Red Soviet Union
Chapter 865: Awesome Hacker
? Just last year, experts from West Germany came to East Germany to participate in a conference. As a result, they were shocked by the Internet in East Germany. They did not expect that East Germany's technology developed so rapidly! East Germany's network is really too powerful!
What they are most enthusiastic about is distributed computing. If there is no large computer, then a large number of microcomputers are networked for computing to complete many difficult tasks! After seeing these applications, experts from West Germany couldn't sit still, and immediately expressed that they would import East Germany's network technology.
Faced with a friend's application, East Germany was of course too embarrassed to refuse, so a few days later, the West German government approved it, and the cooperation project between the two parties began. An optical fiber connected East Germany and West Germany. At the same time, a large number of The network equipment was installed in West Germany, and the universities in West Germany were also among the first to access the network, and they soon felt the convenience.
At the same time, West Germany's government office system is also connected to the Internet. Using the Internet, they can complete various tasks more conveniently, such as sending documents to subordinate units, and the matter is over in a few seconds. In the past, it was necessary to send a contact It takes half a day for the staff to deliver the documents, and it is easy to miss!
When the Internet spread in West Germany, they felt the huge advantages of the Internet. As a result, even the Ministry of Defense couldn't hold back and connected to the Internet!
At this time, there is obviously no talk of cybercrime!
Let alone cybercrime, in this era, there is no Internet. Even the world-renowned Kevin Mitnick has just invaded the telephone network. Historically, in 1983, he used a The computer in the university entered the ARPA network, the predecessor of the Internet without authorization, and through this network entered the computer of the Pentagon in the United States. He was sentenced to six months in a youth correctional center in California. The term cyber hacking has not officially begun.
However, now in the Soviet Union, the rapid development of computer network technology has finally begun to allow ordinary people to have access to computers, and, since ancient times, heroes have come out of youth.
At the age of ten, isn't he still a kid? When it comes to computers, though, it really depends on the brains of geniuses.
In later generations of Huaxia, there was a computer genius Wang Zhengyang who went to the primary school attached to Tsinghua University. When I was 8 years old, I suddenly became obsessed with writing code. So his father immediately bought him a laptop with the highest configuration at that time. Wang Zhengyang started his programming career and wrote code for 5 years. In the end, he broke the keyboard of the computer. He often looks for loopholes in various websites, and then trains his computer skills. I bought 2,500 yuan of goods on a website for a penny, and I was less than ten years old at the time. Of course, he didn't ask for the items, but instead told the website about the bug.
Computer network is a new thing, and the Soviet Union is at the forefront of this field. In the Soviet Union, another awesome hacker was born!
Hackers don’t know age, they only look at talent, I have to say, this thing is really related to talent,
In the eyes of ordinary people, a line of code is quite boring, but in the eyes of others, the code is a beating note.
And now, in front of Andre's eyes, a powerful hacker is appearing. He is now invading the computer system of the West German Ministry of Defense!
When the computer is connected to the Internet, it will face security issues. In order to protect your data from being lost, the computers in important departments must have password systems. If you are familiar with people, you can try to use numbers such as birthdays. For broilers who don't know it, it can only be cracked by using violent means and constantly trying passwords!
It may take a long time, it may only take a few minutes, it depends entirely on luck!
Ivan, where did you get this code-breaking program? Andre suppressed his inner excitement and asked Ivan.
Of course I wrote it myself. The system of the Ministry of National Defense of West Germany uses the UNIX system. I optimized it specifically for this kind of system. Ivan said: Besides, this kind of program can only be written by myself. Are you still counting on others?
It was only then that Andre noticed that there were some computer books beside Ivan's bed, the latest introduction to computers, assembly principles, etc. Andre before time travel, when reading these books, it was quite a headache Yes, after all, the programs of later generations have developed to an advanced stage. Many programmers are just code porters, copy and paste, and copy the corresponding code for any function they need. But now, this is all assembly language, dealing directly with the machine.
If you don't know computer hardware and various technical parameters, you can't write a program at all. This little Ivan is simply too surprising!
And at this moment, suddenly, the jumping images on the screen stopped! Ivan ran over quickly, sat on the chair, and then continued to dance his fingers: Go in, finally go in, and now I want to copy the contents in the shortest possible time! I hope the Germans will leave me a little longer, and salute your God!
Ivan chattered, his fingers kept beating, and the keyboard was ringing. At this time, Ivan's face was extremely excited: Okay, I successfully copied one of their documents, um, and then the first Two copies. It seems that I have to save the pocket money for next month, and I want to buy a big hard drive to save all these materials. Oh, not good!
The jumping characters on the screen suddenly disappeared, and the copy failed!
The connection was interrupted, the network was disconnected over there! Little Ivan said depressingly: I could have copied more, um, now take a look and see what's interesting inside.
Ivan opened the file just now, but what was displayed on the screen was all in German!
Invasion of the German Ministry of National Defense system, the documents inside, of course, are all in German! Andre moved closer and saw the content above, and his expression changed immediately.
An analysis of the feasibility of military exchanges with East Germany.
Andre also knows German. After reading this report, he immediately knew what it meant. After a long period of contact and communication, the West German government finally wanted to take more substantive steps!
Conduct military exchanges with East Germany! what does that mean? It means that some of them want to break away from the embrace of the United States and come together with the Soviet Union! Even for a few of them, this is a welcome change!
They communicated with East Germany, that is, they want to move closer to the Soviet Union. They have realized that with the weakening of the United States, West Germany is facing a deep crisis in politics, economy, and military affairs. Only by changing their ideas can they give East Germany a future. ! (To be continued.)
You'll Also Like
-
Naruto Live: The Death of Naruto in the Beginning Movie
Chapter 829 16 hours ago -
Anime: Saiyans eat the world of food
Chapter 285 16 hours ago -
Naruto: I traveled through time with the Samsara Eye.
Chapter 534 17 hours ago -
Siheyuan: Shazhu's Brother Shadan
Chapter 183 17 hours ago -
From Pirates to Sweeping the Worlds
Chapter 796 17 hours ago -
After I became a real young master, I became famous for my bad behavior
Chapter 627 17 hours ago -
Opening: Minato became my brother
Chapter 108 17 hours ago -
Genshin Impact: Xiao Tiandao becomes a game character
Chapter 190 17 hours ago -
Naruto: This Uchiha is a businessman.
Chapter 209 17 hours ago -
Pirate: I am Kozuki's nemesis and Nika's enemy!
Chapter 205 17 hours ago