Soul Invasion [Rebirth]
Chapter 41
Although Li Chu was physically tired, his mind was overwhelmed and he couldn't sleep at all. He did another CG and posted it on Weibo, and asked the question of how to get back the scene by the way.
It didn't take more than three seconds after he finished posting, the upper right corner immediately started jumping likes, comments, reposts and private messages crazily, because Li Chu really wanted to know how to get back in the game, so he just swiped for a long time and randomly read Several replies.
... Not to mention, some are quite eye-opening.
A fan said that he dreamed that the princess he drew was in his arms at night, and when he woke up the next morning, he found that he was pregnant, but he was still a virgin, so he asked God Erhe to take care of the milk powder...
Li Chu replied: Don't worry, the three sages will come to give gifts.
(Jesus was born of a virgin, and on his birthday, sages ran to give gifts)
Of course, there are also people who answer questions seriously.
There was a very long private letter, which lasted about 1.9 minutes intermittently. He described in detail the key issues of how to get back on the field: First, exercise your body!When you become a strong man of [-] meters with eight-pack abs, you will no longer be afraid of being pressed and kissed!
The second is to practice kissing skills crazily!Don't seek to reach the master realm of not being stuck in things, sending and receiving freely, and breaking the void, and then counterattack, pressing the opponent hard for seven or 49 days without stopping!
Finally, go one step further to build authority!Prepare several tools, including but not limited to candles, belts, leather whips, handcuffs, fetters, x balls, xx sticks, xx restraints, xx rings... (3021 words are omitted below)
Li Chu: "..."
can not understand.
Internet language is really broad and profound, worthy of being the tenth largest language family in the world.
Although he didn't understand, Li Chu silently copied and pasted it into the hard drive.
Such a well-intentioned tirade should not be forgotten.Maybe one day I suddenly get enlightened, or I find relevant explanations on the Internet.
Li Chu continued to scroll down, and suddenly saw a fan named "audrey" left a strange private message: 904844160.
This is the result of multiplying 57124 by 15840.
57124 is Li Chu's number in Icarus Base; 15840 is Adam's.This number was one of the codes they had mentioned.
Adam is the "mermaid" contractor.He can nanoparticleize his whole body and restructure it into any shape. Mermaid is one of his forms.It was Li Chu's first painting after becoming Er He.In fact, he initially chose the image of Adam, partly because he hoped to regain his connection with Icarus. Unfortunately, he changed his mind before waiting, and things have already gone off track to the point where they are today. Too far.
Li Chu's heart moved, and after clicking on this fan, he found that he had sent exactly the same private message six days ago.But because there were too many news, Li Chu didn't see it.
Li Chu is almost sure that behind this account, if Adam did not communicate through the secret code between the two of them, then Ma Yuela, the leader of Icarus, did it.
In order to further identify the person behind the account, Li Chu activated his ability.
He hasn't fully recovered yet. In order to avoid overdrawing himself again, he didn't directly control the data, but chose to use a laptop as a springboard to indirectly achieve his goals through software programs.
Li Chu first simply blocked some of his own ports, and then anonymously purchased some high-level proxies.It is impossible for him to use the resources he used to have in Icarus. The number of botnets he once owned is one of the best in this country, and he has already become popular.After his "death", the Icarus base may have redistributed these resources to other intelligence agents, and using them forcibly may be a warning to others.
White characters on a black background, monotonous and boring rows of English are refreshed on Li Chu's window.
Li Chu quickly found the corresponding Sina server. He sniffed around the periphery, and when he found a loophole that could be exploited, he began to infiltrate without hesitation. The way he infiltrated a computer was exactly the same as a hypnotic bomb penetrated a human brain.
You only need to release an extremely complicated process first, so that the other party is stuck on it and cannot move, even if it is only a few tenths of a second (large servers are especially short), and then take the opportunity to pass the command of illegal length in the past. When the first half of the command successfully breaks through the machine The queue length of the original command, the subsequent commands will enter the execution queue and be executed unconsciously by the central processing unit - even if it is an command to obtain administrator privileges.
Then things were very simple, Li Chu ordered the server to search the user information of "audrey" in the huge Sina database.Soon he found it. This account is very innocent and clean, no follow, no likes, no comments, zero Weibo, and Sina’s information retrieval ability can’t find his preferences and preferences, so it is intelligently identified by the server. Mark it as "Suspected Zombie Fan" and wait for real employees to review it.
Li Chu checked its login status, the two times were different ip addresses, it looked like it was the ip of the mobile phone.
Li Chu likes cautious people, which will make it difficult for him to track down; and difficult work is the best opportunity to show his worth, and he is a little unspeakably excited to conquer such a difficult problem.
Through a simple search, Li Chu found out that the operator of the phone's IP is China Unicom.He rolled up his sleeves and made a simple and rude decision to continue invading China Unicom.
Compared with Sina, China Unicom's server is even more watertight. Li Chu searched for a long time in the huge data stream outside, but couldn't find any useful information. Finally, he found that the intensity of penetration was not worth the gain, so he decided to attack by force.
Forcibly guess the password settings of China Unicom server.Of course, it is not the violent dictionary method, but an algorithm invented by Li Chu himself. After losing the right to use the supercomputer, in order to meet the calculation amount per second required by the algorithm, he had to link his own human body code, so that his Part of the neural network in the brain participates in auxiliary operations.
Don't underestimate the neural network of the human brain. The calculation amount of a person's brain pulse per second can reach 6.4 times 10 to the 18th power, which is equivalent to the sum of all the computers in the world in 2007.
When Li Chu connects his neural network to a computer, the computing power of the latter will be more than thirty times that of the top three supercomputers in the world today.It is conceivable that the technology of neural network computer is so advanced that there is no hardware condition to support it. Without Li Chu's ability, its time in the world is optimistically estimated to be 20 years later.
Such terrible computing power made the cracking progress extremely fast. After one minute and 20 seconds, Li Chu got a series of sixteen-digit passwords, and he quickly used the key to obtain administrator privileges.
At this time, he took a look at the situation of the multi-layer springboard, and found that China Unicom's Hongke responded very quickly. They were shutting down some network services, and they had also tracked down his second-layer springboard.
He has seventeen layers of agents, and once they find the last one, his real IP address will be exposed.
Li Chu didn't take care of these people for the time being. He took the time to enter Unicom's database and searched the ip for logging in to the "audrey" account. To his surprise, in addition to the new key, the Unicom database also needed a database administrator. voice message.
The administrator must personally say to the microphone, "I am xxx, grant the database xx permission." Only then can the search and other operations be performed.
Li Chu frowned, the people from China Unicom had searched his seventh springboard.
We must hurry up.Li Chu intercepted information on the periphery of the database and found that it was a non-relational database. Since the security measures had not yet been developed, he accidentally found the contact information of the database administrator.
Li Chu immediately dialed directly through the network simulator.
"Dudu-"
In the long busy tone of mobile phones, China Unicom's Hongke broke through Li Chu's No.11 springboard. Their speed has become faster and faster, and more people should be invested in tracking.
With a "click", the phone finally got through, and the administrator said on the other end, "Hello? Hello—?"
Li Chu's eyes brightened, and Boyd's timbre and intonation information had been completely recorded and analyzed.
The administrator hung up the phone after a few seconds because there was no answer.
Li Chu quickly denoised, analyzed, and processed the voice information, re-simulated a new voice message, and sent it to China Unicom's database.
After a few seconds of verification, the database permissions are finally opened.
At this time, the Hongkers have caught the tail of his No.16 springboard.
Li Chu immediately searched for information about that IP.
There is a huge amount of user data stored in China Unicom's database.Every piece of information on each mobile phone number, including text messages, calls, and network access, is all archived and backed up. If the amount of data is not too large, I am afraid they will save all the information permanently, but now the hardware settings are limited, and only about three months can be stored. months.
A large number of servers are not used to serve customers, but are nervously analyzing all these information. They calculate each user's name, address, hobbies, relationships, status, funds, etc., and even know that a person is constipated How long, how many times have you cheated, all privacy is not privacy.Imagine how many activities modern people carry out through mobile phones. With the support of these huge amounts of data, any person is almost transparent to this kind of operator.Even more frightening is that people are paying them money at the same time, and this staggeringly large amount of money continues to be used for similar information gathering.
Now back to reality, Li Chu found the number corresponding to that ip. This is a one-time mobile phone number, which will become invalid after dialing it once.
Li Chu glanced at China Unicom's tracking progress. They were stuck on the No.16 floor. The agent was Li Chu's illegal use of the internal server of the US Census Bureau. It seemed that it was difficult for them.
After 30 seconds, Li Chu obtained the retailer's address of the disposable mobile phone, quickly exited the China Unicom server, cleaned up his tail, and then directly destroyed the last layer of proxy servers to ensure that he did not leave any clues.
These springboards were of course never used again.
At this time, Li Chu was free to drink slowly, and after finding the retailer, he easily hacked into their surveillance video.
After overthrowing strong men like Sina and China Unicom one after another, the security system of this kind of business is simply a soft girl who is easy to overthrow.
It didn't take more than three seconds after he finished posting, the upper right corner immediately started jumping likes, comments, reposts and private messages crazily, because Li Chu really wanted to know how to get back in the game, so he just swiped for a long time and randomly read Several replies.
... Not to mention, some are quite eye-opening.
A fan said that he dreamed that the princess he drew was in his arms at night, and when he woke up the next morning, he found that he was pregnant, but he was still a virgin, so he asked God Erhe to take care of the milk powder...
Li Chu replied: Don't worry, the three sages will come to give gifts.
(Jesus was born of a virgin, and on his birthday, sages ran to give gifts)
Of course, there are also people who answer questions seriously.
There was a very long private letter, which lasted about 1.9 minutes intermittently. He described in detail the key issues of how to get back on the field: First, exercise your body!When you become a strong man of [-] meters with eight-pack abs, you will no longer be afraid of being pressed and kissed!
The second is to practice kissing skills crazily!Don't seek to reach the master realm of not being stuck in things, sending and receiving freely, and breaking the void, and then counterattack, pressing the opponent hard for seven or 49 days without stopping!
Finally, go one step further to build authority!Prepare several tools, including but not limited to candles, belts, leather whips, handcuffs, fetters, x balls, xx sticks, xx restraints, xx rings... (3021 words are omitted below)
Li Chu: "..."
can not understand.
Internet language is really broad and profound, worthy of being the tenth largest language family in the world.
Although he didn't understand, Li Chu silently copied and pasted it into the hard drive.
Such a well-intentioned tirade should not be forgotten.Maybe one day I suddenly get enlightened, or I find relevant explanations on the Internet.
Li Chu continued to scroll down, and suddenly saw a fan named "audrey" left a strange private message: 904844160.
This is the result of multiplying 57124 by 15840.
57124 is Li Chu's number in Icarus Base; 15840 is Adam's.This number was one of the codes they had mentioned.
Adam is the "mermaid" contractor.He can nanoparticleize his whole body and restructure it into any shape. Mermaid is one of his forms.It was Li Chu's first painting after becoming Er He.In fact, he initially chose the image of Adam, partly because he hoped to regain his connection with Icarus. Unfortunately, he changed his mind before waiting, and things have already gone off track to the point where they are today. Too far.
Li Chu's heart moved, and after clicking on this fan, he found that he had sent exactly the same private message six days ago.But because there were too many news, Li Chu didn't see it.
Li Chu is almost sure that behind this account, if Adam did not communicate through the secret code between the two of them, then Ma Yuela, the leader of Icarus, did it.
In order to further identify the person behind the account, Li Chu activated his ability.
He hasn't fully recovered yet. In order to avoid overdrawing himself again, he didn't directly control the data, but chose to use a laptop as a springboard to indirectly achieve his goals through software programs.
Li Chu first simply blocked some of his own ports, and then anonymously purchased some high-level proxies.It is impossible for him to use the resources he used to have in Icarus. The number of botnets he once owned is one of the best in this country, and he has already become popular.After his "death", the Icarus base may have redistributed these resources to other intelligence agents, and using them forcibly may be a warning to others.
White characters on a black background, monotonous and boring rows of English are refreshed on Li Chu's window.
Li Chu quickly found the corresponding Sina server. He sniffed around the periphery, and when he found a loophole that could be exploited, he began to infiltrate without hesitation. The way he infiltrated a computer was exactly the same as a hypnotic bomb penetrated a human brain.
You only need to release an extremely complicated process first, so that the other party is stuck on it and cannot move, even if it is only a few tenths of a second (large servers are especially short), and then take the opportunity to pass the command of illegal length in the past. When the first half of the command successfully breaks through the machine The queue length of the original command, the subsequent commands will enter the execution queue and be executed unconsciously by the central processing unit - even if it is an command to obtain administrator privileges.
Then things were very simple, Li Chu ordered the server to search the user information of "audrey" in the huge Sina database.Soon he found it. This account is very innocent and clean, no follow, no likes, no comments, zero Weibo, and Sina’s information retrieval ability can’t find his preferences and preferences, so it is intelligently identified by the server. Mark it as "Suspected Zombie Fan" and wait for real employees to review it.
Li Chu checked its login status, the two times were different ip addresses, it looked like it was the ip of the mobile phone.
Li Chu likes cautious people, which will make it difficult for him to track down; and difficult work is the best opportunity to show his worth, and he is a little unspeakably excited to conquer such a difficult problem.
Through a simple search, Li Chu found out that the operator of the phone's IP is China Unicom.He rolled up his sleeves and made a simple and rude decision to continue invading China Unicom.
Compared with Sina, China Unicom's server is even more watertight. Li Chu searched for a long time in the huge data stream outside, but couldn't find any useful information. Finally, he found that the intensity of penetration was not worth the gain, so he decided to attack by force.
Forcibly guess the password settings of China Unicom server.Of course, it is not the violent dictionary method, but an algorithm invented by Li Chu himself. After losing the right to use the supercomputer, in order to meet the calculation amount per second required by the algorithm, he had to link his own human body code, so that his Part of the neural network in the brain participates in auxiliary operations.
Don't underestimate the neural network of the human brain. The calculation amount of a person's brain pulse per second can reach 6.4 times 10 to the 18th power, which is equivalent to the sum of all the computers in the world in 2007.
When Li Chu connects his neural network to a computer, the computing power of the latter will be more than thirty times that of the top three supercomputers in the world today.It is conceivable that the technology of neural network computer is so advanced that there is no hardware condition to support it. Without Li Chu's ability, its time in the world is optimistically estimated to be 20 years later.
Such terrible computing power made the cracking progress extremely fast. After one minute and 20 seconds, Li Chu got a series of sixteen-digit passwords, and he quickly used the key to obtain administrator privileges.
At this time, he took a look at the situation of the multi-layer springboard, and found that China Unicom's Hongke responded very quickly. They were shutting down some network services, and they had also tracked down his second-layer springboard.
He has seventeen layers of agents, and once they find the last one, his real IP address will be exposed.
Li Chu didn't take care of these people for the time being. He took the time to enter Unicom's database and searched the ip for logging in to the "audrey" account. To his surprise, in addition to the new key, the Unicom database also needed a database administrator. voice message.
The administrator must personally say to the microphone, "I am xxx, grant the database xx permission." Only then can the search and other operations be performed.
Li Chu frowned, the people from China Unicom had searched his seventh springboard.
We must hurry up.Li Chu intercepted information on the periphery of the database and found that it was a non-relational database. Since the security measures had not yet been developed, he accidentally found the contact information of the database administrator.
Li Chu immediately dialed directly through the network simulator.
"Dudu-"
In the long busy tone of mobile phones, China Unicom's Hongke broke through Li Chu's No.11 springboard. Their speed has become faster and faster, and more people should be invested in tracking.
With a "click", the phone finally got through, and the administrator said on the other end, "Hello? Hello—?"
Li Chu's eyes brightened, and Boyd's timbre and intonation information had been completely recorded and analyzed.
The administrator hung up the phone after a few seconds because there was no answer.
Li Chu quickly denoised, analyzed, and processed the voice information, re-simulated a new voice message, and sent it to China Unicom's database.
After a few seconds of verification, the database permissions are finally opened.
At this time, the Hongkers have caught the tail of his No.16 springboard.
Li Chu immediately searched for information about that IP.
There is a huge amount of user data stored in China Unicom's database.Every piece of information on each mobile phone number, including text messages, calls, and network access, is all archived and backed up. If the amount of data is not too large, I am afraid they will save all the information permanently, but now the hardware settings are limited, and only about three months can be stored. months.
A large number of servers are not used to serve customers, but are nervously analyzing all these information. They calculate each user's name, address, hobbies, relationships, status, funds, etc., and even know that a person is constipated How long, how many times have you cheated, all privacy is not privacy.Imagine how many activities modern people carry out through mobile phones. With the support of these huge amounts of data, any person is almost transparent to this kind of operator.Even more frightening is that people are paying them money at the same time, and this staggeringly large amount of money continues to be used for similar information gathering.
Now back to reality, Li Chu found the number corresponding to that ip. This is a one-time mobile phone number, which will become invalid after dialing it once.
Li Chu glanced at China Unicom's tracking progress. They were stuck on the No.16 floor. The agent was Li Chu's illegal use of the internal server of the US Census Bureau. It seemed that it was difficult for them.
After 30 seconds, Li Chu obtained the retailer's address of the disposable mobile phone, quickly exited the China Unicom server, cleaned up his tail, and then directly destroyed the last layer of proxy servers to ensure that he did not leave any clues.
These springboards were of course never used again.
At this time, Li Chu was free to drink slowly, and after finding the retailer, he easily hacked into their surveillance video.
After overthrowing strong men like Sina and China Unicom one after another, the security system of this kind of business is simply a soft girl who is easy to overthrow.
You'll Also Like
-
Douluo: If you don’t accept your confession, why are you crying if you change your mind?
Chapter 377 6 hours ago -
Ancient wizards return to Hogwarts
Chapter 288 6 hours ago -
Pirate: I, Ace, Am a Ninja
Chapter 185 6 hours ago -
Naruto: Naruto, Let's Turn Dark
Chapter 167 6 hours ago -
Marvel: Fishing Across Realms, Starting with the Inheritance of the Ghost Sword
Chapter 230 6 hours ago -
Fortunate Life of the Rural Beauty
Chapter 562 6 hours ago -
Millennium director
Chapter 583 6 hours ago -
My wizarding career begins on Earth
Chapter 326 6 hours ago -
Spoiling History: Starting from the Three Kingdoms
Chapter 543 6 hours ago -
Myth: My dragons can evolve infinitely
Chapter 869 6 hours ago