Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 3333 Picked up the treasure!

Zhengyan nodded, and took the mobile phone and the small bottle in my hand.

Zhengyan did not open the phone immediately. Instead, he held the phone in his hand and observed it. He found nothing unusual in appearance. Then he opened the bottle and took out the finger inside.

Zhengyan pressed the big button in the middle of the phone with his finger, and soon the screen lit up, showing that the fingerprint unlock was successful, and then a password box appeared for him to enter the password.

Seeing such an interface, Zheng Yan couldn't help but frowned. This made me feel strange. Isn't this Zheng Yan a super hacker? How could he show such an expression when unlocking a mobile phone password?

"What's wrong? Is this difficult?" I asked.

"Young Master, it's like this." Zheng Yan replied.

"Generally speaking, mobile phone operating systems are developed for the two operating systems of Linux and Unix, so it is not difficult to crack ordinary mobile phones because their source codes are open. But this phone is different. This is obviously an independent operating system. Just like the core areas of the Chinese military, they all use self-developed operating systems. In this way, the security is greatly improved and cannot be easily cracked and broken by others. This phone obviously uses a self-developed operating system, and the source code is closed, and no one except the author knows about it. This makes it much more difficult to crack such a mobile phone password."

I couldn't help but be stunned when I heard Zheng Yan's words. I really didn't expect that a small mobile phone could be so mysterious!

What is the identity of the person who is following me? The mobile phone he uses is so hidden. In order to prevent the secrets inside from being leaked, it even uses a self-developed operating system.

So what kind of shady secrets does this mobile phone hold? It’s really strange.

"Can you skip the phone password and copy the contents? For example, call records, text messages, etc." I thought for a while, and then asked Zhengyan again.

"No." Zhengyan shook his head.

"This phone is completely sealed, and since the other party uses such a secret locking method, they will definitely try to do something in other ways. If they want to rely on external force to take out the contents, I am afraid that the phone will start a self-destruction program. "

I frowned slightly. I thought that such a mobile phone would be easy to break into by a hacker who is proficient in computers. Unexpectedly, I was overthinking it. Trying to break into this phone did seem a bit difficult. Difficulty.

"What should I do now? Do I have to give it up?" I felt a little unwilling to give up. This phone was so mysterious, and I thought it might provide me with important clues, which made me unwilling to give up.

"There is a way, but it's a very old-fashioned way." Zhengyan thought for a while, and then said to me.

"What method? As long as it works!" I said quickly.

"Just use all the number combinations to try out the power-on password one by one." Zhengyan said.

I was depressed and thought, what kind of method is this?

Who knows what the length of his password is? So many numbers should be tried one by one until the next Year of the Monkey and Horse.

"This is unreliable. How can you try so many number combinations?" I asked.

"Of course it's not a human effort." Zhengyan shook his head.

"I have a computer that can filter passwords one by one, but it costs a lot of money."

After hearing Zhengyan's words, I suddenly realized that Zhengyan wanted to try this method. Computers should indeed be much faster than human beings.

"But for such a mobile phone, I guess if you enter the wrong password several times, you will have to activate the self-destruct program? Wouldn't the phone be destroyed directly?" I thought about it and raised my question again.

"I have a way to prevent him from triggering the phone's self-destruct program. It's actually very simple to bypass this because it involves hardware. You just need to modify the instructions." Zhengyan explained, and then opened the He picked up a shoulder bag he put on the sofa.

What surprised me was that there was a small password box inside this shoulder bag. It seemed that this should be Zhengyan's tool. As a super hacker, he should naturally carry his own tools with him.

Zhengyan opened the password box, and inside lay a very thin and small laptop, probably about ten inches in size. However, it was not a tablet, but one with a keyboard.

Next to the computer are a variety of tools that are dazzling to look at. It seems that these are all tools used by hackers that Zhengyan usually uses.

Zhengyan turned on the computer, then picked up the mobile phone in his hand and looked around, then searched inside the password box and found a black connecting cable to connect the mobile phone and the computer.

Zhengyan's fingers were tapping quickly on the keyboard, and soon the computer entered the interface.

Zhengyan clicked on a black frame-shaped program and started typing letters on the keyboard again.

I stared at the computer screen without blinking. I was dazzled by the densely packed code on it, and I said I couldn't understand it at all.

How do these hackers understand what they are operating? As a layman, my head hurts just by looking at it.

Zhengyan quickly clicked the Enter key, the black frame disappeared, and a progress bar appeared.

When the progress bar finished, Zheng Yan spoke again: "This phone indeed has a self-destruct program, but I have bypassed it now and modified the instructions. Now, no matter how I enter the password, it will not trigger the self-destruction inside the phone. Program, what we have to do now is to try out the passwords one by one."

After Zhengyan finished speaking, he clicked an icon again, and the next moment the same screen as the one on the phone appeared on the interface. It was a box for entering a password, and below it were a few numbers.

Zhengyan operated on the computer again, and then the password started to be automatically entered on the phone screen.

"Let it slowly combine on its own, there will always be a correct password." Zheng Yan said.

"How long will this take?" I asked.

"It depends on how long the password is set by the owner of the phone." Zhengyan thought for a while and then replied.
Chapter completed!
Prev Index    Favorite Next