Chapter 45: The Secret Forum
Chen Nan installed the server, and then connected the laptop to the server, which is much better than ordinary computers in terms of processing power, stability, reliability, security, scalability, and manageability. Pen × fun × Pavilion www. biquge。 info
Now this server is considered an entry-level server mid-range configuration, but in Chen Nan's eyes, its performance is average, equivalent to a personal computer in a few years. This is much better than the performance of the laptop, and the puppy can be regarded as able to exert 50% more performance.
"When will we have our own supercomputer?" Chen Nan is obsessed with supercomputers, and the powerful computing power of "Case" in his previous life will instantly form a flood of data that will destroy all defenses. For example, second-rate hackers use supercomputers against top hackers who use ordinary servers, and the result will only be a strong crush, and the gap in hardware is sometimes not bridged by technology.
This new server only has a low-level system program, and Chen Nan reprogrammed the system program for it, but this time with the help of the dog, it was much easier.
"Dog, let's move!" As the command was given, the laptop work light flickered.
After a while, the puppy voice came: "What a comfortable home! Much more spacious than before! ”
Chen Nan smiled faintly, he finally had a personal server in this life, facing the three brand-new screens, he took a sip of tea comfortably, and finally found a little feeling of his previous life.
"Tuk Tuk!" There was a knock at the door, and the smell of food wafted in.
Chen Nan suddenly felt hungry in his stomach, got up and walked out of the bedroom, only to see that Cheng Yong had already laid out the meal. He tasted a few bites and couldn't help but praise: "Tsk, your cooking skills are good!" ”
Cheng Yonghan laughed twice and only lowered his head to eat. He ate quickly, this was a habit he had developed in the army, and Chen Nan hadn't eaten a few bites, he was already full.
Chen Nan was surprised! At the same time, I was also curious about the troops he served!
Chen Nan continued: "You go to the company in a while and tell Zhang Li about the tracking, I estimate that the other party can't only track me, and I can deal with ordinary people." But she is a weak woman who is very dangerous, you have secretly protected it in the past few days to prevent the opponent from jumping off the wall! ”
If the other party comes to compress the software, this thing can't be as simple as tracking, there must be a backhand!
After that, Chen Nan asked Cheng Yong's mobile phone to return to the room, reinstalled the operating system, and updated the Bluetooth program.
"Try to bring this Bluetooth headset with you at ordinary times, and someone will contact you at critical moments." Chen Nan said, giving Cheng Yong his mobile phone and Bluetooth headset.
Cheng Yong nodded, didn't say anything, put on his headphones and left the residence.
After locking the door, Chen Nan returned to the bedroom, and his original plan was disrupted by Zhang Li's sudden foreign debt, so he had to find another way to make money this time.
"Dog, catch the server-level broiler!" Chen Nan ordered.
Ten minutes later, the puppies captured 5,000 online broilers, and it has to be said that after replacing the laptop with a server, the puppies' abilities have been greatly improved.
Chen Nan controls a broiler, enters a large string of letters in the browser address bar, and opens a secret URL, which is different from ordinary URLs, not the beginning of www.
The ordinary URL is the data transmitted by the HTTP protocol, and all the data is transmitted in clear text, which is easy to leak the data. Internet banking, shopping websites, etc. use the https protocol for transmission, and the transmitted data is encrypted with SSL technology, which has better confidentiality.
And the website opened by Chen Nan is a gathering place for global hackers, which is very mysterious, who is the administrator behind it, where is the server, these are like fog! What's amazing is that it uses a more advanced ALD encryption technology for better secrecy.
Chen Nan suspects that this website must have its own supercomputer!
The website displays a normal forum page, but all in English, and the forum name is Black Abyss. The forum brings together most of the world's hacker masters and a large number of hacker enthusiasts. And Chen Nan is going to use the popularity of this forum to make a lot of money this time!
But to be trusted, you have to have a higher membership level!
Each login account can be upgraded, the account level is represented by stars, from low to high respectively one to ten stars, as for the ten-star member is equivalent to the administrator level of the forum, it is very rare, as far as he knows, there are no more than five ten-star members in the world!
The higher the level of hacker skills, the higher the level, the forum has a separate server for users to hack, and the level is increased by one level every time you pass the level.
Chen Nan quickly registered an account - DK, which means the abbreviation of DeathKnight's English name.
Just registered this account level is 0 stars, and it is very simple to upgrade to 1 star, you only need to log in to the server background to pass the first level, and the first six levels of the administrator will not make a move.
Chen Nan controls the broiler to connect to the server background, at this time the server agrees to the connection request, a pop-up window asks for ID, and Chen Nan quickly enters the two letters "DK".
All of this is done in an analog system, with a simple firewall in front of you, which performs at the same level as a common firewall on the market. At the same time, a 1-minute countdown number appears in the upper right corner, asking for an invasion to be completed within a minute and leave a mark.
59、58、57……
Since it is a simulated real-life XP system, ordinary hackers can pass this level as long as they have enough time. But in fact, this level blocks the vast majority of hackers who do not enter the stream, not how difficult this level is, the problem is that the time is set.
Chen Nan didn't make a move, but ordered the puppies to invade, in fact, the methods of the puppies came from him.
The cub's powerful computing power instantly chose a method of invasion with the shortest time, and this method was much faster for the cub to use than Chen Nan, and a large number of codes were generated almost instantly.
It openly sends a camouflaged packet with a spoofing program that exploits a vulnerability in the other party's TCP/IP protocol to gain trust and bypass the firewall.
Entering the interior of the host, the puppy leaves the word DK in it, and it can be said that this invasion is complete. The countdown has also stopped at the number 50, indicating that the whole process took ten seconds!
Drip! Congratulations on becoming the 186,550th one-star account!
There are two options below, continue or exit.
Chen Nan chose to continue, the second level is still the XP system, this classic operating system is the most widely used and widely used operating system in the world, almost all personal computers choose this system, of course, it has more vulnerabilities.
However, this level has already patched important system vulnerabilities and closed ports that are not commonly used, which makes it much more difficult.