HK018 Shi Lei was invaded?
After cleaning up Chen Ming, Shi Lei lay on the bed happily and fell asleep.
October 1, the National Day of the Summer Kingdom.
In 06 years, the National Day holiday was still seven days.
Ling Yumo had already gone home, and Mu Shuang took a plane back to Shengjing City last night.
Kubi Xiao Lizi also returned to Chang'an, listened to him, and he was still ready to go out with some more things at the place where the old man worked.
This kid is completely hopeless!
Shi Lei is an orphan and has no relatives, as for that inexplicable uncle, he doesn't like Shi Lei, and Shi Lei doesn't like him either.
The two haven't seen each other for more than three years!
Staying alone in the dormitory, Shi Lei thought about some problems.
Like, who are his parents?
Also, how huge was the organization he joined in his previous life?
The organization ruthlessly abandoned Shi Lei, causing Shi Lei to die, how could Shi Lei let them go!
It's just that that organization is too powerful, and Shi Lei won't touch and track them down for the time being.
In his previous life, as a pinnacle-level hacker in the world, although Shi Lei was in the network, he called for wind and rain and dominated one side.
But in the real world, he is a complete little person.
There is no power of its own.
After being reborn, although Shi Lei was hip-hop and ha-hopping, there was no positive shape, but Shi Lei secretly made up his mind, not only to turn his hands into clouds in the Internet.
In reality, it is also necessary to cover your hands for rain!
Turning on the computer, Shi Lei used the server of Shuangqing University as a springboard and landed on the website of the hacker alliance.
Hacker Affiliate is a second-generation hacker group, created by the website of the same name.
The second generation of hackers, rising from 98 to 2,000 years, as the backbone of the current hacker world, the second generation of hackers have excellent skills and high quality, and have supported the hacker circle.
And many of the first generation of hackers have transformed, engaged in cybersecurity, cyber technology, and even opened their own cyber security companies.
Compared to the second generation of hackers, the first generation of hackers is even more powerful!
They are Xia Guo, the first group of people to come into contact with computers and networks, and they have a very high level of education and computer level.
The second generation of hackers basically groped their way out along the path of the first generation of hackers.
As for the hackers after two thousand years, they are collectively referred to as the third generation of hackers.
In the third generation of hackers, there is no shortage of talented people. Horizontal, strong guy. But more third-generation hackers are just copying the methods summarized by their predecessors and the attack tools developed by others.
Compared with the first generation of hackers and the second generation of hackers, the overall strength of the third generation of hackers is too far apart!
The Hacker Alliance is a hacker organization established by the famous black knife in the second generation of hackers.
Among the second-generation hacker groups, the hacker alliance is one of the best.
Shi Lei used to be a member of the Hacker Alliance, although he later broke away from the Hacker Alliance, but the Hacker Alliance helped him a lot.
Shi Lei registered an ID named 'Lucifer' and browsed through the hacker alliance.
At this time, the hacker alliance was not as snobbish as it was a decade later.
Lots of stuff, all for free!
After only a few minutes of browsing, Shi Lei's computer actually started to call the police!
It turned out that the guy who was also browsing the hacker alliance logged in to the IP information through the web page, chased after the door, and had already found the server of Shuangqing University and was attacking!
Shuangqing University's public server, after Shi Lei's adjustment, has increased its defense countless times, how can it be easily attacked?
Shi Lei tracked the intruder, and within a moment, Shi Lei easily traced the IP address of the intruder.
Maybe it's because the other party is too focused on hacking the server of Shuangqing University, or maybe it's because the other party's skills are poor, and they didn't find Shi Lei, and they have already chased and killed the past!
In the network, the IP address is like the home address in the real world. โฆ,
If the other party knows the IP address, it is like being blocked by the police, waiting to be caught!
After getting the other party's IP address, Shi Lei did not rush to invade, but began to query the other party's IP address, the corresponding attribution!
Shi Lei smiled at the corner of his mouth, as long as he knew the location of the other party and exposed the other party to the sun, it was equivalent to a death sentence for hackers!
"Huh!"
Looking at the IP address attribution, Shi Lei showed a surprised look.
The other party turned out to be from Shuangqing University of Science and Technology!
The computer science department of Shuangqing University has always been on the wrong path with the computer department of the University of Science and Technology.
Students on both sides hack each other, often breaking into each other's campus servers, and killing each other with great pleasure.
Even the heads of faculties on both sides acquiesced in this behavior.
After all, it helps to increase students' interest in learning.
Shi Lei was about to go further when he suddenly lost contact with the other party.
Shuangqing University of Science and Technology, in the campus library, an ordinary-looking man directly forced the computer to be turned off.
The man breathed a sigh of relief after confirming that the computer was turned off.
He whispered to himself, "It's so amazing, it caught up with my IP address silently." โ
"It's a good thing to use the library's public computer, otherwise, it would have been dead!"
Shuangqing University, No. 1 Doctoral Dormitory Building, No. 501 Middle School.
Shi Lei snorted coldly.
"Shut down? Unplug the network cable? โ
"I can escape for a while, but I can't escape for a lifetime!"
A real hacker master will never make such a stupid move.
Even if you unplug the network cable and make the other party lose the connection, people can still trace it up and find the specific IP address.
So as to use other means, such as in reality, locate the place of ownership of the IP address, and directly come to the door to arrest people!
Therefore, the master hacker will never shut down and pull out the network cable. will only try to run away and get away from the other party's tracking.
Shi Lei still remembers that in his previous life, another world-level peak hacker single-handedly hacked into the FBI's internal intelligence system.
Although he invaded it very well, and knew a lot of secret information.
However, the tracking experts of the FBI chased him for most of the world, constantly using the method of combining the Internet and reality, and finally caught the world's top hacker in the Gran Country.
The FBI's tracking experts may not be able to invade or defend, but in terms of tracking, they are definitely tough and abnormal.
Combined with the powerful country of Lijianguo, people track experts, and where they are chased, they will notify the police.
Once the IP address is identified, the police come to the door at breakneck speed.
When the time comes, it won't be easy even if you want to run!
Therefore, shutting down and pulling out the network cable is definitely a bad move!
Now that the IP address of the other party has been determined, Shi Lei was not polite and directly began to attack the server of the University of Science and Technology.
Shi Lei did not attack violently, but scanned the loopholes, trying to lurk in silently.
Through port scanning, Shi Lei found that the strength of the University of Science and Technology is actually much stronger than Shuangqing University!
This was not the case in my previous life!
In the previous life, the University of Science and Technology and Shuangqing University, the strength of the two sides was almost the same!
How so?
Could it be Shi Lei, this little butterfly, driving the effect?
Although the defense power of the server of the University of Science and Technology exceeds that of Shuangqing University, for Shi Lei, it is still like paper paste, which can be broken as soon as it is stabbed.
After Shi Lei entered the server of the University of Science and Technology, he began to retrieve the server's permission user group.
In the server of the University of Science and Technology, the president is not super authorized!
In the entire server, there is only one super account, which is in the hands of the administrator, and the administrator is tracking down Shi Lei at the moment!
Shi Lei looked at the computer screen with disdain, tapping the code with both hands. โฆ,
"Let me go down!"
After more than ten seconds, Shi Lei kicked the opponent's super user out of the server permission group and began to establish his own super permission user.
After locking the server's user group, Shi Lei began to check the IP address allocation of the University of Science and Technology.
"Little scumbag, little scumbag, Brother Shi is going to catch you!"
On campus, a local area network is used, and each IP address has a corresponding real-world specific address.
Just like the network of Shi Lei's dormitory, it is also a campus LAN, if you find Shi Lei's IP address, you can find the dormitory corresponding to the IP in the server of Shuangqing University, and then through the dormitory allocation record, you can find Shi Lei's identity!
Shi Lei was preparing to use this method to find the guy who had just invaded him at Shuangqing University of Science and Technology.
Although that guy only traced the server of Shuangqing University through the login IP provided by the hacker alliance webpage, he didn't even break the server firewall.
But is Shi Lei the kind of person who deceives the door and has no temper?
Shi Lei found the intruder's IP and the corresponding real address in the server of the University of Science and Technology, but found that it was the school library, a public computer!
In this way, the clue is broken!
After all, it was just an ordinary invasion, and there was no invasion, so it was impossible for Shi Lei to investigate further.
If it is an invasion of state organs, and people find out this step, then it is time to come to the door to find someone. And will investigate all the people who entered the library during this time, and then ask each other one by one, and point to each other the people who used the computer during this time.
If it really investigates like that, I'm afraid it will be easy to find out, who hacked into Shi Lei's computer.
It's just that Shi Lei is an ordinary person, and he can't conduct that kind of investigation at all.
"Hey, depressed, although shutting down and pulling out the network cable is a bad trick, but it's still quite effective!"
I have to admit that under normal circumstances, dealing with tracking and unplugging the network cable is also a solution.
"I can't find out who you are, but you're from the University of Science and Technology!"
In the previous life, there was also a master in the University of Science and Technology, Shi Lei and that master, who often fought.
The computer departments of the two sides, led by the two of them, often fought each other.
The most serious time, because Shi Lei was not in the school, a kid from the University of Science and Technology actually mounted a Wosang national love action art film on the campus forum of Shuangqing University.
After provoking Shi Lei back, he led the people to kill him, cleaned up all the things in the server of the University of Science and Technology, and deliberately repeatedly formatted the other party's server at a low level.
Finally, the server of the University of Science and Technology will be completely overturned!
This time, Shi Lei made a provocative post in the forum of the University of Science and Technology.
The content is written sprinkled: That pen boy, who has no ability to learn what to invade, actually turned off the phone and pulled out the network cable?
Shame on you!
It's rubbish!
The computer department of your university of science and technology is all rubbish!
At the end of the post, Shi Lei left the name of 'Lucifer'.
Believe that the person who invaded him, should understand!
When the time comes, whether the universities of the two sides will have another mutual black competition, then I don't know what to do!
Anyway, Shi Lei is not afraid!
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
PS: Shanshan is crying, you have to be kind, if you can't reach the goal, you won't vote!
At present, the recommended votes are close to 2000, and 2200 votes are added!
In addition, there is a small activity in the book review area to give away penguin couple accounts, and book friends who need it, go and reply to the post!
Hey, hey, one ID is limited to 10 replies yo!
Ask for recommendation votes, ask for collections, ask for member clicks, ask for rewards, ask for evaluations, and ask for packages
โโ
ใReward thanksใXuanzi_Tomb,Aixuan 1314, ใๆฎโปliangใ,Reward 100