Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 253

In fact, Chen Rou said that she wanted a copy was just a temporary idea, just to attract Xu Yi's attention and make him embarrassed, but she didn't expect Xu Yi to agree so readily. Since Xu Yi agreed, she was not polite. Although she was mentally prepared and probably couldn't see any important content, it was very tempting to peek at a machine she was traveling with, let alone Xu Yi.

What treasures are there in Xu Yi, a super perverted machine?

After the system started, the first thing she saw was the operating system inside. She had just known that this was the "Red Dragon" operating system developed by Tianyi Group itself, and Chen Rou had long expected that it must be an intelligent HL operating system inside. The facts proved that her prediction was correct. The operating system was very exquisite and ran very fast. It did not pay much attention to the interface display effect. Many operations were carried out under the console interface. Chen Rou looked at the specific structure of the operating system in detail and found that the intelligent core was actually higher than the latest version of v1.2.312, and it was actually "v1.3beta".

"Hmph, fake public and private!" Chen Rou said unfairly. She naturally knew the strength of the Red Dragon Intelligence core. Every upgrade performance has been greatly improved in all aspects. Xu Yi's own operating system is a bit unfair to others. But then he thought about it, it seems that this system was originally the main responsible for research, and it doesn't matter whether it is "for personal gain" or not.

After studying the operating system again, she found several subtle improvements, but she didn't find any major aspects. She knew that the new core would definitely not be that simple, but she just didn't know how to use it for the time being.

What Chen Rou really cares about is not this, but Xu Yi’s own hacking toolkit, which is what she is really interested in.

Real experts usually have their own unique and powerful proprietary weapons, and so do hackers. Although ready-made tools also exist, real hackers usually have their own arrogance and psychologically like to use tools they write to carry out hacking activities. Of course, there are exceptions, such as some functions are too simple, and there are such better tools on the Internet. In addition, some people are lazy and use them casually. Obviously, Xu Yi belongs to this type of type. Chen Rou searched for a long time and found many classic hacking tools that people often use. For example, the multi-functional network detection tool netcat, the port scanning mapping tool nmap and superscan, etc. are all there.

"This guy is so lazy." Chen Rou was speechless about seeing the vast array of common tools. The interfaces of these tools were ugly (the interfaces she wrote were very beautiful), but the functions were not very good. With Xu Yi's level, the software he wrote must be much better than these, but he was just whether he wanted to. But then again, with his level, even if he used these tools, his efficiency would probably not be reduced. He would still not slow down even if he conquers the city and the speed would not slow down.

Of course, Chen Rou also found several more mysterious small software inside, very small, one of which was only a few hundred k. She thought about it for a while, but she couldn't figure out how to use it for a long time. This made Chen Rou feel dissatisfied again, blaming the tools he wrote for being "unfriendly" and there was no "prompt for how to use it" in it. (According to her habits, the tools she wrote usually have very friendly navigation functions). However, Chen Rou was also very clear about this point. Most hacker tools are like this. She pursues "beautiful" in everything, but instead is an alternative to hackers. Finding the source code corresponding to these tools is indeed the same as expected. The code writing style can be described as "extremely ugly".

For programmers, code writing is usually required to develop good style habits. For example, "variable naming rules require specifications", "critical codes require necessary comments", "try to maintain modules as much as possible", "code indentation", etc. The reason for this requirement is mainly to enhance the readability of the code, that is, to make others understand it easily. This is also for future software maintenance considerations.

However, for hackers, there is no such concern. They pursue readability. They pursue code execution efficiency. They write as quickly as the code is executed (of course, it is not ruled out that some people are considering innovative or code encryption). Hackers are usually very good at programming skills. They often have a very deep understanding of the underlying programming of the system. Assembly language is the first to master. Since assembly programming languages ​​can correspond one by one with machine language, the execution efficiency of this language is the highest. If the assembly foundation is deep, hackers usually directly choose this language to write software. However, assembly language is a low-level language, and programming is really inconvenient, so they often choose high-level languages ​​such as "c language". However, in order to pursue efficiency, they often use a combination of low-level languages ​​and high-level languages ​​to program, that is, embed assembly in high-level languages.

Moreover, when setting variable names, they usually don’t pay much attention to it. A single sentence of code is not simplicity, but can achieve the functions as much as possible. Often, ordinary programmers need a large piece of code to implement functions. They can solve these behaviors in just one or two sentences directly, the result is that the code written is ugly.

Obviously, Xu Yi is also a hacker of this type. Shen Rou is really not used to his programming style. Although at her level, if she insists on reading, she can still understand it, but it takes a lot of time and energy. In the end, Shen Rou complained a few times in dissatisfaction and gave up continuing to read.

I originally thought I could find something more interesting, but it disappointed Shen Rou very much.

"It's boring." When Shen Rou said this, she casually clicked on a folder.

"Huh?" Shen Rou seemed to have discovered something fun.

"Hehe, I'm still hiding it." Shen Rou felt a little energetic because she found that a folder had been simply hidden by Xu Yi. Obviously, he didn't want others to see this folder easily.

Since Xu Yi just handled it briefly, Shen Rou basically saw the contents without much effort.
Chapter completed!
Prev Index    Favorite Next