Chapter 9: The Legendary Hacker

Feng Xiaotian as early as when he saw the book "Computer Programming Language and Programming", he pondered it carefully, this book is mainly about computer programming, the computer programming language mentioned in it is completely for programming services, a programmer's main job is programming, but programmers also have high and low, the more masters, the fewer loopholes in the program written.

Feng Xiaotian has a deep understanding of this, because he spent more than half a month writing a data conversion software, Feng Xiaotian knows very well: the larger the software, the more content involved, in this way, the software will naturally have more vulnerabilities, to reduce the vulnerability, the best way is to minimize the size of the program, the smaller the program, the less content it contains, so the risk of being exploited by others will naturally become smaller.

This involves the function of the program, short and concise without affecting its function, this is the highest level of the program, as far as Feng Xiaotian currently masters, he feels that it is not too difficult to do this, at least he has this ability.

As for the vulnerability of the computer operating system, it is actually deeply related to computer programming, because only people who are familiar with computer programming can find out the system vulnerability.

What is the operating system of the computer? To put it bluntly, it's just a program, a relatively large program, so in order to find out the possible vulnerabilities of its own, you must first have a deep knowledge of computer programming.

The two most important attack methods of hackers are related to computer programs, which also shows the importance of being familiar with computer programs, Feng Xiaotian is already familiar with this, as for what kind of level he is at, it is difficult to say, because he has not been compared with others, he is like a person who is independent of the scope of the system, the so-called system here, is the talent pool of computer-related knowledge.

At this moment, Feng Xiaotian looked at this news about hackers, and many questions came to his mind, which recorded the number of losses, a full eight million dollars! If converted into RMB at the current exchange rate, this is more than 80 million! Such a huge amount of money made Feng Xiaotian, a poor man, unable to calm the shock in his heart for a long time, and he was stunned for a long time before he muttered: "This ...... So much money, just gone? ”

Feng Xiaotian has a more intuitive understanding of hackers at this moment, in his opinion, this is a group of crazy people, how can not be crazy people and do such a thing that harms others and is not beneficial to themselves? The hacker didn't get a penny of the $8 million he lost, so what did he do it for?

Of course, Feng Xiaotian can't understand this problem, he grew up in China, which made him form relatively good social values, so in his opinion, such a thing must not be done, and people who harm the interests of the country for any reason are not good people.

Feng Xiaotian is still relatively simple, he doesn't know the inner world of hackers, generally such people are masters of computers, these people crack other people's systems, and these things that they manipulate computers are basically out of a personal interest, they are not for money, just to verify their strength, to put it bluntly, it is to show off.

The time soon came to twelve o'clock in the middle of the night, and the sound of firecrackers outside began to explode continuously, and the new year finally arrived, and Feng Xiaotian was a year older, and he was already fifteen years old.

At this moment, it was twelve o'clock in the afternoon Eastern time, on the thirty-second floor of the Empire State Building in New York, a young man was sitting in front of the computer and was busy, he was typing the computer keyboard quite fast, and after a while, he finally stopped what he was doing, only to see him stretch and say, "Ha Lu Ha!" The New York Times website has finally been breached by me! Well...... Why don't you do something interesting? ”

The young man thought for three seconds, then snapped his fingers and said, "That's it!" I've just written a Trojan program, let's put it to the test! ”

After the young man finished speaking, he used the administrative privileges he had obtained to implant this Trojan on the New York Times website, which is a very stealthy program, even professionals, it is difficult to detect, and its main working principle is to infect every computer that logs on to the New York Times website, and then transmit the IP address of the other party back to the young man's database.

Once the young man sends a remote command through the IP address, the Trojan virus will automatically activate, and then keep recovering itself, so that the other party's computer will overflow because it is taking up too much storage space, until the threshold of overflow is exceeded, and the computer will crash.

Although it is a little simple to say, but it is not easy to do this, it seems that this young man is definitely a master program, when he implanted the Trojan virus into the website of the New York Times, he opened his own database - this database is actually a large computer that he captured, the young man observed the information transmitted by the Trojan virus to it, and as the information changed line by line, the young man realized: He has finally succeeded!

The New York Times has a lot of readers, so there are naturally a lot of computers infected by this Trojan virus, including those with a smile.

Originally, he was browsing all kinds of news on the New York Times website, but when he clicked on a news interface, an abnormal interface flickered on his computer screen, although it was only for a very short time, but Feng Xiaotian did not ignore it, because he had just seen a news about hackers, so his vigilance was quite high, so Feng Xiaotian immediately stopped browsing the news, and instead checked his computer, wanting to see if there was anything abnormal.

As far as Feng Xiaotian knows, there are generally the following reasons for this situation: first, because the voltage is unstable, causing the computer monitor interface to flicker; Second, because the amount of information processed by the computer is too large, the computer host chip produces too high computing speed, which makes the computer display interface flicker; Third, because of the sudden network congestion, the computer suddenly changes the adaptive processing speed, causing the computer display interface to flicker; The fourth, which is also the one that Feng Xiaotian is most worried about, is that other programs have invaded the computer without permission, causing a delay in the processing speed of the computer.

Originally, the last one was the most unlikely thing to happen, because he was connected to the Internet through a springboard, and even if a hacker attacked him, he had to crack the computer used as a springboard first, but Feng Xiaotian's cautious character determined that he would not let go of any possibility, because the last reason was the most dangerous, so Feng Xiaotian immediately started the program search.