After cleaning up Chen Ming, Shi Lei lay on the bed in a happy mood and fell into sleep.
October 1st is the National Day of Xia State.
In 2006, the National Day holiday was still seven days.
Ling Yumo has gone home, and Mu Shuang took a plane back to Shengjing City last night.
Kubi Xiaolizi also returned to Chang'an. Listening to his wishes, he was also planning to bring out some more things at the place where his old man worked.
This child is completely hopeless!
Shi Lei is an orphan and has no relatives. As for that inexplicable uncle, he doesn't like Shi Lei, and Shi Lei doesn't like him either.
The two have not seen each other for more than three years!
Staying alone in the dormitory, Shi Lei considered some issues.
For example, who are his parents?
Also, how big was the organization he joined in his previous life?
The organization ruthlessly abandoned Shi Lei, causing his death. How could Shi Lei let them go?
However, that organization is too powerful, and Shi Lei will not touch or track them down for the time being.
In his previous life, as the world's top hacker, Shi Lei controlled the world and dominated the Internet.
But in the real world, he is a complete nobody.
It has no power of its own at all.
After his rebirth, although Shi Lei was joking and laughing without any formality, Shi Lei secretly made up his mind not only to make a fortune in the Internet.
In reality, we also have to turn our hands into rain!
Turning on the computer, Shi Lei used the Shuangqing University server as a springboard to log into the Hacker Alliance's website.
The Hacker Alliance is a second-generation hacker organization that created a website of the same name.
The second generation of hackers rose from 1998 to 2000. As the backbone of the current hacker community, the second generation of hackers have excellent skills and high quality, which supports the hacker circle.
As for the first generation of hackers, many have transformed and engaged in network security, network technology, and even opened their own network security companies.
Compared with the second generation hackers, the first generation hackers are more powerful!
They are Xia Guo, the first group of people to come into contact with computers and the Internet, and they have high cultural quality and computer skills.
The second generation of hackers basically followed the path of the first generation of hackers.
As for hackers after two thousand years, they are collectively called the third generation of hackers.
Among the third-generation hackers, there are many talented, tyrannical, and powerful guys. However, most of the third-generation hackers just copy the methods summarized by their predecessors and the attack tools developed by others.
Compared with the first-generation hackers and the second-generation hackers, the overall strength of the third-generation hackers is really far behind!
The Hacker Alliance is a hacker organization established by the famous Black Knife among the second-generation hackers.
Among the second-generation hacker organizations, the Hacker Alliance ranks first.
Shi Lei was once a member of the Hacker Alliance. Although he later left the Hacker Alliance, the Hacker Alliance helped him a lot.
Shi Lei registered an ID named 'Lucifer' and browsed in the Hacker Alliance.
The hacker alliance at this time was not as snobbish as it would be ten years later.
Lots of stuff, all free!
After browsing for only a few minutes, Shi Lei's computer actually started to alarm!
It turned out that the guy who was also browsing the Hacker Alliance logged in the IP information through the web page and came to the door. He had found the server of Shuangqing University and was conducting an attack!
After Shi Lei's adjustments, the defense of Shuangqing University's public server has increased countless times. How could it be easily captured?
Shi Lei tracked the intruder, and within a moment, Shi Lei easily tracked the intruder's IP address.
Maybe it was because the other party was too focused on invading Shuangqing University's server, or maybe because the other party's skills were poor, they didn't notice Shi Lei and were already chasing him!
On the Internet, an IP address is just like a home address in the real world.
If the other party knows the IP address, it will be like being blocked by the police, waiting to be caught!
After getting the other party's IP address, Shi Lei did not rush to invade, but started to query the other party's IP address and the corresponding location!
Shi Lei smiled, as long as he knew the other party's location and exposed the other party to the sun, it would be equivalent to a death sentence for the hacker!
"Huh!"
Looking at the location of the IP address, Shi Lei showed a surprised look.
The other party turned out to be from Shuangqing University of Science and Technology!
The computer department of Shuangqing University has always been at odds with the computer department of the University of Science and Technology.
Students from both sides hacked each other back and forth, often breaking into each other's campus servers, and killing each other with great joy.
Even the department leaders from both sides tacitly approved of this behavior.
After all, this helps to enhance students' interest in learning.
When Shi Lei was about to take a step further, he suddenly lost contact with the other party.
Shuangqing University of Science and Technology, in the campus library, an ordinary-looking man directly forced the computer to shut down.
After confirming that the computer was shut down, the man breathed a sigh of relief.
He whispered to himself: "It's amazing, you actually tracked down my IP address silently."
"Fortunately, I am using the public computer in the library, otherwise, I would be dead!"
"You can escape for a while, but you can't escape forever!"
A true master hacker would never make such a stupid move.
Even if the network cable is unplugged and the other party loses the connection, people can still trace it and find the specific IP address.
Therefore, other means are used, such as locating the location of the IP address in reality and arresting people directly!
Therefore, a master hacker will never shut down his computer and unplug the network cable. He will only try to escape and get rid of the other party's tracking.
Shi Lei still remembered that in his previous life, another world-class hacker single-handedly invaded the FBI's internal intelligence system.
Although he was very good at invading and learned a lot of secret information.
However, the FBI's tracking experts chased him across half of the world, constantly using methods that combined the Internet and reality, and finally captured the world-class hacker in the country of Granville.
The FBI's tracking experts may not be good at intrusion or defense, but they are absolutely powerful in tracking.
Combined with Li Jian, a powerful country, people track experts and notify the police wherever they track them.
Once the IP address is determined, the police will come to your door very quickly.
At that time, it will not be easy even if you want to run!
Therefore, shutting down the computer and unplugging the network cable is definitely a bad idea!
Now that the other party's IP address had been determined, Shi Lei was not polite and directly launched an attack on the University of Science and Technology's server.
Shi Lei did not attack violently, but scanned for loopholes, trying to sneak in silently.
Through port scanning, Shi Lei discovered that the University of Science and Technology was actually much stronger than Shuangqing University!
The situation in the previous life was not like this!
In the previous life, the strength of the University of Science and Technology and Shuangqing University was almost the same!
how so?
Could it be that Shi Lei, this little butterfly, caused the effect?
Although the defense power of the University of Science and Technology's servers exceeds that of Shuangqing University, to Shi Lei, it is still like paper that can be broken with just a poke.
After Shi Lei entered the server of the University of Science and Technology, he began to retrieve the server's permission user group.
In the server of University of Science and Technology, the principal does not have super authority!
The entire server has only one super account, which is in the hands of the administrator. At the moment, the administrator is tracking down Shi Lei!
Shi Lei looked at the computer screen with disdain and typed the code with both hands.
"Get down here!"
After more than ten seconds, Shi Lei kicked the other party's super user out of the server permission group and started to create his own super user.
After locking the server's user group, Shi Lei began to check the IP address allocation of the University of Science and Technology.
"Little Zhazha, little Zhazha, Brother Shitou is about to catch you!"
The campus uses a local area network, and each IP address has a corresponding physical address.
Just like the network in Shi Lei's dormitory, it is also a campus LAN. If you find Shi Lei's IP address, you can find the dormitory corresponding to the IP in the Shuangqing University server, and then through the dormitory allocation record, you can find out Shi Lei's identity!
Shi Lei was preparing to use this method to find the guy who had just invaded him at Shuangqing University of Science and Technology.
Although that guy only tracked Shuangqing University's server through the login IP provided by the Hacker Alliance web page, he didn't even break through the server firewall.
But is Shi Lei the kind of person who doesn't have a temper even if someone bullies him?
Shi Lei checked the server of the University of Science and Technology and found the intruder's IP address and the corresponding real address, but found that it turned out to be a public computer in the school library!
In this case, the clue is broken!
After all, it was just an ordinary invasion, and without an invasion, it was impossible for Shi Lei to investigate further.
If it is an intrusion into a state agency and people find out this step, then they should come to find someone. They will also investigate all the people who entered the library during this period, and then question them one by one and testify against each other as to which computer was used during this period.
Computer person.
If we really investigate like that, I'm afraid it will be easy to find out who hacked into Shi Lei's computer.
However, Shi Lei is just an ordinary person and cannot conduct such an investigation at all.
"Hey, I'm so depressed. Although shutting down and unplugging the network cable is a bad idea, it's still quite effective!"
I have to admit that under normal circumstances, unplugging the network cable is a way to deal with tracking.
"Although I can't find who you are, as long as you are from the University of Science and Technology!"
In his previous life, there was a master at the University of Science and Technology. Shi Lei and that master often fought.
The computer departments of both sides, led by these two people, often went to war with each other.
The most serious incident was that since Shi Lei was not in the school, a boy from the University of Science and Technology actually posted the love action art film of Wosang Kingdom on the campus forum of Shuangqing University.
After provoking Shi Lei back, he led his men to kill them, wiped out everything in the University of Science and Technology server, and deliberately low-level formatted the opponent's server repeatedly.
Finally, the University of Science and Technology server was completely overturned!
This time, Shi Lei posted a provocative post in the forum of the University of Science and Technology.
The content read eloquently: That shabby boy has no ability to learn any intrusion, but he still shuts down the computer and unplugs the network cable?
What a shame!
What a waste!
The computer department of your University of Science and Technology is all trash!
At the end of the post, Shi Lei left the name "Lucifer".
I believe that the person who invaded him will understand!
By then, I don’t know if the universities on both sides will have another blackmail competition!
Anyway, Shi Lei is not afraid!
————————————————————————————————————————————
PS: Shanshan is crying, dear friends, please be kind. If your recommendation vote cannot reach the target, you will not vote!
The current recommendation votes are close to 2000, 2200 votes will be added!
In addition, there is a small activity in the book review area to give away Penguin Couple accounts. Book lovers in need, please reply to the post!
Hey hey hey, one ID is limited to 10 replies!
Asking for recommendation votes, asking for favorites, asking for member clicks, asking for rewards, asking for reviews, asking for packages....
——
[Thank you for tipping] Xuan Zi_Zhong, Aixuan1314, ゛kill※liangご, tip 100.
.
.
.
;
{Piaotian Literature www.ptwxz.com thanks all book friends for their support, your support is our biggest motivation}