Reborn Ace Hack

Chapter 481

The appearance of this dialog box surprised everyone and shocked everyone, because this dialog box made them aware of a terrible problem, that is, seeing their computers being silently invaded.

.

"Who is this person, how did he hack into my computer, and what do he mean by what he said?..."

At this moment, I am afraid that when many people see this dialog box, a series of questions will pop up in their minds, and then their subconscious action is to click on the cross in the upper right corner of the dialog box.

But when they closed the dialog box, another dialog box popped up immediately.

"Do you think I'm being alarmist? You also want to know how I control your computer. If you want to know, just click the OK button."

This dialog box is a modal dialog box, which means that if you want to perform other operations, you must first close this dialog box. However, this dialog box only has an OK button, and the close button in the upper right corner is blocked. In other words,

Normally, if you want to close this dialog box, you can only click the OK button, but,

I am afraid that few of those who like hackers and dare to call themselves hackers will follow the instructions on the dialog box and click the OK button, because there are many ways to close a modal dialog box, and the simplest method is,

You can use the task manager to forcefully end the dialog box process, such as restarting or logging off the computer, etc.

But after these guys tried various methods, they found that their computers were completely locked by this dialog box. They could no longer perform any operations except clicking on the dialog box, and logging out and restarting were of no use.

At their wits' end, even though they were reluctant, most people still followed the requirements on the dialog box and clicked the OK button on the dialog box. Of course, some particularly stubborn people did not rule out the extreme idea of ​​redoing the system.

method, but after all, there are only a few people who are so extreme.

After clicking on this dialog box, the computer's browser window automatically opened and was automatically positioned on a post in the public section of the Xuannie community.

ker, and fly007 mentioned in the post is the hacker who released attack tools and organized hackers to attack the White House website.

Being forced to read this post, some people were attracted by the title and began to browse this post. Of course, there were also some people who did not want to be forced to read the post, so they closed their browsers. However, they soon discovered that turning off browsing

After the browser is installed, the previous dialog box where you can only click the OK button will pop up again.

So someone else thought that if I don't close the dialog box, then I can change the network address to another address, but this attempt still failed, because the browser address was also forcibly locked on that post, even if it was forced

If you change the browser address, the browser will still automatically return to this post.

"Well, since we can't change it, let's see what the conspiracy is first." So whether they were willing or unwilling, after going through a lot of trouble, people began to browse the post posted by chn_honker.

.

When people read the post carefully, they were all shocked by what was mentioned in the post. If what is said in this post is true, their passion has really been taken advantage of.

What was described in the post not only shocked the fans who were forced to read the post, but also those who had been paying attention to this matter but had not participated in it. After learning about the hijacking of the fans, they found the post.

, at a glance, everyone was shocked.

This post is divided into two parts. The first part is a typical technical post with very concise language. It mainly lists the following points:

First, the so-called spam information released by the tool released by fly007 is actually not spam information, but an encrypted network protocol data packet.

Second, if China's domestic network data wants to access foreign sites, there are several core gates that must be passed, and these core gates have been implanted with Trojans by fly007. When hackers start the tool software, they start to follow the configured

When parameters send attack data to foreign sites, the data must pass through these core levels. When the data passes through these levels, it will first be intercepted by the Trojan horse implanted by fly007 in advance.

Third, after the attack data is intercepted by the Trojan, the Trojan will copy the data into several copies, one of which will be sent to the attack target intact. In this attack, it was sent to the White House station in the United States, and the site was

attack.

Fourth, while attacking the White House Station, the Trojan will also unpack the attack data and extract some special codes. These codes will be decrypted at the core level, and the Trojan will convert them according to the decrypted network protocol data packets.

Redirect, send to some large domestic stations, and attack these stations.

At the end of the technical part, the protocol encryption algorithm of the tool provided by fly007 to the hackers is given, as well as the sample of the Trojan horse implanted in the core level.

If the technical analysis part only describes objective facts without any personal emotions, the second part is the expression of some passionate personal opinions.

First of all, the poster claimed that he was the one who hijacked the computers of the hackers who were bewitched by fly007 and used by him. He was also a hacker, loved computers and the Internet, and advocated freedom and unrestraint, but he was also a Chinese,

deeply in love with myself

nation, so he would never tolerate anyone taking advantage of the passion of the Chinese people to use conspiracies and tricks against the Chinese people. Therefore, he had to step forward. At this moment, he preferred to be called Hong Ke. Next, he talked about himself

What should the Hongke in my heart look like?

First of all, Hongke is a title exclusive to China. To be worthy of this title, you must first be a Chinese, and you must love your own nation and be willing to sacrifice your life and blood for the sake of national justice like countless martyrs. Only in this way can you be able to

It deserves a red letter.

"But can we call it a Hongke if we only have a passionate love for the Chinese nation? No, because Hongke also contains the word "Ke". What is a guest? In ancient times, there were knights and swordsmen. I think Hongke

The word "ke" in "ke" should have the same meaning as the word "ke" in these two words, that is, only a person with superb skills and high moral standards can be called a guest..."

"In computers and the Internet, when it comes to being technically proficient, I don't think I need to explain it. I'm afraid everyone has a standard, but I think the most basic threshold should be that you can't just be a script kid who only takes advantage of others.

To write good tools, you must at least be able to express your ideas in one or several programming languages. If you can't even do this, then you can only be regarded as a passionate young man, not a red guest...

…”

"Secondly, when it comes to high morals, I think people who are willing to be hackers should refer to the hacker spirit mentioned in the Feonix Hacker Manifesto, and the white hat standards of calmness, protection, responsibility, not belligerent but not afraid of war.

, these should be the moral standards of Hongke, and words such as impulse, invasion, and destruction should be rejected by Hongke, because these words will only bring shame to our nation!"

"Perhaps every Chinese who is willing to be a Hongke should think about what I said. Maybe some people will say, what qualifications do you have to define Hongke? When the name Hongke first appeared, I was thinking

, what kind of standards should Hongke have, so I came up with the above ideas, but what qualifications do I have to stand up and define Hongke? "

"I think that this qualification should not be something I claim by myself, but should be recognized by everyone. In order for everyone to recognize that I have such qualifications, I decided to do something!"

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like