Chapter 270

“That’s right, our six groups just look up to you very much.”

The knife raised his hand next to him and put his arms around Xiao Yao’s neck. On that seemingly quiet and beautiful face, there was a molesting smile, “Sister, for example, I am very greedy for your body!”

“…”

Xiao Yao was speechless, reaching out and flicking.

A finger flicked on the knife’s wrist.

Snapped!

Everyone was shocked, and the wrist of the knife was flicked away by a finger.

The knife looked at his palm in dismay.

I lost consciousness in my palm!

“Don’t tease me!”

Xiao Yao got up and looked at the people in Guoan Group 6. “I think the only way to find criminals is to follow the clues through this dark web.”

“We also know this very well.”

The soldier wearing sunglasses smiled bitterly, “But the problem is that the person who can create the dark web should be a top hacker. We have extremely high hacking skills and want to break through the dark web with strong protection. We have tried these few days, but it is almost impossible. possible.”

“impossible?”

Xiao Yao frowned, just about to speak.

Sudden.



“Ding, congratulations to the host for triggering the system requirements and completing the system task: the first time in my life to find a criminal online!”

“System rewards, skill: red guest!”

Xiao Yao: “…”

Followed by.

In his mind, there is a huge amount of information about computer technology and C language…

What is Hongke?

Hongke is a kind of spirit.

It is a spirit of loving the motherland, upholding justice, and pioneering.

Anyone who possesses this spirit and loves computer technology can be called a red guest.

Celebrities usually use their own technology to maintain the security of the domestic network and fight back against foreign attacks.

Red has a specific value meaning in this country today.

Justice, morality, progress, strength, etc.

Some people will say.

Hackers are bad, and Hongke is good.

In fact, this definition is ignorant.

Both hackers and red offenders are responsible for construction and defense.

The really bad ones are the so-called ‘hackers’.

Hackers can be destructive, such as illegally invading others’ computers to break and steal data, attacking some important servers, causing inconvenience and even danger to users, and creating Trojan horse viruses.

Hongke, hacker, and hacker have different meanings. Why is the Chinese language so extensive and profound?

Changing words at random will have different meanings. Maybe someday there will be Luke, Zike, Baike…

There was once a person with extremely strong network technology who said such a sentence.

“At first, I thought I was a hacker. I was a popular guest for a while two years earlier, but others said that I was a hacker, and I didn’t even know who I was.”

maybe.

This also reveals the current situation and chaos of the domestic hacker community.

No one knows who he is.

in short.

In a general sense.

Hongke is a patriotic hacker who is engaged in the cyber security industry.

Hongke has distinct love and hatred, evil as hatred, and must be patriotic.

Almost all of the ‘skills’ that the system gives Xiao Yao are technical means of positive network computers.

It also stated: If the host uses these technologies to commit crimes, he will be the first to withdraw his ‘Red Guest’ skills and be punished, randomly erasing Xiao Yao’s three abilities acquired by himself!

What makes Xiao Yao dumbfounded is that.

The information in the ‘Red Guest’ given through the system.

He only found out.

domestic.

In the world of computer networks.

There are actually five major factions…

Hacker: A highly skilled computer expert who is enthusiastic about computer technology and a person who conducts research on computer vulnerabilities.

Hongke: Safeguard national interests, love one’s motherland, nation, peace, and strive to safeguard national security and dignity.

Lanke: Believe in freedom, use your own strength to maintain the peace and stability of the Internet.

Grey guest: Advocating personal technology, with the main purpose of improving personal technology, neither destroying like a hacker, nor maintaining it like a red guest, but more personally improving.

Hackers: Some criminals who use computers to commit crimes.

The five major factions are all computer masters, and they are very different in substance.

Xiao Yao rolled his eyes.

My own ‘system’ is actually quite patriotic!

Ignore the system skills for the time being, just get familiar with them later.

Xiao Yao began to think about the case before him.

Speaking of the case in front of me.

The scariest place means that it will not happen in the future.

It is what has already happened, and is even happening.

The dark web does exist.

From the day when the Internet appeared, they might begin to exist…

It’s like the incident of “House No.” in a certain country.

Many women and young children were persecuted.

A small country with a population of tens of millions.

There are actually 260,000 people who are members of “Room No.”.

The dark web where the exposed “House No.” is located has a trading scope spanning multiple countries, and its business scope is extremely dark, and it is called the “certain treasure” of the dark world.

There are news reports.

Nowadays, some apps that people usually use have also been exposed to monitor user privacy.

Some companies use these apps and certain software to monitor people’s computers and mobile phones and steal privacy and collect information.

You can also use the microphone and camera to monitor the conversations and daily life of the people who are monitoring the filming.

Why is it so?

Because many people don’t understand network security.

When some apps are installed, mobile phone permissions are given to it.

For example, positioning, photo album, voice, video, microphone, camera, address book, system control…

Such a problem is easy to understand.

For example, a game software.

During the installation process, it is common to ask for microphone permissions, camera permissions, address book permissions, album video permissions, mobile phone system permissions…

For a game, you may need microphone permissions and album permissions.

But you need address book permissions, camera permissions, and mobile phone permissions. What do you do?

Have the people ever thought about it.

When you give these permissions to these apps, what will happen?

Ha ha!

This is also an indirect proof.

Any behavior of the public on the Internet may be monitored.

In the era when technology and intelligence are becoming more and more popular.

The privacy of the people is becoming less and less.

Under the supervision of the normal network.

Can restrain the behavior of many people.

If it is some profit-only network technicians and companies.

Through the network, through software, through illegal means.

Spotted some people.

Steal your indecent photos, steal some of your indecent videos, record your voice in life, record some of your life videos, and even steal some secret files and identity information on your mobile phone.

So, can these criminals control you?

If you can.

This will also make some people fall into an endless abyss.

Think carefully! .

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like