As soon as the screen flashed, Hu Yifei saw the other person's desktop. Unexpectedly, he found that the other party's operating system was an English version.
"European and American porn?" Hu Yifei reacted very quickly this time, and immediately thought of it.
The other party uses a scanner to scan the loopholes on Hu Yifei's computer, but there is almost no available information back. It should be blocked by Hu Yifei's firewall.
Hu Yifei can still recognize the scanner. He used the scanner to scan the website server of the University of Science and Technology for a while, and finally got a thick scan result. The report, which Hu Yifei will never forget, is still fresh in his memory: big title loophole one, a large section of esoteric English; large title loophole two, a large paragraph of esoteric English; big title loophole three, a large paragraph of esoteric ….
Since then, Hu Yifei was injured and never dared to use a scanner again.
In fact, many stupid scanners are integrated with attack tools, specially scanning for a loophole, which can be attacked immediately after scanning the loophole. But at that time, Hu Yifei did not know, he read an article called "Hacker invasion step by step", saying that the first step of hacker intrusion is scanning.
So he went to the wolf's den to post and asked others what scanner was best to use. An expert solemnly recommended one to Hu Yifei, saying that it was the most famous scanner in the industry, with the fastest scanning speed, the most complete vulnerability information and the strongest auxiliary functions.
Hu Yifei, like a treasure, excitedly downloaded the legendary "three most" scanner, but did not know that it was a security scanner, and the report was also a safety report, so a big misfortune was staged!
The other party's scan lasted two minutes and got five pieces of available information. Hu Yifei was able to count the number clearly. He had no idea what the information represented, and he couldn't help but be a little worried.
"Damn it!" Hu Yifei scolded, but he didn't expect that he had eaten half a book, but he still couldn't understand it. The effect of watching the silent performance was far less than that of Cobra. Although Cobra's demonstration had strong traces of performance, it was understood that he could at least see a lively performance, but this time he was completely blind.
Hu Yifei is very depressed, he also ran to seek enlightenment, which can enlighten a ball!
The intruder over there had already opened the command-line program, a dark interface similar to the DOS operating system, and then quickly typed some commands. This time Hu Yifei was even more dumbfounded. He could not understand the plain operation, and the characters on the pure command line were even more confused. He could only understand one thing, that is, the commands typed by the other party all pointed to his own computer.
Soon, the implementation result came out, failed!
Hu Yifei was overjoyed. This simple message was easy for him to understand.
The other party quickly typed in a new command, and the target was still pointed at Hu Yifei's computer, but the result was still a failure, changing five or six orders in a row, all of which were execution failures. For a while, the other party's operation stopped and seemed to be thinking, looking for new ways.
Hu Yifei's stomach cooed twice. just now, when he saw that the other party had failed several times in a row, he was so happy that he forgot about eating. Now that the other side had been quiet for more than ten minutes, Hu Yifei's stomach began to stir again. After a moment of hesitation, he stood up and tossed about on the big table in the middle of the dormitory to see if he could find something to cushion, otherwise it would be too uncomfortable.
After searching for a long time, I found a piece of gum and two packets of Banlangen granules. Hu Yifei was about to cry. Both of these things seemed to contain sugar. According to the biology book, sugar can be converted into energy. But the carrier of this energy seems to be too much of that.
Hu Yifei gritted his teeth and stuffed the gum into his mouth. "Damn it, it's like eating candy buns!" Trying to remember the taste of sugar buns, he removed the two packets of Banlangen granules, washed them away with water, smelled them, and his face was covered with deep and distant words: "when I was a child, as soon as I heard the cry of black sesame paste, I couldn't sit still any longer.". "
Before returning to the computer, the intruder began to move again, and to Hu Yifei's surprise, after leaving for such a while, the other party's operating system became Chinese. Because Hu Yifei did not see the other party's operation just now, Hu Yifei did not know what had happened. he guessed that the other party must have entered another computer, which is a bit similar to using his own artifact.
The other side's further actions confirmed that Hu Yifei's guess was correct. He rummaged through the Chinese computer for a while and found a document called "online Registration Information form for College students of Dongyang Science and Technology".
It was only then that Hu Yifei realized that it turned out that this guy had invaded other computers in the school, and the computer that stored this kind of information should be the center of the school network.
The intruder opened the registration form and quickly searched it. Soon, he locked an IP address: 10.50.0.120. The intruder circled the corresponding information behind the IP address with the mouse: Hu Yifei, Room 319, dormitory Building 2.
Hu Yifei immediately stood up all over his body, sat in front of the computer and watched others call up his real information. It felt so horrible, as if he had been bewitched. At this moment, his life seemed to be pinched into the hands of others.
The intruder's attack did not stop. He quickly cleaned up the log, withdrew from this computer in the network center, and then went to connect to another computer. Hu Yifei saw clearly this time. The other party uses a small software similar to his own artifact interface, called a remote terminal connector.
After clicking on the connection, the other party entered another computer, and there was no extra action at all. He directly ran a shortcut icon on the desktop called "Student File Management system of Dongyang University of Science and Technology". Enter the word "Hu Yifei". After clicking the query button, Hu Yifei's file was called up, which Hu Yifei had never seen before. It includes photos, birthdays, phone calls, places of origin, and other information.
The intruder circled the mouse again, and this time the one in the circle was Hu Yifei's email address. After a few seconds, the other party cleaned up the log again and exited the computer.
The interface returned to the English operating system, and the other party opened the email tool and began to write a letter to Hu Yifei's mailbox with the title: "Hu Yifei alumnus, invitation from his alma mater Dongfeng Experimental Primary School!" And then put in the contents of the letter that had been prepared a long time ago. it was all code, and it was meticulously crafted at a glance.
Hu Yifei was amazed by this series of actions, and the other party was so powerful that he only glanced at the file, only a few seconds before and after, he even remembered what he went to primary school, and the intention of the other party was also very admirable. when most people see a letter with this title, they must have no suspicion at all. as long as they click in, they are afraid that they will be hit.
After the other party wrote it, he did not send it in a hurry, but opened the search engine to search for information about Dongfeng Experimental Primary School. Finally, he found the mailbox of the headmaster of Dongfeng Experimental Primary School. He wrote this email address in the sender column, and then clicked send. The email was sent to Hu Yifei's mailbox.
"I'm not going to order it!" Hu Yifei also understood at this time that the other side could not attack his own computer, so he thought of the way to save the country. He probably wanted to plant a Trojan horse to his computer through e-mail.
After the other party sent an email, he landed at the wolf's nest stronghold. This time Hu Yifei saw clearly that the other party's ID was a tarantula. He sent Hu Yifei a forum message saying, "your computer is very secure. I need some time."
Hu Yifei withdrew from the artifact and ran to reply to the other party's message, "then three days, valid for three days, no waiting for expiration!"
"OK!" The response from the tarantula is very short.
Hu Yifei laughed very slutty. This shameless tarantula wanted to trap me, but it was good to trap yourself. Hu Yifei is not worried that the tarantula will come to attack his computer, the boy will definitely stay in front of the computer for three days, wait well, I will not enter the mailbox for three days.
Hu Yifei hummed a little song and went out for dinner.