Chapter 273 I want to see if he has the guts! (4 more! Please order!)

Chu Hao paused to give the audience time to react in the live broadcast room.

This time he is not talking about common sense knowledge of computer technology, but in a real sense, leading these audiences to touch the field of hackers.

“As the saying goes, go to the countryside as you do. Since I decided to teach you something practical today, let’s start with the jargon of hackers.”

“Each line has its own rules, jargon! Hackers also have them. I have sorted out 21 common ones.



“1, rou chicken! Simply put, it refers to the computers that can be controlled by us at will! Whether it is a win system or a macOS system! It can be a personal computer or a large server. We can operate like our own computer.

Operate them without being noticed by the other party.

“2, Trojan horses! These are programs that appear to be disguised as normal programs, but when these programs are run, they will gain the entire control authority of the system. Many hackers are keen to use Trojan horse programs to control other people’s computers.”

“4, hang a horse! This is very common, you will know it when you browse the web, especially some small websites!



“073 is to put a webpage Trojan horse in other people’s website files, or to sneak the code into the other party’s normal webpage files, so as to make the viewers sway.

“5, Backdoor! After the intruder has successfully controlled the target host using some methods, he can implant specific programs in the other party’s system, or modify some settings that are difficult to detect, but the intruder can use it. The corresponding program or

The method is to easily establish a connection with this computer and re-control this computer, as if an intruder secretly assigned a key to the owner’s room, and can enter and exit at any time without being discovered by the owner.

%3D

“11, WebShel! WebShell is a command execution environment in the form of web files such as asp, php, jsp or cgi. It can also be called a web backdoor.”

“After hackers invade a website, they usually mix these asp or php backdoor files with normal webpage files in the web directory of the website server to obtain a (bhaj) command execution environment to achieve the purpose of controlling the website server.

To upload and download files, view the database, and execute arbitrary program commands ”

……

“15. Intranet: In layman’s terms, it is a local area network, such as Internet cafes, campus networks, company intranets, etc. All belong to this category. If the IP address is within the following three ranges, it means that we are in the intranet. The: 10.0.0.0-10.255.

255.255, 172.16.0.0–172.31.255.255, 192.168.0.0-192.168.255.255! ”

“19, Anti-virus! It is to modify the program through techniques such as shelling, encryption, modification of feature codes, adding flower instructions, etc., so that it can escape the detection and killing of anti-virus software.

“21. Flower instructions: just a few assembly instructions, let the assembly statement jump some, so that the anti-virus software can not normally judge the structure of the virus file. The popular point is: the anti-virus software searches for the virus in order from head to toe. If We put



If the head and feet of the virus are inverted, the anti-virus software will not find the virus!”

“These 21 common attack methods are very important! I will do them in a while! So that you can get a deeper understanding!” Chu Hao released the information in the live broadcast room while giving a systematic explanation.

Compared with Chu Hao’s earnest talk about hacker knowledge, the voice of condemnation in the live broadcast of “Super Hacker” has already been overwhelmed.

Countless viewers are shouting in the live broadcast room, hoping that their anchor can defeat the god-level hackers.

“Anchor, that god-level hacker avoids fighting! What should I do?”

“Anchor, he persuaded! Haha! Our anchor is the most powerful hacker! Punch the god-level hacker, kick the forehead brother! It is unmatched across the domestic Internet!”

Seeing the barrage of these audiences, Kong Shan smiled and said: “It’s okay, he didn’t dare to fight, it means he has no confidence! This also shows from the side that his strength is not good! He is just an Internet celebrity hacker!

“For this kind of anchor, who has been defeated by others, if we care about him again, won’t we be inferior? The ancestral religion has guided us, so we must forgive and forgive!

“It doesn’t matter if you are a super hacker. Anyway, fairness is in the hearts of the people.

Listening to Kong Shan’s words, those audiences admired Kong Shan’s broad xiong embrace! Admired his tolerance!

But, immediately, another audience jumped out, angrily brushing the barrage, expressing their dissatisfaction.

“Anchor, the god-level hacker next door is too Damn it! He completely ignores you!

“Yes, the most damn it is, he actually said, Laozi does not argue with a child! He compares you to a child!

“Anchor, I just went over and argued with them, but you guessed it, what did they do to me?”

“Say upstairs, what did they do to you? Don’t be afraid, our anchor will help you!”


Kong Shan’s curiosity was also hung up, and he immediately asked: “This old iron, what did those people do to you?

“Too Damn it! They actually banned me! The god-level hacker said, if I go to make trouble, I will close my account! God! Am I going to make trouble? I’m telling the truth.”

“Too much deception! Is this really a human thing?

“Anchor, take it!”

Now, the empty mountain is also on fire.

“Unreasonable! He actually dared to forbid the audience in my live broadcast room! He threatened to be named! I want to see, he doesn’t have the guts!

The college entrance examination is going to be tomorrow. I hope everyone will put away all the past modesty and everything at this time, and be cruel to themselves. Since someone wants to take the first place after all, why can’t that person be me? The most beautiful beauty will eventually marry as a wife, why this

Man can’t be me?

Therefore, I wish all the college entrance examination students, as well as the students who are about to enter the high school entrance examination, the title of the gold list.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like