I’m Really a Superstar Chapter 280: [I found Li Tao’s handle! 】


Saturday morning.

Masterpiece of ringtones, oh.

Zhang Ye glanced at the sky that was still not bright. He yawned and got up to wash. He moved very lightly because the door of Dong Shanshan was not open and he was still sleeping. After returning, Zhang Ye was refreshed after washing his face in cold water.He sat in front of the computer and waited for the information on the other party's email. If the other party's service endpoint opened the Trojan Horse program sent by Zhang Ye, the Trojan Horse software on his side would There is feedback.

Wait.

Wait.

Why isn't this grandson online?

Did you not get up or turn on your computer?

At the same time.

A residential District.

Li Tao and his family have breakfast after getting up.

His wife asked, "Aren't you going to work today?"

"Break." Li Tao didn't talk much and returned two words.

His wife said: "The mess that the Zhang Ye has made, isn't there much pressure on your side? Does it have any effect on you? Will it not cause any problems?"

Li Tao took a mouthful of steamed bun and laughed: "It's definitely impossible to say that there is no impact, but rest assured, he can't set off any storms and threatens me."

His daughter looked up and said, "Dad, is Zhang Ye really finished?"

"He's finished." Li Tao touched her daughter's head. "He caused public anger by himself. There are too many people who want to see his jokes. Even if I don't fix him, he will have to follow suit sooner or later"

His daughter clapped her hands, "It's great, let him scold my family Pu Puhum, by the way, please give me a signature of Li Puyu."

Li Tao said, "Well, wait, when will he come to Shanghai for program, I will say hello to TV station, this is a trivial matter."

His daughter said excitedly, "Dad, you are so nice"

Li Tao said, "Oh, let's eat."

After dinner, Li Tao's wife went to work. His daughter went out to find classmates to play. He went back to the bedroom alone, turned on the computer to watch the news, and logged in to Weibo and the mailbox of one's own.

Drop.

You have new mail.

Li Tao glanced, his eyes blinked.

Don't you see a man? Steal the hidden-secret photos of Zhang Yuanqi?

Shit, so yellow and so violent, then ... must watch it

Li Tao said nothing, and immediately opened the picture in this email with a mouse click. The network security in this world is very good, limiting a large part of Hacker or network technique enthusiasts with private purposes. This is a disadvantage for them, but there are two sides to everything. It is actually beneficial to look at it from another angle. In this secure network environment, the public's awareness of prevention has been greatly reduced, and there is no vigilance of the people in the Zhang Ye world. No, Li Tao didn't have any sense of prevention, so she waited with anticipation to refresh, but after the picture was brushed out, Li Tao couldn't help but almost motherfucker. Who is this foreigner, Grandma? Where is Zhang Yuanqi? Where is the very yellow and violent thing? Isn't this a daddy, do you still have humanity?

The other end.

Zhang Ye's Family.

Drinking tea and smoking a cigarette, Zhang Ye suddenly noticed that the Trojan Horse client lighted up. The following column controls the interface, and an extra user name for the computer is added. He only sent Trojan Horse to Li Tao. So this computer does not need to ask, it must be Li Tao's

It became

It's finally here

This grandson is really a pirated System

Zhang Ye immediately straightened up. Now Trojan Horse basically uses the 6 structure. This is the name and title of the world of Zhang Ye. In this world, it is called BIC structure, which means the same It is very convenient and convenient.Trojan Horse also cheated Li Tao's computer firewall through planting, and invaded it through a previously very old System vulnerability. It can be said that the computer already is now under the control of Zhang Ye and has become his. A broiler-in short, the avatar that can be called at will.

Type an instruction, Li Tao ’s Ip address will be displayed soon. This is a dynamic Ip segment. It will be different every time you log in. It will change, but with the Trojan Horse embedded in it, Zhang Ye is completely You don't need to worry about confirming the IP address every time, because this Trojan Horse will generate the IP of the port to the client of Zhang Ye on the first time every time the other party goes online, unless the other party fills this loophole or the Level Up firewall, Otherwise, it is basically impossible to run away from the control of Zhang Ye.

As for the language and method of inputting instructions, there is not much difference between the two worlds. After all, the first language of a computer is English. English in this world has not changed. Of course, the development of computer languages ​​is similar. Zhang Ye typed a few commands, the Internet address of the other computer at the moment, the computer's working group, the computer's reputation, user name and management password, Zhang Ye all got, it can be said that the gods don't know it.

Zhang Ye is afraid that the other party will be disconnected from the network.In that case, even the highest Hacker with technique cannot take him, so the quickest goal of implementing one's own is to quickly see all the files on the other computer, including hidden files

C drive-no.

Drive B-no.

Disk F-there is nothing worth noting.

Li Tao ’s computer is actually very clean. Except for a few game and System software, there is basically nothing else, not even a movie. Zhang Ye looks at the traces on the other party ’s browser. An unhealthy website that he has visited and visited, but this is of no use and cannot cure Li Tao at all. Zhang Ye is dissatisfied, and he smashed his mouth and searched carefully, still nothing.

paralysis should not be

Who doesn't see anything in the computer?

Zhang Ye scratched his head, this method was rejected again, but he still has tricks, since the other computer already is in his hands, there is too much information that can be captured

For example, turning on the camera

Zhang Ye performed this operation the next moment, but before adjusting it, he adjusted the settings slightly and typed a line of instructions. Most of the current computer cameras are equipped with lights.Some of the lights on the cameras are used to light the lighting.This is very common. There are also cameras such as small lights like pinholes on laptops.Fools also know that There is nothing to do with the lighting, so the light won't even shine with the needle. That light is a kind of System Notification indicator light, which tells you that the camera is turned on. So this thing should be closed naturally, otherwise it is easy to be exposed. Some Hacker software comes with this function, but some do not. It takes a lot of trouble to set it up. It is done for concealment. Of course, as the large amount of memory and CPU resources occupied after the camera is turned on makes System slow, there is no way to shield it. This is a hardware thing, and no one comes.

That's it

The camera is turned on

At that moment, a big face suddenly appeared in front of Zhang Ye. He looked intently, and smiled coldly, it turned out to be Li Tao's owing face

Li Tao is staring at the screen, there is no Voice over there.

Zhang Ye performs another operation-turn on the microphone of the other computer.

Da, da, the mouse clicked Voice passed into the ear of Zhang Ye. You can hear the movement in the other's house. Everything is under the control of Zhang Ye.

Afterwards, Zhang Ye also turned on the video recording function regardless of whether it was thirty-seven or twenty-one. This was turned on on the one's own computer. The whole process of Li Tao's every move was recorded in order to find his handle. However, with such a fool, the computer with the common configuration of Zhang Ye is also a bit speedy, not to mention turning on other things, that is, there are some cards on the screen with a mouse movement, hop by hop, so Zhang Ye quickly shut down with a bitter smile A few things that are not used to relieve the pressure of System, this is a little better.

It's a long wait again.

About ten minutes later, Li Tao suddenly got up and stood up, leaving the range of the camera in a blink of an eye, because the camera coverage is limited, Zhang Ye can only be judged by the sound of opening the door, Li Tao is going to the outer room living room, but There is no off the computer disconnection because Zhang Ye can still connect.

Wait.

Nothing but waiting for him.

A few minutes later, Li Tao returned and sat in front of the computer again.

Hacker is risky, so Zhang Ye does not dare to leave for a moment. In case any trace is left, it will be easy to track the position of Zhang Ye when Expert comes over.

cell phone ring of Music sounded.

Zhang Ye headed subconsciously, not cell phone of one's own.

Then he saw Li Tao in the video pick up the phone, and lit a cigarette in his mouth, "Hey, Xiaoyong ... uh ... uh ... how about a few Talkshow program check? ... I know there is a problem ... but you can deal with it symbolically, so as not to stop the broadcast ... Yes ... copyright? I know they copied Zhang Ye program, but there is no problem with their copyright. This is not our responsibility. There are related copyright departments, no longer can they go to court in one's own, what is the relationship with us, just warn them, it does not need too severe punishment, but it should not be too light, at least to the public a symbolic Let me explain, I still use this to teach you? "

What?

Speaking of me?

Zhang Ye eyes are bright

Then I listened to Li Tao and continued, "Wu Wei's video of Dong Dong's woman, she was program blocked ... Okay ... who? Who called? Umm ... I know, but It's useless to ask anyone. She is a Zhang Ye university classmate. If you want to do it, you can do them together ... Yes, ask our working group and make us such a big mess. Oh, they still think about it? You can also watch this video, if there is any problem with program, report it directly to me ... Yes, kill a hundred, I see who dare to rebel in the future ... Hehe, I don't know that "Network Talent Show" is OK, no problem Let ’s do it, who can do it ... Understand ... Okay, you do it, you must suppress this negative public opinion who will not accept you and tell me "

The phone hung up.

Li Taoyan extinguished his cigarette **** and continued to surf the Internet. He didn't know that his words and deeds already were recorded by the Zhang Ye video on the computer side.

Zhang Ye is so excited, I can't help but pat my thighs

This is what I want. With this, Li Tao still wants to jump? He can't jump for a day

I waited for more than ten minutes, and saw that there was nothing new, Zhang Ye did not connect to his computer, turned off the camera and audio, and used the network technique Skill eaten by one's own to quickly clean up the log files of the other computer. Eliminate the trace of invasion.As for the Trojan Horse program Zhang Ye left in his computer, it cannot be deleted. There is no way. This is an ordinary Trojan Horse software that can be downloaded on the Internet. The level is very low and the technique content is not high. There is no program setting that automatically deletes itself, that is Hacker Trojan Horse of Royal Rank. However, this is also harmless.Every Hacker invasion will actually leave some traces of software, mail, Trojan Horse, etc., it does not matter. As long as you remember to clear the log traces when you leave, then there is no problem, others will not follow Here.

Exit control.

Zhang Ye also disconnected the network for security reasons, so I re-watched the entire process just recorded, and intercepted the most critical video

Want to slap me and my old classmates?

Li Tao, you are finished, your dad is here and I ca n’t save you.


Leave a Reply