Chapter 812: Former Hacker
readx;
Los Angeles, USA. Pen, Fun, Court www.biquge.info{{}}
From the outside, it looks like a small house on an Aegean island, but instead of Greece, this is a chic café on the street of Los Angeles, and the atmosphere here is very warm.
There is no western cowboy taste, no oppressive work atmosphere, this is a café where you can relax.
In the parking lot next to the café, a Nissan sedan from the RI is a striking sight, especially with its monochrome license plate number...... It's a lot of imagination.
In one of the private rooms, there were two men, one of them, only in his twenties, a young man with a full spirit, a slightly fat body, somewhat sunken eyes, and a pair of glasses.
The other man, who was in his forties, could not see anything in appearance, except for the hooked nose, which was more obvious, and made people feel like Jews at first glance.
"Mr. Kevin, it's a pleasure to meet you, we are here to discuss a business with you. {{}}" said Hooknose.
"Who are you?" Kevin asked.
"Just call me Bill." Eagle hook nose said.
If he hadn't seen it with his own eyes, Bill would never have thought that the young man in his twenties sitting in front of him, who still looked a little introverted and weak, was actually an important person personally designated by President Qusay!
Kevin Mitnick, this person, is a very famous person in a special circle, but only in this circle, their name, is called a hacker!
Hackers, in this day and age. It is still a very new business, because the Internet, which was widely used in a large number in later generations, was only a "ARPANET" built by the Advanced Research Projects Agency (ARPA) of the US Department of Defense...... The predecessor has not developed to the extent that every household is necessary. Moreover, most of the so-called hackers in later generations only downloaded a few so-called hacking software. {{}} and then wreak havoc on hackers.
The first hackers were all technicians who roamed the Internet, keen on scientific and technological exploration and computer science research. They are all very hands-on guys, and the first thing they invaded was the telephone network. At this time, the Internet had not yet emerged.
Kevin was a controversial man in this era, born in Los Angeles in 63, and at a very young age, his parents divorced and he developed a withdrawn and stubborn personality. In the late '70s, Kevin became fascinated by radio technology while still in elementary school, and later became fascinated by a computer in the community's "Elementary School Club," where he learned advanced computer expertise and cāo skills.
When Kevin first came into contact with computers, he already knew that he would be inseparable from computers for the rest of his life. In the process of learning computers. Kevin has barely encountered much of an obstacle. The programs he writes are concise, practical, and aesthetically pleasing to computer teachers. (Most of today's programming is in the scope of coder, and if you need a function, you need to find the code that implements that function, and then.) Add it in, then debug, and when computers were just emerging, all the code was typed in by hand, and because of the hardware limitations, the code had to be kept concise. {{}} The logic is strong, and the code written by the master can make people see a sense of beauty, which is rarely felt by modern so-called programmers. This withdrawn guy was raised as a model by the teachers, but one day, the teachers found out that he was using his own school computer to break into the network system of another school, and because of this incident, Kevin was ordered to drop out of school.
After dropping out of school, Kevin seems to have found the most challenging thing in his life, from which he can find a joy of success, so with patience and perseverance far beyond his age, he tries to crack the most difficult network, the United States! As a result, Kevin, who was only 15 years old, broke into the computer host of the "North American Air Defense Command System" for the first time in the history of hacking in the world, rummaged through all the data of all the nuclear warheads pointed by the United States to the former Soviet Union and its allies, and then quietly slipped out.
Later, he turned his attention to other websites. He entered the communication network system of the famous "Pacific Telephone Company" in the United States. Changed the number and mailing address of the company's computer users, including some well-known people. At this time, Kevin has become a saboteur, and the fragile network system has a great attraction to him, and he seems to be the only way to find self-satisfaction from this. {{}} He turned his attacks to large corporations. In a short period of time, he entered the networks of five major companies in the United States one after another, constantly destroying their network systems and causing huge losses to these companies.
And so far, Kevin has done the most sè thing, probably in 83, using a university computer to access the ARPA network, and through the network into the Pentagon computer, the result of this incident, Kevin was sentenced to 6 months in a youth correctional facility in California.
After being released from prison, Kevin was followed by the FBI for several months and found that he did not do anything other than change his car license plate to be more ostentatious. That one...... It's the meaning of "former hacker", since it's a former hacker, maybe it's been reformed, in 84, the tracking of him finally ended, until now, Kevin has always been honest from the outside, but, what his real thoughts are, I'm afraid no one can know.
Looking at Kevin sitting in front of him, Bill knew that he had to offer enough conditions to make Kevin's heart move, because, the person opposite could enter the website of a large company without much effort, although he could cause huge losses to the other party, but he was definitely not for profit, at most, he used it to make free calls after hacking the phone company. {{}}
"Mr. Bill, I'm not in business, if you have anything to say, just say it." Kevin said.
"Mr. Kevin, I need some information, but these materials are very difficult to obtain, but they are very valuable to me, so I hope you can help me." "Someone introduced you to me and said you could do it very easily because you're the best hacker in the country," Bill said. ”
Bill puts a high hat on Kevin, hoping to impress him.
Who knows, Kevin didn't react, just drank the coffee in front of him lightly, the reason why he accepted this invitation to come here was just to taste the coffee here.
Hearing the last sentence, Kevin knew that the person in front of him was just hoping that he could help him enter some systems, and now Kevin is looking at strangers with suspicion, who knows if this person in front of him will be sent by the FBI to tempt him to hack into some systems again, and then, use this as a reason to arrest himself?
"I'm sorry, I'm no longer interested in this kind of thing." Kevin said, "You see, I'm the best hacker, but I'm just a former hacker, if you came to me two years ago, I would have been okay with it, but now, I'm very sorry, I'm not touching computers anymore." ”
"Yes, you're no longer touching the computer, but there's one thing I have here that you should like." With that, Bill pulled out his briefcase from his side.
Open the briefcase, inside is a much larger than the folder, and then, Bill skillfully opened it, so, what appeared in front of Kevin's eyes, is such a thing that surprised him, in front, is a large screen display device, below, is a keyboard, like a folder, together, can be stuffed into the briefcase, and open it, it's a... Personal computer!
Bill felt like his saliva was pouring out, and he stopped touching computers, which was just a public announcement, in fact, many times, he would sneak out to the university to use those computers.
Bill looked at Kevin's face, and knew that the other party was already tempted, such a person would actually be attacked from here, it seems that the key is to find the right point!
What he was holding in his hand was the T1100, a portable personal computer that Toshiba had just produced and would enter the U.S. market the year after...... Processor, 256k memory, 3.5-inch floppy drive, 640*200 resolution display, weight 4.1 kg.
Although there were all kinds of "portable" computers before this, most of those computers, like a small suitcase and a small CRT display, could not meet the needs of use at all.
However, this one is different, because, this is the standard prototype of later laptops, with a clamshell design, after being opened, there is an LCD monitor on top and a keyboard below, and the size is small enough to be stuffed into a briefcase.
Moreover, this portable computer is directly integrated with a modem, which means that as long as the telephone line can be found, it can be connected to the network, which means that Kevin can do his work anywhere.
"What do you want?" Kevin asked casually, although he was very tempted by this thing, but he was still very careful, he needed to ask the other party clearly, some invasions without difficulty, he disdained to do, that would reduce his identity, however, since the other party took the initiative to find him, then, it means that the other party must have a very difficult task.
Bill knows that when talking to the person in front of him, he doesn't have to go around too much, and he won't scare the other party by saying it directly.
"The CIA and the Pentagon's computer hosts, we need to get detailed information about the Middle East, the more the better." rq