, the notepad function suddenly opened automatically on my computer window.
"Hello, I'm ABC."
Seeing this, I know that I have been invaded.
I can't believe that a hacker with technology like mine can be hacked by someone else one day. It's just that the facts in front of me tell me that what I see, everything is real, and I have to believe it.
"Calm down."
I told myself that I had to be calm.
"Who are you?"
I took his words on my notepad and replied to the unknown intruder. And, after sending the message, I turned on a separate computer to prepare for anti-intrusion.
"Your Excellency, it's useless, please stop all your efforts, otherwise, you will know what the consequences will be."
Seeing this, I gave up all efforts.
This intruder already has all my information, and no matter how much I try to counterattack, it will be useless.
=============
PS: Sanjiang recommended in the afternoon, thank you for your support.
);