Of course, don't think that being able to control only one camera at a time is a big limitation for Zhang Baoyou.
In fact, for Zhang Badan, the biggest limitation is not ability, but time!
Zhang Liang always remembers what Damon once told him: Every hacker has his own program!
The meaning of this sentence is that every hacker has his own way when programming. The more unique the method you use and the more novel the method, the more difficult it will be for the other party to break through or defend you.
And what is Zhang Lianyuan’s best method?
Controllable! Changeable!
I think back then, when he and Guan Yueling faced off in the test, they won unexpectedly by relying on the "yin and yang code" they compiled.
This is also a programming method that Zhang Baobao created that is most suitable for him based on the hacking knowledge he learned and combined with his own situation.
The program he compiled is not static. In other words, it is not "dead". His program can be adjusted at any time according to the actual situation, and if there is enough time, Zhang Baobao can continue to improve it!
This method can be said to have advantages and disadvantages. The advantage is that it greatly improves Zhang Baobao's programming efficiency. This is equivalent to a "cheating device" for Zhang Baobao. He can continuously change the encoding through a program.
To achieve different functions.
However, it also has a big drawback, that is, it is extremely restrictive. At the same time, Zhang Badan can only use this program to perform one operation.
Fortunately, the preparation of this kind of program does not take too long. With Zhang Baolan's current hacking skills, if he wants to compile the simplest "convertible code program", fifteen minutes is enough!
At this time, what Zhang Baoli was doing in the elevator was to compile such a "convertible code program". Soon, a list was displayed on his mobile phone.
What is listed in this list is all the monitoring equipment in the entire building.
Whichever Zhang Baobao clicks on, he can gain complete control over that monitoring device. Of course, he can only control one at a time!
However, under such a tight time, it is possible to make such a
The procedure is already very difficult.
Zhang Liang did not dare to stay any longer. He had been in the elevator for more than ten minutes and had even destroyed the camera in the elevator. Who knew if the other party would send someone to check.
So, Zhang Badian unplugged his cell phone from the cord and quickly left the elevator.
Zhang Liangbo first returned to the corridor because he took a special look when he came and knew that there was no monitoring equipment in that corridor.
Then, he took out his mobile phone and started clicking on the monitoring devices one by one in the order listed in the list.
The purpose of Zhang Baoli's doing this is to roughly confirm the scope of control of these surveillances. Since it is impossible to form a more intuitive surveillance network, he at least needs to have a brief understanding of the overall structure of the building.
While confirming the surveillance, Zhang Badian also speculated on Ian's location. Soon, after comparison, Zhang Badian discovered that Ian was on the top floor of the building at this time.
The building of ZX Company is not high, with only eleven floors in total. However, that only refers to the "front building". The "back building" is even lower, with only nine floors.
The only "tie" between the two buildings is the corridor where Zhang Liang is standing at this time.
Although Zhang Baoyou couldn't see outside, based on the surveillance footage, he could roughly deduce that this corridor should also be moving upward simultaneously.
In other words, from the first floor to the ninth floor, there is such a corridor on each floor, connecting the "front building" and the "back building" together.
The location where Ian is at this time, to be precise, should be the top floor of the "back building", which is the ninth floor.
Although he found out Ian's location, Zhang Liang did not feel relieved, because what he relied on was only the phone card he had placed on Ian. However, two days have passed, and Zhang Liang didn't feel relieved.
There is no guarantee that the phone card is still carried by Ian.
Zhang Badai has no way to verify this, but he does have a way. If it goes well, through this method, Zhang Badai will be able to know whether Ian still carries this phone card, and even let Ian show up on his own initiative!
The method is to destroy the phone card remotely.
so-called broken
Bad means literally. Under normal circumstances, once the mobile phone card leaves the phone, it is actually a useless little card without any function.
The reason why Zhang Badai was able to track Ian with this mobile phone card was actually because he had already carried out encryption transformation on this card. To put it simply, this card was able to get rid of the communication module of the communication provider, but
It is not completely separated from the satellite system.
To put it bluntly, it is equivalent to having a "machine within a machine"! This phone card is equivalent to a miniature "small mobile phone". Even if it is not placed in the mobile phone, you can still make calls and send messages to this card.
However, it cannot realize the functions of answering and watching.
This approach actually doesn't have much practical significance. It was just done by Zhang Baolan himself after some research and play. The only advantage is that the card can be used all the time even if the phone bill is not paid.
Of course, the communication provider may not find out in a short period of time, but over time, people will still be able to tell that there is something wrong with your card. At that time, as long as people cancel the card number at the terminal, the card will be equivalent to
Wasted!
What Zhang Baoban has to do at this time is actually similar to canceling the card, but it is more thorough than canceling it.
This kind of mobile phone card is actually a chip card equipped with a microprocessor. It has five internal modules: microprocessor, program memory, working memory, data memory and serial communication unit.
Under normal circumstances, when running, these five modules are connected to the mobile phone through the five ports on the chip. However, Zhang's defective card is already a "self-contained entity", so it does not need to be connected to the mobile phone.
Able to run on its own.
During operation, the mobile phone card will generate a power supply voltage of up to 5V. If a person touches this voltage at ordinary times, he may not feel it, but on such a small card, it is a considerable amount of energy.
Already.
Zhang Badai wants to use remote control to cause a short circuit between modules when the mobile phone card is running. The voltage of 5V is enough to cause the card to emit heat that can be felt by the human body when short circuited.
In other words, as long as Ian still carries this phone card, he will definitely feel it!