Chapter 453 Psychological Trap
Compared with other hackers, Xuan Qi's advantages and disadvantages are equally obvious. Xuan Qi's advantages are that he has decades of experience than these hackers, and has advantages that others cannot compare with the network, computers and even operating systems. Xuan Qi's disadvantages are very obvious. He is not an orthodox hacker and has no solid foundation. Whether it is intrusion or defense, he has a lot of theory, but has no practical practice, so he often makes some low-level mistakes.
Fortunately, what we have to deal with now is D but not a disciple. Xuan Qi's shortcomings will not be exposed. Relying on his current level is enough to copy the DYR device.
DY is a person who knows the quality of life very well. He has a unique nature in his thinking and has a sense of endless life and endless mak. Unfortunately, the Mask Island is very cautious and can do it. All he can do is turn on his beloved computer and play one-to-five, or five-to-one games.
The server has been spreading similarly, at least it can make Xuan Qi lose a large amount of development expenses. This result makes DY much more comfortable. Hackers on the Internet cannot kill people thousands of miles away, but they can cause losses to others.
Looking at the small movies made by Island Country on the screen, DY also thought about comparing the differences between the protagonists of both sides. It was like a huge foreigner who liked performances with more men and women. Why are the small movies in Island Country all one woman and more men? Is it because the actresses in Island Country are more dedicated?
Waiting for Zhong Xuanqi to breathe deeply, his heart beats for no reason. This time, the legendary server leaked the secret, there are two steps to solve it, and grasping the big hand behind the scenes is only the first step.
As data continues to be rolled and exchanged, Xuan Qi watched the space in the hard disk start to increase continuously, and the percentage continues to rise, 60%, 65, 70%...
When it reaches 100%, Xuan Qi opens the shadow system and looks at ten lines at a glance. It has a very traditional layout, with a total of three partitions, system disk, program disk and entertainment disk. Xuan Qi searches in the system disk, which is very clean and has nothing suspicious about it.
It's easy to find in the entertainment disk. There are only twelve folders inside, all of which are small-cost movies. Together, there are almost 60 G. In 2001, ordinary computers have only 60 hard drives, and only 120 computers have 60 G. It's really talented to use 60 G to install movies.
After clicking on the folders one by one, Xuan Qi found that there were completely different series in these twelve folders, forcibly, role-playing, professional, and heavy tastes of humans and small animals. Xuan Qi then realized that this thing could still shoot these file names like this, all of which were self-encoded with numbers and letters, with a total of twenty digits long, and there were a total of twenty files in the folder. However, it did not attract Xuan Qi's attention.
The third one is the program disk, which contains some simple user hacking tools and some strange fragmented files, which seem to have been crushed by a file shredder, and is lying alone in the recycling bin.
The most valuable gain of invading a target is likely to be in the recycling bin. Xuan Qi did not open the recycling bin immediately, but instead opened the scanning program to scan again. Through continuous scanning and searching, he also searched for hidden files in the subdirectory, and then conducted hidden crawler analysis. Sure enough, a small crawler was found in the subdirectory, and this crawler belonged to his disciple.
After seeing this little crawler, Xuan Qi's eyes flashed with strange colors and then turned into something. It seems that the disciple and DY are not the same as DY. In the hidden files of the system, in addition to this crawler, there is also a honey pot hidden. The careful DYf interprets it to the extreme, installing a honey pot for his system and installing such a secret is really shameless.
Xuan Qi typed his finger on the keyboard, then blocked the honeypot program, scanned it again, and confirmed that there were no other problems, Xuan Qi began to restore the shattered files in the recycling bin.
The fragmented files were restored bit by bit, five percent, nine percent, and eighteen percent... As the progress bar got higher and higher, a trace of uneasiness rose in Xuan Qi's heart, as if something bad was about to happen. When the progress bar reached 99 percent, Xuan Qi directly reached out to cancel, staring at the shattered garbage files on the screen.
Will such a black-bellied and atrophic bastard only leave a honeypot in his computer? Why are the crushed files deleted into the recycling bin without clearing them? Does it look like fish food hanging on a fish hook? Such an obvious setting may be a trap.
Xuan Qi felt that it was very likely, so he opened another safe program in the shadow system, put all the fragmented files in the safe, and then began to reverse the assembler's source code. After the binary value of 0101010I...¨ appeared on the screen, Xuan Qi's eyes slowly widened, and finally saw a strange code in more than three thousand lines. This is the program of the data bomb.
Data bombs are different from network viruses. If network viruses steal data or cause logical errors, data bombs are mainly used to destroy computer hardware. They use high voltage and high power input and output, and can burn the computer's hard drive in an instant when running overload. This is actually a common protection method used by some hackers, but it has not been popular yet.
Xuan Qi took out this piece of code and then recovered the file, but found that the shattered file was really a data bomb. DY really understands psychology, continuously exploits the weaknesses of human nature, and makes a little arrangement. Even if he encounters a hacker who is countless times more skillful than himself, he can still lead the other party to rush to the mine.
If it hadn't been for DY many times, Xuan Qi would be a hacker who was not very confident but had powerful tools and ideas. He would have been caught this time with a cautious and cautious look.
Excluding the data bomb in the recycling bin, Xuan Qi searched for it in the DYR computer again, but failed to find something valuable, which made Xuan Qisheng feel a little frustrated. Didn’t DY put the secret in the computer?
The levels of hackers are divided into three levels. Among them, hackers who are just starting out will use notepad to write down their account passwords, and then store them in their hard drive or mailbox. They even use dozens of passwords to repeatedly protect them. Every day, they are nervous, but mysterious. They always feel that their skills are superb. They want to expose their identity, but they have to keep their mouths tight. This feeling is like walking in a night clothes, which is too uncomfortable.
After a period of polishing, these hackers either gave up or grew up and became senior programmers. Only then did they realize that hackers had nothing to do with them. They also had hands, wanted to eat, sleep, and survive. At this time, they no longer recorded these passwords in the computer, but set some obvious summary, and at the same time, different password combinations were performed according to different time and dates. They would perform secondary manual encryption on the recorded passwords, which could improve security a little further.
As for the ultimate hacker, it is completely different. In the crowd, they are no different from Guang Tongchen and the uncle next door, or even the younger sister next door. They are so inconspicuous, and even when there are few people, or where there are no one, they seem to be a little nervous.
They do not believe in computers, and important information programs or even passwords will be recorded on paper in handwritten form. They firmly believe that there is no unbreakable firewall in this world, nor does it not leak the secrets. This not only includes other people's computers, but also their own computers. So they rationally doubt everything, and even stick the camera with paper, as if they live in other people's surveillance every day, every minute and every second.
And now DY has definitely not reached the ultimate level, otherwise Xuan Qi would not have touched it into his home and copied his computer hard drive in full. Then what should have been saved in this computer, but it has not been discovered yet.
Xuan Qi has searched the entire hard drive three times without any omissions. The damn truth seems to be hidden in the computer, making a series of ridicule.
Xuan Qi looked at the computer screen with his eyes a little distracted, and his brain was still thinking. Did he miss something? Looking at the desktop of the shadow system again, Xuan Qi's eyes suddenly lit up, his palm ticked on the keyboard, and the just-deleted recycling bin was opened again. Xuan Qi used the hard disk repair tool to repair the recycling bin. Finally, among the many files in the recycling bin, he found a written document, and the title of the document was ID.
I found the corner of Xuan Qi's mouth and was about to restore the file, but I remembered DYR cunning. I used the tool to scan and search the entire folder three times in a row. After confirming that there was no problem, Xuan Qi restored the folder and then opened the ID text document.
A password input box pops up on the screen. This is the encryption program of the document and cannot be brute-forced. There are twelve digits in total, and it flashes every five minutes. Each flash means that the old password is small and the new password is added. If you want to verify the guess through input, even Xuan Qi, who owns a supercomputer, will have to crack it continuously for thousands of years.
Twelve digits and twenty digits? When Xuan Qi was anxious, he suddenly thought of the twenty-digit self-encoding in the small movie document. He quickly opened the file and looked at the twenty different self-encoding. Xuan Qi randomly copied one self-encoding. Just as he was about to glue it inside, he loosened the mouse again. The twenty-digit self-encoding has eight more digits than the twelve digits.
It shouldn't be that simple. Will the almost explicit password be the answer to the text document? Xuan Qi felt that it shouldn't be. After checking the detailed information of these small movies, he found that the twenty files were not changed on the same day, and the time span exceeded three years.
Chapter completed!