Chapter 70 Intrusion into the Security System
Ren Yue got off the line and called No. 13 to go out for dinner together
At the beginning, No. 13 disagreed. She thought that her identity was still equivalent to the identity of a black householder, and she was afraid that she would be brought out by those who pursued her.
Ren Yue pointed to the collar, "Isn't this still there?"
Only then did the Thirteenth laugh. Yes, I still have this collar. I can virtually simulate a face, as long as it is not too conspicuous.
Ren Yue has been buying some clothes online these days, of course they are all female supplies, but the courier's eyes always feel strange, just like....emm.....the perverted eyes
What kind of skirts are basically decided by Ren Yue. I bought a full box of aunt's scarves alone, and I was ready to fight a protracted war.
But after teaching online shopping on the 13th, he became addicted to buying things on the 13th. If Ren Yue hadn't made some money, he would have lost all his money long ago
It seems that No. 13 has no idea about money
Ren Xiaoning, dressed up slightly, stayed on his neck. After changing his appearance, he turned into a girl with freckles on his face, but his figure was still hot. The blue floral long skirt just exceeded his knees, revealing his white and tight legs. A pair of jade feet were wearing a pair of cheap sports cloth shoes and a straight chest. Ren Yue's eyes were at least 36c.
Ren Yue swallowed and went out for a meal. Is it necessary to be so correct?
But that's fine, who would have thought of this woman wearing leather pants in the alley not long ago? Anyway, Ren Yue can't recognize her. Ren Yue likes this little girl's jass feeling very much.
"Remember, when you go out, you call Ren Xiaoning. No matter what others call your code, you can't have an instinctive reaction." Ren Yue solemnly explained.
As time goes by, this name is slowly engraved in everyone's bones. In the depths of their nerves, what people cannot control most is their instinctive reactions.
No. 13 nodded solemnly, and the two of them went out.
However, there was no danger, and no one followed him. The police officer standing on the street checking his identity did not doubt the two seemingly couples.
While having dinner, Ren Yue knew that the 13th day was already level 10, and the main city was Changan, so the two of them could be able to get along. The 13th day chose the swordsman, but there was no weapon to join hands. Ren Yue also talked about his experience in the game, the tasks he was doing, and the meaning of "Zang" that he could not understand.
No. 13 was still chaotic about the past and had no impression. It seemed that I had tried the medicine myself and was always forced to take a small blue pill in a trance. This is the latest memory I remember, but the details about the organization are still not clear.
When she talked about the past, she would still have the same headache as before. Ren Yue would always pour some red wine for her at this time to relieve her depression.
The two agreed to meet in the game. When they returned home on the 13th, they went back to the bedroom, and Ren Yue sat in the study.
Now the atmosphere between the two of them is no longer as awkward as when they first came. Ren Yue has no financial pressure. Naturally, he said that he would stay here for as long as he wants to stay here. As long as Ren Yue is not too lazy, others will not be able to come to him.
Ren Yue bought the first huge sum of money he bought to buy an enterprise-level super processor, and flew out ten million at once. It was just now. It was not big in size, but it was very power-consuming and the cost was very expensive.
The core of this processor is made of high-temperature superconducting materials, with a very low power consumption and is not easy to generate heat. However, this high temperature is relatively high compared to the absolute zero degree. Most of the cost of this machine is on this small cooling device that cools the central processor. Of course, the main power consumption is also derived from it.
The continuous computing speed of this processor has a double-precision floating point of 222.1 billion times per second. Don’t question it, don’t type 100 million words.
This integrated processor is equivalent to half of the continuous computing speed of Tianhe 2 in the last century, but its area is only one cubic meter, which is unimaginable. Just as the transistor calculator in the 1950s and notebooks in the 21st century, you should know that when high-temperature superconducting chips were released, in order for multiple chips to reach superconducting temperature, the cooling equipment required was hundreds of square meters.
Ren Yue bought this processor to provide more advantageous guarantees for his invasion. Strong computing speed is the primary choice for cracking passwords. This is one of the ultimate enemies of cryptography. The world's martial arts are only fast and not broken.
Ren Yue had not used this kind of supercomputer to make a broiler for actual combat invasion. Now, I am still a little excited. What Ren Yue wants to do today is to find out who is staring at him. The person who wants No. 13 must be one of them.
Not only that, Ren Yue also took out some money to buy a lot of overseas IPs, especially in disputed areas, such as Haiti, Afghanistan, and even Mars. Of course, these IPs are anonymous. Overseas investigation is a very horse manure thing, and no one will search carefully.
After Ren Yue had this enterprise-level supercomputer, his heart became hot. His teacher highly praised brute-force cracking streams, believing that in the face of speed, any firewall or any password does not exist.
All Ren Yue had to do was to go into the security system of Yuhang City where he was. If he had only invaded the community system and hid his whereabouts, he could do it with the microcomputer in his hand. However, doing so would be like opening a high-powered lighthouse in the vast ocean. He wanted the other party to post it and find him, "Look, I'm here."
Ren Yue just wanted to lurk into the security system and see if some strange people appeared around him recently. First, to ensure his own safety, and second, to monitor others in turn.
The household registration system is different from the security system. The management of the household registration system is simply not worth mentioning compared to the police security system. After all, the resources allocated are different. This is the first time Ren Yue has done such a big job, and he is inevitably a little excited.
Ren Yue grinned and began. Ren Yue called out more than a dozen IP addresses and started the first wave of feint attacks. This level of attack would not lead to early warning of the security system. It was just that within the usual range of tolerance, Ren Yue wanted to explore the strength first.
The data on the screen is like a stream, and the complicated and complicated color codes flashed across the screen, but Ren Yue could see clearly. As expected, this level of protection is not ordinary. After all, it is a state institution. It is not something you can get by just typing on the keyboard like in a movie.
If you want to break through the other party’s password wall, the first thing you need to understand the other party’s password is first.
Ren Yue looked at the results of these dozen IP attacks
"lxxt>33m2mqkyv2gsq3q=w]02ntx"
Ren Yue looked at this bunch of garbled codes, what the hell is this? How can I solve the key of the password wall? This is the thing
No, isn't this one of the common ways to play in cryptography? Ren Yue's preconceived concept made him feel that this government system would not be so low
What Ren Yue thought of was Caesar encryption. The principle of this encryption is to move all letters in the plain text forward or backward on the alphabet according to a fixed number to obtain the cipher text. Of course, if it only relies on powerful computing power, the computer will give countless reasonable explanations for this character, which comes from the tens of millions of decrypted codes in the information database.
Ren Yue looked at it, well, with numbers, obviously not for the alphabet, nor for the only Latin language. Ren Yue looked at his keyboard
Well, it seems that there are some things on the keyboard that have them in this string of characters, and there are also many
Ren Yue tried to input all symbols into the supercomputer, input the general mode code encrypted by Caesar, and start performing effective solutions. The effective solutions here are not only known as numbers, but everything that contains actual information.
After listing the symbols on the keyboard and moving them four characters forward, Ren Yue got a website
Ren Yuedian went in and saw that I went, and I was actually ridiculed.
It's a duck with big English characters next to it
“woops just decoys this way,looks like you can't guess how to get the message out .“
In general, hey, what's wrong, is this the password? It seems that it's not right. It seems that you can't guess what the password is?
Fuck~ Ren Yue was so angry that he wanted to lead the bench. He had not received such insults since he entered the hacker's portal. He could not help himself.
Ren Yue called 90% of the supercomputers to crack the brute force. Although it is not very open, it is effective.
On the other hand, Ren Yue was not idle and was still actively looking for clues.
I thought that a question setter would always leave some way for the person who did the question, otherwise the question setter would lose the opportunity to show off. The same is true for decryption. Ren Yue thought that he had eaten enough of the information in the string of characters, and the correct password would definitely be hidden behind this message, but now the clues in front of him are only a picture of a duck and a sarcastic statement.
Ren Yue mobilized 10% to dynamic crawlers and related information on the Internet, I want to use this to find a breakthrough
Ren Yue didn't think this was just a sarcastic sentence. Instead, this sentence seemed to persuade some newbies to withdraw. However, Ren Yue was not a newbie. His hacking career had already begun since high school.
Ren Yue is a two-pronged approach. On the one hand, he uses a large number of IPs as a springboard to invade some of the more backward areas overseas, and acquires a large number of broilers, such as Southeast Asia and some areas in South America. Then, he uses this as a springboard to access the security system website with a large number of intentions, in order to paralyze it. However, this access is not a simple click, but a large amount of information to be accessed.
The purpose is to make its server generate a lot of information redundancy so that it can get off the machine. At this time, it is a good opportunity to pretend to be spam and quietly enter.
The other is to crack the backdoor password, which is the part that Ren Yue is worried about
While Ren Yue was thinking, a message popped up on the screen, and the valid information was found out "out �
It's a graphics software
Ren Yue immediately realized something, that duck
There is no software online, Ren Yue can only seek the dark web, but fortunately the dark web lives up to expectations and successfully found the software
Ren Yue introduced the picture and obtained the digital information. After the supercomputing operation, one of the most effective information is that the duck's feathers present an equal product sequence of extreme patterns.
Do you want to take my math test?
Ren Yue wrote the answer with a smile, knocked on the call, and successfully entered with a tingling sound.
But Ren Yue was still very curious about who cracked the backdoor password, and it was so bad that he wrapped the password into a decryption game and placed it there, as if someone would definitely play it.
No matter who it is, he must be a master. Ren Yue saw a line of characters that do not belong to the code at the bottom of that web script, ~r. Who is he
Please bookmark ~
Chapter completed!