Chapter 13 The school flower dormitory has a good view

Zhang Qiu now has some anti-tracking measures on this springboard server, and then he tracked the past towards this IP. However, after tracking Zhang Qiu, I found that there didn't seem to be any resistance from the legend, and even the hacker didn't seem to notice that he was tracking her.

Is it a trap? What intrigues does the other side have? Thinking like this, Zhang Qiu arranged a few more traps and honeypots, so that even if there was fraud, the other party could track him back, and he could deal with it with ease.

In this way, after clearing the springboard layer by layer, and tracking five IPs in a row, Zhang Qiu entered a personal computer.

Needless to say, this computer must be the hacker's computer.

After entering, Zhang Qiu didn't do anything, so as not to alarm the hacker.

After checking this IP address, Zhang Qiu suddenly found that this address is the IP of Suxian City, which accurately points to Jinfeng Community.

Well, it can't be such a coincidence, right? It turned out to be a neighbor. Zhang Qiu took a deep breath and felt a little incredible.

The Jinfeng community is just opposite the Jinling community, and the two communities are only separated by a 12-lane road. However, unlike Jinling Community, Jinfeng Community is not a resettlement community, but a commercial housing community. It is divided into two phases, Jinfeng Garden and Jinfeng Mansion, but I don't know where the hackers live.

If that hacker lives in the Jinfeng community, he can really be regarded as a neighbor.

Zhang Qiu couldn't help but think of Lin Lai's bus ride, and thought to himself that Lin Lai took the bus that day, just to go to Jinfeng Community to find the hacker?

After more than ten minutes, Zhang Qiu didn't see any movement from the hacker, so he began to make small moves. Using world-class perfect technology, Zhang Qiu left a backdoor on this computer, so that as soon as he entered the MAC address of this computer, he could track it to this computer.

Unlike IP addresses, MAC addresses point directly to a computer, and theoretically, even if you change your IP, you can still trace the computer. It's just that if you change the IP, it will be a lot more troublesome, and you have to find the IP address of that computer again.

Now Zhang Qiu has an IP and records the MAC address, so you can locate the computer directly with the MAC address.

IP addresses have a large number of shared features, and it is common for many people to share an external IP. For example, an Internet café, such as a school, all the machines in an Internet café, and all the students in a school, generally share an external IP. In this case, it is very difficult for you to use IP to locate individuals.

Although there are also internal IP addresses that can be assisted, in many cases, internal IP addresses are also dynamically assigned. Only the MAC address, like the ID number of each computer, does not change lightly.

After connecting to the computer through the back door, Zhang Qiu was granted a hidden super administrator privilege. However, he did not use his authority to sabotage it, but immediately monitored the computer's movements.

On the screen, hackers are typing lines of code, and they are learning to write hacking software. With such concentration, it's no wonder that even the computer was hacked.

However, Zhang Qiu was still a little depressed, the expected hacker confrontation did not appear, and he was a little too easy. This look, just like when I was damaged by this hacker, I didn't have the power to fight back at all, and I only thought about pulling out the network cable in a hurry.

And now it's the other way around, she can easily hack into this hacker, and she doesn't notice it at all.

Is world-class technology so awesome? Zhang Qiu had a question in his head.

Because before he obtained the Super Somei, he was not even a real hacker, he was completely a novice, and he didn't know what the strength of hackers of various levels was, and he had never carried out hacking in the real sense.

So now although Zhang Qiu has world-class computer knowledge, he is still confused about those things in the hacker world, and he doesn't know anything. After all, all he has is technology, and this technology is not only hacking technology, but a comprehensive computer technology.

Zhang Qiu is now an all-rounder in computer science, maybe he can't compare with the real peak of any technology, but it's only below the peak. And compared to other technologies, then the pinnacle of a certain field can only be killed by Zhang Qiu.

What's more, the pinnacle is only a few, so Zhang Qiu's strength can still be the majority.

"It seems that we have to find a chance to get to know the real hacker, why don't we just monitor this hacker and learn something from her?" Facing his novice hacker, Zhang Qiu made up his mind to make up for it. This hacker was able to easily hack his own computer and damage his own computer, so he should be regarded as a real hacker. Observing hackers and understanding the world of hackers is the most straightforward way.

After observing for a while, the hacker had been writing software, and Zhang Qiu, who didn't see anything famous, closed the lid of his laptop. Turn on your phone and initiate a penguin message with Ning Lan.

Not to mention, having a mobile phone is convenient, even if it's just an old-fashioned feature phone.

After taking a break like this, Zhang Qiu turned on the computer again and monitored another IP in the private album. The location of this IP address turned out to be Suxian No. 1 Middle School, so don't think it must be Lin Lai.

There is a link to the IP address, which proves that Lin Lai is surfing the Internet at the school at the moment. Since Lin Lai didn't use a springboard, although there were professionals in the computer to help strengthen the defense, it was still much simpler than the hacker's computer just now.

It took almost no effort, and in a few seconds, Zhang Qiu had already obtained the secret authority of Lin Lai's computer. At this moment, Lin Lai is not entertaining on the Internet as Zhang Qiu thought, but is watching PPT review courseware on the computer.

In modern society, classes have long been modernized. I don't know where else, every classroom in No. 1 Middle School is equipped with computer projectors, speakers and other equipment, and the teachers have prepared courseware before class, plugged into the computer and directly use PPT to lecture.

The benefits are obvious, first of all, it greatly reduces the frequency of the teacher's use of chalk to write, protects the hand, and reduces the absorption of a large amount of chalk ash, which protects the health of the respiratory tract.

For the students, the class has become more interesting, the knowledge has been more extensive, and the learning has become more intuitive. And every time you understand, you can also ask the teacher for courseware, and use your own smartphone, tablet or computer to strengthen learning, eliminating a lot of note-copying links.

Therefore, Zhang Qiu is no stranger to such a scene of learning with courseware.

I can't imagine that Lin Lai is still working so hard as a school flower! Zhang Qiu couldn't help but be even more intoxicated. Just as boys with good grades are more likely to be favored by girls, girls with good grades and good looks are more favored by boys.

Generally speaking, many students have the worldly impression that the better the grades, the more ugly the girl, and the more beautiful the girl, the less hard she studies.

There are many theories about this phenomenon. For example, beautiful girls are easy to be pursued and harassed by others, and they can't calm down to study, and beautiful girls are more likely to be pursued by boys.

And ugly girls will not be harassed by others and can study wholeheartedly. Ugly girls want to get the attention of others, and they can only go against the sky's academic performance.

However, such a situation is just a common worldly impression. Just like not an ugly girl is a top student, whether you are beautiful or not has no special relationship with the level of learning ability. Among the top students, there are also beautiful women.

Therefore, once a woman is beyond people's worldly impressions, then she will immediately become scarce and become a goddess in everyone's minds. For example, the school bully suddenly became no longer ugly, and the beauty suddenly worked hard.

The school flower is Lin Lai, which is exactly such a situation, she is a scholar but beautiful, and a beauty is hardworking. So she is not only a school girl, but also a goddess.

Courseware or something, Zhang Qiu was naturally not interested. First, I skimmed through common documents and searched for keywords such as "photo", "photo", "souvenir" and "selfie".

Soon he found a large number of private photos stored by Lin Lai on his computer, although many of them he had already kept privately through Guò Space, but there were also many that he had not seen.

In order not to alarm Lin Lai, Zhang Qiu did not watch it wantonly, but made a few small moves and wrote a small Trojan horse that could secretly compress and upload texts in the background.

Fortunately, Lin Lai's computer configuration is good enough, so Zhang Qiu's actions did not cause things like a decrease in computer speed. If you change Zhang Qiu's notebook, it is estimated that someone will have to crash directly if someone makes it like this. Once it crashes, no matter how awesome a hacker is, there is no way.

These photos were secretly uploaded by Zhang Qiu to the public server of Suxian University, which is a top-level departmental server, mainly used as the official website of Suxian University and the web server of the official forum. With a performance of 1.8 Tflops, it is comparable to a low-end enterprise server and comparable to an entry-level supercomputer a few years ago.

With such strong performance, even as a public server for a university, there are still a lot of idle resources. After Zhang Qiu caught this broiler, he immediately divided a hidden partition for his own use.

At this time, Zhang Qiu used this hidden partition as a transit station, and uploaded all these photos of Lin Lai to it after compressing and encrypting them.

In this way, even if the administrator of this server discovers these articles, at most they will only be deleted as Trojan viruses or junk articles, and they will not know that this is a girl's photo.

After doing this, Zhang Qiu continued to wander around Lin Lai's computer, and suddenly found that this laptop was equipped with an embedded high-definition camera. Looking at the driving parameters, there is still no flash, which is suitable for private monitoring.

Zhang Qiu's heart was hot, as if a stream of blood was gushing up, and his face became a little hot.

Without saying a word, he immediately quietly turned on the camera, relayed and recorded the remote protocol of the number of jùtong guò through the public server of Su University, and played it on his laptop.

With the capacity of Zhang Qiu's computer hard disk, it is naturally impossible to store a large number of video texts, so Zhang Qiu chose to use a server to record and store, and his computer only plays.

In this way, there is no movement on Lin Lai's computer, and unless she can check the background service process, she will not find herself being monitored at all. But with Lin Lai's computer level, it is estimated that he doesn't know what the service process is, let alone check the service process and find that the camera service is already active.

What's more, with enough time, Zhang Qiu had already disguised himself and disguised all the processes about the camera.

After buffering for about a minute, Lin Lai's face, which made Zhang Qiu dream, finally appeared on Zhang Qiu's computer screen.

Just by looking at it, Zhang Qiu felt his blood boiling, and almost had a nosebleed on the screen. It's so fragrant, it's worthy of a girls' dormitory!

――――――――

All the techniques and theories involved in this book are not realistic, they are only written for the needs of the plot, and they cannot stand up to consideration. I hope that science students will care about these details (*^__^*)