()ps: Is there any 'like'? The low praise index is so hurtful. I beg everyone to support it!
The Kingdom of Wosang is a country that is both powerful and weak.
The technology level of WoSangguo is very developed, especially in electronic IT products, which almost occupy half of the Xiaguo market, making the local electronic IT companies in Xiaguo unable to raise their heads.
Not only electronic IT products, including various industrial equipment, automobiles, and even home appliances, but also make Xia Guo’s local products powerless.
It is such a powerful country of WoSang, but when facing the country of Liberty, it looks like a slave. Many areas in WoSang are occupied by the country of Liberty, and military bases have been established, which is equivalent to renting.
Same.
For example, the Futenma Marine Base in Okinawa Prefecture, at the Futenma Base, the Ligan Kingdom has deployed nearly 100 armed helicopters, and even the latest secret weapons.
The Putenma Base is located in the city center of Yiyewan City, accounting for 25% of the entire urban area. It has been severely protested by local residents, but WoSang Guozheng is powerless...
At the end of 2006, the Putianjian State and the Putianjian State reached a complete withdrawal from Yiyewan City in 2014. However, until Shi Lei was reborn, there was no action from the Lijian State until he was reborn.
.
Perhaps the two countries have long known that the so-called final agreement is just a pretext for easing.
Because the Putianji Base, the Kingdom of Wosang and the Kingdom of Lijian were full of struggles, Shi Lei found the Putianji Base!
At this sensitive time, when the withdrawal agreement was signed at the end of last year, the Futianma Base was the best at causing trouble!
Jing Yayuan and Shi Lei kept communicating with Yi Zuer with wireless headsets. Looking at the data on the monitor, put their hands on the keyboard, making final preparations.
"Yuzhuer, copy the endless defense system to the supercomputer thunder. Once the thunder cannot stand it, start the endless defense system immediately. Use the thunder's super administrator privileges to obtain all the computing resources of the thunder to provide full support for the thunder.
"Shi Lei first considered the worst plan. If he was discovered in the military network, the supercomputer would definitely not be able to be protected. It would be better to stick to the last time for himself, let Yi Zuer clean up the connection record and protect his reality.
ip address.
This is also the reason why Shi Lei had to seize the permissions of another supercomputer. You can't lose Yan?
"Sir, the endless defense system has been installed. You can turn on the endless defense system for thunder at any time." Yi Zuer responded.
"Then, start!" Shi Lei took a deep breath, typing his fingers on the keyboard quickly, typing in line by line of code.
The time in WoSang Kingdom is only a little later than that in Xia Kingdom. It is now more than nine o'clock in Xia Kingdom. The time difference between the two sides is not large, and it is still in the middle of the night, the Futianji Base
The main control computer should have a security guard, so Shi Lei must be very careful.
Shi Lei is the main attacker, Yi Zuer detects and defends. Time passes by minute by minute, and the firewall of the main control computer of Futianjian blocks Shi Lei's entry.
Since Shi Lei cannot force an attack in the military network, so as not to cause firewall reports, he can only keep looking for system loopholes.
At 11 o'clock in the evening, Shi Lei finally discovered a system vulnerability in the Putenji main control computer and successfully entered the Putenji main control computer.
In the Putenma main control computer, Shi Lei kept testing the situation of the permission group and wanted to obtain the corresponding information from the permission group.
After some hard work, Shi Lei obtained some basic information.
As an overseas base, the Putianji Base has great autonomy. After all, if an emergency occurs and the war situation changes rapidly, you can't ask the Ministry of National Defense of the Liberian Kingdom for everything?
Although the information from the Futenma Base can be transmitted to the Ministry of Defense at any time in the military network, the Ministry of Defense cannot respond to the information anytime, anywhere.
Therefore, the highest authority of the main control computer at the Futenji Base has considerable autonomy, especially in terms of automation weapons. The highest authority of the Futenji Main Control computer can be directly determined without confirmation by the order of the Ministry of National Defense.
Shi Lei found this information and was excited. His choice was indeed correct. As long as he obtained the highest authority for the main control computer of the Putianjian base, then
How powerful is the hacker?
For ordinary people, most hackers have little power, especially broadband access users. Because they are dynamically allocating IP addresses, hackers with slightly worse technology cannot do anything to ordinary users. And deep-tech hackers
, unless you are idle, you will not attack ordinary users.
However, for commercial users, having a fixed official website and a fixed server address is extremely easy to be attacked by hackers. Hackers are simply a disaster for commercial users.
As for the general public, before December 20, 2006, hackers were just a noun for them, representing network instability elements with powerful computer technology.
But on December 20, 2006, the earthquake hacker EQ explained to everyone in the world how powerful the hacker is!
Through hacking technology and earthquake hacker eq, the losses of WoSangguo are unprecedentedly powerful!
Because of the earthquake hacker EQ, the general public around the world knows what kind of destructive power can a top hacker, especially a crazy top hacker, cause in this society called technology!
Now, Shi Lei is preparing to let the general public around the world know what else hackers can do and how powerful the hackers are!
Shi Lei's hands quickly typing on the keyboard, starting from the main control computer cao system of the Futianji base, slowly eroding the permissions of the cao system.
Although the CaO system of the Putenma Base is very powerful, Shi Lei is not only a peak-level hacker in the world, but also has computer technology for the next six years.
Even though Shi Lei became a monk halfway through, most of his technology was learned from the Angel Parliament pseudo-artificial intelligence Abertiel, Shi Lei was also quite powerful!
"Sir, an abnormal data scan was detected and is tracking us!" When Shi Lei was cracking the Futianjian system, Yi Zuer suddenly sent a message.
Shi Lei's heart tightened. He quickly began to enter the code and disguise his data stream.
A moment later, a data scan passed through the internal network of Futianjian, and Shi Lei was not found in disguise. Shi Lei breathed a sigh of relief, as long as it was not discovered.
"Yuzhuer, continue to monitor the entire internal network. If there is any situation, report it in time!" Shi Lei ordered and continued to crack the cao system of the Futianjian Base.
‘Damn, I have already obtained the description information of permission to live. Why can’t I enter the permission group?’ Shi Lei thought secretly, and suddenly his inspiration flashed.
As a string of codes was typed, when Shi Lei pressed the enter key, the main control computer of the Futianjian base immediately expanded the entry permission group.
‘It turns out that! It’s actually a dual-system CAO system, which has both Linux and Windows, which is really too dangerous!’ Shi Lei secretly despised him.
The scope of dual systems application is very narrow. It is mainly because the combination of dual systems is very troublesome. The degree of confidentiality is not better than that of closed systems. Therefore, dual systems are gradually eliminated by closed systems.
After entering the permission group of the main computer of the Putianjian Base, Shi Lei first began to secretly retrieve all user situations of the permission group. When the situation is not clear, Shi Lei will not tamper with any information of the permission group without authorization.
After all, I don’t know the protection of the permission group. What if the information is tampered with and triggered the jing report?
When searching for the permission group, Shi Lei had already stopped reporting jing no less than ten times. From this we can see how tight the security settings of the main control computer of the Putianjian Base are. It is just a user of the search permission group.
This triggered more than ten reports.
Once you really attack the permission group, how many reports will it inspire?
It took a few minutes for Shi Lei to finally retrieve all the users in the permission group. In order to prevent the existence of hidden users, Shi Lei repeatedly checked three times and confirmed that there were no other hidden permission users before he began to analyze each permission user.
Shi Lei simply analyzes each permission user and checks the corresponding permissions for the main computer of the Putianjian Base. Since this is a military network, Shi Lei does not use his own password dictionary to analyze the password of each permission user.
The analysis method of password dictionary is to test the possible passwords multiple times. If the password test is wrong many times, it is very likely to cause the main control computer to report.
With the corresponding permissions of each permission user, after the analysis was completed, Shi Lei finally chose the highest permission user. Only the highest permission user can call all the automation weapons of the Futianma Base.
In order to obtain the highest authority user, Shi Lei began to think about what should be done to obtain the highest authority. According to the analysis of the corresponding code of the permission group, Shi Lei obtained an information.
The highest authority user of Futenma's main computer has great authority and can directly use all of Futenma's automated weapons without going through the Ministry of Defense of the Liberian Kingdom.
Therefore, the highest permission account password of the main computer of the Futianji Base will change every day. For example, today's password is abc, then tomorrow's password is definitely not abc, it may be abd, or cbd.
The password will change again the day after tomorrow!
The passwords are all different every day!
Since a new password is adopted every day, the password is guaranteed to a great extent and prevented by hackers from being stolen.
In fact, changing a new password every day is indeed very effective in preventing hackers. After Shi Lei learned this information, he was also quite distressed.
Even if he wants to obtain a password, it will take a lot of effort. Moreover, there is a certain chance of being discovered. The internal network of the Putianjian base is included in the Lijian** network. Shi Lei cannot be in the military network.
To do things unscrupulously, you must keep your own concealment.
‘The damn Futenma Base actually uses the method of changing passwords every day. I hate this password method!’
After complaining, Shi Lei began to carefully check the file system of the main computer of the Butianjian Base, and wanted to search for any clues from the file system.
However, Shi Lei discovered something that made him laugh and cry
(To be continued. Mobile phone users please read it.)