Chapter 229: Release Bit Messenger!
With the first intrusion experience, Lin Hong was out of control and began to really pay attention to network technology. Pen? Interesting? Pavilion wWw. biquge。 info
All of his spare time, except for writing the Linux Cào system, is spent learning network intrusion techniques.
Kevin was very helpful to him during this time, and Lin Hong often had jiāo with him at night.
Fearing that their communication would be monitored, Lin Hong later wrote a set of encryption software for communication in the calculator, and Kevin also purchased a CDAD device and a calculator to synchronize and receive information.
He was very impressed with the device, because it was so niche that the FBI didn't have the strength to work on such a thing at the moment.
Only the two of them use this software, which is a way to avoid being spied on.
With Kevin's help, Lin Hong's network technology has advanced by leaps and bounds in recent times. Of course, a big part of this is because he has a very thorough understanding of the underlying network.
He has already started to implement more sophisticated networking features in Linux, including various utilities for intrusion and detection, such as the "scan" tool that can automatically scan the target server for ports and services.
Kevin's help to Lin Hong is not in the details, but in the thoughts, he pointed out the direction to Lin Hong, so that he took a lot of detours. What's more, he has been emphasizing that the most powerful tool for hackers is social engineering, and that technology is only an aid, and only by mastering this know-how can one truly enter the mén.
In Kevin's eyes, it is a very prickly and interesting thing to disguise himself as a person of various identities and professions to fight with others, especially if he can perceive the emotions of the other person to a certain extent in advance. It's even more handy.
Kevin sees this technique as tailor-made for people like him. Think of it as an art of invasion.
At a very young age, Kevin felt that he could get others to do things for him by disguising himself as someone else.
For example, he once claimed that his father was a high-ranking official of the Ministry of Political Affairs, and as a result, he was respected as the boss by his friends and listened to his command. This lie was not known until he was fourteen years old, and by that time, he had already gone to live and study elsewhere.
It is with the constant practice and experimentation of this kind. Kevin has a knack for getting others to do his bidding. He spends a lot of time researching other people's work, such as how many types of department there are in a company, and what a telecommunications employee needs to do. 4∴8065 What actions and words can make people more convinced that they are who they think they are......
Under the influence of Kevin. Lin Hong also gradually began to try to use another identity to enter and exit some places.
Lin Hong's Xingge is different from Kevin, he has been educated more orthodox since he was a child, and he rarely deceives others except for hiding his secrets.
So when he first tried these things, there was always some awkwardness in his heart, and several times, he was recognized by pretending to be someone else. Of course, others just took this as a good-natured joke, because Lin Hong didn't use his fake identity to do anything bad.
However, it is precisely in the continuous failure and summary that Lin Hong has slowly mastered the skills of social engineering, or the skills of deceiving others, and even if he is confronted by others now, he can use his ability to successfully solve the crisis without changing his heart, and he can also fool him into a fog, thinking that he was mistaken.
……
Time passes. A month has passed in the blink of an eye.
During this period, Diana of Texas Instruments came to Lin Hong, but she did not come alone, but brought another man, namely Miller of Intel.
After the three of them talked for a while at an upscale café, Diana and Miller quickly left.
They come over. The main purpose is to acquire the infrared transmission patent in Lin Hong's hands, but Lin Hong has completely entrusted this matter to Phyllis, and asked them to talk to Phyllis.
Although there is no news so far, Lin Hong knows that he will definitely have to put a lot of dollars in his account.
Because this time Miller represents a joint organization called the "Infrared Data Association", this association is composed of Intel, Hewlett-Packard, Compaq, Texas Instruments...... The purpose of the group jointly initiated by more than 20 companies in the electronics industry is to establish a unified infrared data standard.
They took a fancy to Lin Hong's infrared data transmission protocol, and planned to continue to expand on this basis, and finally establish this standard.
This time, they didn't play any tricks, and after seeing Lin Hong, they showed their identities and intentions.
However, Miller also told Lin Hong that this association is a non-profit organization, and once the standard is established, it will be released to the whole society for free, and I hope Lin Hong can consider this factor.
Of course, Lin Hong also discussed this matter with Phyllis, according to Phyllis, these companies are world-class giants, not bad money, can you talk to them about whether they are profitable or not, not to mention, after the opening of this agreement, the beneficiaries are not these electronics companies themselves?
Lin Hong originally wanted to learn from veteran hackers and make some contributions to society, but was vetoed by Phyllis, saying that although he now has more than 10 million US dollars, it is not enough, and in the eyes of some people, he is still a poor person. If he wants to contribute, it's not too late to do charity when he becomes a world-class billionaire.
This business negotiation has been fruitless for nearly a month, and it is clear that in business, Phyllis is not a person who is easy to fight.
※※※※※
It was Saturday again, and after dinner, Lin Hong returned to his room early.
He walked up to the computer, turned it on, selected the Linux boot menu, entered.
At this time, Linux is not as simple as it was at the beginning, Lin Hong not only implemented as many as hundreds of system calls in bash, but also implemented some hacker-specific commands, such as automatic scanning, traceroutes, and commands in UNIX...... And so on and so forth.
A lot of common GNU software has also been ported, such as GCC, E-MC, TEL, FTP, ......
At this moment, the Linux version used by Lin Hong is already more powerful than his minix.
Lin Hong has completely abandoned minix, the most commonly used is linux, he knows all the operating mechanisms in it clearly, if there is any function that is not in it, he will personally implement it, this feeling of controlling everything is very good.
The only thing that's a bit of a pity is that he hasn't been able to do anything about the file system. Because Linus had said before that he wanted to design a file system by himself, Lin Hong was worried that he already had a plan, so he put this matter aside for the time being, although he had recently studied the content of the file system, and finally did not do it.
Today, he is going to do something very important - to release the bit messenger, which is constantly improving!
After more than a month of research and practice, Lin Hong has become very confident in his network intrusion technology.
These days, he's pretty much all the more famous hacker BBS in the world.
Note that it's not the BBS that are public, it's the BBS that are internal to the major hacker groups.
When he hadn't been in contact with this circle before, the only professional hacker BBS Lin Hong came into contact with was "Blue Eagle", and none of the other hacker BBS knew about it.
Circles are like that, when you don't reach this height, you never know, or even think that those things don't exist at all. And when you really become a part of it, you will find that a whole new world opens up to you.
In addition to the internal BBS of the two hacker organizations "Mask Island" and the second "Anonymous" in the United States, Lin Hong has no clue at all, and other top ten hacker organizations in the United States, such as "Mocking Nong World" and "Massacre 2600" Lin Hong have all been successfully won.
In addition, Lin Hong also found that hackers in Australia are also relatively active, according to the information he saw, during this period, there were at least more than 100 hackers of all kinds in Australia.
Among them, the more famous ones are "Pacific Islands", "Domain", "ZEN", etc.
These BBSs are not open to the public, and only internal members, or those who have been recommended and guaranteed by internal members, have access to them.
But obviously, these are not difficult for Lin Hong, who is a frequent visitor to these BBS, in order to check the latest technology and news.
Of course, this is not to say that Lin Hong's technology is better than that of the members of those organizations, but that Lin Hong has successfully hacked into the servers running these BBS. As for the way of invading, there are those who directly rely on the leakage and technology they have mastered to successfully invade, and there are also accounts obtained through social engineering, and then the rights are escalated...... Etcetera.
After preparing for a while, Lin Hong finally felt that the time was ripe, and he couldn't wait to release his bit messenger.
At the beginning, Lin Hong didn't want to announce it directly, because in essence, this is a completely anti-surveillance and anti-authority software, and everyone knows that it is very bad at the beginning, and it is likely to adversely affect its growth.
Therefore, Lin Hong plans to start with hackers, and I believe that many hackers want to have such a tool that can communicate safely.
Lin Honghu put some thought into it, and Jing Xin prepared a post, in which Lin Hong described in detail the original intention of developing this software.
Of course, what he wrote is not that it was born for communication within the team, but that for the freedom of Jiāo flow, he doesn't want to be monitored by others all day long chatting on the Internet.
At the beginning of the post, he quotes Richard, the father of free software.
"The freedom of software is related to the freedom of human beings." (To be continued)