Two minutes to go!

At this time, Sorayama was completely desperate.

Even the special demon spirit has been closed, who can withstand this?

Of course, he knew that it was impossible for the demon spirit to really close, but that his mobile phone signal was intercepted by a god-level hacker.

As a result, no matter who he asks for help, he can't succeed!

At this time, he realized how big the gap between himself and god-level hackers was.

It's the difference between cloud and mud!

"Poof. "

Sitting on the chair, his face was like ashes, and his whole spirit was wilting.

Apparently, he has given up struggling.

At this time, those viewers in Chu Hao's live broadcast room, after seeing this scene through the screen of the live broadcast room, suddenly felt bored.

In everyone's expectation, the super hacker will have to fight against the anchor anyway, and then lose.

This is in line with the plot in their hearts.

Have you ever thought that the super hacker would lose so quickly that he didn't even have the courage to struggle.

Many people have swiped the barrage in the live broadcast room, expressing their inner feelings.

"It's boring! It's so boring! Super hacker, it's giving up the struggle! It's so disappointing for me. "

"He lost before it began! Alas, you see his dejected face, like an old man in his seventies and eighties, 467 sons, not angry at all. "

"Alas, he shouldn't have offended the anchor! The fighting spirit has been completely worn out..."

This lesson is enough for him to remember for a lifetime. "

......

Looking at the barrage in the live broadcast room, Chu Hao smiled and said, "There are less than two minutes left." "

"I'm going to give you a brief explanation of some post-invasion precautions. "

As soon as these words came out, the audience in the live broadcast room suddenly became interested again.

Chu Hao paused and continued: "When the hacker completes the intrusion work, the next step is to leave the other party's system. "

"But!" Speaking of this, Chu Hao's voice lengthened slightly, and then said solemnly.

"If a hacker leaves the system immediately after completing the attack without doing any aftermath work, then his whereabouts will be quickly discovered by the system administrator!"

"Because all network operating systems generally provide a logging function, they will record the actions that occur on the system. "

"This logging function is like hitting someone on the road, and you think that if there is no one around, you can run away (bjbg) birth day! In fact, the surveillance cameras have recorded the whole thing completely!"

"So, for the sake of its own concealment!

"Hackers generally erase the marks they leave in their logs.

"To understand how hackers erase their traces, we must first understand the log structure of common operating systems and how they work..."

Listening to Chu Hao's explanation, those great realizations.

In their imagination, hacking into the network is a very interesting thing.

Unexpectedly, the preparations in the early stage of the invasion, some complicated handling methods during the invasion, and the evacuation after the invasion also need to do some things to cover people's eyes.

In this way, hackers are not easy to be.

If you are not careful, you will end up drinking tea.

Many viewers sighed with emotion: "I have gained knowledge! It turns out that hackers are even more cowhide than I imagined! However, if you are not careful, you will also be exposed!"

"yes, I thought hackers came and went without a trace, it's simple. I didn't expect that there were so many things! Any mistake in any link would lead to an unimaginable situation. "

"So, if you don't have the strength, don't have those unclean thoughts! curiosity will kill cats. "

......

Chu Hao glanced at the fearful remarks in the live broadcast room, and couldn't help but smile: "Don't worry, as long as you pay more attention, the problem is still not big." "

"If you do a math problem, you will test it back and forth several times! It makes sense to be cautious about hacking into other people's networks. "

Immediately, Chu Hao changed his words and said, "There are many ways to erase the traces, but the most basic point is that you must obtain the highest administrator authority of the system!"

"This is the only way to modify the files on the system at will. "

"For example, if a hacker wants to hide his tracks, he will modify the logs, and the easiest way is to delete the log files. "

But in doing so, while preventing the system administrator from tracking him or her based on his IP, it also unequivocally tells the administrator that the system has been compromised. "

So the most common thing to do is to only make changes to the part of the log file that is relevant to you. "

"It's like a penguin with Yellow Diamond, you can enter other people's spaces, and you can use the Yellow Diamond privilege to delete the visitor records you entered... The principle is the same. "

"Of course, it's not enough to just change the logs, because there must be a leak in the 100 secrets, and even if you think you have changed all the logs, you will still leave some clues. "

Therefore, master hackers can further hide their tracks by replacing some system programs. This hacking program, which is used to replace normal system programs, is called a rootkit... So as to achieve the purpose of hiding yourself. "

It's been half a ring, and as time gradually wears off, Chu Hao has almost finished speaking. Similarly, the two-minute deadline has arrived.

Look at the timer in the live broadcast room showing 00:00!

Once again, everyone's attention was drawn to the super hackers.

At the same time, Kong Shan experienced the painful torment of the people for two minutes, and at the same time, he had to listen to Chu Hao explain the precautions of the invasion to those viewers.

He felt like his whole body was about to explode.

A hacker anchor has actually become a lecture material in the mouth of a god-level hacker!

This kind of thing is the first time he has experienced it in more than 30 years!

Under the double torture, he felt like he was going crazy.

After watching the countdown turn to 00:00, Sorayama actually breathed a sigh of relief, and said silently in his heart: Finally, don't endure this painful torment.

Abruptly, Chu Hao's voice echoed in his room.

"The time has come, and unfortunately, you have achieved nothing. "

"From now on, your live broadcast room, I, is closed!"

As Chu Hao's voice fell, in an instant, the super hacker live broadcast room flashed.

Kongshan's computer interface has also retreated from the backstage of the salted fish live broadcast room and has become a normal web interface.

Kongshan searched on the salted fish platform and found that the "super hacker" live broadcast room had completely disappeared.

"Alas!" Sorayama sighed, feeling a deep sense of powerlessness.

——————

Thanks to "Monster @" for the 200 rewards, thanks to "Kong" for the 1000 rewards_

To see the ununderlined version of the novel, please download the Fei Lu novel

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like