Chapter 8 Turtles Enter the Internet

After staying for a while, Feng Xiaotian began his own actions, he was already very familiar with computer knowledge, and what he had to do now was to try to see if he could find a network interface to a foreign country through his own skills.

Half an hour later, Feng Xiaotian finally found a feasible path, but he was a little hesitant, because this only path belonged to the military system! Feng Xiao is fourteen years old, if this matter is discovered by the military, how can he bear the consequences?

After hesitating for a long time, finally the hunting psychology overcame the fear psychology, Feng Xiaotian operated the computer, quietly infiltrated the military system, this system is very quiet, today is the Chinese New Year's Eve, it is estimated that there are few personnel on duty, so Feng Xiaotian succeeded, he easily controlled a military computer through remote instructions, and then through this computer, issued a port access application to the international Internet.

In fact, the military's system is only used for testing, which is a civil-military cooperation project to detect possible problems in the connection between the country's network and the international Internet.

After all, there is the participation of the military, so all the configurations are better, not long after Feng Xiaotian sent out the application, the computer showed that he had successfully connected to the Internet, Feng Xiaotian suppressed the excitement in his heart, and finally entered the international Internet.

At this moment, Professor Vincent, as the main person in charge of the National Computer Security Center in Seattle, USA, will do his own work every day, what is his main job? Quite simply, it's about dealing with threats that are always present on the network.

It's half past nine a.m. US time, and Professor Vinson is sitting in his brightly lit office, leisurely sipping coffee, holding a newspaper with a striking headline: "Hackers Reappear!" Cause significant damage! ”

Below the headline, the newspaper made a very detailed report: "At three o'clock yesterday afternoon US time, a hacker invaded the internal network of General Electric, causing the company to shut down for four hours, according to the relevant person in charge of General Electric, the hacker's behavior has caused the company nearly eight million US dollars in losses, General Electric issued a statement to severely condemn the hacker's behavior, and will assist the relevant departments to trace the whereabouts of the hacker." ”

Professor Vinson took a sip of coffee, his face looked very calm, he already knew about this matter yesterday, it was with his help that General Electric finally returned to normal, the hacker who appeared yesterday was quite powerful, Professor Vincent's team spent more than an hour, it took the other party to crack the virus software implanted by the other party, as for the whereabouts of the hacker, the ghost knows where he ran to.

Professor Vinson put down the newspaper, shook his head with a wry smile, the current network security situation is getting more and more serious, the general computer masters are hidden in the people, few people will join the national security department service, so his work is getting harder and harder day by day, there used to be time to desert, you can go out to see the scenery or something, but now, the things that need to be dealt with every day make him feel like he can't be busy, Professor Vinson has been in the security center for more than a month and has not gone home, and then go on like this, I don't know if his wife will file for divorce from him.

Professor Vinson sat in the chair, stretched comfortably, it is rare to have such a leisurely time as today, he wanted to take advantage of the great opportunity to relax, just when he was enjoying this leisurely time, his secretary hurriedly walked in, only to hear her report to Professor Vincent: "Professor, we have just detected the network signal of Huaguo, and the other party has entered the Internet through the only port, what do you think should be done about this matter?" ”

Professor Vincent was stunned when he heard this, and said, "Are the people of China connected to the Internet?" Aren't their testing hours between 10 a.m. and 3 p.m.? Why did you run out at this time? ”

Professor Vincennes got up and followed the secretary to the monitoring room, where there were eight huge supercomputers, at this moment, a staff member was sitting in front of the screen of a computer, watching the situation on it closely, Professor Vinson came to this person, and asked, "Rocky, how is the situation?" ”

Rocky replied, "This guy has been wandering around since he got on the Internet, as if he was looking for something. ”

Professor Vincent was speechless when he heard this, he stared at the computer screen tightly, and after looking at it for a few minutes, he smiled and said: "It seems that this guy is familiar with the Internet, he is from China, and he will naturally make a fuss when he sees such a magical Internet world, leave him alone, as long as he doesn't make any out-of-the-ordinary moves, just follow him." ”

Professor Vinson turned around and walked out of the house, in his opinion, this man from a backward country was completely a turtle, if he could pose a threat to the security of the Internet, it would be as ridiculous as a fairy tale of one thousand and one nights, so Professor Vinson did not do anything about it, and let this guy run around the Internet.

This person who wanders in the network is naturally Feng Xiaotian, indeed, as Professor Vincent said, Feng Xiaotian is a turtle at the moment, everything in the network is so novel, all kinds of information are available, and Feng Xiaotian is like a sponge, constantly absorbing useful information for himself, whenever he sees something interesting, he will stop and take a closer look.

Originally, Feng Xiaotian wanted to learn some relevant computer knowledge on the Internet, because he wanted to create an artificial intelligence system, but now, he has long forgotten this ideal, and when he continued to browse all kinds of information, a news on the Internet caught his attention, which was a message about hackers.

Feng Xiaotian also has a certain understanding of the word hacker, and probably knows what these people do, if you really want to talk about it, he himself is a hacker to some extent, because he entered the international network by controlling the military's computer, as long as it is not allowed to enter, it is called illegal invasion, and the person who controls the computer to complete the illegal invasion can be called a hacker.

Feng Xiaotian looked at the news about hackers, this news was the one that Professor Vincent had read, compared with Professor Vincent, Feng Xiaotian looked at it more carefully and had more ideas.

There is no perfect thing in the world, and the operating system of the computer is naturally the same, and the real computer master generally obtains control of other computers by looking for system vulnerabilities.

Some people will write some cracking software by themselves to forcefully destroy the defense system of the other party's computer, and Trojan viruses and the like are related derivative products.