Chapter 14: Not Taking the Unusual Path
(For the first reward of this book, a special chapter will be added!) Professor Vincent was immediately shocked when he heard Troy's words! He cracked this program in less than half an hour? How did he do it?
After a while, Professor Vincent said, "Troy, can you tell me about your cracking method?"
Troy nodded after hearing this and said, "Of course, the working principle of this virus is related to the system's own operations, so the cracking method I thought of is to modify the system's own programs and convert the 'delete' command into other operations. Only in this way can the virus be deleted. Of course, this method is a bit cumbersome, but it is the most suitable and safest method I thought of."
Professor Vincent nodded when he heard this. As Troy said, this method is a bit cumbersome and a bit clumsy, but it is indeed the safest method. However, the mysterious character obviously did not use this method, so he developed another special killing tool specifically for this virus!
Professor Vincent thought of this and said to Troy: "Your opponent did not use this method. I think we can study his method."
Troy had wanted to do this for a long time. He immediately nodded and logged into the New York Times website. The virus killing tool embedded in Feng Xiaotian still existed. Troy did not take much effort to extract this killing tool. After a few minutes, Troy suddenly slapped the table and said, "Oh Buy! Buy Buy! It's so beautiful!"
Troy's reaction was a bit loud. The guards standing not far away immediately came over. They were worried that Troy would make any extraordinary actions to Professor Vincent. Professor Vincent waved his hand and stopped the guards, and then said, "Troy, what method did he use?"
Just look at Troy's expression and you will know that this virus-killing tool is definitely very powerful, otherwise why would Troy be so excited?
Troy sighed for a while before explaining to Professor Vincent: "This person is so genius! Why didn't I think of this method? - Professor, you must have thought that cracking this virus is so simple! Just put the virus into a newly created folder and delete this folder! Buy it! This is the most direct, simplest and most effective method I have ever seen! He is a genius!"
When Professor Vincent heard Troy's explanation, he immediately understood that this method is indeed the most effective and simplest! Although the virus itself will be activated after receiving the deletion command, if the virus itself is bypassed, things will become much simpler!
Troy was excited, Professor Vinson was shocked, and both of them were not at peace. After a while, Troy shouted again: "Oh my God! This... this person is so amazing! This special killing tool actually has the active search function! You can search for targets similar to yourself and actively run the program to delete them! Me, I... I think... maybe he is the most powerful programmer in the world!"
Professor Vinson was silent for a long time after hearing this, and then said to Troy: "Troy, are you willing to join the National Cybersecurity Center?"
There is naturally a reason why Professor Vincent made this request. He wanted to find this mysterious person. If such a powerful person cannot be controlled by the country, once he does something bad, the consequences will definitely be extremely serious. Therefore, Professor Vincent wants to bribe Troy and then learn more about this person through the Troy line.
Troy was stunned when he heard Professor Vincent's words, and then said, "This... can I really join?"
Troy originally thought that he would be imprisoned for at least a few years after he was arrested, but he did not expect that Professor Vincent would recruit him. If he really joined the state department, what he committed would not be investigated. This is naturally the best result.
Professor Vincent smiled slightly and said, "Of course you can. I can solve this matter for you. As long as the relevant procedures are completed, you can restore your freedom and your work and reputation can be preserved. But I have a requirement - you need to assist us in the future and find this person. Do you agree?"
Troy seemed very happy when he heard this, but then he hesitated and said, "Professor... are you sure we can catch him?"
Professor Vinson smiled when he heard this, and then said, "As long as we have enough patience, we can achieve our goal. Even if we can't catch him, it's good to know him more. I'm very curious about him. When you launch a flood attack, his data flow can be almost negligible, but he defeated you in the end. I guess you are very puzzled by this, curious, right?"
Troy nodded and said, "That's true. I originally thought I was sure to win, but inexplicably lost. I was very puzzled about this. How did this guy do this?"
Professor Vinson laughed at this and said, "That's why I invite you to join us. We can work together to unveil his mysterious veil."
At four o'clock in the morning on the first day of the Lunar New Year, Feng Xiaotian got up early as usual. After washing up, he went out with a snakeskin bag. As the saying goes, "Beggars have three days of years", which means that even if they are beggars, they will rest for a few days during the Chinese New Year. But Feng Xiaotian is not beggars, so he did not rest.
If he doesn't pick up rags and sells them for money, what will he eat? How can he survive? Feng Xiaotian has no habit of rest. For him, life is like this. Since he has no support, he has to rely on himself.
At 6:30 in the morning, Feng Xiaotian returned home with a full bag of rags in a snake-skin bag. Today, Lao Li didn't start work, so he had to take back the rags he picked up. He could only sell them for money after Lao Li opened his door on the ninth day of the Chinese New Year.
Feng Xiaotian took the rag to the backyard and put it in, then turned on the computer. After last night's battle, he suddenly had an idea in his mind, which was to develop a counterattack program against hackers. This is very simple to say, but it is very difficult to do.
First of all, you have to know what hackers attack methods are, and then you can prescribe the right medicine. Feng Xiaotian knows the hackers' attack methods very well. Generally, the most common hacker attack methods can be summarized into the following types:
(1): Trojan horse virus implants, stealing the other party's operating instructions, thereby controlling the other party's computer;
(II): Flood attack, that is, data flow attack, through a large number of meaningless access applications, the other party's computer crashes because the processing volume exceeds the critical value;
(III) System vulnerability, this is a relatively powerful method used by advanced hackers. All systems have vulnerabilities. As long as you know this vulnerability, you can sneak into your computer through the vulnerability and gain control of the computer;
(4) Data monitoring, information transmission between networks is carried out through data packet mode. Some hackers can control the computer by intercepting data packets and cracking data of data;
(5) Deception and seduction. Some hackers will spread some deceptive programs on the Internet. As long as you click on these programs, you may be deceived. Once you allow this program to run on your computer, it will basically declare that you have been hit.
The above five methods can be summarized into three types. First, fourth, and fifth are basically of the same nature. Whether it is Trojan virus, data monitoring, or deception and seduction, their essence is to know your computer operation instructions. This is also the most commonly used method by hackers. The second is more violent and directly destroys your system. Although it does not have much technical content, it makes people difficult to resist. The third is a problem of the system itself. This problem is not easy to solve unless you can fix all the vulnerabilities in the system.
Chapter completed!