The Strongest Hacker
Chapter 98 Unordered Arrays (Part 1)
Chapter 98 Unordered Arrays (Part 1)
After roughly checking the system, Zhang Yang did not find anything wrong. If a thorough inspection is carried out, the software needs to be analyzed. Zhang Yang stood up and went to the attached box, rummaged through it, and found this server dedicated network cable, and then connect the server to the apartment network.
Although Shige brought a dedicated 10M optical fiber, its external gateway still uses the school gateway, so even if their dormitory is an independent optical fiber, the public IP is still the school's, the difference is that it does not need to be the same as other dormitory buildings , A building only uses 10M optical fiber.
After connecting the network cable and turning on his computer, Zhang Yang copied the analysis software he used. It is very different to analyze other people's computers, because Zhang Yang itself is in the system, so the information needs to be analyzed more comprehensively, and it took about 20 minutes for Zhang Yang to get the result he wanted.
Looking at the dense analysis results, Zhang Yang's face became a little weird. This analysis software was adapted by Zhang Yang based on six years later, although in the eyes of most people, the computer technology six years later is different from the current computer technology. It seems that except for the more powerful hardware performance, nothing else has changed, and XP should be used.
But in fact, the core technologies of many system software can be described as earth-shaking. After analyzing the entire system, Zhang Yang discovered that the hard disk array of the entire server is not only 600 G, but has 80 G of space. hidden.
And the entire Linux system can be described as perfect, except for some loopholes scanned by the analysis software that will not be discovered until a few years later, all other loopholes have been patched! Even a few bugs that were not announced until a year later were patched!
Master, looking at the various results of the analysis software, Zhang Yang felt a burst of emotion. Don’t underestimate these two cabinets. After the entire server array is combined, its computing performance is even more advanced than that of millions of servers larger than S. At this moment, Zhang Yang could see that this server was not just as simple as a blade server.
Its computing performance is quite good, and it is also equipped with billions of high-definition image processing chips and systems. Disk hiding is not a sophisticated technology. Many people who have just learned computers will use it. However, the disk hiding in this server is different. It is not closed from the outside like the blades at the beginning. These disks are still running, the difference is that it has been masked at a technical level.
And unlike any technology Zhang Yang had ever seen, even Zhang Yang a few years later hadn't seen this way. He tried to find this disk space, but Zhang Yang soon discovered a hidden trap. If Zhang Yang conducts a brute force attack, this trap will be completely detonated, destroying the entire hidden disk space, and naturally the data inside will be gone.
And the whole system is also very clean, so clean that there are no other programs except the system itself. After hesitating for a while, Zhang Yang quickly downloaded a hard disk recovery tool from the Internet, found a disk partition, and began to restore these unhidden hard disk spaces. Zhang Yang wanted to see if there was anything in it that could explain where the server came from.
The data recovery was very fast, in about 20 minutes, Zhang Yang completed the data recovery of the 20 G partitions. There was nothing important in Zhang Yang's mind, and they were all messy data. Based on the data itself, Zhang Yang just looked like some experimental data, but he couldn't tell what these data were from the experimental data.
Zhang Yang felt dizzy looking at the complicated formulas. This is not just a high number. Many formula symbols Zhang Yang has never seen before. They should be chemistry or physics.
After copying a part of some formulas, Zhang Yang thought about it, and simply deleted the data again, it was useless. It seems that the most important things are in the hidden 80G space.
After deleting these data, Zhang Yang is ready to rebuild the system, although the whole system is very clean according to the analysis software, without any other software or traps. But this server is very important at first glance. Although I don't know how it got out, it is obvious that its owner has taken precautions.
Zhang Yang doesn't want to be fooled by a server used by a computer expert. God knows what traps are hidden in this system.
All the hard disks were directly formatted deeply. As for the hidden disk space, if the trap outside it and its password cannot be cracked, no matter how deep the format is, it will not affect it. It still takes a certain amount of time to deeply format a 600 G disk.
It took more than an hour before Zhang Yang formatted all the disks and ensured that no data on them remained before Zhang Yang started to rebuild the system. Zhang Yang is also used to using the linux system, so he rebuilt the linux system, and Zhang Yang completely patched all the loopholes in the entire system, including those loopholes discovered a few years later.
After installing his own firewall, Zhang Yang went through a virus scan, and only after confirming that there were no problems, Zhang Yang began to crack the hidden disk space.
Carefully and carefully analyzing the surrounding traps, Zhang Yang immediately confirmed that this trap is the well-known disordered array in the hacker world. The disordered array is just a name, but it shows the ingenuity of this trap, just like what Zhang Yang involved The two computer viruses are set according to the same mutation rules as the DNA sequences of AIDS and Ebola viruses. This disordered array is also set according to certain rules, just like the formations in Chinese Taoism.
If you don't know the exact way to enter and exit the formation, you can't completely bypass this trap! After carefully checking the entire enclosed disk space, Zhang Yang confirmed once again that the data in this disk space is definitely highly encrypted. If you don’t crack the trap outside, or the decoding method, even if you get those data , I'm afraid it's also a bunch of useless 0s and 1s, which are not arranged according to the decoding method, and you can't get what data is inside.
After confirming that it was a disordered array, although Zhang Yang was a little depressed, he was also relieved, because the disordered array is also a way to crack normal access, it can be set in any way by the setter, it can be a problem, it can be a game , can be an animation, or even some problems that need to be calculated. Or you can think of it as a piece of software. After you access it, follow the questions set by the creator to complete step by step, and then just unlock it.
You'll Also Like
-
Pirates: I plundered entries in the underwater prison!
Chapter 114 6 hours ago -
Doomsday: Sign in to the planetary shelter at the beginning
Chapter 1376 11 hours ago -
My Players' Second Playthrough
Chapter 370 11 hours ago -
Dominate the Game of Thrones with Mount and Blade
Chapter 209 11 hours ago -
Participating in a money-saving variety show, earning billions because of stinginess
Chapter 109 11 hours ago -
Mortal Cultivator
Chapter 334 11 hours ago -
My villain wants to save himself, but the yandere heroine disagrees
Chapter 537 11 hours ago -
Honkai Impact 3rd: Live broadcast room, start!
Chapter 163 11 hours ago -
I have become the zombie king, and the zombie apocalypse has just broken out.
Chapter 261 11 hours ago -
Plundering countless entries, I became a god in the wasteland era
Chapter 182 11 hours ago