Chapter 144: Monkey Virus [350 votes plus update]
Chapter 144 Monkey Virus 350 votes plus update
Lin Hong restarted it twice more reluctantly, and a line of text was still displayed on the monitor: "Invalid drive".
Fortunately, he is not a rookie who doesn't know anything now, and he probably knows a little about this situation (the latest chapter of seeking demons), and he won't be as panicked as before.
However, he has not yet reached the point where he can solve this problem. I had no choice but to turn to Arthur, who should have experience in this area.
He looked at the time, it was past one o'clock in the morning, Arthur didn't know that he was asleep at the moment?
If it were a normal day, he would have fallen asleep a long time ago, but it is estimated that his sleep will be a little chaotic in the past two days.
Lin Hong walked outside, stood quietly outside Arthur's door and listened for a while, and sure enough, he heard some movement, so he knocked on the door a few times.
"Knock knock."
I heard a sudden loud noise inside, and the sudden knock on the door seemed to startle Arthur.
After a while, he asked, "Who?" ”
It was I who replied in a low voice.
The door was opened, and Arthur looked at Lin Hong with a surprised expression: "You haven't slept yet?" ”
"Aren't you also sleepless?". Arthur smiled at him, "I'm connected to the Internet today, I'm more excited, I've been online." ”
"I can't sleep either, you know, for that program on the calculator. Matthew hasn't slept right now, and I've been chatting online for a long time. ”
Arthur welcomed Lin Hong into the room, and then tiptoed the door shut, if his parents heard it, he would be scolded.
"How's it going?"
Lin Hong saw that a code editor was open in Arthur's computer, and he was obviously writing code just now.
"I'm writing a ping-pong game." Arthur sat back in his seat, "You should know, right?" The sport of table tennis should be very popular in China. ”
Lin Hong nodded, he instantly understood what Arthur meant: "Can you play a table tennis game online?" ”。
"Yes. Although this game is simple, it is much more fun and playable if you can connect two calculators to play. Once this is done, we can also port multiplayer on other platforms to the TI-82. ”
He discussed it with Matthew for a long time, and finally decided to solve the online problem first, and then think about other interesting game content, as long as the two calculators can be successfully connected, ordinary games can become very interesting.
The back-to-school prom is coming, and they need to finish the game before the prom starts.
Lin Hong agreed with their idea and asked casually, "Have you studied infrared communication technology before?" ”。
Arthur shook his head: "There is too little technical information in this area, I checked it, there are many communication protocols in this area, there is no unified standard, and I have studied several more common communication protocols, all of which are relatively bloated and not suitable for us." ”
"What about the official agreement used by Texas Instruments?" Lin Hong remembered that they themselves had a built-in communication function.
"I don't know exactly which protocol they're using, and they're not disclosing it." Speaking of which, Arthur's mood was a little impatient, "Time is too short, there is only one day left, and we definitely can't develop it before the ball starts!" ”
When Lin Hong was at school today, he had already taken the time to see the communication protocol almost, and he no longer wanted to be as blind as before, so now he could have a smooth conversation with Arthur.
He knew that infrared communication must have its own protocol, but he didn't expect that there was no unified standard at all, everyone fought separately, and almost every manufacturer had its own set of standards.
"How's your table tennis program going?"
"It's almost there, only the communication side is left, and if you can't communicate, the next development can't go on at all."
Lin Hong patted Arthur on the shoulder: "Man, don't worry, since none of their agreements can meet our requirements, then we will make our own agreements like other manufacturers." ”
"Make it yourself?" Arthur was a little moved when he heard his words, "It's a solution, but is it too late?" ”。
"Of course, we have one more day and night to give, and I think that should be enough, let's design this protocol together. Before I can do me a favor, though. Lin Hong finally said his own business.
"What's the matter?"
"My computer won't boot anymore."
Coming to Lin Hong's room, Arthur only glanced at the monitor and knew what was going on.
"The computer is poisoned."
"I know, it's all my fault." Lin Hong was a little depressed and told Arthur about the stupid thing he had done just now.
Arthur said that he understands the emergence of this situation (the latest chapter of the demon quest), he said that the rookie stage, this situation generally occurs (the latest chapter of the demon quest), and the current computer network environment is no longer as before, all kinds of viruses and Trojans have begun to appear, and novices enter the network and are easily poisoned and infected.
Arthur retrieved a system floppy disk from his room, rebooted it, and soon entered an interface, and after entering a command, he said:
"The hard drive is gone."
Lin Hong was shocked when he heard this: "How come? I haven't dismantled this machine. ”
"Hehe, don't worry." Seeing that he was frightened, Arthur immediately laughed, "I mean, the virus destroyed the boot record of the hard disk, so I use the system on the floppy disk now to go in, and I can't find the existence of the hard disk." ”
Then he called up one of the gadgets, then entered a few commands to check it, and found that the hard drive was missing.
"It's a variant of the monkey virus." He already knew the type of virus.
"Monkey virus?" Lin Hong suddenly came to his senses when he heard this, this was the first time he had experienced poisoning, and some of them were not afraid and afraid of it, but had a different sense of excitement.
"Yes. The Australian hacker modified the monkey virus himself, but his technology is obviously not at home, otherwise this would not have happened when it was launched......"
After Arthur's introduction, Lin Hong knew that this monkey virus itself is indeed a very powerful virus, which can modify the boot sector in the computer hard disk, move the boot record originally stored in the first sector to the third sector, and then take the magpie's nest by himself to replace it, so that when the computer starts, it will be loaded into the memory as soon as possible, and then it will load the system, so as to achieve the purpose of hiding itself, people who do not know its principle cannot kill it.
A computer's hard disk is structured in a circular shape, roughly like a record, with the hard disk rotating continuously so that the head can read the data stored on the disk. Usually, the division of the hard disk data area is carried out by sector, just like the Chinese folding fan structure, the reason for this is to locate the location of the data on the disk, in addition to the sector, there are parameters such as cylinder and track, which constitute the address coordinates of the data on the hard disk. With this coordinate, the programmer can easily store and read the data. Therefore, the process by which the head is looking for data is called the "addressing" process.
The main boot sector is located in sector 1 of the 0th cylinder of track 0 of the entire hard disk (the coordinates can be considered 0,0,1), which is the first part of the disk.
If the hard disk is a spiraling highway, then the main guidance sector is the "entrance" of the highway, at this entrance, there is a "map", the map has important information about the highway (guidance record MBR and partition table DPT), and the "driver" who enters the highway is a road blind, and amnesia, every time you enter you must rely on a map to not get lost.
Monkey is a clever "road rage", after he arrived, he directly forcibly pushed the "entrance" where the map was placed two kilometers back, changing its coordinates to 0,0,3, and then, he disguised himself as the entrance to the highway, so that every time the driver entered, he passed in front of him, at this time, he secretly jumped into the driver's "trunk (memory)", quietly hid inside, waiting for the opportunity to do something bad.
Monkey's cleverness lies in the fact that he managed to hide in the "trunk" before entering the highway, so that even if the driver suspects that something is wrong with the highway and invites his rival "scavenger" to clean the obstacles on the road, he will not be aware of his existence at all, and he will be able to evade the "scavenger" inspection every time he cleans, laughing at the stupidity of his peers.
However, the car bandit road rage that Lin Hong met now was obviously incompetent, and when he was camouflaging the highway entrance, he was not at home, and he actually led the highway to a fork in the road, so he was immediately discovered to be abnormal.
What Arthur is doing now is to repair the highway entrance that was diverted, and then move the removed entrance back so that the driver can find the right way.
"OK, it's fixed." Arthur withdrew the floppy disk from the floppy drive, restarted the computer, and after self-checking, the system successfully entered the familiar DOS interface.
"Thank you." Lin Hong now has a deeper understanding of this guided virus.
Then, Arthur did some research on the program that Lin Hong downloaded, and finally found that this program turned out to be a Trojan horse program, he disguised himself as dial-up login software, under the guise of free Internet access, deceived unfamiliar users into entering accounts and passwords, and then through the email sending function hidden in the program, the account number and password were sent to the email account designated by the other party, so that the other party could steal other users' Internet accounts.
Lin Hong couldn't help but feel very stunned after learning about this situation (the latest chapter of seeking demons), he didn't expect that there was such a trap on the original network, but he quickly understood this situation (the latest chapter of seeking demons), the subject of the network is also a person, all behaviors and habits in real life will be projected on the network, and due to the anonymous characteristics of the network, these negative emotions and behaviors will be amplified and become more intensified.
In short, the network is not as good as he imagined, the network is risky, and you need to be cautious when surfing the Internet! Fortunately, the other party is far away in Australia, even if he gets his account password, it is useless, and now that he knows about it, he can immediately change the password to prevent others from stealing it.
Chapter 144 Monkey Virus [350 votes plus update]
Chapter 144 Monkey Virus [350 votes plus, go to (Holy King txt download) to read the novel.]