Chapter 729: Just Five Minutes

The examiner was very surprised when he saw this warrior and performed the card playing skills on the spot, and he quickly grabbed the 13 heart cards accurately in the air and arranged them in order: "How did you practice this?" ”

"I watched my dad gamble since I was a child, and I learned it from me."

"Then why don't you want to be a magician or an acrobat?"

"My parents died in the fire, and I had nowhere to go, so I joined the army."

"Oh, why do you want to be a member of the Flying Eagles, it's dangerous and hard?"

"No matter how dangerous and difficult it is, I have seen it all, there is nothing to be afraid of!"

A reporter was also fascinated by watching it just now, and when he heard their conversation, he hurriedly came over and asked: "Do you think that the eagle can save people, and if you can be like the eagle when you are a child, you can save your parents?" ”

"No, I'm here for the Mu detachment and the Jin brigade, they are very good!"

The reporter listened to it again.

The examiner of the little member of the Eagle Eagle looked at the warrior in front of him who was a little younger than him, and didn't know how to score it, so he said: "Your skills are very exciting, I'll write it down first, and I will recommend the video just now to the chief you worship." ”

The warrior stared at the examiner and said, "Thank you." ”

The little examiner hurriedly avoided the soldier's eyes, turned around, as if shivering, and said to himself: "Hey, this look is too poisonous." ”

Indeed, this warrior's eyes and hands are incomparably fast, and they are jaw-dropping. No slight change could escape his eyes, no wonder the little examiner felt a little frightened.

On the other side, someone broke out again. One of the fighters took out a USB stick from his pocket and said to the examiner, "I can hack your assessment system." ”

As soon as these words came out, the examiner first shook his head and immediately said, "Is it?" What gear do you need? ”

"My own computer, is it available?"

"Permission to use."

This member of the Flying Eagle was also a computer master who took over Shao Ning's position, and he quickly took out his computer and said to the player: "Make an exception and give you 10 minutes." ”

"No, just 5 minutes."

"Cut!" The examiner felt that the kid was a little arrogant.

Soon the fighter's computer turned on and the USB flash drive was inserted. The examiner's computer is also turned on, ready to detect the interception.

The warrior quickly entered the on-site assessment system. The examiner also quickly detected the hacking and immediately took interception measures, but was redefined by the fighters as having no authority to act.

Not only was the examiner's computer unable to intercept hacker attacks, but the examiner's access to the system was canceled.

In fact, this means that now this warrior has changed roles with the examiner.

Mu Tianyu was working in the office, while observing the scene of the selection competition.

Suddenly, he felt that there was a hacker intrusion in the assessment system running in the background in the computer, and he was busy opening the assessment system running in the background, and found that the test results were being downloaded, and then began to tamper with the data.

Mu Tianyu quickly began to fight back, first detecting the hacker intrusion port, and then redefining the permissions.

It was discovered that the highest privilege had been obtained by hackers.

Mu Tianyu knew that hackers obtained system privileges, mainly using various Trojan horses, backdoor programs, and programs written by hackers themselves that caused buffer overflows.

The former, which allows hackers to illegally gain full control of the user's machine.

The latter, which allows hackers to gain superuser privileges and thus absolute control over the entire network.

Theoretically, backdoors are those that bypass security controls and gain access to programs or systems. In software development, programmers create backdoors in the software so that flaws in the program design can be modified. For example, people who use the indos operating system know that there is an indos updata program, which is used to update the operating system patches. This indos updata actually works using a backdoor.

Mu Tianyu immediately determined two points: first, what is the hacker's remote control technology and the evaluation system of the Flying Eagle Arena to establish at least one TCP or UPD connection. The second is that the hacker remotely controls the Trojan to write to the evaluation system, at least one random startup item, service startup item, or hijacking the normal startup item necessary for the system.

He immediately and purposefully chose to call the TCPVIE program he developed himself, quickly found the backdoor bundler, and forcibly cleared it.

On the field, when the young examiner is at a loss, he is ready to let the warrior who plays the hacker hurry up. But at this moment, his computer system suddenly returned to normal, but the soldier's computer system was destroyed, and he could not continue to operate at all, and it became a chaotic screen of death.

"Ahh Oh my god! The soldier suddenly burst into tears and cried: "Examiner, you are too ruthless, I just showed it, and left a backup of your data." ”

This time, it was the turn of the young examiner, who was confused: "Why are you crying?" I know you're awesome, okay, okay, the system is restored, and I'll record your results. ”

The instructor thought that it was this fighter who cried tears of joy because he had defeated him. He thought it was too exaggerated, and the exaggeration made him feel very shameless.

And the soldier thought that this examiner was too powerful, what he was most worried about was also the most feared move, thinking that no one had the ability to use that trick, but he didn't want to, he was hit, not only was the system he attacked quickly and completely recovered, but as a hacker, his computer was also destroyed at the same time, and even difficult to repair, facing scrapping.

He cried, and no one understood him.

His beloved computer, tuned and optimized to the extreme, was scrapped for a display. For a computer programmer, he can give up everything but not want to damage his computer.

Just like a soldier on the battlefield, the gun in his hand is like a part of his body, precious and must be cherished.

The soldier was distressed, hugged his computer, walked to the edge of the arena, sat on the ground, and simply cried.

The examiner, looking at the situation that suddenly evolved over there, was really inexplicable, and everyone was very puzzled, didn't he already win, why did he really cry, and seemed to be very sad.

The examiner is also a young man, just a college student in a military academy, and he doesn't want to offend other people's firefighters who fight every day. Hurriedly ran over and bent down, and asked kindly, "Hey, what's wrong with you, are you not feeling well?" ”

"You're too ruthless, you might as well beat me up and kill me."

"What are you talking about, how cruel am I, why should I beat you?"

A lot of people came around, and they didn't know what was going on.

Due to the short-term paralysis of the computer evaluation system in the arena just now, the game was forced to be interrupted, and everyone was about to complain about this fighter, but the system was completely restored to normal, and the data was also restored at the same time.

Everyone still thought that this fighter was very powerful and showed it successfully.

I don't know why he suddenly became like this.

(Thank you for subscribing, and ask for more recommendations, more favorites, and more votes!) )