Chapter 31 Hell Hacker Appears
Answer a few questions:
[Essence] - The protagonist went to the American forum to download pictures in recent chapters. As a result, the operation time was too long and the administrator discovered it! Since the protagonist understands PHP, I think the PHP acquisition system will always be able to do it. For web development, PHP is very simple and the fastest speed. Therefore, the protagonist can use PHP acquisition to collect pictures, and can download the pictures in a few seconds. If there are too many pictures, divide them a few more times! The speed is huge~~ Blue ¢小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小�
- First, it takes time to write a collection system; second, it is a limited forum and cannot be collected directly like this. The download speed is affected by the Internet speed, which used to be very slow.
-The other one is whether to add some fantasy elements (such as martial arts, superb medical skills, etc.) to this book is still being considered. In fact, the original plan was to join, but some book friends objected, so I can't decide for the time being. My idea is that the protagonist should have some self-protection skills.
― Let’s talk about the plot. This book must have emotional dramas. Although I am not very good at it, I personally still want to write some. Most hackers in reality lack feelings, and I don’t want the protagonist to be like this after reborn once. In addition, there are also commercial plot descriptions, after all, they need to make money.
=========================
An office in the Pentagon.
Seven or eight young men in their twenties and a middle-aged man sat in the office. They were all operating the luxurious computer in front of them with all their hearts at this moment. No one spoke in the whole office, but it was very lively. The sound of them typing on the keyboard quickly was like rain hitting a jade plate, one after another.
"shit!" An American guy with a small body, acne-filled face, and a chicken coop, cursed out in anger, chewing gum in his mouth, and his eyes were still staring at his 19-inch LCD monitor, saying, "Team leader, the target is lost, he has found that he has been tracked... What a coward, he actually disconnected the broiler's network connection! If I give me some more time, I will definitely be able to catch him!" This guy is not only as thin as a monkey, but also has a bad voice.
Then, other people in the same office also reported their situation, and the target had completely disappeared. From everyone's eyes, they admired and feared this opponent, and at the same time they were unwilling to admit defeat.
Yes, these young people, standing out is a person who can make major online companies in the world frightened. When they usually do tasks, they will not be easily done? I originally thought that this time it was the same. Everyone divided their work and slowly followed the clues according to the traces left by the invaders, but unexpectedly, when the situation was about to reach the end, the situation was a big reversal, just like a scramble. The other party washed away the traces, leaving them, the group of hacker elites in the United States, helpless.
As soon as the skinny monkey finished speaking, a voice said strangely: "Sto, stop bragging, just be able to catch him? His skin is really thick!" The person who spoke was a young man wearing gold-rimmed glasses, with a handsome face that was quite elegant, but the style of this face was his outfit. His hair was explosive. I don't know if it was because he hadn't washed his hair for too long or someone had specially made it, the color was dyed red and green. His body was also very fashionable, with silver-shining ornaments hanging all over, and his lower body was wearing a pair of jeans full of holes.
When Skinny Monkey was said by fashionable glasses, the acne on his face turned red, and the concave and convexity became more obvious. He said angrily: "Of course I can catch him! If Jack hadn't wasted a lot of time overestimated his ability, I would have pulled him out!"
"Oh? Is that right? It took so long for who had just broken a broiler?"
"You...you are not the same!"
Fashionable glasses spread their hands, shrugged and rolled their eyelids and said, "I'm not like some shameless people who can catch him."
What Stoy hates the most is that others say he is shameless. Whenever he hears this, he thinks of the layers of acne on his face. Seeing that the other party repeatedly attacks him, he can no longer help and jump over and beat him up.
"Martin, Sto, say less!" A deep voice sounded, and the two men who were fighting roosters immediately became quiet.
The team leader is naturally their team leader. The team leader is about thirty years old and has a little fat body. Because he rarely comes into contact with the sun, his face is almost pale. Just a middle-aged man who looks ordinary manages a group of young, vigorous and skilled American guys in the office to obey. If Xu Yi is present at this moment, he will definitely jump up and shout "Idol...Idol..." Yes, this person is the spiritual leader of global hackers. He once played with the FBI in the United States and was arrested last year (the mosaic here is handled, this novel is completely fictional. If there is any similarity, it is purely coincidental. Please don't scold me for Kevin's Fans).
Hackers do not need politics, and politics often find hackers.
I don’t know what the hackers around the world think of Kevin’s idol discovering that the freedom fighter, who is now sitting in the Pentagon in the United States, would feel.
Before Kevin stopped, he ordered: "The opponent this time is really great. We have already broken through four broilers, and their safety is better than the other one. I have found the IP address of the fifth one, which happens to be an IP somewhere in California. I guess no matter how cautious the other party is, it will not exceed five broilers. Martin, please transfer a few people from the operation team to move the machine back."
"I understand, team leader." After Martin got the IP from Kevin, he immediately began to check the detailed address of the computer.
After Kevin finished speaking, his eyes still did not leave the monitor. Based on the log, he found the computer saved after the pictures was downloaded, but what surprised him was that he did not find any traces of those pictures. Could it be that this computer was just a transit? Kevin was a little confused. Where did the pictures be downloaded? Has it arrived in that person's machine? Kevin filtered the files in the computer in detail again, but did not find very large folders.
His mouse pointer finally moved to a folder named "new" on the D disk. At this time, a system popped up a bubble prompt box "FileFolderisempty (the folder is empty)". Kevin habitually double-clicked it, but a warning box with a red cross popped up "...referring an unavailable location...please check to confirm that the disk is correctly linked..."
The warning sound "buzzed", awakening Kevin who was thinking. When he saw this prompt box, he was stunned at first. After seeing the warning content, he felt relieved. He thought it was a small bug in the Windows system. This bug was just like sometimes a folder could not be deleted, but it could be deleted after restarting. He pressed the "DELETE" key, and as he expected, the system popped up another warning box: "The system cannot delete files: the source file or disk cannot be read." Kevin muttered that there were many bugs in Microsoft's operating system, and gave up searching for pictures and disconnected the connection with the machine. What he didn't notice was that the 2G space-sized D disk had more than 100 megapixels and didn't know where it ran.
Half an hour later, an intruder secretly connected to the computer that Kevin had just focused on. In the character interface, a batch copy command with loop was run, and then a batch download command with loop was run. After intermittently, the connection was disconnected and everything returned to peace. The only thing that changed was that the folder named "new" was gone, and the more than 100 megabytes of space lost by the D disk was also recovered unconsciously.
Chapter completed!