Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 71 Hacker Fingering

Yesterday someone sent a red envelope, and Xiaodao updated more than 5,000 words today. But what Xiaodao can’t figure out is how there are only a few collections with nearly 20,000 clicks every day. Collecting has nothing to lose for everyone, so why don’t you be an adult and help Xiaodao collect it?

What about a moment?

Just after the two of them finished shopping, it was already noon. For convenience, Xiao Yihan said to eat out, while Xia Xiaoyu insisted on cooking at home. The reason was that too much money had been spent today and there was no other way. Xiao Yihan could threaten others

Xia Xiaoyu, but when eating, Xia Xiaoyu threatened Xiao Yihan. If she didn't go home to cook, she would not eat today. At this time, Xia Xiaoyu was like a little girl. Xiao Yihan had to drive to buy groceries, and then the two went back

Home.

After lunch, Xiao Yihan still went to the study to learn advanced computer operations. Xiao Yihan remembered what Yang Shaojun said to him before leaving, speed.

After several days of computer operation, Xiao Yihan finally understood this truth. Just like in martial arts, speed is the only thing that cannot be broken, and it is equally applicable in the computer world.

Xiao Yihan has been practicing typing the letters of English words on the keyboard these days. From the beginning, Xiao Yihan could only type a dozen words a minute to now being able to type about 40 words a minute. This is something even a professional typist cannot achieve.

The speed reached, but Xiao Yihan is still not satisfied. Legend has it that Kevin Mitnick, the most powerful hacker in the world, can input more than a hundred words a minute. The more expert he is, the more he pays attention to the most basic things. Although technology is very important,

But without the support of speed, no matter how powerful the technology is, it is of no use, otherwise it is better to strike first.

In fact, when the keyboard first came out, the letters on the keyboard were arranged according to the English alphabet. However, because the input speed was too fast, the computer could not react and often crashed, so the English letters on the keyboard were scrambled.

Distribution, which greatly reduces the input speed and allows the computer to operate normally. Since a habit has been formed over the years, it has continued like this. Although electronic computers have developed rapidly, the English on this keyboard

The distribution of letters has still not changed. It is estimated that this distribution method will not change now, even in the future, because everyone is used to it.

In the hacker community, fingering methods are divided into three types based on the speed of inputting letters: whirlwind finger, blast finger, and phantom finger. The test speed of inputting letters is based on the number of English words input per minute. On average, each word is based on five

When the input speed reaches 60 words per minute, the input speed at this time is a whirlwind finger. That is to say, 300 accurate keystrokes must be made on the keyboard within one minute, and one keystroke must be made every second.

Hit five times.

When typing seventy words per minute, the input speed at this time reaches the level of the wind finger, but the phantom finger needs to reach 100 English words per minute. The legendary hacker Kevin Mitnick can achieve this

Speed ​​is very important as a hacker technology, but speed should not be underestimated.

Regarding some information about hackers that Xiao Yihan has learned from the Internet in the past few days, Xiao Yihan made three rules for himself: First, hacking is not allowed if the input speed cannot reach the level of the wind finger. Second, he has not written any hacking software and

Hacking is not allowed before the program. Third, you are not allowed to use hacking techniques to engage in unethical hacking.

Xiao Yihan understands that only hackers hiding in the dark are truly safe and free. The first two conditions he has set for himself are to ensure his own safety and freedom to the greatest extent, and to prevent his identity in the hacker world from being affected by real life in the future.
Chapter completed!
Prev Index    Favorite Next