Reborn Hacker
Chapter 43
No matter how important or not the matter of the physics competition is, in short, it passed so smoothly.For He Ran, such a physics competition can only be regarded as an accident in life, and he will not ignore it, but he will definitely not pay more attention to it than computers.
When Liu Haoyuan left the examination room this time, he didn't hold the door in embarrassment, instead he came out happily. This performance was particularly abrupt because of the serious faces of the students around him.He Ran and others quietly labeled Liu Haoyuan as an "abnormal person" after experiencing being viewed with strange eyes twice.
The new week is coming soon, and He Ran is fully focused on waiting for the official start of the labyrinth network on Tuesday, but Qi Zhanhang's family is in trouble.
"The night before yesterday, I heard from my father that the network of SH city government was hacked and a lot of important data was lost. The most important thing is that these data are related to most of the city government's work orders and Account information. This time the situation is very serious. I went there yesterday to check it. It should be a premeditated intrusion. All traces in the server have been erased. The vulnerability has been fixed, but the nature of the incident this time is very bad. I have also seen the operations of those network security personnel, and to be honest, it really made me laugh, their technology is not one or two points worse." He explained the ins and outs of one incident very clearly, and it was a small breakthrough for him who has always been reticent.
After pondering, He Ran said, "I've always known that the current domestic network security technology is far from adequate, so I can imagine the skills of those network security personnel. But I don't really understand what you mean when you tell me this."
"Why, you understand clearly."
"..., Zhanhang, do you know why I decided to organize a Honker League? I just hope to improve the computer technology of country Z to some extent, which naturally includes network security technology. But this is just A non-governmental organization, do you understand? Once something has something to do with the government, it will no longer be pure. I just want to provide those netizens with good Internet access conditions within my ability."
Qi Zhanhang also knew He Ran's thoughts, starting from knowing He Ran's superb computer technology, Qi Zhanhang conducted various analyzes on He Ran.
How He Ran learned his skills has always been a mystery. When asked He Ran, he only said that he learned it by himself.But how could Qi Zhanhang believe that a 15-year-old boy could reach such a level? (He Ran was indeed self-taught before rebirth, but it took nearly 10 years to reach this level) But the mystery of this point is not a big sin, Qi Zhanhang would rather believe that He Ran was self-taught.
However, it is indeed strange that he has such skills and has remained unknown.
Technically speaking, if He Ran takes action, countless hackers will definitely stick to him like flies, but from knowing He Ran to now, there are only a few hackers.Of course, it is also possible that He Ran's computer technology is so advanced that ordinary hackers did not notice.
From a human point of view, shouldn't a 15-year-old boy have a certain desire to show off?Those who can really hold back, everyone has various stories behind them, but judging from He Ran's family background, he obviously doesn't seem to be a person with stories, and these can also be seen from the chat with Xu Tao. I can feel it.So what is it that makes this young man hide behind the Internet so silently?
In addition, He Ran's behavior in the world has always made him feel a little strange.This point is a bit clear after seeing a lot of people who welcome and see off at home. Of course, for friends, this kind of trace is almost gone.It's just that this impression was imprinted in Qi Zhanhang's heart when we first met, and it was only then that we could find the same traces on some other people.Will this kind of way of dealing with people be possessed by a 15-year-old boy from an ordinary family?Qi Zhanhang asked himself, even if he was himself, he couldn't do it. On this point, he was very clear about his indifference.
And He Ran didn't want to get involved with the government and other agencies. Qi Zhanhang could understand it intellectually, but emotionally, he still hoped that He Ran could help solve this problem.Qi Zhanhang's father was still having a headache for the government network, and Qi Zhanhang's own ability was not enough to solve this problem, so he thought of asking He Ran to help.
"After this incident, your case will not be brought up by the government, so are you willing to go?" Qi Zhanhang asked.
He Ran was a little moved by Qi Zhanhang's pleading, but he still felt that he shouldn't go to this muddy water.
"Well, tomorrow is the time for the labyrinth network assessment. If you can come out from exit 4 or above, including exit 4, I will go to the city hall to have a try. How is it?" "Luck" to decide this issue.Based on Qi Zhanhang's ability 7 days ago, it was a little difficult to get out of exit 4, but as long as he made a breakthrough in the past week, the difficulty has dropped to an acceptable level.He Ran is betting on his own luck on this point.But whether Qi Zhanhang can get the number 4 or above is another point, he is betting on Qi Zhanhang's luck.At this point, he didn't bet on whether Qi Zhanhang would win or lose, but just wanted to see Qi Zhanhang's "luck" as a hacker.
"Of course it's no problem. I think I'm lucky that you can make such a condition." Qi Zhanhang smiled. At this point, he could understand what He Ran was thinking.
Originally, He Ran, who was the examiner, took this test with the mood of watching a play, but because he raised the conditions with Qi Zhanhang the day before, his mood was a little complicated.
In CHAT, He Ran opened a new chat room HKLM. Before the labyrinth network started, He Ran brought the second group of thugs and the first group of hermits into it together.After the labyrinth network started, the originally smooth chatting speed turned into a terrifying screen swiping.
Thug: What is this I encountered! !This file is simply a turtle shell! ! !
Monk: I am in trouble here. Why is this authority seized so violently? !
Hermit: I mean, I fell into a trap.Is there anyone to save me?
Fly: I was just about to ask for help...
Zhang: Which side should I save first?
Ghost Hand: I seem to be lost...
Monk: This is a labyrinth, ghost hands...==
Xutao: Ah!I fell into a trap too, will someone come to rescue me?
Spike: ...
Xutao: Spike, you should be doing well now, right?Can you save me?
Spike: Usually it's fine, but today is special.
Hermit: As the apparent stationmaster of the Honker League, I need your support, Spike.
Ghost Hand: Is there no one to guide me?
Monk: They said it was a labyrinth...
Thug: Monk, didn’t you say that your place is being invaded violently?Why are you still free to chat?
Monk: I finally got defensive, so relax.
Thug: shit!My tortoise shell hasn't moved at all...
Hermit: Come and save me, the time for this trap is 20 minutes.The punishment time is twice as long as that. Is there really no one to save me?
Xutao: I can't protect myself, but the waiting time for my trap is 5 minutes.Could it be that this is the luck that Joe said?
Joe: That's right, it's a matter of luck.
Ghost Hand: Still no one leads the way.I just walked through a bizarre set of data streams and seem to see an exit.
Joe: Ghost Hand, I saw you at the entrance.
Monk: Ghost hand, you are not a road idiot in reality, are you?
Thug: Ghost Hand, you are too poor!
Ghost Hand: So this assessment is my worst luck.
Joe: For your Lu Chi, it has nothing to do with luck...
Fly: I just came across a small password guessing game... What is the hint: what kind of technology is the mirroring technology?
Zhang: You're pretty good. My reminder is: a certain step of the AES encryption algorithm...God knows what the AES encryption algorithm is!
Fly: I only know MD5, but I have never heard of AES.
Spike: Joe, explain.
Joe: Zhang was unlucky enough to meet the entry test for Exit 9.
Zhang: Introductory quiz? ...then how do I get out of here now?
Joe: Well, wait for the punishment for failure...
Monk: I looked through the records, and it seems that the Taoist priest has not spoken.
Thug: Do you still remember what the Taoist said?He said he has been lucky.
Hermit: I mean I'm in a bad mood right now.
Fly: +1
Zhang: +2
Xutao: +3
Ghost hand: +10086
Joe: That's really not what I taught you...
(These Internet terms were used by He Ran accidentally, and then learned to use by those people.)
Taoist: I haven't encountered anything so far... so I have nothing to say.
Joe: Let me see the specific situation.
After He Ran saw the words of the Taoist priest, he immediately turned to the backstage to see the situation of several people, saw the various routes on the location map, and then found the Taoist priest's route map, He Ran stared at him for a long time and was speechless.
Thug: Boss Joe, what's going on?
Joe: Unbelievably, the Taoist priests are still walking on the only barrier-free direct road so far.If he had been this lucky, he would have exited 0.
Monk: ..., last time I clearly said that I dragged it out and chopped it up.Who stopped me?
Xutao: No one stopped you. At that time, he went offline after speaking.
Joe: That must be luck, too.
He Ran was also speechless about this kind of extremely lucky guy.
Joe: Cough cough, you guys should take the test well and leave the rest alone for now.
After finishing speaking, He Ran entered the chat room where Tuesday and Swagger were located.
The author has something to say:
Small information:
mirror technology
Mirror technology: a kind of cluster technology.It is to mirror the hard disks of two servers built on the same LAN through software or other special network equipment.Among them, one server is designated as the master server and the other as the slave server.Clients can only read and write to the mirrored volume on the master server, that is, only the master server provides services to users through the network, and the corresponding volume on the slave server is locked to prevent access to data.The master/slave servers monitor each other's running status through the heartbeat monitoring line respectively. When the master server shuts down due to failure, the slave server will take over the application of the master server in a short time.
Analysis of the Working Mechanism of SQLServer2005 Database Mirroring Technology www.luotuo.net.cn/a/gongxue/jisuanji/2011/0523/84866.htmlMirror Files
baike.baidu.com/view/928.htmAES encryption algorithm
The Advanced Encryption Standard in cryptography (Advanced Encryption Standard, AES), also known as the Advanced Encryption Standard Rijndael encryption method, is the United States Federal Government
府采用的一种区块加密标准。这个标准用来替代原先的DES,已经被多方分析且广为全世界所使用。经过五年的甄选流程,高级加密标准由美国国家标准与技术研究院(NIST)于2001年11月26日发布于FIPSPUB197,并在2002年5月26日成为有效的标准。2006年,高级加密标准已然成为对称密钥加密中最流行的算法之一。
The algorithm was designed by Belgian cryptographers Joan Daemen and Vincent Rijmen, combined with the names of the two authors, named after Rijndael, and submitted to the selection process of the Advanced Encryption Standard. (Rijdael is pronounced closer to "Rhinedoll".)
Learn about AES: baike.baidu.com/view/2310288.htm
When Liu Haoyuan left the examination room this time, he didn't hold the door in embarrassment, instead he came out happily. This performance was particularly abrupt because of the serious faces of the students around him.He Ran and others quietly labeled Liu Haoyuan as an "abnormal person" after experiencing being viewed with strange eyes twice.
The new week is coming soon, and He Ran is fully focused on waiting for the official start of the labyrinth network on Tuesday, but Qi Zhanhang's family is in trouble.
"The night before yesterday, I heard from my father that the network of SH city government was hacked and a lot of important data was lost. The most important thing is that these data are related to most of the city government's work orders and Account information. This time the situation is very serious. I went there yesterday to check it. It should be a premeditated intrusion. All traces in the server have been erased. The vulnerability has been fixed, but the nature of the incident this time is very bad. I have also seen the operations of those network security personnel, and to be honest, it really made me laugh, their technology is not one or two points worse." He explained the ins and outs of one incident very clearly, and it was a small breakthrough for him who has always been reticent.
After pondering, He Ran said, "I've always known that the current domestic network security technology is far from adequate, so I can imagine the skills of those network security personnel. But I don't really understand what you mean when you tell me this."
"Why, you understand clearly."
"..., Zhanhang, do you know why I decided to organize a Honker League? I just hope to improve the computer technology of country Z to some extent, which naturally includes network security technology. But this is just A non-governmental organization, do you understand? Once something has something to do with the government, it will no longer be pure. I just want to provide those netizens with good Internet access conditions within my ability."
Qi Zhanhang also knew He Ran's thoughts, starting from knowing He Ran's superb computer technology, Qi Zhanhang conducted various analyzes on He Ran.
How He Ran learned his skills has always been a mystery. When asked He Ran, he only said that he learned it by himself.But how could Qi Zhanhang believe that a 15-year-old boy could reach such a level? (He Ran was indeed self-taught before rebirth, but it took nearly 10 years to reach this level) But the mystery of this point is not a big sin, Qi Zhanhang would rather believe that He Ran was self-taught.
However, it is indeed strange that he has such skills and has remained unknown.
Technically speaking, if He Ran takes action, countless hackers will definitely stick to him like flies, but from knowing He Ran to now, there are only a few hackers.Of course, it is also possible that He Ran's computer technology is so advanced that ordinary hackers did not notice.
From a human point of view, shouldn't a 15-year-old boy have a certain desire to show off?Those who can really hold back, everyone has various stories behind them, but judging from He Ran's family background, he obviously doesn't seem to be a person with stories, and these can also be seen from the chat with Xu Tao. I can feel it.So what is it that makes this young man hide behind the Internet so silently?
In addition, He Ran's behavior in the world has always made him feel a little strange.This point is a bit clear after seeing a lot of people who welcome and see off at home. Of course, for friends, this kind of trace is almost gone.It's just that this impression was imprinted in Qi Zhanhang's heart when we first met, and it was only then that we could find the same traces on some other people.Will this kind of way of dealing with people be possessed by a 15-year-old boy from an ordinary family?Qi Zhanhang asked himself, even if he was himself, he couldn't do it. On this point, he was very clear about his indifference.
And He Ran didn't want to get involved with the government and other agencies. Qi Zhanhang could understand it intellectually, but emotionally, he still hoped that He Ran could help solve this problem.Qi Zhanhang's father was still having a headache for the government network, and Qi Zhanhang's own ability was not enough to solve this problem, so he thought of asking He Ran to help.
"After this incident, your case will not be brought up by the government, so are you willing to go?" Qi Zhanhang asked.
He Ran was a little moved by Qi Zhanhang's pleading, but he still felt that he shouldn't go to this muddy water.
"Well, tomorrow is the time for the labyrinth network assessment. If you can come out from exit 4 or above, including exit 4, I will go to the city hall to have a try. How is it?" "Luck" to decide this issue.Based on Qi Zhanhang's ability 7 days ago, it was a little difficult to get out of exit 4, but as long as he made a breakthrough in the past week, the difficulty has dropped to an acceptable level.He Ran is betting on his own luck on this point.But whether Qi Zhanhang can get the number 4 or above is another point, he is betting on Qi Zhanhang's luck.At this point, he didn't bet on whether Qi Zhanhang would win or lose, but just wanted to see Qi Zhanhang's "luck" as a hacker.
"Of course it's no problem. I think I'm lucky that you can make such a condition." Qi Zhanhang smiled. At this point, he could understand what He Ran was thinking.
Originally, He Ran, who was the examiner, took this test with the mood of watching a play, but because he raised the conditions with Qi Zhanhang the day before, his mood was a little complicated.
In CHAT, He Ran opened a new chat room HKLM. Before the labyrinth network started, He Ran brought the second group of thugs and the first group of hermits into it together.After the labyrinth network started, the originally smooth chatting speed turned into a terrifying screen swiping.
Thug: What is this I encountered! !This file is simply a turtle shell! ! !
Monk: I am in trouble here. Why is this authority seized so violently? !
Hermit: I mean, I fell into a trap.Is there anyone to save me?
Fly: I was just about to ask for help...
Zhang: Which side should I save first?
Ghost Hand: I seem to be lost...
Monk: This is a labyrinth, ghost hands...==
Xutao: Ah!I fell into a trap too, will someone come to rescue me?
Spike: ...
Xutao: Spike, you should be doing well now, right?Can you save me?
Spike: Usually it's fine, but today is special.
Hermit: As the apparent stationmaster of the Honker League, I need your support, Spike.
Ghost Hand: Is there no one to guide me?
Monk: They said it was a labyrinth...
Thug: Monk, didn’t you say that your place is being invaded violently?Why are you still free to chat?
Monk: I finally got defensive, so relax.
Thug: shit!My tortoise shell hasn't moved at all...
Hermit: Come and save me, the time for this trap is 20 minutes.The punishment time is twice as long as that. Is there really no one to save me?
Xutao: I can't protect myself, but the waiting time for my trap is 5 minutes.Could it be that this is the luck that Joe said?
Joe: That's right, it's a matter of luck.
Ghost Hand: Still no one leads the way.I just walked through a bizarre set of data streams and seem to see an exit.
Joe: Ghost Hand, I saw you at the entrance.
Monk: Ghost hand, you are not a road idiot in reality, are you?
Thug: Ghost Hand, you are too poor!
Ghost Hand: So this assessment is my worst luck.
Joe: For your Lu Chi, it has nothing to do with luck...
Fly: I just came across a small password guessing game... What is the hint: what kind of technology is the mirroring technology?
Zhang: You're pretty good. My reminder is: a certain step of the AES encryption algorithm...God knows what the AES encryption algorithm is!
Fly: I only know MD5, but I have never heard of AES.
Spike: Joe, explain.
Joe: Zhang was unlucky enough to meet the entry test for Exit 9.
Zhang: Introductory quiz? ...then how do I get out of here now?
Joe: Well, wait for the punishment for failure...
Monk: I looked through the records, and it seems that the Taoist priest has not spoken.
Thug: Do you still remember what the Taoist said?He said he has been lucky.
Hermit: I mean I'm in a bad mood right now.
Fly: +1
Zhang: +2
Xutao: +3
Ghost hand: +10086
Joe: That's really not what I taught you...
(These Internet terms were used by He Ran accidentally, and then learned to use by those people.)
Taoist: I haven't encountered anything so far... so I have nothing to say.
Joe: Let me see the specific situation.
After He Ran saw the words of the Taoist priest, he immediately turned to the backstage to see the situation of several people, saw the various routes on the location map, and then found the Taoist priest's route map, He Ran stared at him for a long time and was speechless.
Thug: Boss Joe, what's going on?
Joe: Unbelievably, the Taoist priests are still walking on the only barrier-free direct road so far.If he had been this lucky, he would have exited 0.
Monk: ..., last time I clearly said that I dragged it out and chopped it up.Who stopped me?
Xutao: No one stopped you. At that time, he went offline after speaking.
Joe: That must be luck, too.
He Ran was also speechless about this kind of extremely lucky guy.
Joe: Cough cough, you guys should take the test well and leave the rest alone for now.
After finishing speaking, He Ran entered the chat room where Tuesday and Swagger were located.
The author has something to say:
Small information:
mirror technology
Mirror technology: a kind of cluster technology.It is to mirror the hard disks of two servers built on the same LAN through software or other special network equipment.Among them, one server is designated as the master server and the other as the slave server.Clients can only read and write to the mirrored volume on the master server, that is, only the master server provides services to users through the network, and the corresponding volume on the slave server is locked to prevent access to data.The master/slave servers monitor each other's running status through the heartbeat monitoring line respectively. When the master server shuts down due to failure, the slave server will take over the application of the master server in a short time.
Analysis of the Working Mechanism of SQLServer2005 Database Mirroring Technology www.luotuo.net.cn/a/gongxue/jisuanji/2011/0523/84866.htmlMirror Files
baike.baidu.com/view/928.htmAES encryption algorithm
The Advanced Encryption Standard in cryptography (Advanced Encryption Standard, AES), also known as the Advanced Encryption Standard Rijndael encryption method, is the United States Federal Government
府采用的一种区块加密标准。这个标准用来替代原先的DES,已经被多方分析且广为全世界所使用。经过五年的甄选流程,高级加密标准由美国国家标准与技术研究院(NIST)于2001年11月26日发布于FIPSPUB197,并在2002年5月26日成为有效的标准。2006年,高级加密标准已然成为对称密钥加密中最流行的算法之一。
The algorithm was designed by Belgian cryptographers Joan Daemen and Vincent Rijmen, combined with the names of the two authors, named after Rijndael, and submitted to the selection process of the Advanced Encryption Standard. (Rijdael is pronounced closer to "Rhinedoll".)
Learn about AES: baike.baidu.com/view/2310288.htm
You'll Also Like
-
Douluo's first sword
Chapter 530 19 hours ago -
Promote the theory of threat to Konoha, why Kirigakure brings Hide!
Chapter 241 19 hours ago -
Pirate: I can draw all things in the dimension
Chapter 358 19 hours ago -
Douluo: Tang San was born as a demon and fell into the trap of Qian Renxue
Chapter 258 19 hours ago -
Douluo: Wuhun is the Star Casting Dragon King
Chapter 164 19 hours ago -
American comics: Launching a dimensional war at the beginning
Chapter 335 19 hours ago -
I am in the Liver Treasure Box in the World of Beast Control
Chapter 208 19 hours ago -
Start a mysterious island
Chapter 901 19 hours ago -
I am cultivating immortality in the world of immortality
Chapter 282 19 hours ago -
I have a magic dice of destiny
Chapter 854 19 hours ago