The Strongest Hacker in the City
Chapter 283
Chapter 283 The despair of a super hacker! (2 more! Seek full order!!!)
Two minutes left!
At this time, Kong Shan was completely desperate.
Even the monster demon spirit is closed, who can withstand it?
Of course he knew that Yao Yaoling could not really shut down, but said that his cell phone signal was intercepted by a god-level hacker.
This has also led to the fact that no matter who he asks for help, he can’t succeed!
At this time, he realized how big the gap between himself and the god-level hacker was.
It can be called the difference between cloud and mud!
“Puff.
Kong Shan fart. Sitting on the chair, his face was like ashes, and the whole person’s spirit was wilted.
Obviously, he has given up struggling.
At this time, those audiences in Chu Hao’s live room, seeing this scene through the screen of the live room, suddenly felt dull.
In everyone’s expectation, the super hacker will have to fight against the anchor no matter what, and then lose.
This is in line with the plot in their hearts.
Have you ever thought that a super hacker lost so quickly that he didn’t even have the courage to struggle.
Many people brushed the barrage in the live broadcast room, expressing their inner feelings.
“It’s boring! It’s boring! Super hacker, let’s give up struggling! It disappoints me too much.”
“This hasn’t even started, he lost! Alas, look at his predictable face, like an old man 080, who is not angry at all.”
“Hey, he shouldn’t be absolutely wrong, he shouldn’t offend the anchor! Now it’s fine, the whole person is considered useless. The fighting spirit has been polished to a thousand times.”
“This lesson is enough for him to remember for a lifetime.
Looking at the barrage in the live broadcast room, Chu Hao smiled and said, “It’s less than two minutes.
“I will briefly explain to you some precautions after the invasion.
As soon as this statement came out, the audience in the live broadcast room suddenly became interested again.
Chu Hao paused and continued: “After the hacker has completed the intrusion work, next, he needs to leave the other party’s system.
“But!” At this point, Chu Hao’s voice stretched slightly, and then solemnly said.
“If the hacker completes the attack and immediately leaves the system without doing any aftermath, then his whereabouts will be quickly discovered by the system administrator!
“Because all network operating systems generally provide a log recording function, which records the actions that occur on the system.
“This logging function is like when you hit someone on the road. You think there is no one around, you can escape (bhaj) days! In fact, the surveillance camera has completely recorded the whole thing. The case!
“So, for my own concealment!”
“Hackers generally erase the traces they leave in the log.
“If you want to understand how hackers can erase traces, you must first understand the log structure and working methods of common operating systems.”
Listening to Chu Hao’s explanation, the audience suddenly realized.
In their imagination, hackers hacking into the network is a very leathery and interesting thing.
Unexpectedly, the pre-invasion preparations, some complicated handling methods during the invasion, and the evacuation after the invasion also need to do some deceptive things.
In this way, hackers are not easy to behave.
A little carelessness is the end of tea.
Many viewers sighed with emotion: “I have gained knowledge! It turns out that hackers are more hideous than I thought! But if you are not careful, you will be exposed!”
“Yeah, I thought that hackers came and went without a trace. It was very simple. I didn’t expect that there are so many things! Any mistake in any link will lead to an unimaginable situation.
“So, if you don’t have enough strength, don’t have those unclean thoughts! Curiosity will kill the cat.
Chu Hao glanced at the fearful remarks in the live broadcast room and couldn’t help but smile: “Don’t worry, as long as you pay more attention, the problem is not big.”
“If you do a math problem, you will check it back and forth several times! It makes sense to invade other people’s networks and be careful.
Immediately, Chu Hao changed his conversation and said: “There are many ways to erase traces, but the most basic point is that you must obtain the highest administrator authority of the system!
“Only in this way can the files on the system be modified at will.
“For example, if a general hacker wants to hide his traces, he will modify the log. Of course, the easiest way is to delete the log file.”
“But by doing so, although it prevented the system administrator from tracing himself based on the IP, it also clearly told the administrator that the system had been invaded.”
“So the most common method is to modify only the part of the log file that is relevant to you.
“Just like the penguin with yellow diamonds, you can enter other people’s spaces, and you can also use the yellow diamond privileges to delete the visitor records you have entered. The principle is the same.
“Of course, it is not enough to only modify the log, because there must be a leak in the hundred secrets. Even if you think that you have modified all the logs, you will still leave some clues.
“So, hacker masters can further hide their traces by replacing some system programs. This kind of hacker program used to replace normal system programs is called rootkit to achieve the purpose of hiding themselves.”
It was a long time, and as time passed away, Chu Hao was almost done. Similarly, the two-minute deadline has come.
Watch the timer in the live room show 00:00!
Everyone’s attention was once again attracted to the super hacker.
At the same time, Kong Shan experienced two minutes of painful suffering while listening to Chu Hao to explain to the audience the attention points of the invasion.
He felt that his whole person was about to explode.
A dignified hacker anchor has turned into a lecture material in the mouth of a god-level hacker!
This kind of thing, he has experienced it for the first time in more than 30 years!
Under the double torture, he felt like he was going crazy.
Seeing that the countdown turned to 00:00, Kong Shan was actually relieved, and silently said in his heart: Finally don’t endure this painful suffering.
Abruptly, Chu Hao’s voice echoed in his room.
“It’s time, I’m sorry, you didn’t accomplish anything.
“From now on, your live broadcast room, I, closed it!”
As Chu Hao’s voice fell, in an instant, the Super Hacker Live Room flickered.
The computer interface of Kongshan has also retreated from the backstage of the Xianyu live broadcast room and turned into a normal web interface.
Kong Shan searched the Xianyu platform and found that the “Super Hacker” live broadcast room had completely disappeared.
“Oh!” Kong Shan sighed, feeling a deep sense of powerlessness.
Thank you “阿怪@” for the two hundred rewards and “kong” for the 1,000 rewards.
You'll Also Like
-
Villain: Master Forbidden Empress, I am invincible!
Chapter 465 13 hours ago -
Villain: You were the one who suggested breaking off the engagement, why are you crying now?
Chapter 656 13 hours ago -
I, the fighting party, became Xiaozhi's golden finger
Chapter 948 13 hours ago -
Young man on white horse, I am in the human world, who dares to call himself an immortal?
Chapter 240 13 hours ago -
Starting from not paying back debts to start technological hegemony
Chapter 513 13 hours ago -
Pirates: Beginning with the Patrolman
Chapter 213 13 hours ago -
I'm the villain! Why are all the heroines surrounding me?
Chapter 131 13 hours ago -
The real young master was reborn and went crazy, and the whole family regretted and cried
Chapter 465 13 hours ago -
Let you be a policeman and arrest the chief
Chapter 522 13 hours ago -
Weird: To avoid disaster and seek good fortune, start by watching the red moon at night
Chapter 110 13 hours ago