Chapter 134: Cracking
Chapter 134 Cracked
Back in his room, Lin Hong began to read "Hackers: Heroes of Computers".
Just now in Arthur's room, the other party didn't show him any hacking techniques, just simply sent emails over the Internet, and then browsed some websites. Later, Arthur connected to a forum known as the Electronic Bulletin Board, or BBS for short, which is a school forum within the Massachusetts Institute of Technology, and saw a lot of interesting information.
Some people post topics on it, and then a lot of people post back to participate in the discussion.
These people are usually computer savvy and ask for help on BBS to share what they have discovered or created.
All of this, Lin Hong was in contact with for the first time, so he watched it with relish.
However, when he sensed that Arthur wanted to do something else, he took his leave with great humor.
Everything has just begun, Lin Hong does not expect to understand everything in one day, today's harvest is already very huge, he feels that his horizons have broadened a lot.
The book in his possession, about some famous hackers from the 50s to the 80s, is written by Steven Levy, the chief technical writer and senior editor of Newsweek, and is known as one of the "top historians of the digital age". This "Hacker" is one of his masterpieces and has a great influence in the industry.
The book is divided into four parts.
Part I: Real Hackers. In the fifties and sixties, computers were just emerging, and MIT computer gurus created computers with their own superior technology. At this time, the early hacker with the most sexual significance was also born.
Part II: Hardware Hacking. Describes the story of those genius hardware hackers at the Massachusetts Institute of Technology.
Part III: Game Hacking.
Part IV: The Last Real Hacker.
This is a real hacker history book, and Lin Hong is completely immersed in it.
A hacker figure seemed to come out of a book and unfold in front of his eyes.
He didn't know until this moment that the emergence of personal computers was the result of the active promotion of these hacker heroes, and without them, computers might still be in the buildings of research institutes, with bloated and huge sizes. Without them, the internet wouldn't have evolved so quickly.
Since Lin Hong owns an Apple computer, he is particularly careful about the description of Wozniak, Apple's genius hacker. Only then did he learn that the Apple computer was created by Wozniak, from Apple-i to Apple-II, and even the Red Book was written by him.
Lin Hong's reading speed was very fast, and he had finished reading the two hundred pages of English books before midnight. The deeds of these hacker masters in the book all have a great attraction and inspiration for him.
After reading it, he fell into deep thought.
The first is the hacking theory that the early hackers came up with.
"Access to the computer should be unrestricted, and completely anyone has the right to try it out"
"All information should be freely accessible."
"No Superstitious Authority - Promoting Separation of Powers"
"You can create art and beauty on a computer."
"Computer technology can make your life better."
……
These hackers have influenced generations of hackers since then, who have taken these principles as their own guidelines, restrained their behavior, and even adopted them as their beliefs and fought for them all their lives.
However, later in the book, Lin Hong also saw some of the author's helplessness about the current hackers from the last chapter "The Last Real Hacker".
Over time,
With the development of the times, the early hackers began to gradually change, and those early hackers gradually took different paths.
Some old hackers who stick to tradition reject this change, believing that they have betrayed the spirit of hacking and no longer recognize the other party as a real hacker.
For example, the founders of Apple and Microsoft, who began to commercialize their technologies, began to make money with these, began to oppose copying, charged for technological achievements, and sold them for money......
In the traditional spirit of hackers, "free" is a very important core, and this is also an important point of disagreement among hackers.
Pure hackers upload their creations to the Internet for free and let everyone download and use them, and the more people use their works, the happier they are. They believe that "sharing, openness, and decentralization" is the true essence of hacking.
The book was written in 1983, and now it's 1991, eight years later, and in the ever-changing world of computers, many things have changed dramatically, and the meaning of hacking has changed.
Lin Hong remembered what Matthew had told him, that today's hackers have gradually turned to the field of computer software and networking, and there are very few hackers in hardware, which may be because the current computer manufacturing process has become more and more standardized and complex.
After reading this book, Lin Hong did not continue to read the other two, but instead began to study the TI-82 calculator produced by Texas Instruments, which he bought today.
Lin Hong only took a cursory look at it before, and now he has studied it carefully. He followed the instruction manual and quickly became familiar with the calculator.
This calculator comes with a thick instruction manual, and most of it is technical references, except for simple operating instructions. Lin Hong likes this kind of technical manual the most.
This is a graphing calculator that can not only do the functions that ordinary scientific calculators do, but also use it to draw graphs.
And this is a programmable calculator, inside it, there is also a built-in programming language called "ti-basic", Lin Hong took a look at it, it is a derivative version of basic, some functions are removed, and some built-in drawing functions are added for calling.
The thick instruction manual states that the calculator can also support "assemblers". Users can design an "assembler" in a computer, compile it into machine code, and then transfer it to flash memory using a data cable, and then execute the program.
It has 512KB of flash memory, of which the user can use B as a place to store data, which is equivalent to a disk in a computer.
There's also a 32KB RAM (RAM) that users can use to execute their own programs.
The monochrome LCD screen is 96x64 pixels and can display 8 lines of letters or numbers with a maximum of 16 characters per line. At the bottom of the display, there are up to ten rows of buttons.
However, Lin Hong saw in the manual that although the configuration of this calculator is higher than that of his own Apple computer, it is not so flexible, there are restrictions on many things, and the supported instructions are only limited, mainly some functions related to mathematical operations.
In addition, most of the built-in programming functions are limited to the text interface, and only a few built-in graphics functions can be used to program them simply, such as drawing parabolas, statistical tables, common geometric figures, and so on.
Lin Hong read the entire manual several times, and always felt that it was a waste to use such a good configuration to only accomplish such limited functions.
He has already learned the basic display principle of this LCD screen with this calculator through the manual, and it stands to reason that he can operate this display as if it were a computer monitor.
At this time, Lin Hong remembered that when he was in Beijing, Gu Wei explained to him the knowledge of game cracking.
"This calculator is actually similar to a game console, and it is obvious that the firmware brushed in it limits its own hardware functions."
Lin Hong looked at the computer in his hand and began to be a little nervous.
The engineers at Texas Instruments must have been very aware of what the calculator could do, but they didn't open it up. The specific reason, Lin Hong speculated, may be because it is only a calculator product, so it should be made like a calculator, with these functions now, it can fully meet all the needs of students.
"If I could try to crack this calculator like I would crack a game console, it would be like having a microcomputer that I could take with me."
A very crazy idea popped up in Lin Hong's mind, and as soon as this thought appeared, it could not be contained.
Theoretically, this is entirely possible
However, if he really wants to crack it, Lin Hong still has many problems to solve.
The first is the circuit diagram of the entire calculator, and the entire structure and instruction set of the Z80 processor must be very familiar.
The hardest part should lie in the firmware (Shengwang txt download).
To crack the game console, you can take down the firmware directly, and then use the burner to re-burn. So can this calculator do the same?
Lin Hong looked at the thin computer in his hand, and Lin Hong was really a little unsure in his heart.
Of course, there are many ways to crack it, and it doesn't have to be limited to this one, the most ideal one of them is to use the firmware system vulnerability in it to crack the system to enhance the permissions and liberate those functions that have been restricted.
As for which way can be cracked, Lin Hong doesn't know for the time being, he has to try before he can have an answer.
Lin Hong, who was quite excited, said to do it, he pressed the power of the computer, and after the computer was turned on, he searched in the directory, and he really found an assembly compiler called "ma**".
So, he followed the instructions in the manual, connected the Compaq computer in the room with a data cable, and then began to write some small programs to transfer to the calculator, testing some of the functions it could support, hoping to find something useful from it.
This process is boring and boring, and it takes a lot of time and energy, but fortunately, Lin Hong doesn't have to sleep at night, otherwise there really won't be much time to test.
Time just passed in constant testing over and over again......
Chapter 134 Cracked
Chapter 134 is cracked, go to (Saint King txt download) to read the novel