my app store
Chapter 45
Chapter 45
It's not right for Shen Yi to go back now. Although nothing happened, it's not good to be used maliciously.
After thinking for a while, he volunteered and said:
"How about I help you solve the case of the bear burning incense in Jiangcheng?"
"What did you say?" Zhang Heng suspected that he had heard wrong.
Shen Yi said it again: "I want to help you solve the case of the bear burning incense in Jiangcheng."
Now Zhang Heng finally heard clearly, and he knew that this matter should not be underestimated.
What is Gou Xiong Burning Incense?
The first computer crime case in China.
This unknown criminal group, or possibly an individual, spread a virus with strong transmission ability, hard disk infection ability and powerful destructive ability on the Internet.
At present, nearly [-] computers in Jiangcheng have been infected. Among them, the computers of many small and medium-sized companies and government agencies have been severely damaged, and the impact has been bad. Netizens have suffered unspeakably.
This virus seriously affects network security and is highly contagious.
It's now July 12th.
It is expected that more and more computers will be infected by the Bear Burning Incense virus in the future. It is estimated that the number will increase to one million, but there is no sign of it in Jiangcheng.
This case is definitely not done by Shen Yi, because according to the survey, his Xinghuo Computer Manager has a total of 2500 million users.
The number of people infected by Gouxiong Burning Incense virus is nothing compared to his software.
In other words, if Shen Yi really wanted to release a computer virus, the computers in the country would basically crash.
However, there is no benefit and no point in doing so.
Now he has taken the initiative to assist the police in solving the case. If he really did it, he would get burned.
Those articles on the Internet, now it seems, are mostly nonsense.
Now Shen Yi actually volunteered to assist the police in solving this case?
The key point is that he seems to be good at programming. As for other things, how much does he know?
Is it possible that they are more knowledgeable than these task forces who specialize in various fields of computers?
Could he settle the case?
"But I have one condition." Shen Yi didn't give Zhang Heng too much time to fantasize.
"Once I break this case, you must publicize it well."
"Yes, if you solve this case, you have protected the public interest, and we will reward you for your brave actions."
"The most important point is to let all kinds of news media report this matter."
"Even if you don't need to say it, those media will rush to report it."
"Then I can try it."
Zhang Heng said: "Of course you can, just try."
Shen Yi nodded.
"Do you have any clues about the case of the bear burning incense in Jiangcheng?" Zhang Heng asked him.
After all, it was a case that broke out in Jiangcheng. Shen Yi wanted to solve the case across provinces, and what he wanted to solve was a computer crime case.
If he can really succeed, he can definitely learn and gain some experience, which can also come in handy in future computer crime cases.
It can even become an example that can be referred to in solving a case.
In short, if Shen Yi successfully solves the case, there will be many benefits.
"Let me do it first, it shouldn't be difficult."
Shen Yi stared at the computer screen and started his performance.
I saw him open VC++, wrote another program, and then he went to the infected website and downloaded a bear burning incense virus.
He first ran the previously written program, and then turned on the bear burning incense.
Computers haven't changed much in a short period of time.
Gouxiong Burning Incense virus is very low-key, it will slowly infect all infectable files in the computer.
It's not as exaggerated as those videos on the Internet, where so many bullet boxes pop up all at once.
Nothing has changed for a long time.
Because the program written by Shen Yi was used to limit the virus.
His program prevents Gouxiong Burning Incense from infecting other files.
However, the feature that Gouxiong Burning Incense will automatically click on the web page still exists.
Shen Yi observed the webpage pointed to by Panda Burning Incense.
"This webpage has ghosts. Virus creators may use poisoned computers to click on this website to make money."
"ICP is also fake. If it is traced back to the real one, then we can find clues related to them."
Shen Yi performed another operation and found out the ICP that this website had used before.
"The registration information of this ICP is very important, and it is related to the criminal's accomplices or himself."
Zhang Heng immediately wrote down this point, and then went to check the ICP.
Shen Yi proceeded to the next step.
Extract the signature of the virus.
The signature code is a kind of scanning method in the virus diagnosis method.
Each specific virus has its own unique signature.
Just like everyone has their own unique face.
If we make a metaphor, viruses and signatures can be compared to fugitives and the faces of fugitives.
Then the technology of scanning the signature code is a camera with a database.
If the camera scans a fugitive's face similar to someone in the wanted database, it calls the police.
However, some good people may be very unlucky, and they look very similar to this fugitive, and the camera will call the police.
This kind of situation where good people are alarmed by cameras is called false positives.
The analogy mentioned above is virus signature scanning, which belongs to active defense antivirus technology.
Shen Yi's method is equivalent to extracting the "face photo" of the virus.
He soon found clues in the code of the virus.
"JCBoy, XBoy."
Shen Yi repeated this string of codes over and over again.
Ordinary criminals will not use their own information as a signature, but this criminal seems a little arrogant, because these two English words are not common in programming, and they are obviously added on purpose.
He knew that this was important information for criminals.
This criminal is also too rampant, as if he has a sense of accomplishment after committing such a case.
But it was this guy who used the information as a signature, so Shen Yi could find him faster.
Otherwise, he would have to use various means to check the IP to find it.
He opened CC and searched for a netizen named "JCBoy" on CC.
Then he wrote a program to lock the keyword "virus", and then automatically access the space and personal profile of these CC numbers.
Finally, the program locked a CC number.
Open the space, and there is a sign inside: "Sell Trojan horses for account hacking."
Well, it must be this guy!
Actually selling the virus publicly on the CC number?
The current CC does not have real-name authentication and phone authentication, so basically no one can be found.
These alone were not enough to prove that this person was a criminal, so Shen Yi started the next step: tracing the source of the virus.
However, the results of tracing the source of the virus were unsatisfactory, because the source of the virus is very complicated, and it exists in various areas in Jiangcheng and other places.
This can prove that this virus has been trafficked several times.
Shen Yi added the guy's CC number and sent him a message:
"Is GG here? Buy hacking virus."
Not long after, the man finally returned.
"Okay, you pay first. Bank card number: xxxxx..."
Shen Yi's ID card, bank card, mobile phone, etc. have been returned to their original owners.
100 yuan, directly transferred to this netizen.
The other party was also very honest and sent the virus to Shen Yi.
Then he deciphered the virus again, and found the words JCBoy and XBoy in it.
It is exactly the same as the signature code of the bear burning incense virus!
This can prove that this JCBoy is the seller of these two viruses.
Since it can be sold, it means that he has contact with the developer, maybe it is the developer.
As long as he is caught and followed up, the case will be solved directly.
At this moment, Zhang Heng finally completed what he was going to do: "I have already found out the registrant of that ICP!"
Shen Yi pondered for a while, then pointed to the screen and said:
"Hurry up and contact the police in Jiangcheng, ask them to add this person's CC number, and then use the excuse of buying his virus to lure him out!"
(End of this chapter)
It's not right for Shen Yi to go back now. Although nothing happened, it's not good to be used maliciously.
After thinking for a while, he volunteered and said:
"How about I help you solve the case of the bear burning incense in Jiangcheng?"
"What did you say?" Zhang Heng suspected that he had heard wrong.
Shen Yi said it again: "I want to help you solve the case of the bear burning incense in Jiangcheng."
Now Zhang Heng finally heard clearly, and he knew that this matter should not be underestimated.
What is Gou Xiong Burning Incense?
The first computer crime case in China.
This unknown criminal group, or possibly an individual, spread a virus with strong transmission ability, hard disk infection ability and powerful destructive ability on the Internet.
At present, nearly [-] computers in Jiangcheng have been infected. Among them, the computers of many small and medium-sized companies and government agencies have been severely damaged, and the impact has been bad. Netizens have suffered unspeakably.
This virus seriously affects network security and is highly contagious.
It's now July 12th.
It is expected that more and more computers will be infected by the Bear Burning Incense virus in the future. It is estimated that the number will increase to one million, but there is no sign of it in Jiangcheng.
This case is definitely not done by Shen Yi, because according to the survey, his Xinghuo Computer Manager has a total of 2500 million users.
The number of people infected by Gouxiong Burning Incense virus is nothing compared to his software.
In other words, if Shen Yi really wanted to release a computer virus, the computers in the country would basically crash.
However, there is no benefit and no point in doing so.
Now he has taken the initiative to assist the police in solving the case. If he really did it, he would get burned.
Those articles on the Internet, now it seems, are mostly nonsense.
Now Shen Yi actually volunteered to assist the police in solving this case?
The key point is that he seems to be good at programming. As for other things, how much does he know?
Is it possible that they are more knowledgeable than these task forces who specialize in various fields of computers?
Could he settle the case?
"But I have one condition." Shen Yi didn't give Zhang Heng too much time to fantasize.
"Once I break this case, you must publicize it well."
"Yes, if you solve this case, you have protected the public interest, and we will reward you for your brave actions."
"The most important point is to let all kinds of news media report this matter."
"Even if you don't need to say it, those media will rush to report it."
"Then I can try it."
Zhang Heng said: "Of course you can, just try."
Shen Yi nodded.
"Do you have any clues about the case of the bear burning incense in Jiangcheng?" Zhang Heng asked him.
After all, it was a case that broke out in Jiangcheng. Shen Yi wanted to solve the case across provinces, and what he wanted to solve was a computer crime case.
If he can really succeed, he can definitely learn and gain some experience, which can also come in handy in future computer crime cases.
It can even become an example that can be referred to in solving a case.
In short, if Shen Yi successfully solves the case, there will be many benefits.
"Let me do it first, it shouldn't be difficult."
Shen Yi stared at the computer screen and started his performance.
I saw him open VC++, wrote another program, and then he went to the infected website and downloaded a bear burning incense virus.
He first ran the previously written program, and then turned on the bear burning incense.
Computers haven't changed much in a short period of time.
Gouxiong Burning Incense virus is very low-key, it will slowly infect all infectable files in the computer.
It's not as exaggerated as those videos on the Internet, where so many bullet boxes pop up all at once.
Nothing has changed for a long time.
Because the program written by Shen Yi was used to limit the virus.
His program prevents Gouxiong Burning Incense from infecting other files.
However, the feature that Gouxiong Burning Incense will automatically click on the web page still exists.
Shen Yi observed the webpage pointed to by Panda Burning Incense.
"This webpage has ghosts. Virus creators may use poisoned computers to click on this website to make money."
"ICP is also fake. If it is traced back to the real one, then we can find clues related to them."
Shen Yi performed another operation and found out the ICP that this website had used before.
"The registration information of this ICP is very important, and it is related to the criminal's accomplices or himself."
Zhang Heng immediately wrote down this point, and then went to check the ICP.
Shen Yi proceeded to the next step.
Extract the signature of the virus.
The signature code is a kind of scanning method in the virus diagnosis method.
Each specific virus has its own unique signature.
Just like everyone has their own unique face.
If we make a metaphor, viruses and signatures can be compared to fugitives and the faces of fugitives.
Then the technology of scanning the signature code is a camera with a database.
If the camera scans a fugitive's face similar to someone in the wanted database, it calls the police.
However, some good people may be very unlucky, and they look very similar to this fugitive, and the camera will call the police.
This kind of situation where good people are alarmed by cameras is called false positives.
The analogy mentioned above is virus signature scanning, which belongs to active defense antivirus technology.
Shen Yi's method is equivalent to extracting the "face photo" of the virus.
He soon found clues in the code of the virus.
"JCBoy, XBoy."
Shen Yi repeated this string of codes over and over again.
Ordinary criminals will not use their own information as a signature, but this criminal seems a little arrogant, because these two English words are not common in programming, and they are obviously added on purpose.
He knew that this was important information for criminals.
This criminal is also too rampant, as if he has a sense of accomplishment after committing such a case.
But it was this guy who used the information as a signature, so Shen Yi could find him faster.
Otherwise, he would have to use various means to check the IP to find it.
He opened CC and searched for a netizen named "JCBoy" on CC.
Then he wrote a program to lock the keyword "virus", and then automatically access the space and personal profile of these CC numbers.
Finally, the program locked a CC number.
Open the space, and there is a sign inside: "Sell Trojan horses for account hacking."
Well, it must be this guy!
Actually selling the virus publicly on the CC number?
The current CC does not have real-name authentication and phone authentication, so basically no one can be found.
These alone were not enough to prove that this person was a criminal, so Shen Yi started the next step: tracing the source of the virus.
However, the results of tracing the source of the virus were unsatisfactory, because the source of the virus is very complicated, and it exists in various areas in Jiangcheng and other places.
This can prove that this virus has been trafficked several times.
Shen Yi added the guy's CC number and sent him a message:
"Is GG here? Buy hacking virus."
Not long after, the man finally returned.
"Okay, you pay first. Bank card number: xxxxx..."
Shen Yi's ID card, bank card, mobile phone, etc. have been returned to their original owners.
100 yuan, directly transferred to this netizen.
The other party was also very honest and sent the virus to Shen Yi.
Then he deciphered the virus again, and found the words JCBoy and XBoy in it.
It is exactly the same as the signature code of the bear burning incense virus!
This can prove that this JCBoy is the seller of these two viruses.
Since it can be sold, it means that he has contact with the developer, maybe it is the developer.
As long as he is caught and followed up, the case will be solved directly.
At this moment, Zhang Heng finally completed what he was going to do: "I have already found out the registrant of that ICP!"
Shen Yi pondered for a while, then pointed to the screen and said:
"Hurry up and contact the police in Jiangcheng, ask them to add this person's CC number, and then use the excuse of buying his virus to lure him out!"
(End of this chapter)
You'll Also Like
-
I'm developing a mobile game in StarTie, and even the Star Gods are crazy!
Chapter 92 5 hours ago -
A review of famous scenes in anime: starting with Emiya Giant Warrior
Chapter 190 5 hours ago -
Review of the characters of the spell, starting with the sky and the tyrant
Chapter 39 5 hours ago -
Taking stock of the Saiyans' transformations, the whole universe is stunned!
Chapter 84 5 hours ago -
American comics: My understanding is beyond belief, I created my own little universe
Chapter 91 5 hours ago -
Pirate Family
Chapter 1318 15 hours ago -
Full-time Summoner
Chapter 1763 15 hours ago -
Technology: breaking the hegemony that monopolizes the world
Chapter 1904 15 hours ago -
Out of the cage
Chapter 1605 15 hours ago -
Build Madness
Chapter 1094 15 hours ago