Chapter 14: Off the beaten path
(For the first reward of this book, a special chapter is added!) Professor Vincennes was immediately shocked when he heard Troy's words! Cracked this program in less than half an hour? How did he do it?
After a while, Professor Vincent spoke, "Troy, can you tell me how you solved it?" ”
Troy nodded when he heard this: "Of course, the working principle of this virus is related to the system's own calculations, so the solution I thought of is to modify the program of the system itself, and convert the instruction of 'delete' into other operations, only in this way can this virus be removed, of course, this method is a bit cumbersome, but it is the most suitable and safest way I can think of." ”
Professor Vincennes nodded when he heard this, as Troy said, this method is a bit cumbersome and clumsy, but it is indeed the safest method, but the mysterious figure obviously did not use this method, he has developed another special killing tool specifically against this virus!
Thinking of this, Professor Vincent said to Troy, "Your opponent did not use this method, and I think we can study his method." ”
Troy had wanted to do this for a long time, he nodded immediately when he heard this, and then logged on to the New York Times website, the virus killing tool embedded by Feng Xiaotian still existed, Troy didn't take much effort, he extracted this killing tool, and after just a few minutes, Troy suddenly slapped the table and said, "Oh buy karma!" Buy Karma Buy Karma! It's so beautiful! ”
Troy's reaction was a bit big, and the guards standing not far away immediately walked over, they were worried that Troy would do something out of the ordinary to Professor Vincent, Professor Vinson waved his hand, stopped the guards, and then said, "Troy, what method did he use?" ”
Just look at Troy's expression, you can know that this virus killing tool is definitely very powerful, otherwise why would Troy be so excited?
Troy sighed for a moment before explaining to Professor Vincent, "What a genius this man is! Why didn't I think of this idea? - Professor, you can't believe that cracking this virus is so easy! Just put the virus in a new folder and delete it! Buy Karma! It's the most straightforward, simple, and effective way I've ever seen! He's a genius! ”
When Professor Vinson heard Troy's explanation, he immediately understood that this method was indeed the most effective and simplest! Although the virus itself will be activated after receiving the deletion command, if you bypass the virus itself, things are much easier!
Troy was excited, Professor Vinson was shocked, and neither of them was at peace inside, and after a while, Troy shouted again, "Oh my God! This...... This guy is amazing! This killing tool actually has an active search function! You can search for targets that are similar to you and actively run the program to delete them! Me, I...... I think...... Maybe he's the best programmer in the world! ”
Professor Vincennes was silent for a long time when he heard this, and then he said to Troy: "Troy, would you like to join the National Cyber Security Center?" ”
Professor Vinson naturally made this request for a reason, he wanted to find this mysterious person, such a powerful person, if it can't be in the hands of the state, once he does something bad, the consequences will be absolutely extremely serious, so Professor Vinson wants to buy Troy, and then through the Troy line, get more information about this person.
Troy was stunned when he heard Professor Vincent's words, and then said, "This ...... Can I really join? ”
Troy originally thought that he would be imprisoned for at least a few years after he was caught, but he did not expect that Professor Vinson would recruit him, and if he really joined the state department, he would not be held accountable for what he had committed, which was naturally the best outcome.
Professor Vincent smiled slightly when he heard this: "Of course you can, I can help you solve this matter, as long as the relevant procedures are completed, you can regain your freedom, and your work and reputation can be preserved, but I have a request - you need to assist us in the future, find this person, do you agree?" ”
Troy was very happy when he heard this, but then he hesitated, "Professor...... Are you sure we can catch him? ”
Professor Vincent smiled when he heard this, and then said: "As long as we have enough patience, we can achieve the goal, even if we can't catch him, it would be good to know more about him, I am very curious about him, when you launch a flood attack, his data flow is almost negligible, but he defeated you in the end, you must be very puzzled and curious about this, right?" ”
Troy nodded when he heard this: "That's true, I thought I had won the battle, but it turned out to be an inexplicable defeat, I am very puzzled about this, how did this guy do this?" ”
Hearing this, Professor Vincennes smiled and said, "That's why I'm inviting you to join us, and we can work together to unravel his mystery." ”
At four o'clock in the morning on the first day of the Lunar New Year, Feng Xiaotian got up early as usual, and after washing, he went out with a snakeskin bag, as the saying goes: "Called Huazi has three years of age", which means that even if you want food, you will rest for a few days during the New Year, but Feng Xiaotian is not called Huazi, so he did not rest.
If he doesn't pick up the rags and sell them for money, what does he eat? How do you survive? Feng Xiaotian has no habit of resting, for him, life is like this, since there is no reliance, he has to rely on himself.
At half past six in the morning, Feng Xiaotian returned home with a snakeskin bag full of tatters, Lao Li didn't start work today, so he had to take back the tatters he picked up, and he could only sell them for money after Lao Li opened his doors at the beginning of the Lunar New Year.
Feng Xiaotian took the rags to the backyard and put them away, and then turned on the computer, after last night's battle, he suddenly had an idea in his heart, that is, to develop a counterattack program against hacker attacks, which is very simple to say, but it is difficult to do.
First of all, you know what are the attack methods of hackers, and then you can prescribe the right medicine, about the hackers' attack methods, Feng Xiaotian knows very well, the most common hacking methods can be summarized as follows:
(1) Trojan horse virus implantation to steal the other party's operation instructions, so as to control the other party's computer;
(2) Flood attack, that is, data flow attack, through a large number of meaningless access requests, so that the other party's computer crashes because the processing volume exceeds the critical value;
(3) System vulnerability, this is more powerful, it belongs to the method used by advanced hackers, all systems have vulnerabilities, as long as you know about this vulnerability, you can sneak into your computer through the vulnerability, so as to gain control of the computer;
(4) Data interception, information transmission between networks is carried out through the mode of data packets, and some hackers can control the computer by intercepting data packets and cracking the data of data packets;
(5) Deception and lure, some hackers will spread some deceptive programs on the network, as long as you click on these programs, you have the possibility of being deceived, once you allow this program to run on your computer, it is basically announced that you have been tricked.
The above five methods can be summarized into three, the first, fourth, and fifth are basically the same nature, whether it is a Trojan virus or data monitoring, or deception and lure, its essence is to know your computer operation instructions, which is also the most commonly used method by hackers, the second is more violent, directly destroy your system, although there is no technical content, but it is difficult to parry, the third belongs to the problem of the system itself, this problem is not easy to solve, unless you can fix all the vulnerabilities of the system.