Chapter 50 Live again! (2 More flowers for collection)

There are still more than two hours before Chu Hao’s live broadcast.

But obviously, the Internet has begun to ferment.

The major forums have been swiped by posts related to “God-level hackers” one after another.

Especially for large websites such as Bib, the top three in the hot search list are all related to “God-level hackers”.

Many people came to the Xianyu platform after they knew that “God-level hackers” were Xianyu anchors.

But what is waiting for them is the live broadcast room that has not yet started.

At the same time, the “God Hacker” vx fan support group also exploded the pot.

“It’s over! It’s over! You can’t hide things from 99 years!”

“It’s wrong, the anchor can’t hide it!”

“Oops, I seem to have seen countless people vying for a lucky audience with me! What should I do, my 99-meter machete hasn’t been polished yet!!”

“The plan can’t keep up with the changes! It’s horrible!”

“Everyone, what are you waiting for? I have already advertised on major websites! Since I can’t cover it up, I will be the most arrogant communicator! Anyway, now the cyber police don’t care! Let us play as much as we like.”

“Secretly tell you one thing! I edited the video I recorded before! I also added the content of the press conference! I posted it on Douyin! In order to strengthen the scope of communication, I charged 10,000 soft sister coins! Now, If you just swipe the vibrato, you can see the video I posted! Hahaha!”

“Soft sister coin players, can’t afford to provoke! Can’t provoke!”

“Damn it’s krypton gold player! Say you are standing at the same starting line, but you secretly charge up money and drain traffic behind my back!”

“Money is not the point! The point is, I want the anchor to smoke me! If you smoke me hard, it will be over!”

Back in the dormitory, Chu Hao began to prepare what he was going to talk about today.

Chu Hao’s dormitory is a single dormitory, so I don’t worry about being disturbed.

Nearly eight o’clock, Chu Hao opened the live studio.

Suddenly, he was taken aback by the popularity.

He remembers that when he went offline last time, he had only a few hundred thousand popularity.

At first glance, it still has soared to more than five hundred thousand!

Moreover, he hasn’t officially started broadcasting, and the live broadcast room has already raised a barrage.

“Five minutes left, where’s the anchor? Hasn’t come yet? Which fellow daoist pissed the anchor! Wake him up!”

“Lean back for the diabetic, don’t let the anchor taste the sweetness!”

“Uremia comes first, and it will make him suffer!”

Chu Hao smiled helplessly as he watched the full screen of poems.



“According to this data, the real audience should be tens of thousands! Plus today is the weekend, the popularity will definitely skyrocket soon!” Chu Hao thought about it in his heart and opened the live broadcast room.

For a while, the barrage of the entire live broadcast room boiled.

“The anchor is here!”

“Catch the anchor alive!”

“Anchor, who are you going to do tonight? In a word, a million troops will be killed!”

“Who is black tonight…”

“Anchor, I just want to ask, the senior executive of Xianyu, did you drag him into the water? No, no, you dropped it into the water!”

“Yes, anchor, I’m curious too! It’s gone crazy online now!”

Facing the audience’s questions, Chu Hao smiled faintly, and said, “Yes, it is indeed me. I saw him at large, and I was upset, so I threw him into the water.”

For a time, the whole live broadcast room set off a fever of worship!

“I lost at the bottom!”

“Can’t afford to offend! The whole network is the youngest and most offensive anchor!”

“Anchor, ask weakly, can you find out about bedwetting when I was a child?”

“…”

“Cough cough.” Chu Hao gave a light cough and signaled that the live broadcast had begun, “Attention everyone, the live broadcast has started!”

“Last time I talked about some basics, today we will talk about some hacking methods and defense methods.”

“At present, the rapid development of technology has brought me a lot of convenience, but there are also many dangers hidden behind it.”

“Especially important is information security!”

“Everyone knows about Zhibao’s’Brother Dao’! With the existence of technical talents like them, our Zhibao can be used freely without fear of being hacked and causing property losses.”

“Of course, in many cases, some personal information that we don’t care about will become a means of attack by hackers.”

“Below, I have listed more than a dozen hacking methods for everyone, and everyone takes a warning.”

“The first type: data-driven attack!”

“A data-driven attack refers to an attack that a hacker sends or copies to a target computer, which appears to be harmless on the surface of a special program when it is executed.”

“The attack allows hackers to modify files related to network security on the target computer, making it easier for hackers to invade the target computer next time.”

“Data-driven attacks mainly include buffer overflow attacks, format string attacks, input verification attacks, synchronization vulnerability attacks, and trust vulnerability attacks.”

“The second type: forged information attack!”

“Third: Attacks on the weaknesses of information protocols!”

“The fourth type: remote control!”

“Twelfth: Jump Attack!”

“This, as a relatively common attack method for hacking, everyone needs to understand.”

“In the Internet, many website servers or supercomputers use the UNIX operating system.”

“The hacker will try to log in to one of the UNIX-equipped computers, gain system privileges through the operating system’s vulnerabilities, and then use this as a base to access and invade the rest of the computers. This is called jumping.”

“Hackers often jump like this several times before attacking the final destination computer. And those computers controlled by. Are also called broilers!”

“For example, a hacker in the U.S. may log in to a computer in Asia before entering the network of the U.S. FBI!”

“From there, log in to a computer in Toyo, and then jump to Europe!”

“Finally, he will even launch an attack on the FBI network from a computer in France.”

“In this way, even if the attacked computer finds out where the hacker launched the attack against itself! However, it is difficult for managers to follow the path and find the hacker.”

“What’s more, once a hacker obtains the system privileges of a certain computer, he can delete the system log and cut off the “vine” when he exits!”

“This kind of method was not uncommon in the Internet hacking war between the Chinese Empire and the U.S.!”

“A hacked computer, and all its users’ behaviors on the Internet, will appear to the hackers just like playing a movie!”

“This is also why a poisoned computer will cause great economic losses to users!”

Speaking of this, Chu Hao paused, took a sip of water, and typed all the knowledge on the interface so that the audience could see it.

“Which audience is willing to sacrifice, as the object of my lecture!” Chu Hao said casually.

All of a sudden, the audience in the live broadcast room expressed their willingness.

“Anchor, even if you don’t smoke me, I still hope you can hack into my computer!”

“Come on, drag the first floor out and wake up! lest he speak nonsense!”

“Anchor, hurry up, come and invade fan me! The posture is already set!”

Chu Hao was planning to draw a lot at random, and at this moment, a striking red barrage floated across his live broadcast room.

“Please note! Please note! As the host your live broadcast involves illegal technology, please suspend the live broadcast! Please suspend the live broadcast! Otherwise, we will ban you!”

Immediately afterwards, barrage bounced.

“The salted fish is so brave and not afraid of death! I have sealed one, and dare to come again?”

“Is the anchor going to take the salted fish again? Why can’t I help but laugh?”

The moment he saw that barrage, Chu Hao smiled: “It seems that they don’t have a long memory! Then use the Xianyu Supertube account as the teaching material!”*

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like