225 boring regedit
Five days passed in a flash, and the mobile phone placed in the release hall of Prince Datang Technology touched the hearts of countless people.:.
According to the backend data, more than 30 million people have logged in to check the situation of the Prince's intelligent system through the official website link. This is a blessing for Prince Wang to break up money from Microsoft. Datang Prince Technology is currently quite rich in hands and has enough bandwidth to rent, otherwise so much visits alone can paralyze the company's official website.
However, nothing happened. I just placed it there and kept the phone in standby state. Fortunately, the phone did not set the automatic black screen, otherwise it would be extremely boring.
But even so, countless people waiting to watch the fun are already bored. I thought I could see a wonderful hacker offensive and defensive battle. But what is this? Is no one taking action at all, or is it really impossible to hack this system?
Although the device connected to the phone seems to show that someone is constantly sniffing the phone and trying to connect it in various ways, this does not explain too many problems. In short, this is too boring, completely different from the hot scene I imagined.
However, at this moment, a post published by regedit on the Black Hole Forum once again triggered countless hackers' discussions on the Black Hole Forum. Then, this post and all comments were translated into Chinese and reprinted by almost all Chinese portals, which made this topic hotly discussed again.
Regedit explained in detail all the invasion methods and processes he tried in the post, and gave countless invasion ideas, but unfortunately all failed. At the end of the post, he said: "First of all, the Chinese are slutty and put a system there without performing any operations, which limits our performance and is too many means to be used; secondly, what's the matter with a system that only enables four services? Does the user only enable such a few services when using it? Well. I admit that I will never be able to successfully invade the remaining time in this situation, so I announced that I would withdraw from this meaningless competition."
"In addition, is NCSC now occupied by a group of pigs? Although the Chinese are so arrogant, they only consider security. This system is more powerful than In10! Not to mention anything else, the intelligent anti-sniffing technology of this system is definitely a nightmare for all hackers. NCSC actually said that this system only has a D-level security level, which made me make a wrong judgment! Well, I am embarrassed, I'm angry. NCSC you are dead!"
The response below is naturally like a tide.
Many famous hackers in the industry have replied to this post. There is no way, everyone has been very troubled these days. I wasted five days for this system, but there was no result at all. Now someone is taking the lead, how can I not vent? Anyway, there is nothing to be embarrassing to not get rid of it. There is nothing to be embarrassed about such a god like regedit.
Of course, some people followed behind and complained. In fact, regedit was right. No one used the phone there, so naturally they lost too many attack methods, which made them quite unhappy.
The post is still doing technical discussions. I have to say that although the prince system is amazing, many of the intrusion methods given by regedit are refreshing to everyone. There is even one method. If there is enough computing power to support it, the intrusion may be successful.
But no matter what, when these professional posts are translated into Chinese and posted on the Internet, in the eyes of ordinary people, these hackers are obviously making excuses for their incompetence.
Damn it! I used to boast that Haikou would definitely have to die within 48 hours, but now five days have passed, so I posted a post saying that I didn’t blame me for not working hard. What does it mean to blame the enemy for being too cunning?
In short, everyone can't understand all the mysterious hacker technical posts in the front of the regedit post, but the text behind them can be understood. Who is cheating? When Datang Crown Technology communicated with you before, it was very clear that the phone was placed there. I gave you all the IPs and let you invade it casually. Now, if you fail to invade, you start to find excuses to make trouble. Isn't this a scammer?
As for the posts that the hackers who were complaining about were directly ignored by the public. It was indeed a group of people who were heading towards the group. Anyway, the fact was that a group of top hackers in the world had been busy for a whole week. They were unable to break through a system that was placed there and had an IP clearance. This seemed to be enough to show that the security of the prince's smartphone system was indeed powerful enough!
So wasn’t the review content of the previous American Orange Book nonsense? Now thinking about it, was it because the Americans saw that this system is more advanced than their technology, so they deliberately suppressed it like this?
There is only such an explanation, otherwise why are they brainless?
The direct consequence of this post is that the authority of the American Orange Book has begun to be widely questioned, and countless analysts have even begun to write articles, despising this official system security evaluation agency as the spokesperson for American companies, and can do professional advertising...
More importantly, the Crown Prince's smartphone system has been renamed this time, and the silence of the Tang Dynasty Crown Prince Technology naturally has a better interpretation. It turns out that this company is disdainful to sue the gang of naughty soldiers. Others' confidence in their own system has long made them not need to be proved through explanations...
And regedit became a tragic figure.
In fact, regedit has a reputation in the hacker circle where he is mingled, but it doesn't look at it like this in the eyes of ordinary people. This guy has obviously just reached a peak in his life, and in a blink of an eye he encountered Waterloo, which is a pity.
But just as countless people were regretting regedit, this guy made a move again. Less than three hours after posting, the websites of the National Security Agency and its subordinate organization, the National Computer Security Center, were hacked...
Now logging in to these two websites, there is only a dynamic picture. A big pig with a big three-tongue was walking in the lattice office with a big bucket. In front of each computer for work, there was a cute pig sitting in front of the computer. The picture also included an explanatory text, "Look, sure enough, these institutions were occupied by a group of pigs..."
Although these two official institutions closed the website immediately after being hacked five minutes later, in this information age, these two pictures have spread throughout the world, and everyone has once again seen the power of regedit. Damn, it has only been three hours before this guy was on the black hole platform, and he directly hacked Cheng Xiang the official websites of two serious official departments in the United States. Is this really a tragic person? It seems that he is still so unknowing... (To be continued.)
Chapter completed!