Chapter 241 : Search the whole network!

The network cable is a physical existence. No matter how high your hacking skills are, it is impossible to hack the network cable, right?

There will be a numbered record for the physical lines on the network server side. For example, Chu Hao’s network service in Jingyayuan is connected to the service through a physical network cable. The network service provider will assign an IP address to the line. If someone knows the IP address and hacks into the network service provider, it can Find this IP address by IP address.

Which line is allocated?

From the number of this line, you can find the real address of Chu Hao in the line number record!

Even if Chu Hao hacks into the network service provider and modifies the information, it will not be truly insured. Because the line installs these information. Not only electronic records, but also written records-.

When Jingyayuan introduced network service providers. When the network service provider allocates each line. Will make a written-record.

Therefore, Chu Hao hacked the record information of the network service provider. If someone really wants to investigate, as long as they have a relationship with the network service provider, they can query the written record, then Chu Hao is a tragedy!

As for wireless Internet access. That’s even less reliable. Wireless signals have positioning characteristics, and wireless Internet access is easier to track than wired Internet access!

Chu Hao was shocked by the SO project in a cold sweat, but fortunately there was endless defense. Otherwise, this is the rhythm to be caught by the International Intelligence Bureau of the Ministry of Foreign Affairs!

Fortunately, when Chu Hao just sent back the So plan, it used the disordered file segmentation technology to divide the SO plan disorderly into more than one hundred copies, which were transferred to multiple broilers before they retrieved the No. 1 server locally. And also eliminates IP connection records. Otherwise, in the point-to-point transmission just now, the IP address of the No. 1 server will probably be exposed!

‘Damn the International Intelligence Bureau of the Ministry of Foreign Affairs, do all of these insidious settings! Fortunately, brother is cautious, otherwise you will be shamed by you again!” Chu Hao secretly rejoiced.

There was a problem with the so plan file package. Before it was confirmed from the side, Chu Hao was inside the JFS and easily entered the suspected point of the confidential information server.

It seems that there is no defense, and the smooth sailing into the confidential information server has actually fallen into the trap of JFS.

The security experts of JFS devised a bitter trick. They suspected that someone had entered the JFS internal network, so they made such a trap.



…For flowers…

Chu Hao was unfortunately hit!

The only good news is that Chu Hao did not fall into the trap completely. Although he was overshadowed, his real IP address was not detected.

This is a blessing in misfortune!

After analyzing it in his mind, Chu Hao no longer rushed to open the S0 plan file package. What can be easily taken away by him is probably not a good thing.

…………

There may even be follow-up methods.

In order to study the SO project package, Chu Hao established a sandbox environment. Any changes in the sandbox environment have no impact on the system itself.

The sandbox environment has been widely used in the security field of anti-virus and anti-trojan horse.

As the sandbox environment was being established, Chu Hao suddenly stopped, so that the International Intelligence Bureau of the Ministry of Foreign Affairs can make such a reassuring and bold tactics, it should be very powerful!



Stopping the establishment of the sandbox environment, Chu Hao divided the SO plan into more than one hundred parts again, and sent them to a fixed broiler. At the same time, Chu Hao was also on the fixed broiler, copying the endless defense. At,

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like