Chapter 10: First Encounter with a Hacker

After a few seconds, Feng Xiaotian sensed that something was wrong, and the computer operating system he was familiar with was actually 1.5 trillion more! In other words, who would remember the size of the computer operating system so clearly? That is, Feng Xiaotian, a freak, will do this.

Since he found that there was an extra 1.5 trillion space, Feng Xiaotian naturally would not ignore it, he immediately began to look for what the extra part was, Feng Xiaotian clicked on the computer operating system, quickly browsed the information on it, and after less than a minute, he finally found the extra part!

This is a very inconspicuous program, in order to hide itself, it is actually disguised as a graphics processing program of the system, if it weren't for Feng Xiaotian's knowledge of the whole system, I'm afraid it wouldn't be so easy to find this guy.

Feng Xiaotian didn't hesitate at all, and immediately started to clear it, but when he clicked "Delete", this program suddenly seemed to be crazy, and began to self-replicate at a rapid speed!

What is this for? The reason is simple, because the activation instruction of this Trojan virus is "delete"! This young man who wrote the Trojan virus is really a master, he knows people's psychology very well, and knows that when ordinary people find such a program in their computers, the first thing they think of is to clear it, how to get rid of it? The simplest and most direct way is to delete it directly, so young people will take "delete" as the activation instruction of this Trojan virus, no matter who it is, as long as you click "delete", it will make the virus break out instantly!

Feng Xiaotian watched as this program was constantly duplicating itself, and the limited storage space of the computer was being eroded by its growing volume, he stayed for a few seconds, and then began to act!

Feng Xiaotian's solution was simple: he re-created an empty system folder, then moved the virus into it, and then he deleted the folder.

Although Feng Xiaotian has not written a virus program, but he knows the main operation mode of this virus, according to Feng Xiaotian's understanding, the self-replication of this virus has only one purpose, that is, to occupy the entire disk space, and finally "hold the computer to death", because the virus cannot be deleted directly, and it itself is at the core of the system, so that there is almost no way to solve it, at that moment, Feng Xiaotian thought of a very simple, but very effective way- That is to load the virus into a new folder and delete it without going through itself.

Obviously, this method still works very well, sometimes, the solution to the problem is not as complicated as imagined, but it is easy to be overlooked, the reason why Feng Xiaotian was able to think of this, it is because he is very calm, his way of thinking is very special, so he succeeded.

Seeing the virus disappear from his computer, Feng Xiaotian sat on the chair and pondered, this is the first time he has encountered this kind of thing, he didn't expect the legendary hacker to encounter him so quickly, although the two sides did not directly confront, but this also made Feng Xiaotian have a more intuitive feeling of hackers, although some things seem far away, but it is likely to happen to you without you noticing.

Feng Xiaotian thought for a while, and then he took action, he had a very bold idea, he wanted to infect his computer with this virus again, and then analyze and crack this virus!

Feng Xiaotian did not hesitate, he clicked on the New York Times website again, and then his computer interface flashed again, Feng Xiaotian opened the system folder with ease, and found the virus program effortlessly.

This program is not big, only 1.5 trillion, Feng Xiaotian began to analyze the operating principle of this program, and after less than ten minutes, he had the result, it turned out that this program was not completed, if you want to run it, you have to improve it, how to improve it? The answer is simple – enter the activation instruction.

The so-called activation instruction is actually the unfinished part of the program, and it is obvious that the "delete" instruction is the missing part of the program.

Of course, the "delete" instruction itself does not have this ability, because this is the function of the system itself, but one point can not be ignored, the operation of the system itself also needs to go through data processing, for example, when you want to delete a file from the computer, you will click the right button to open the dialog box, and then use the left button to click on the "delete" command, the computer receives this instruction, will be calculated inside the system to obtain the result, and then through the system program to complete the instruction.

This is the magic of the computer, any instruction is pre-set to the cloud, if you want to execute a command, you must choose the matching program from the pre-set data, when you issue the command, the computer will also be based on the pre-set calculation method, get the corresponding result.

This virus program operates according to this principle, it is associated with the "delete" instruction in the computer, and once the relevant data is running in the computer, it will see this operation as a command, and then it will run with it.

For the principle of the operation of the virus, Feng Xiaotian already knows everything about it, what he has to do now is how to crack this virus, I don't know what the problem of the road is in the eyes of others, anyway, it is very simple here in Feng Xiaotian, first of all, he used this virus as a model, rewrote a number of programs in it, and through his rewriting, this virus became a program that was diametrically opposed to the original.

To put it simply, the original virus has the ability to infect, but also has the ability to replicate itself, after the modification of Feng Xiaotian, it has now become a special program for this virus, any program that is 70% similar to it, it can be found in the computer, after finding this program, it will start to act - it will take the initiative to set up a folder, include itself and the target program, and after all this is done, it will execute the last instruction - delete the folder.

Of course, there is another prerequisite here, in order to complete the virus removal task, it must first infect the computer with the relevant virus, faced with this problem, Feng Xiaotian hesitated.

It only took Feng Xiaotian ten minutes to write this killing tool, but the next thought took him a quarter of an hour, for the simple reason that he was not sure whether he wanted to embed this killing tool on the website.

This is a hacking act, even if Feng Xiaotian is doing a good deed, but deliberately hacking into the website, in essence, this is not allowed, but if he does not do this, the virus will cause very serious consequences, how to choose between the two?