No. 401 Broken Love Gets Goldfinger (2)
No. 401: Lovelorn Goldfinger (2)
In other words, because it costs money to chase Sheng Jinhuan, Jiang Wenchen felt the pain of not being able to move an inch without money very early. However, Jiang Wenchen was born in a small citizen's family, and his parents' monthly salary is about 5,000 yuan, even if they dote on Jiang Wenchen and give him living expenses as much as possible, it is difficult to provide Sheng Jinhuan with the exquisite life he wants.
If Jiang Wenchen wants to make money, he must do it himself.
Jiang Wenchen doesn't have any business thinking, and thinks about it, and puts his hope in public opinion, the most profitable smart phone application at the moment.
Jiang Wenchen is a liberal arts student majoring in business administration, but he has no fear of computer programming, because he feels that his mathematical foundation is very solid. In his first year of high school, his grades in science courses such as mathematics and physics were actually far higher than those of liberal arts courses, and in order to get closer to Sheng Jinhuan, he finally stubbornly chose the liberal arts that he was not good at.
At the same time, due to the overtaking of smart phones, the smart operating system has a strong impact on Microsoft's indos system. At least in China, programmers agree that it is necessary for developers in the field of smartphones to buy computers with smart operating systems, and that the indos system naturally lags behind the Sapientia system when developing smartphone applications. Since Jiang Wenchen decided to learn programming from scratch, he simply begged his parents to buy him another laptop if he wants to do a good job.
Jiang Wenchen never expected that before the laptop was sent to the school, Sheng Jinhuan threw himself into the arms of others.
What's the use of a laptop when people aren't there?
When Jiang Wenchen received the laptop, he was even more depressed when he thought of the purpose of buying the laptop.
Jiang Wenchen knows the meaning of exquisite life. Money is a necessary condition for a refined life, and without enough money, how can life be refined? Jiang Wenchen clearly understands the shortcomings of his family, but he is willing to work hard to change the current embarrassing material conditions. In order to make money, Jiang Wenchen is even ready to cross the barriers of liberal arts and science to learn computer programming from scratch. Jiang Wenchen asked painfully: "Jin Huan, I will get better!" Is it so hard to give me a little time to work on and change? Without you, what is the point of my efforts? ”
Unfortunately, there are no ifs.
Back in the dormitory, Jiang Wenchen turned on the machine to inspect the quality, and immediately scolded angrily: "I ×× profiteer and sell me second-hand goods." ”
This laptop is shocked to be an old item that has been used for at least half a year, and the hard drive stores a bunch of messy files: for example, the movie directory of the F drive, where the previous user downloaded more than 30 high-definition movies; For example, in the E-disk game catalog, the former user downloaded four stand-alone games such as "Crusader_Kings_II", "Europa_Universalis_IV", "Victoria_II" and "Hearts_of_Iron_IV". Because the four single-player games do not support the Sapientia system, the previous user also downloaded a number of auxiliary tools such as the indos system emulator.
Wait a minute.
Jiang Wenchen's face became darker and darker.
You can buy second-hand goods when you buy a laptop, and even profiteers don't bother to format the hard drive to reinstall the system for a little camouflage, and this year is really moldy.
However, the mountains and rivers are exhausted and there is no way out, and the willows and flowers are bright and another village.
Jiang Wenchen checked the D drive, and suddenly saw countless treasures in the study directory.
Click on the eye-catching help file, there are a total of 143 practical tools in the study directory, but unfortunately the whole text is in English, Jiang Wenchen seems to be reading a book from heaven. Jiang Wenchen's English grades are actually not bad, he passed level 4 in high school, and level 6 is also a treasure trove. But as a liberal arts student and a beginner in programming, Jiang Wenchen is at a loss for what he can't do when he looks at computer professional vocabulary.
Jiang Wenchen clicked on one of the most commonly used functional software by previous users in the list of common uses, and if the name is simply and crudely translated, it can be called "communication monitoring". The program's interface is also all in English, but the style is very simple, like the homepage of spring and autumn search or Google search, except for an input box in the middle, only a few lines of text description and icon buttons.
Jiang Wenchen inefficiently translated the English reminder and slowly understood how to use this functional software.
The input box in the center of the interface requires the input of the target IP, and there is a convenient option on the right side of the input box "Local Area Network".
Jiang Wenchen's experimental psychology casually clicked on the "local area network" option, and the communication monitoring software popped up a new two-page new interface. Jiang Wenchen began to teach himself computer programming last year, and he knew a little about basic computer knowledge, and quickly understood the content of the two-page interface.
The interface on the first page shows the computer usage of the entire dormitory, and all online computers are listed; The interface on the second page shows the computer layout of the entire Panmen Institute of Science and Technology, and the structure is relatively complex, and Jiang Wenchen is ignorant.
Jiang Wenchen's attention focused on the relatively simple interface on the first page.
The dormitory IPs are all pre-bound, which is very regular. For example, Jiang Wenchen's IP is ×.×.0.58, and roommate A's IP is ×.×.0.59, and the bed order is only added to 1. Roommate B doesn't have a computer, but the school keeps the IP of ×.×.0.60 for him: So, when it comes to roommate C, his IP is ×.×.0.61. Knowing whose dormitory number is his, his IP is reduced to a quarter; On the other hand, if you know whose IP number it is, you don't know your dormitory number.
Jiang Wenchen saw the online ×.×.0.63 next door and clicked on it casually.
The screen flashed, and a new window popped up that looked like the size of a desktop.
The new window turned out to be the desktop of a computer, and someone on the screen was playing the online game Clash of the Lich in windowed mode.
Jiang Wenchen was stunned, why did it suddenly become an online game interface?
Suddenly, Jiang Wenchen thought of a possibility. Jiang Wenchen locked his laptop and hurriedly rushed into the dormitory next door. There is only classmate A in the dormitory next door, and at this moment he is sitting on the computer desk under the bed to play, and the screen interface is exactly the "Lich Conflict" that Jiang Wenchen is most familiar with. Student A was happy to play the game at the moment, and said hello to Jiang Wenchen briefly, and his attention turned back to the wonderful game world. Jiang Wenchen walked up to classmate A's computer, remembered classmate A's game nickname and matching player, and then returned to the dormitory with his heart pounding violently.
Boot up your second-hand laptop.
Nickname the same......
Match players the same......
It's the same with heroes......
Jiang Wenchen trembled excitedly.
It turned out that the interface that popped up was the computer desktop of student A.
It turned out that with just a few clicks, he could easily hack into classmate A's computer.
Jiang Wenchen knows a little bit about computer security, and computer security is all about authority. Hacking into someone's computer is like trying to go to someone's house in reality, either asking them to open the door for you, or you want to try to get a key. How to enter the room as quickly as possible, how to steal keys most efficiently, how to enter the room without being detected to check the privacy of the homeowner, and how to check the level of a network security. If the owner of the household or property voluntarily hands over the keys in a fraudulent way, this is what everyone is talking about in social engineering; If you study the keyhole structure and get a key at the moment, this is commonly known as brute force hacking, and so on.
However, the functional software of communication monitoring is powerful.
Jiang Wenchen randomly tested other IPs and found that all computers in Panmen Institute of Science and Technology could be invaded like a second kill.
There is no invincible adjective prefix, no universal adjective prefix, and no artifact adjective suffix, but the simple and simple "communication surveillance" naming shows its power. The trivial operation without intermediate processes indirectly proves that this functional software is extremely well integrated and may be a common tool for a large organization.
Communication surveillance, strong outrageously.
Who exactly is the previous user? Install the indos system emulator, download pirated HD movies, play single-player games, he should not be a professional hacker or spy. Reminiscent of the naming of directories such as movie, game, study, etc., study has the meaning of learning, could it be that he somehow obtained a batch of powerful hacking tools, and used these hacking tools to learn the novices of hacking attack and defense techniques?
Why did this laptop sell to me by coincidence?
Was it a mistake by the previous user, or was he unwilling to learn anymore?
All kinds of thoughts flashed through Jiang Wenchen's mind.
Dozens of minutes later, Jiang Wenchen gradually calmed down.
No matter what kind of accident it is, since he is here, it is Jiang Wenchen's luck.
If God doesn't take it, he will be blamed.
Before the owner searches for it, Jiang Wenchen might as well use it to complete his dream of hacking. Because of emotional injury, thinking of Sheng Jinhuan in his heart, Jiang Wenchen suddenly had the selfish idea of invading Sheng Jinhuan's computer to peep. As soon as he thought of it, Jiang Wenchen explored and studied the operation method of the communication monitoring function software, and soon successfully invaded the campus LAN of Panmen University and found Sheng Jinhuan's laptop with difficulty.
Maybe it's luck, maybe it's a coincidence, Sheng Jinhuan's laptop display is in a dormant state.
However, the communication monitoring software is very powerful, and a dormant laptop can also activate the camera to spy on Sheng Jinhuan's dormitory. The camera was activated in the monitoring mode, and Jiang Wenchen was pleasantly surprised to see Sheng Jinhuan sitting on the side of the computer at this time; At the same time, the four laptop cameras in the dormitory were activated, and the scenery of the dormitory was more three-dimensional and intuitive, all of which met Jiang Wenchen's eyes.
Panmen City is located in the south of the Yangtze River, there is no central heating in winter, and the pajamas of the dormitory girls are relatively thick. Despite this, the laziness brought by the girls' unsuspecting also has a different kind of charm, and some parts of Jiang Wenchen who looked at it couldn't help but start to get congested.
However, Jiang Wenchen was not happy for long.
Because the dormitory girl suddenly gossiped about Sheng Jinhuan's relationship, it turned out that Sheng Jinhuan solemnly groomed in order to go to Zhai Wuhao. During the conversation, one cruel fact after another was revealed, Sheng Jinhuan, who had never been lonely with Jiang Wenchen, so that Jiang Wenchen misunderstood her very conservative personality, and now not only agreed to Zhai Wuhao's date, but also prepared to have a good time with him.