Chapter 271

“Where the victim is, the branch is all over the country.”

“The murderer’s laptop residual IP also appeared all over the country.”

“It can be seen that the murderer belongs to the crime scene.”

“All criminal transactions and video transactions will be implemented through the dark web.”

“The dark web software on the murderer’s laptop cannot be ported to other computer hosts because it has been set with a self-destructive program.”

“There is no way to crack it.”

“If you want to enter the dark web, you have to go through this software.”

A cyber security officer in his twenties, wearing a pair of glasses, pointed to the laptop and explained to Xiao Yao: “But using this software means that everything about you is monitored or even manipulated by the other party. You can block your network, destroy your software, and even use software to control your computer permissions and destroy your computer!”

If it is the past.

Xiao Yao would definitely think that the security officer in front of him was bragging.

Destroy other people’s computers?

This is impossible in the eyes and imagination of many computer novices.

But in reality. 16

Hackers do have the ability to control other people’s computers.

Use technology to destroy computer memory and hard drives, or some hardware implants.

The core of a computer is the CPU and the heart. There is nothing wrong with this statement.

But to talk about the real core.

It is necessary to talk about memory and hard disk.

Because of these two core hardware.

It is equal to the human brain and cerebellum.

If the data in it is destroyed and erased.

It is equivalent to turning a human into an idiot.

People have become idiots, they have become so vegetative.

There is also a heart and other organs for use as eggs!

Some people will say.

Isn’t it possible to recover the hard disk or something?

It can be restored.

However, the premise is that the data traces are not damaged, maliciously overwritten, tampered with, and completely erased.

If the data traces are damaged, maliciously overwritten, altered or completely erased, the gods will not be able to recover them.

Now he has the skill of ‘Red Guest’.

Xiao Yao knows that the other party’s words are not at all watery.

But he still wanted to try.

Since owning the system.

Every time the skills and abilities given by the system, he has never let him down!

“Help me prepare a better laptop instead of original hardware.”

Xiao Yao spoke to Zhao Mingjun on the side.

Zhao Mingjun and the team members of the sixth group do not know why.

When the cyber security officer heard Xiao Yao’s words, his eyes lit up and he asked, “Along with you?”

The existence of hackers rarely uses desktop computers, and most of them use laptops.

So why do hackers like to use laptops instead of desktops?

First of all, what hackers do often violates laws and cybersecurity laws.

This requires hackers to be ready to run away at any time.

Desktop computers are obviously very cumbersome.

The hacker will obviously drag himself with it.

Once someone finds out that their computer cannot be taken away in time.

Then the data in your own computer will be obtained by others.

In order not to reveal your computer model, or your computer data.

Hackers will also buy hardware on their own.

Or buy hardware from some specialized channels.

Then proceed to assembly.

In addition, from a security perspective.

Hackers often have large amounts of data in their computers.



Once your IP address is locked.

It is tantamount to becoming a living target for others.

So in order to ensure the safety of your data.

They need to constantly change IP.

The notebook can also solve this problem perfectly.

As for why you should buy hardware assembly yourself?

Because these hardwares are not ordinary hardware, most of them have been ‘modified’.

Some ‘implant procedures’ above will be erased or replaced.

What is the ‘implant procedure’?

Make a simple analogy.

As soon as ordinary people’s mobile phones are turned on, they connect to the Internet.

Mobile phone manufacturers can know how many people are using their phones.

Why does the manufacturer know?

Because some hardware in the phone is ‘implanted program’!

The same is true for computers.

Some computer hardware comes with some ‘implanted programs’.

This is not alarmist!

so.

Some top hackers rarely use original computer hardware.

Most of them have been ‘modified’ or ‘self-made’.

There are even manufacturers specializing in these hardware.

This can also prevent ‘hardware hackers’ from exploiting vulnerabilities in the original hardware to carry out attacks.

It is like some mobile phones are cracked and jailbroken through hardware.

These things are not accessible to ordinary people.

Too far away from people.

Everyone understands it!

Hackers use the two core points of a laptop.

‘Portable’ and ‘Safety’!

There is such a legend on the Internet.

People who are good at desktop computers are not necessarily hackers.

But people who are good at laptops are likely to be hackers.

“no.”

Xiao Yao looked at the security personnel in front of him and asked with a smile, “What is your last name?”

“Menggui, Hao Tian!”

Hao Tian said politely: “Brother, don’t make fun of you. You know that people who don’t use the original hardware computer, there is nothing simple.”

Big brother?

I’m not older than you!

Xiao Yao smiled without saying a word.

The rest of Guoan Group 6 looked at Xiao Yao suspiciously.

soon.

The gunman brought a notebook.

The military one!

Hao Tian’s eyes fixed on Xiao Yao.

Staring at the laptop in front of Xiao Yao.

After booting up.

Xiao Yao checked the ‘military system’ on the computer.

The military system is safe, but because it is too safe and has a strong defense force, it is impossible to ‘invade’ with such a system!

The corners of his mouth twitched a few times.

Skill: Red guest!

moment.

Xiao Yao’s hands danced quickly on the computer keyboard, bringing up a dazzling afterimage.

People in Guoan Group 6 still don’t know what Xiao Yao is doing.

But Hao Tian looked at it, and his whole body was not good.

Not only was he stunned, but the boss had already opened his mouth.

He found a fact that was somewhat unacceptable.

Xiao Yao is actually programming his own computer system!

Many people know it.

There are roughly four types of computer systems on the market.

windows, linux, MacOSX, Unix…

But few people know.

In the world of hackers.

Some powerful hackers can make some computer operating systems by themselves.

For example, some domestic hackers.

Most of their self-made systems are based on the Linux kernel.

Because it is free, it works very well.

Of course, some terrifying super hackers.

Will make the ‘personal system’ you like.

This is a time-consuming and laborious work, and sometimes even requires the assistance of a team to complete the work.

Individuals want to do it independently and make a self-made system, the difficulty can be imagined.

What kind of existence can this be done?

In the eyes of Hao Tian.

What Xiao Yao is doing now is doing a ‘personal system’.

Do you dare to believe it? ! .

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like