Chapter 60: Internal Response (II)

Chapter 60 (II)

Familiar with finding the hidden partition, Yang Yiwei did not hesitate this time and directly began to let the mechanical mouse crack the hidden program outside, Yang Yiwei just started to act, a new program popped out, Yang Yiwei was startled at first, he thought he had touched some honeypot at the beginning, but soon Yang Yiwei found out that this was a dormant security encryption program.

It's also to protect the hidden partition, squinting slightly, this program doesn't send any data, and other Yang Yiwei can't find it, but in terms of data, this program is not connected to other programs that can't escape the "eyes" of mechanical mice. Any data exchange is converted into a signal, but the robot rat does not catch the new signal transmission, which means that the encryption program is only a passively dormant security program.

Only one person is trying to crack this encrypted hidden space, it will automatically pop up, a little check this encryption program, Yang Yiwei has a little headache, this hidden space is really not as simple as it seems on the surface, at least this encryption program is definitely a master can crack, a little check, Yang Yiwei knows that this encryption program is definitely the top encryption program in the world.

The Robot Mouse is quite strong in signal tracking, but it is not so good at cracking codes, and the only thing that can be done is to use it and the powerful computing power of the Biomodifier to forcibly crack it. In addition, there may be other ways, but Yang Yiwei's current strength is not good, so he simply didn't want to, and directly let the biomodifier forcibly start cracking, Yang Yiwei took a look at the cracking time, it took four hours.

It only takes 4 hours to forcibly crack the encryption program with up to 256-bit encryption, which is simply terrifying, and this is not the main function of the biomodification device. But if you think about it carefully, the scientific and technological strength of the civilization where the biomodifier is located is much higher than that of the earth, just like we took back the one or two hundred copycat mobile phones that can be seen everywhere now 2000 years ago, they were all artifacts! Moreover, the CPU of copycat mobile phones is definitely stronger than the CPU computing power of personal computers before 2000.

This is the power of the overall scientific and technological improvement, and he shook his head slightly, about four hours of forcible cracking time, Yang Yiwei has no other way but to wait, fortunately, no one will come over this whole night, and Yang Yiwei doesn't have to worry about anything.

Time passes very slowly, especially when you are waiting for one thing, Yang Yiwei, who was bored, simply opened the World of Warcraft and placed a large copy with Bian Ming, I have to say that now the copy of the World of Warcraft is not as perverted as before, and after a total of several copies, it took more than three hours to survive, and said goodbye to Bian Ming, and Yang Yiwei closed the World of Warcraft.

With the completion of the countdown of the last second, the encryption program in front of him was directly forcibly cracked by Yang Yiwei, and the cracked password was entered into it, and the encryption program in front of him flashed and disappeared directly. In this exclamation, Yang Yiwei has been paying attention to the page of the mechanical mouse, confirming that this program has not generated data exchange with the outside world, and Yang Yiwei began to move on to the next step. Breaking this encryption program, what follows is the relatively simple hiding method of the original hidden space.

Yang Yiwei felt a little strange, the encryption program just now seemed to be added later, after all, if there is that encryption program, there is no need to arrange the simple encryption program in front of him, is it a honeypot? Yang Yiwei was a little hesitant, but if you want to call it a honeypot, it's not a good thing, the honeypot is a trap in the Internet world, and this thing is used to harm people. …,

However, Yang Yiwei didn't have to worry too much about the biological modification instrument, after thinking about it, it had come to this point, he simply began to forcibly crack this simple hidden space, the cracking process was very smooth, and it only took ten minutes before and after, Yang Yiwei finally entered this hidden space. Until entering this hidden space, Yang Yiwei was still cautiously guarding against a sudden outbreak of Trojan horses or viruses, but there was nothing.

Nothing happened, and after repeatedly confirming that nothing had happened, Yang Yiwei was a little unbelievable to confirm that this thing was indeed not a honeypot. What the hell is this playing? Yang Yiwei was a little entangled, this tattered and simple way to hide, isn't this taking off his pants and farting, and spending an extra set of procedures?

However, Yang Yiwei can't think about this, he needs to see what the content is now, with the powerful computing function of the bio-modification instrument, Yang Yiwei simply packaged and copied all the data into the storage space of the bio-transformation instrument. After copying back, Yang Yiwei began to be simple, and half an hour later, Yang Yiwei raised his head with a strange expression.

Nima, what the hell is this playing? If Yang Yiwei is not mistaken, the pile of data he copied back should be a client of a web game, right? After repeated confirmations, Yang Yiwei was also completely messy, what is the situation? There is no imaginary Trojan horse here.,Some are actually a client for a web game that can't be played?

After being stunned for a long time, Yang Yiwei suddenly remembered something, re-entered the client of Dream Jewelry, and let the mechanical mouse monitor the external data traffic of the hidden space, about ten minutes later, Yang Yiwei was sure that this is really a client of a web game, and there are obviously users playing, the data exchange here is not only regular, but also the data exchange is quite large, which proves that this web game is still a little hot.

It's just that the server of Dream Jewelry is quite high-end, and this bit of traffic occupation is nothing, so those security personnel can't tell it at all, besides, there are two clever programs hidden outside, and it is impossible for security personnel to find out here. In this way...... A thought flashed through Yang Yiwei's mind, could it be that Ye Yulin was the same as himself? Is it also the target of others?

In this way, it is easier to explain, why the two numbers hanging on the server in this hidden space are in a state of hang-up, just used to place the web game client, naturally there is no need to be active all the time, that is to say, these two hackers are just to steal server resources, not what Yang Yiwei imagined, the internal response of those killers.

One of these is definitely Ye Yulin, which Yang Yiwei is sure of, so in other words, Ye Yulin is just a hacker who steals the company's server resources? And there should be someone else among those thieves?

Rub, there is no way to find the target now, there are dozens of security personnel in the entire security department, anyone is possible! But now is not the time to draw conclusions, Yang Yiwei directly called up the auxiliary system, and began to let the auxiliary system retrieve the source code and related data of the Trojan horse found in his notebook in this large pile of web game client information, to see if there is the same.

First update! Ask for Votes!!