398: Goal, Newtown, Free Country!

This program is not too big, only 1.5 trillion. Su Ming began to analyze the operation principle of this program. After ten minutes, he had the result.

It turns out that this virus program has not been completed. If you want to run it, you have to improve it. How to improve it? The answer is simple-enter the activation command.

The so-called activation instruction is actually the unfinished part of this program. Obviously, the “delete” instruction is the missing part of this program.

Of course, the “delete” command itself does not have this ability, because it is a function of the system itself, but there is one point that cannot be ignored. The operation of the system itself also requires data processing.

This virus program runs according to this principle. It is associated with the “delete” command in the computer. Once the computer runs the relevant data of the “delete” “six zero zero” command.

It will treat this as an activation command, and then it will follow suit.

Su Ming already knows how this virus works. What he has to do now is how to crack the virus. I don’t know what this problem looks like to others. Su Ming is very simple here anyway.



First of all, he took this virus as a template and rewritten many programs in it. Through his rewriting, this virus became a completely opposite program from the original.

To put it simply, the original virus has the ability to infect as well as the ability to replicate itself. After Su Ming’s modification, it has now become a special killing program for this virus.

Any program that is more than 70% similar to it can be found on the computer. After finding this program, it will start to act – it will take the initiative to set up a folder to include itself and the target program in Inside, after all this is done, it will execute the last command-delete the folder.

Of course, there is a prerequisite here. To complete the virus removal task, it must first infect the computer with the relevant virus. Faced with this problem, Su Ming hesitated.

It only took Su Ming ten minutes to write this special killing tool, but the next thinking took him a quarter of an hour. The reason is simple, he is not sure whether he should embed this special killing tool on the Newtown Times website. .

This is a hacking behavior. Even if Su Ming is doing good deeds, but deliberately invading the website, this is essentially not allowed, but if he does not do this, the virus will cause very serious consequences. What is the two? How to choose between?

Su Ming considered for fifteen minutes and finally decided to invade the Newtown Times website. He felt that he was doing good deeds. As long as he did not cause damage to the website, there would be no problem.

Now that the decision has been made, Su Ming started to act. He obtained the execution code of the website through the interface on the website. After analysis, Su Ming quickly reversed the core code of the website.

Once you have the core code, it also declares that the control of this website has fallen into Su Ming’s hands. Even the management staff, without Su Ming’s permission, will be turned away.

Su Ming obtained the control authority of the website, and then abbreviated the embed code, and embedded this virus-killing program on the page of the website.

In this way, as long as the person who clicks on the website interface will be infected for the first time, the virus killing program will automatically enter the other party’s computer and start the removal task.

All this was done in secret, and hardly anyone was disturbed. The only exception was young people who wrote virus programs.

Originally, he was watching his results triumphantly, but after half an hour, he suddenly found that the number of IP addresses he obtained had stagnated, and after a while, the number of IP addresses actually began to slowly decrease!

This discovery made him a little confused, so he entered the backstage of the Newtown Times website with the permission he obtained, so he immediately found Su Ming’s trace.

After careful observation, the young man became angry. He only heard him yelling: “This guy is actually destroying my baby virus! It’s too much!”

After the anger, it is natural to fight back. If Su Ming is allowed to do this, the Trojan horse virus he wrote for more than two months will completely fail. This is his work, how can Su Ming be destroyed so easily Lose?

The young man flew his fingers and was executing the administrator password on the keyboard. He wanted to kick Su Ming out of this website, but soon he found out that he had failed. No matter how he operated, Su Ming still did not. move..

This time the young man was a little shocked! Because there is only one explanation for this phenomenon-the person who is against him has obtained the core code of the website!

“Buy late! How is this possible?!”

Any program has its core code. This code is the core part of the program and the most valuable and most powerful part.

For example, the operating system on Su Ming’s computer, this is the Windows 3.0 version of the operating system, and its core code is firmly in the hands of software and micro.

This is the top secret.No one can obtain this core code except for the relevant personnel of Software and Micro.If anyone masters this code, he can do whatever he wants with this operating system!

Of course, it is not so easy to obtain this code. If the software company does not tell you, don’t even think about it. This also confirms the difficulty of obtaining the core code.

Su Ming obtained the core code of the Newtown Times website through reverse engineering. In his opinion, it is not difficult, but in the eyes of young people, it is quite incredible!

The young man was shocked and continued: “Could it be that this guy is the one who helped the Newtown Times build the website? Otherwise, how could he get the 2.3 core code? But even so, I have to let you know how good I am! ”

Hackers are extremely arrogant people. In the eyes of young people, Su Ming can occupy the commanding heights only because he has the core code.

There is nothing remarkable about him. The young man wants to teach Su Ming a lesson, let Su Ming know that the consequences of offending him are extremely serious.

However, he ignored another question: Why can Su Ming make his Trojan virus ineffective in such a short time?

The young man started to act. He took control of the other computers in his hand, acted in unison, and launched a tsunami-like flood attack on the Newtown Times website.

The principle of this attack is very simple, because it is simple and practical, so most hackers prefer this attack method.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like