Chapter 865: Awesome hacker

Just last year, experts from West Germany came to East Germany to attend a conference, and as a result, they were shocked by the East German network, they did not expect that East Germany's science and technology would develop so rapidly! The network of the GDR is so powerful!

What they are most enthusiastic about is distributed computing, there is no mainframe computer, so a large number of microcomputers are networked for computing and used to complete many difficult tasks! After seeing these applications, the West German experts could not sit still and immediately said that they would import East German network technology. Pen @ fun @ pavilion wWw. biqUgE。 info

In the face of a friend's application, East Germany was of course embarrassed to refuse, so a few days later, the West German government approved, the cooperation project between the two sides began, a fiber connected East Germany and West Germany, at the same time, a large number of network equipment, was installed in West Germany, West German universities were also the first to access the network, and soon they felt the convenience.

At the same time, the government office system in West Germany is also connected to the network, using the network, they can more easily complete various tasks, such as sending documents to subordinate units, and the matter is finished in a few seconds, while in the past, it was necessary to send a liaison officer to deliver documents, which took half a day, and it was easy to miss!

When the network spread in West Germany, they felt the huge advantages of the network, and as a result, even the Ministry of Defense could not hold it back, and they also connected to the network!

And at this point, there is clearly no talk of cybercrime yet!

Not to mention cybercrime, in this era, there is no Internet, even the world's most famous Kevin Mitnick, has just invaded the telephone network, history, 83 years now, he used a university computer to access the Internet's predecessor ARPA network without authorization, and entered the Pentagon's computer through the network, and was sentenced to 6 months in a youth correctional facility in California. The talk of cyber hacking has not officially begun.

However, now in the Soviet Union, the rapid development of computer network technology has finally begun to make computers accessible to ordinary people, and since ancient times, heroes have come out of youth.

At the age of ten, isn't he still a little kid? However, when it comes to computers, it really depends on the brains of geniuses.

In later generations of China, there was a computer genius Wang Zhengyang who went to Tsinghua University. When I was 8 years old, I suddenly became obsessed with coding. So his father immediately bought him a top-of-the-line laptop at that time, and Wang Zhengyang began his programming career, writing code for 5 years, and finally the computer keyboard was broken by him. He often looks for vulnerabilities in various websites to train his computer skills. I bought a 2,500 yuan item on a website for a penny, and I was not yet ten years old at the time. Of course, he didn't ask for the goods, but instead told the website about the loophole.

Computer networks are a new thing, and the USSR was at the forefront of this, and in the USSR, another awesome hacker was born!

Hackers are regardless of age, only look at talent, I have to say, this thing is really related to talent, in the eyes of ordinary people, lines of code, is quite boring, and in the eyes of others, code is a beating note.

And now, in front of Andrei's eyes, a powerful hacker is emerging, and people are now hacking into the computer system of the West German Ministry of Defense!

When the computer is networked, it will face security problems, and in order to protect their data from loss, the computers of important departments must have a password system, if it is a familiar person, you can try to use a combination of numbers such as birthdays, and for broilers who do not know, it can only be by violent means, constantly trying to crack the password!

Maybe it will take a long time, maybe it will only take a few minutes, it's all up to luck!

"Ivan, where did you get this code-breaking program?" Andrei suppressed the excitement in his heart and asked Ivan.

"Of course I wrote it myself, the system of the Ministry of Defense in West Germany, which uses the UNIX system, which I optimized specifically for." Ivan said: "Besides, this kind of program can only be written by yourself, do you still expect others to fail it?" ”

Andrei noticed that there were some computer books at the head of Ivan's bed, the latest computer primer, assembly principles, etc., Andrei before the crossing, when reading these books, was quite a headache, after all, the programs of later generations have developed to an advanced stage, and many programmers are just code porters, copy and paste, and copy the corresponding code if they need any function. But now, it's all assembly language, dealing directly with machines.

If you don't know the computer hardware, you are not familiar with various technical parameters, and you can't write a program at all, this little Ivan is simply amazing!

And just then, suddenly, the beating images on the screen stopped! Ivan quickly ran over and sat down on the chair, and then, his fingers continued to fly: "Go in, finally get in, I am now, I want to copy the contents in the shortest possible time!" I hope the Germans will stay with me longer, greetings to your God! ”

Ivan chattered endlessly, his fingers kept beating, and the keyboard caracalla rang, and Ivan's face was extremely excited at this time: "Okay, I successfully copied one of their documents, well, and then the second." It seems that I still have to save my pocket money for next month, and I want to buy a big hard drive to save all this information. Oh, not good! ”

The characters that are jumping on the screen are suddenly gone, and the copy fails!

"The connection is interrupted, and the network is disconnected over there!" Little Ivan said depressedly: "I could have copied more, well, now look at it, see what is good in it." ”

Ivan opened the file just now, but all that was displayed on the screen was in German!

The system of the Ministry of Defense that invaded Germany, the documents in it, of course, are all in German! Andre got closer and saw the content on it, and suddenly, his face changed.

Analysis of the feasibility of military exchanges with the GDR.

Andrei, who also understands German, saw this report and immediately knew what it meant, and after a long period of contact and exchange, the West German government finally wanted to take a more substantive step!

Military exchanges with the GDR! What does this mean? It means that some of them want to break away from the arms of the United States and come together with the Soviet Union! Even for a few of them, this is a welcome change!

They communicated with East Germany, that is, they wanted to move closer to the Soviet Union, and they had realized that with the weakening of the United States, West Germany was facing a deep crisis politically, economically, and militarily, and only by changing their concepts could they give East Germany a future! (To be continued.) )