Chapter 7: The First Hacking Operation
By the time Luffy Yu appeared on the BBS forum again, it had already exploded, and a post titled "Mi China's computer technology is ten years ahead of China" quickly appeared on the front page of the forum. Pen & Fun & Pavilion www.biquge.info
"Hello Huaxia people, I am a little hacker in the United States, as you can see in the title, the computer technology of the United States has been ahead of you for ten years. Look at most of you still using junk operating systems, and our great rice country has used the latest Windows system today, you backward Chinese people! ”
This looks like a computer hacker in the United States, and what's even more infuriating is that this BBS has also been hacked, and all users can't post or leave a message under this article.
Liu Lingyun's lungs exploded when she saw this article, and she quickly typed on the computer, she wanted to snatch the permission of the forum from this hacker!
Liu Lingyun smiled, this computer rookie also dares to come to his own territory to spread wild, this kind of technology can take over the authority in less than two hours.
At this time, a comment suddenly popped up under the post: "The light of fireflies also dares to compete with Haoyue." ”
This? The hacker's post has only been sent out for a few minutes, and someone has already seized the permission!
Although some netizens outside can't leave messages in this forum, this obvious insult to China has also aroused everyone's anger.
And this short reply is really happy, everyone looks at it again, and the id of the reply is only a short letter "L".
“L? This is the author who wrote the Wubi input method? ”
"That's right! I didn't expect L God to have hacking technology! ”
Although many netizens have no knowledge of hacking, they also spontaneously discuss it in some large online forums.
At present, there are only two people in the input method forum,One is a hacker in the United States, and the other is L。
The Mi hackers were also taken aback, their permissions were taken away so quickly!
"Who are you?" The Mi hacker hurriedly published another post.
"You don't deserve to know who I am, but trust me, I'll be your nightmare!"
Although no one else can log in to this forum, there are more than a dozen W people following it, and the number is still growing.
Some netizens also spontaneously went to other forums to publicize.
"Input method forum in the rice hacking war."
"The input method forum is hacked! Chinese hackers fight alone! ”
Posts like this are also spreading rapidly on other forums.
If it were an ordinary hacker, Luffy Yu might not make a move, but if you touched my bottom line, I wouldn't let you get out of the way!
The Mi country hacker also realized that he seemed to have provoked a great master, but as long as he insisted on retreating for a few hours, it would be his victory.
After all, if your post can stay on this forum for several hours, it is enough to make this group of Chinese people lose their faces.
How could Luffy Yu give him a chance, his fingers were tapping rapidly, and he could still make you wild in China!
Onlookers found that the posts in the forum disappeared one by one, and it seemed that the Mi hackers wanted to completely delete the data of the forum.
In a live post on another forum, it also immediately attracted a heated discussion.
"This Mi hacker is really shameless, and he actually deleted the forum data!"
You must know that most hackers only enter the server and do not tamper with the server's data, and at the same time will leave some footprints on the server or take away some irrelevant things to prove that they have been.
This kind of deletion of data is despised by the majority of hackers.
"I know the technique of the L god, and I believe he can win."
"I've never heard of such a Chinese hacker."
"Do you know the Wubi input method, this Mi hacker dares to attack in the input method forum, can L sit idly by?"
"Really, Wubi was developed by L?"
After this netizen said this, everyone,A lot of people woke up from a dream,It turns out that the recent rapid spread of the five-stroke input method is this called L development。
But everyone is still not at ease.,Although the five-stroke input method is good,But L's hacking technology is not known how。 Hacking isn't as simple as writing code.
"Look! There's a new post on the forum! ”
At this time, a large number of netizens poured into the input method forum again.
I saw rows of eye-catching red headlines appear, and these headlines were all the same sentence.
"Those who offend me will be punished even if they are far away!"
The Mi hackers deleted it immediately, but these posts sprung up like mushrooms after a rain, and they popped up one by one and couldn't delete them.
Just when he wanted to continue the operation, an operation interface popped up!
"You don't have permission to make changes to the server!"
What the? I planned for many days to get the permission of this server, and it was cracked in two minutes? Ten minutes to be recaptured?
At this time, netizens also found that now the input method forum can be logged in normally.
"Explode in an instant and complete the single kill! L Great God is mighty! ”
"It's also a hacker in the United States, it was done by L in two minutes, can you stop teasing me?"
"Do you really think we don't have anybody? Still ten years ahead of China? I don't believe it when it comes to being ten days ahead. ”
"Those who offend me will be punished even if they are far away!"
"Go back to your country and get milk."
“fuak。” Miche hackers cursed after reading the posts, and quietly withdrew from the forum, thinking that he was looking for a small website in Huaxia, but he didn't expect to fail so quickly, if other hackers knew that there would be no way to mix in the hacker world in the future.
At this time, Luffy Yu sneered: "Still want to run? ”
Today's matter is not so easy to calculate, in just a few minutes, Luffy Yu has already obtained the other party's IP, and now it's time to fight back.
At the same time, on the other side of the world, a teenage boy breathed a sigh of relief, fortunately it was just himself, if he let his master know that he would still raise his head in the hacker world?
Just as he was relaxing, an email came from his computer, "I'myournightmar!" (I'm your nightmare!) )
It's not good, the other party is chasing after me!
The Mi hackers really can't figure it out, they are already very secretive, and they have changed the line a few times in the middle, which can be chased?
But fortunately, this is the latest Windows system, which is the latest system in the United States, which is much more secure and stable than the traditional system. What can you backward Chinese do to me?
You must know that China has not yet issued a Windows system! You're afraid you've never seen this kind of system, and when you think of this, the Mi hackers can't help laughing.
"Bastard, come on, come and hack me!"
Luffy Yu was disdainful in his heart: "Do you think that if you have a Windows system, I can't do anything about you?" I have a thousand ways to hack you! ”
If it weren't for Luffy, Bill Gaishi didn't know how long it would take to develop the Windows system, and it couldn't be easier for him to hack the Windows system.
Luffy is a person who has seen the windows source code, and even the input method on it is developed by himself, more precisely, Luffy used the Windows system before Bill Cover.
It is not an exaggeration to say that Luffy is the first person to use the Windows system in this world, and the performance vulnerabilities of Windows himself are the most clear.
How many operating systems did Luffy Yu use in his previous life, and he deeply understood a truth, there is no absolutely safe system in this world!