Reborn Hacker
Chapter 47
In fact, Qi Changhe's secretariat was next door to his office. When Qi Zhanhang brought his friends to the secretariat, Qi Changhe still heard the voice.But after all, this can be regarded as taking advantage of his position to open a back door for his son, and he will not go over to "caring" for a while.
The spare two networked computers are placed against the wall, far away from the other four computers, almost diagonally.There are only two secretaries in the secretariat, and they are both sorting out materials at their desks at this time.Because of the previous information leak, they were ordered to sort out all the information that was confirmed to be leaked and possibly leaked, and also to transfer and reconstruct some of the information, so now these two people are busy going around, and Qi Zhanhang only talks to them. After saying hello, he and He Ran walked to the backup computer on their own.
Although Qi Zhanhang was specially invited to help find the hacker who invaded the city hall, but based on the principle of confidentiality, it is not good for these two people to discuss these issues at this time, so Qi Zhanhang just used his eyes to indicate that it is time to start.
He Ran whispered to Qi Zhanhang: "Look at other people, I don't feel anything around me when I'm concentrating."
Qi Zhanhang nodded to show that he understood, so why did he start his own actions.
The two secretaries of the secretariat are both men. Although both of them are sorting out information and documents at this time, they still make eye contact from time to time, like "ah, look, the back door or something, it really can't be compared with us." Ah." "It's about looking up information and seeing the speed of that hand on the keyboard over there, do you believe it?" "Hey, he is a friend of the second generation of officials." "Time and fate~" and other information .
While watching He Ran's movements, Qi Zhanhang also paid attention to the other two people who were in the same room.Of course, Qi Zhanhang also saw their strange eye contact, but Qi Zhanhang didn't pay attention to it, his indifference came from the bottom of his bones, and he was generally indifferent to other people's remarks, not to mention that these two people hadn't really "" talk".
He Ran first scanned the networked computers of the entire city hall, but unfortunately, the other party was very cautious, and all traces were erased.He Ran was not disappointed, because before he came here, he heard Qi Zhanhang say that the traces were wiped off, and he also knew very well that generally cautious hackers would never forget to wipe off their own intrusion traces.But that doesn't mean He Ran can't be tracked.
He Ran tilted his head to look at Qi Zhanhang, then raised his finger to the display screen, and wrote on it: Is there any information that has been confirmed stolen?
Qi Zhanhang repeatedly hacked into the database of the city hall from the computer in front of him, picked out a few external affairs processing and follow-up follow-up reports, and then directly forwarded them to He Ran.
He Ran directly used zero language to transfer these materials into programming and transmission data streams, and then put them into a small tool that he hung on a certain website before. After pressing the enter key, he began to automatically track the whereabouts of these materials Yes, this small tool can lock the final IP location of the data according to the similarity of the data.
Although the nature of data transcribed in zero language can be accepted and recognized by the data transmission system to the greatest extent, it is definitely not possible to find data streams of the same nature in the vast Internet world in a short time.However, at this time, selective data overlapping tracking can only be carried out country by country.
Considering the huge workload, He Ran downloaded the CHAT from the Internet and directly asked the online Tuesday if he was free to help.
It was around midnight on Tuesday, and they were sorting out the lesson plans, but since Joe asked him for help, he naturally wouldn't refuse.What's more, the reward is that small tool. Although I don't really understand the principle of Joe's small tool, Tuesday believes in the research value of this small tool.
He Ran doesn't care about these, because that gadget is also written in zero language, and without the foundation of zero language, it is impossible to understand what is written in those characters.
He Ran himself was in charge of countries in the Asian region such as country Z and country R, while Tuesday was in charge of the OM region.
It will take at least 20 minutes to wait for the feedback information, so He Ran simply started browsing the webpage.The reason Qi Zhanhang himself used was to check the information, so such a move became smooth and successful.
The time passed by every minute and every second, and He Ran had to call out to the background to check the progress from time to time. After 24 minutes, He Ran finally saw the progress bar to the end.
Feedback data shows that the data stolen by hackers is not in the Asian region.
"Huh?" He Ran was slightly surprised. From He Ran's point of view, this kind of information is usually stolen by those who want to target individuals. Although He Ran planned to filter the OM area because of caution, but He Ran Unexpectedly, it was not in Asia.
"What's wrong?" Qi Zhanhang asked.
"Hmm..." He Ran looked up and saw the two secretaries turning their eyes, and replied, "It's nothing, there are still some problems with the materials."
Qi Zhanhang saw He Ran's expression and also saw a series of data on the screen. Although he didn't know what these data showed, judging from He Ran's reaction, the situation should not be good.
"We'll have to wait for... the news." He Ran tilted his head, but his eyes were fixed on the screen.
Before Tuesday sent the feedback results, He Ran directly began to write a virtual storage shell in zero language, intending to install it directly in the computers of these city halls to prevent future attacks by those hackers.
Tuesday: Joe, the result is out, and I will send you the data feedback.
... (transfer information)
Joe: Thanks, keep that gadget.
Tuesday: Hmm.
After He Ran received these materials, he quickly started browsing from the beginning.When he saw the area over country M, He Ran raised his eyebrows.
"As expected... M country." He Ran murmured to himself, this was unexpected and reasonable.
Qi Zhanhang turned his head to see what happened.
Feeling Qi Zhanhang's gaze, He Ran quickly converted these zero-language feedback data into C language data.
After the conversion, He Ran made a "please look" gesture to Qi Zhanhang.
"Is there a way?" Qi Zhanhang asked in a low voice, frowning after reading it.
"At present, it seems to be a bit difficult." He Ran also replied in a low voice, "The other party's actions are obviously organized. Although I found out where the last information belongs, this is different from directly catching the intruder. nature."
Qi Zhanhang pondered: "Then it seems like this is the only way to go. This incident can only be used as a warning. What you just made up is a defense system?"
"No, it's just a virtual storage shell that can stop some hackers from stealing."
"Blocking against behavior?"
"you can say it this way."
"Thank you."
He Ran smiled when he heard Qi Zhanhang's words.
Suddenly, the data on the screen began to jump rapidly.
"Huh?" Qi Zhanhang noticed it and couldn't help but make a sound.
At this time, the two secretaries had already sorted out some of the materials, transferred them, and left the secretariat.
"It's a coincidence." He Ran propped his chin with his left hand.
"Is it the original batch?" Qi Zhanhang asked directly without looking carefully.
He Ran's right index finger clicked on a certain data on the screen: "Look, when they came in, the first hole they chose was the one you've patched. From this point of view, I think it's the same group of people."
Qi Zhanhang nodded, and then asked, "Then why are you in no hurry?"
He Ran recalled the data of the previously written virtual storage shell and said, "Because this thing has already started running."
Qi Zhanhang: "..."
He Ran yawned again at this time.
Qi Zhanhang: "I mean, you should track them down."
"The other party is an organization, and it would be very troublesome to track back." He Ran waved his hand, indicating that he has no such ability.
"Where's the Monster from last time?"
"..." Student Zhanhang, can you not remember it so firmly? "I see."
Quickly entered a URL, and downloaded a virus directly from it.
"You want to use a virus?" Qi Zhanhang asked.
He Ran nodded: "Live virus, send it out first to let it lurk in those guys' computers, other problems, let's talk about it next time."
"Live virus?"
"Well, I wrote a virus in a brand-new programming language. It is characterized by strong latency. It can change the storage location every second in the same computer. There is no behavior of a general virus during the latency period. The activation method is simple. Enter a specific activation password in the computer, as long as the computer is connected to the Internet, the virus will be activated. After that, it can completely infect the computer where the live virus is located. As for the destructive ability, it depends on the designer's settings. Primary live viruses do not have active self The function of copying and spreading externally, that is to say, the virus I released now cannot be regarded as a worm virus."
"The intermediate and advanced versions are worms?"
"Well, that's right. But the advanced version hasn't been improved yet. If there are no special circumstances, I guess I won't be able to use it in my life."
"What is a very special situation?" Knowing that the matter here can basically be resolved, Qi Zhanhang relaxed and asked.
"The most special situation is that suddenly the computers all over the world are upgraded to win3000, or there are some optical brains, smart brains, etc. The next special situation is that a new programming language suddenly appears that is popular all over the world. The special case this time is..." There was a moaning "beep beep" sound from the computer.
"?" Qi Zhanhang turned his gaze back to the computer in front of He Ran.
"It's this kind of virtual defense line I set up that was broken by violence..." He Ran almost bit his own tongue.
"Cracked by violence?" Qi Zhanhang raised his tone, "Does it need to release your advanced live virus in this situation?"
He Ran scratched his head helplessly: "No need, although he brute force cracked my virtual storage shell, but at the same time destroyed the integrity of the files, and... the alarm should have sounded..."
There were many people yelling outside the door.
"What did you do?" Qi Zhanhang was not calm anymore.
He Ran turned his head and didn't look at him: "The terminal of the virtual storage shell is connected to the alarm system of the Public Information Network Security Supervision Bureau."
Qi Zhanhang: "..."
The author has something to say:
Small information:
Public Information Network Security Supervision
Public information network security supervision is referred to as network supervision, which is a duty of the public security department of the People's Republic of China. The staff of the supervisory agency is called the Internet Supervision Police (also known as Internet Police or Internet Police, see Internet Police for the difference).They are a special term in mainland China.
Network monitoring content and common technologies
Utilize the rights granted by the government and laws to monitor the website content, emails, chat messages and access records of users in mainland China, and have the highest level of network information control authority in mainland China.
Cyber police usually use technologies such as domain name hijacking, keyword filtering, network sniffing, gateway IP blocking, and electronic data forensics to filter and obtain relevant intelligence information; banning, blocking, and blocking may "destroy national and national unity, subvert national Political power", "endangering national security", "pornography and obscenity" and other "harmful" information; investigate and deal with network and computer crimes; backup and obtain relevant electronic evidence, etc.
According to Article 6 of the "People's Police Law of the People's Republic of China", the people's police shall perform the duties of "supervising and managing the security and protection of computer information systems" in accordance with the law.That is to say, the people's police who are currently engaged in the supervision of public information network security should be called "network police".
Internet Police, the official name in China should be International Internet Security Supervision Professional Police.
The spare two networked computers are placed against the wall, far away from the other four computers, almost diagonally.There are only two secretaries in the secretariat, and they are both sorting out materials at their desks at this time.Because of the previous information leak, they were ordered to sort out all the information that was confirmed to be leaked and possibly leaked, and also to transfer and reconstruct some of the information, so now these two people are busy going around, and Qi Zhanhang only talks to them. After saying hello, he and He Ran walked to the backup computer on their own.
Although Qi Zhanhang was specially invited to help find the hacker who invaded the city hall, but based on the principle of confidentiality, it is not good for these two people to discuss these issues at this time, so Qi Zhanhang just used his eyes to indicate that it is time to start.
He Ran whispered to Qi Zhanhang: "Look at other people, I don't feel anything around me when I'm concentrating."
Qi Zhanhang nodded to show that he understood, so why did he start his own actions.
The two secretaries of the secretariat are both men. Although both of them are sorting out information and documents at this time, they still make eye contact from time to time, like "ah, look, the back door or something, it really can't be compared with us." Ah." "It's about looking up information and seeing the speed of that hand on the keyboard over there, do you believe it?" "Hey, he is a friend of the second generation of officials." "Time and fate~" and other information .
While watching He Ran's movements, Qi Zhanhang also paid attention to the other two people who were in the same room.Of course, Qi Zhanhang also saw their strange eye contact, but Qi Zhanhang didn't pay attention to it, his indifference came from the bottom of his bones, and he was generally indifferent to other people's remarks, not to mention that these two people hadn't really "" talk".
He Ran first scanned the networked computers of the entire city hall, but unfortunately, the other party was very cautious, and all traces were erased.He Ran was not disappointed, because before he came here, he heard Qi Zhanhang say that the traces were wiped off, and he also knew very well that generally cautious hackers would never forget to wipe off their own intrusion traces.But that doesn't mean He Ran can't be tracked.
He Ran tilted his head to look at Qi Zhanhang, then raised his finger to the display screen, and wrote on it: Is there any information that has been confirmed stolen?
Qi Zhanhang repeatedly hacked into the database of the city hall from the computer in front of him, picked out a few external affairs processing and follow-up follow-up reports, and then directly forwarded them to He Ran.
He Ran directly used zero language to transfer these materials into programming and transmission data streams, and then put them into a small tool that he hung on a certain website before. After pressing the enter key, he began to automatically track the whereabouts of these materials Yes, this small tool can lock the final IP location of the data according to the similarity of the data.
Although the nature of data transcribed in zero language can be accepted and recognized by the data transmission system to the greatest extent, it is definitely not possible to find data streams of the same nature in the vast Internet world in a short time.However, at this time, selective data overlapping tracking can only be carried out country by country.
Considering the huge workload, He Ran downloaded the CHAT from the Internet and directly asked the online Tuesday if he was free to help.
It was around midnight on Tuesday, and they were sorting out the lesson plans, but since Joe asked him for help, he naturally wouldn't refuse.What's more, the reward is that small tool. Although I don't really understand the principle of Joe's small tool, Tuesday believes in the research value of this small tool.
He Ran doesn't care about these, because that gadget is also written in zero language, and without the foundation of zero language, it is impossible to understand what is written in those characters.
He Ran himself was in charge of countries in the Asian region such as country Z and country R, while Tuesday was in charge of the OM region.
It will take at least 20 minutes to wait for the feedback information, so He Ran simply started browsing the webpage.The reason Qi Zhanhang himself used was to check the information, so such a move became smooth and successful.
The time passed by every minute and every second, and He Ran had to call out to the background to check the progress from time to time. After 24 minutes, He Ran finally saw the progress bar to the end.
Feedback data shows that the data stolen by hackers is not in the Asian region.
"Huh?" He Ran was slightly surprised. From He Ran's point of view, this kind of information is usually stolen by those who want to target individuals. Although He Ran planned to filter the OM area because of caution, but He Ran Unexpectedly, it was not in Asia.
"What's wrong?" Qi Zhanhang asked.
"Hmm..." He Ran looked up and saw the two secretaries turning their eyes, and replied, "It's nothing, there are still some problems with the materials."
Qi Zhanhang saw He Ran's expression and also saw a series of data on the screen. Although he didn't know what these data showed, judging from He Ran's reaction, the situation should not be good.
"We'll have to wait for... the news." He Ran tilted his head, but his eyes were fixed on the screen.
Before Tuesday sent the feedback results, He Ran directly began to write a virtual storage shell in zero language, intending to install it directly in the computers of these city halls to prevent future attacks by those hackers.
Tuesday: Joe, the result is out, and I will send you the data feedback.
... (transfer information)
Joe: Thanks, keep that gadget.
Tuesday: Hmm.
After He Ran received these materials, he quickly started browsing from the beginning.When he saw the area over country M, He Ran raised his eyebrows.
"As expected... M country." He Ran murmured to himself, this was unexpected and reasonable.
Qi Zhanhang turned his head to see what happened.
Feeling Qi Zhanhang's gaze, He Ran quickly converted these zero-language feedback data into C language data.
After the conversion, He Ran made a "please look" gesture to Qi Zhanhang.
"Is there a way?" Qi Zhanhang asked in a low voice, frowning after reading it.
"At present, it seems to be a bit difficult." He Ran also replied in a low voice, "The other party's actions are obviously organized. Although I found out where the last information belongs, this is different from directly catching the intruder. nature."
Qi Zhanhang pondered: "Then it seems like this is the only way to go. This incident can only be used as a warning. What you just made up is a defense system?"
"No, it's just a virtual storage shell that can stop some hackers from stealing."
"Blocking against behavior?"
"you can say it this way."
"Thank you."
He Ran smiled when he heard Qi Zhanhang's words.
Suddenly, the data on the screen began to jump rapidly.
"Huh?" Qi Zhanhang noticed it and couldn't help but make a sound.
At this time, the two secretaries had already sorted out some of the materials, transferred them, and left the secretariat.
"It's a coincidence." He Ran propped his chin with his left hand.
"Is it the original batch?" Qi Zhanhang asked directly without looking carefully.
He Ran's right index finger clicked on a certain data on the screen: "Look, when they came in, the first hole they chose was the one you've patched. From this point of view, I think it's the same group of people."
Qi Zhanhang nodded, and then asked, "Then why are you in no hurry?"
He Ran recalled the data of the previously written virtual storage shell and said, "Because this thing has already started running."
Qi Zhanhang: "..."
He Ran yawned again at this time.
Qi Zhanhang: "I mean, you should track them down."
"The other party is an organization, and it would be very troublesome to track back." He Ran waved his hand, indicating that he has no such ability.
"Where's the Monster from last time?"
"..." Student Zhanhang, can you not remember it so firmly? "I see."
Quickly entered a URL, and downloaded a virus directly from it.
"You want to use a virus?" Qi Zhanhang asked.
He Ran nodded: "Live virus, send it out first to let it lurk in those guys' computers, other problems, let's talk about it next time."
"Live virus?"
"Well, I wrote a virus in a brand-new programming language. It is characterized by strong latency. It can change the storage location every second in the same computer. There is no behavior of a general virus during the latency period. The activation method is simple. Enter a specific activation password in the computer, as long as the computer is connected to the Internet, the virus will be activated. After that, it can completely infect the computer where the live virus is located. As for the destructive ability, it depends on the designer's settings. Primary live viruses do not have active self The function of copying and spreading externally, that is to say, the virus I released now cannot be regarded as a worm virus."
"The intermediate and advanced versions are worms?"
"Well, that's right. But the advanced version hasn't been improved yet. If there are no special circumstances, I guess I won't be able to use it in my life."
"What is a very special situation?" Knowing that the matter here can basically be resolved, Qi Zhanhang relaxed and asked.
"The most special situation is that suddenly the computers all over the world are upgraded to win3000, or there are some optical brains, smart brains, etc. The next special situation is that a new programming language suddenly appears that is popular all over the world. The special case this time is..." There was a moaning "beep beep" sound from the computer.
"?" Qi Zhanhang turned his gaze back to the computer in front of He Ran.
"It's this kind of virtual defense line I set up that was broken by violence..." He Ran almost bit his own tongue.
"Cracked by violence?" Qi Zhanhang raised his tone, "Does it need to release your advanced live virus in this situation?"
He Ran scratched his head helplessly: "No need, although he brute force cracked my virtual storage shell, but at the same time destroyed the integrity of the files, and... the alarm should have sounded..."
There were many people yelling outside the door.
"What did you do?" Qi Zhanhang was not calm anymore.
He Ran turned his head and didn't look at him: "The terminal of the virtual storage shell is connected to the alarm system of the Public Information Network Security Supervision Bureau."
Qi Zhanhang: "..."
The author has something to say:
Small information:
Public Information Network Security Supervision
Public information network security supervision is referred to as network supervision, which is a duty of the public security department of the People's Republic of China. The staff of the supervisory agency is called the Internet Supervision Police (also known as Internet Police or Internet Police, see Internet Police for the difference).They are a special term in mainland China.
Network monitoring content and common technologies
Utilize the rights granted by the government and laws to monitor the website content, emails, chat messages and access records of users in mainland China, and have the highest level of network information control authority in mainland China.
Cyber police usually use technologies such as domain name hijacking, keyword filtering, network sniffing, gateway IP blocking, and electronic data forensics to filter and obtain relevant intelligence information; banning, blocking, and blocking may "destroy national and national unity, subvert national Political power", "endangering national security", "pornography and obscenity" and other "harmful" information; investigate and deal with network and computer crimes; backup and obtain relevant electronic evidence, etc.
According to Article 6 of the "People's Police Law of the People's Republic of China", the people's police shall perform the duties of "supervising and managing the security and protection of computer information systems" in accordance with the law.That is to say, the people's police who are currently engaged in the supervision of public information network security should be called "network police".
Internet Police, the official name in China should be International Internet Security Supervision Professional Police.
You'll Also Like
-
My Talent For Cultivating Immortals Can Be Refreshed
Chapter 414 6 hours ago -
People Are Drawing Cards In Konoha, But Some Men Don’t Play
Chapter 57 9 hours ago -
In Black Basketball, The Opening Template Is Shogo Haizaki
Chapter 72 9 hours ago -
Behind the Scenes of Aura Revival: I Am the King
Chapter 180 9 hours ago -
Don't like security guards? Here comes the little iron fist!
Chapter 87 9 hours ago -
Fuck you females, I'm a real man
Chapter 70 9 hours ago -
Game production: I created Mihoyo
Chapter 193 9 hours ago -
Watching the short video of One Piece, the characters of the Bankai instantly burst into tears
Chapter 93 9 hours ago -
Naruto live broadcast starts from the movie version
Chapter 194 9 hours ago -
I'm a card beast!
Chapter 180 9 hours ago