Kevin. A moment of hesitation flashed in Mitnick's heart, but it was only a moment.

He is very aware of his current situation, and he also knows that behind the gentle smile of the Chinese young man in front of him, there is also a third choice he has not said-to "handle" himself cleanly, thoroughly and completely. Get rid of all traces that you have ever existed in this world.

He fully believes that this Eric has the ability to do this. Today, now, if he makes a choice that can’t satisfy the other party, then in the future, maybe no one will think of this world except for his mother Shirley. There was a person like myself.

Therefore, the so-called option of bringing oneself back to China and surrendering to the FBI does not actually exist.

The other party took such a painstaking effort to kidnap himself to Mexico, and he would never want to be a good citizen of the United States, not to mention that he had heard that Eric did not become a citizen of the United States at all. As for the FBI offered a reward. Your own 13,000 dollars? In the eyes of this Eric, I am afraid it is not as important as his own value of 1 cent.

At this moment, his strong desire to survive filled all his nerves.

"I choose to work for you." He replied without hesitation.

"Very well, Mr. Kevin, it seems you have made a wise choice." Tan Zhenhua's usual smile appeared on his face again: "Then let's discuss your job content and salary issue now, but before that , I must remind you that, given your current embarrassing status in the United States, you may not be able to arrange your work place in the United States. I don’t want the FBI to break into my office and take away my employees."

"boss……"

Now that he is ready to sell himself, Kevin. Mitnick changed the name very simply, and this slightly ridiculous and intimate name is very helpful to improve the relationship between himself and Eric, at least it can remind him that he is already a subordinate of his employee. Please stop "handling" yourself casually.

Tan Zhenhua waved his hand and motioned him not to interrupt. He tilted his head and thought about it for a while before saying, "Kevin, that's good, you go to Xiangjiang, I will build a special network security laboratory for you there and equip you with it. The best equipment, your job is to test the security performance of all hardware and software products that I give you, find out their vulnerabilities and methods to attack these vulnerabilities, um, yes, there is another important job. "

Kevin. Mitnick's heart came up again, and he once again remembered all the speculations he had just made about this mysterious Chinese tycoon-that important job, wouldn't it be the kind of speculation he had guessed? If Eric really asked himself this way, how should he answer?

As if seeing through his heart, Tan Zhenhua smiled again, "Kevin, I have to repeat it again, it’s not what you think, I won’t ask you to do those things, well, that important job I said, It means that you have to study a new branch of computer field from now on. Judging from your performance, you are currently very new to this field."

"Uh, boss, can you tell me what field it is?"

"virus."

"virus?"

"Yes, Mr. Kevin, you have a very good network knowledge, skilled and sophisticated programming skills, better than most people I know, but in this field, it seems that you still know nothing, um, Well, I think it’s time to introduce a gentleman to you. He was once your opponent and once defeated by you, but in the end, he was the one who caught you."

In Kevin. With Mitnick’s puzzled eyes, McGregor Shiran pushed the door and walked in. When entering the door, he did not forget to whistle to him: "It seems that I will have one more colleague. Hello, hacker. Mr."

"This is McGregor, the deputy dean of the Computer Algorithm Research Institute of the Matrix Lab, and the CEO of the iDoor Software Company." Tan Zhenhua introduced: "Kevin Mitnick, our hacker kid."

McGregor squeezed his eyes at Kevin and said: "Hi, hello, Kevin, you are great, but I will win in the end."

Kevin Dou Di shook hands with McGregor and asked, "Mr. McGregor, I am a little confused now. It seems that you have found my trace. Can you tell me how all this is done? ?"

"Call me Mike." McGregor smiled: "Kevin, the boss told you just now, it's a virus, um, well, before my boss told me, I never thought of this world Such a program actually exists on the Internet."

"Let me explain." Tan Zhenhua said: "Not long ago, computer viruses were just things that existed in science fiction novels. I remember I once read a book called "P-1 Puberty", um. , Should have been written by a writer named Rehn, and published in 1977. In this book, he fabricated a prototype of a virus program wandering in silicon, and finally controlled the operating system of 7000 computers. This is probably the first time the word computer virus has appeared in the public eye."

After a pause, he looked at Kevin and McGregor who were listening attentively, and continued: "But his fictional fantasy soon became a reality. In 1984, computer security expert F. Cohen (F. Cohen) He proved the possibility of the virus program. He became the creator of the first computer virus in the world and conducted a demonstration experiment at the US National Security Conference. However, this experiment did not attract enough attention."

"The reason why this program is called "virus" is that it has many similar characteristics to viruses in nature-it is concealed, easily infected, latent, stimulating, self-replicating, and may cause damage to equipment systems and data. Even the destructive results of the hardware."

Kevin nodded thoughtfully, thought for a while and then asked: "So, you have planted this virus in my computer? How did you find me through the virus?"

"It's not implanted in the computer you bought." McGregor replied: "When Eric told me that there are such programs in the world, I was very interested and immediately found some After researching the data, I found that after knowing the principle, writing virus code is actually a very easy task. Anyone who has learned programming skills can master it, so I tried to write a paragraph, um, but The code I wrote can only infect specific computers-it is lurking in the host system of Citibank. Only computers accessing specific accounts will be infected. Moreover, it has no destructive power and can only be infected from infected computers. The computer retrieves and resolves the host's local IP address and Internet access method and sends this information to a specific computer."

"So we know that the computer you use to surf the Internet, Mr. Kevin, uses a modem to dial-up the Internet. The phone number of this machine is 0012138759763," Tan Zhenhua continued, "Although you used a series of encryption algorithms to hide these on the network Information, but on the host’s local machine, these contents cannot be obscured, so Mike quickly found the registration address of this phone number from the yellow pages, and it happened that I also had some friends in the "sliding area" of Los Angeles. So they came to visit you, Mr. Kevin, do you understand now?"

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like