Tsai Please find the students who "talk about" a word, warning him to Hou Sulan If what happened the first to find him, that boy is also sensible, since the teacher did not call Sulan idea.
Bo Xu Yi to go to school and play after the still hot, but after the anxious face of Gigi pose heart, and killed him did not dare to provoke the violence, women, and jokes, he finally able to bring it again, if so be that violence to Girl accidentally hit back prototype, it is not worth more than it! Xu Yi would have to say violence is not a cold woman, in his view, the gentle woman is the real woman. Moreover, he found that I was in love with Su Lan, her people beautiful, and gentle, the most important thing is Sulan age and his heart almost before reincarnation, there is a common psychological age. Xu Yi girls in class who do not yet fully developed, he is of little interest at all. Usually he is an honest point of view in their seats reading, the way to consider how to make your own pot of gold.
After school he went to the weekend Bin Bureau data that the Internet, although Bo said that they also pull the network cable at home access to the Internet, but Xu Yi think about, but finally decided not to take the risk, Gigi attitude that has caused him psychological shadow. Xu Yi site to download Linux from abroad, the latest version of the Linux operating system, with the operating system how to Bin boasted how easy to become a qualified network administrators, must understand Linux or Unix operating system, configuration and so on. So this Bin is pleased to burn the disc into the system, then let Xu Yi help installed in a machine inside.
Linux can be considered at this time more mature, and 91 years of the father Linus0.01 Linux operating system, version, 94 was finally an official version, that is, the landmark version 1.0, and after more than a year of development, at this time Linux functionality is greatly enhanced. Xu Yi, as a veteran hacker, naturally well aware of Linux, and is Lniux fanatical fans, he could not get on the windos95 rather in the character interface with Lniux do not want to use the current loopholes in the win95.
Bin Xu Yipei service was now putting on five, no matter what difficulties on the computer, Xu Yi like a no-brainer to be easily resolved, several times, Bin Xu Yi are clamoring to worship as a teacher, but every time he refused. Xu Yi is very clear that this kid is indeed smarter Wang Bin, but his impetuous nature of mind that he decided to engage this technology is not a piece of material, not how long, he must be a career change. As an early access to the Internet, and if he vision, in the Internet field can make a difference. The matter concerns an armchair, Xu Yi does not seek to remind him. One big reason is Xu Yi found himself and his touch for so long, it is difficult to become a true friend.
96 years, China has just started the Internet, connect to the Internet people are pathetic, not to mention hackers community, and there are only a handful of maverick, maverick and these are generally the first batch of guest's network , the real skillful almost did not, so Xu Yi Bin on the last black guy very interested in the machine. But such a long time past, that guy has never occurred until Xu Yi Linux operating system installed after the second Sunday.
Bin win95 system that sets the machine filled once again get on the ground, the hard disk is locked, Wang Bin, know that he came again. In fact, Xu Yi has the ability to fully furnished leak of his system, but Xu Yi, and did not do, is to sit back and wait, the rabbit finally came today!
Xu Yi already compiled a program hidden in the data in the Bureau of the router, it is a monitoring program that can monitor the data flowing through the Bureau all data streams, so when Bin Xu Yi is using the last series of the hard disk that fixes , he then began to analyze the data flowing through the router.
Without much effort, Xu Yi to track down the attacker's IP address, that guy seems also a rookie, did not undergo any springboard turned out to be directly connected, which more or less to Xu Yi a bit disappointed. His condition at this time is like a martial Wu Chi, is trying to find a teaching can and compete with their rivals, see each other so even low-level errors committed, no wonder he was to be disappointed.
Xu Yi conducted a scan of that IP belongs to Beijing, the operating system is Unix's. This provoked a little interest Xu Yi, after all, is not used in this fool-type operating system win95, indicating that the other side a little bit technology. Examination of the two common vulnerabilities have been patched each other, Xu Yi has added some of their confidence. With their preparation of a simple scanner glanced in his opening service, find each other even while the machine is a server, open the apache and mysql service port, in addition to FTP services on port 21. FTP software is ServU, these are very familiar with things Xu Yi, Xu Yi decided not to use loopholes in the system intrusion, because that did not challenge that, instead of ServU start, improve system privileges. But this is only a little difficult to just, Xu Yi is very easy to get the root privileges, which makes him a bit depressed, not challenging!
Well, low level of domestic technology, later turned into the battlefield abroad, Xu Yi made a decision, the direct result of the Western world, hackers know the cause of the East a man named XYZ peerless genius hacker, this is something. (XYZ is the name of Xu Yi in his first letter of alphabet XY Z followed by the results of a basic, but still marked by the stigma of his name)
Bin Xu Yi has invaded not know the success of a few curse was both unethical guy called to repair a computer.
Xu Yi landed on the other side of the system now, but root. He looked a bit user login name that kid Kingson (meaning: the country prince.) Xu Yi sent a message to him: Hello, Kid. (Hello, kid actor.) 〔Characters in the text interface, in English only. 〕
This is what seems to each other under the Debu light, after a silence, Xu Yi found himself and the other side of the connection disconnected. Well I thought that guy two down, took me so quickly driven out. Next, Xu Yi would like to re-invade, they found each other's machines have a Ping unreasonable.
Watermelon! That guy disconnected the network cable. Xu Yi is somewhat helpless, so useless that he did not expect the other side, the first thought is, surprisingly, this tactic, but this move really works. Do not go, even with big ability Xu Yi is nothing can be done. Fortunately, after a while, Xu Yi found each other again coming up, so he re-infiltration and found that the newly created account has been deleted, but it is also easy for Xu Yi, he was again under the old methods of invasion success, and then made had a message to him.
After a while, Xu Yi by the Echo: whoareyou?
Xu Yi replied to a: XYZ.
He then quickly visit in each other again on the machine, found a lot of things in there, a lot of small programs hackers, looks should be written in his own, which makes Xu Yi improve his image a bit. Next, Xu Yi from the inside some of the contents of the file that the other turned out to be a high school, so he was very surprised that the heart of a dynamic, an idea formed in his mind. He entered a hidden directory, the directory is the system directory, and deep, the average user will rarely go here, and then he created a file in there and hide it. It can be said, unless the other files on the system carpet check, or simply can not find the small files. Finally, he in the other machine running a small program, retreated. It is a small program that locks the hard disk logic, very small, but each other's hard drives can be locked, Xu Yi eye for an eye is the body of its people, not for revenge but for warning each other Bin network, not arrogant, there is day.
Xu Yi principle of the program locks the hard drive on the other side of that method are different. I said before, the hard disk partition table in sector 0, cylinder 0 head 1, and its special meaning for each byte, while the last two bytes of the partition table is that a sign of the partition table is valid, that is When the system each time you start it first checks the last two bytes, if it is valid, it will continue to run, otherwise it will stop running. Kingson lock the hard drive is to destroy these two key bytes, change them into other numbers, so that the partition table to achieve the purpose of destruction. Unlock method just change the two bytes of the digital back on the line, with A boot disk, you can use the DOS system directly comes Debug to modify the assembler, a program written in the last Xu Yi is because there are three To repair the computer, so he did not directly on the computer changes.
Another way is to lock the hard disk partition table parameters into a cycle chain, about a partition C, the next point D, D, and then the next partition point C (where only a metaphor, Unix systems are different) This cycle continues, the hard disk so locked. This principle is the same as the previous method, the unlocking method is similar, as long as you can come back to modify the relevant parameters, Xu Yi is to see each other in the end how to solve this problem.
So for a while, Xu Yi found that the other is still not online, mind wondered to see the other side had also overestimated the strength, half past one will he get it working. Wait a minute, that Kingson or no movement, ranging from the decision Xu Yi, Wang Bin looked, but did not come back, his machine has now been restored well, just as he left a statement on the machine, said he first go back.
Saying that Kingson, he is now a high school student in Beijing, the family very rich, but he liked to fiddle with computers since childhood, to now also be played with this superb computer technology, but today he has met nails. The last time he had a chance stroll BBS, see people posting to ask some idiot computer problems, he pulled on the back of the sentence, laughed at each other in general how the content is an idiot, yet they attracted a comparison to understand computer guy looks like (Bin) of some sermons, both in computer technology than on the BBS, which is similar to martial arts master fiction contest with the mouth (of course, Kingson recognize each other is not a master), they are using a text, the result is the caller said, but Kingson very angry and started playing rogue and cursed. This allows Kingson very angry, decided to take lessons from each other about. Network is unreal, no one knows the end of the line computer access to the Internet is a person or a dog, so many people in the network is the indulgence, even out of character in which the performance and the reality is the opposite, honest people can Variable bully, good girl ... ... you can loose to some extent, so to speak, your network is the real you. So, like Wang Bin, as saying that a lot of people, but others will curse.
Instrument allows angered put Kingson, who is he, he always compares himself to China will be Kevin •; Nick (Nick, hacker community spiritual leader, 95, was arrested by the U.S. FBI), he not provoke others to giggle, and now it has been on the rogue network, so good Kingson decided to punish the uppity kid. Online world is illusory, and hackers and cyber world can be both a relationship and the real world, such is the fear of hackers, an important reason.
So, Kingson left under the BBS on the IP address of the other track to its host, and then start its invasion, the other side of the patch to play a very complete, when he invaded a lot of time, but eventually by his successful penetration Finally, the other three computers hard drive all "blow" out. The drive system of formation of the bomb is Kingson came up when the program, his confidence is not how advanced computer technology should be very few people know that domestic solution. The first time it does, the other side of the machine for a long time not on the web, this time does not solve the hard disk lock, unlock estimate is way he did not know. Triumphantly in Kingson, he was surprised to find each other again in the network, he met his master suspected, so vanishing for a moment, but the mind has been worried about it until today, he plans to test again .
Kingson is surprising is that the last invasion of each other's vulnerabilities still did not make up, but there are machines for the operating system, more like he did not directly try to kill a rumor, and then wait for each other's back. Sure enough, soon had his own machine movement, someone to scan it, he thought it was the original target of the counter, but he look at each other's IP address is another IP, which surprised him, he thought of the two possibilities: First, this is indeed another man in the scan; second, the other with a "springboard" techniques to hide their true IP. In fact, his mind may be less inclined to second, but he would not believe this is because he has not mastered "springboard" technology, and if so, other than their own powerful technology, and that face their own the first attack, the other is not powerless, but let a horse ... ...
Belong to each other in the end is what he thought possible when he received the information sent each other - "Hello, kid".
Kingson shocked, this information gave him a big blow to such a short period of time, the other party actually has been successful invaders, and also obtained root privileges, which allow Kingson difficult to accept that he had originally thought that there is no vulnerability the machine is now being so easily penetrate the other side, too ... ... shocked, too hit it! Especially the phrase, "You okay, kid actor" Kingson to see if it is harsh, it is clearly laughing at him the same technology is now like a child! !
Is endure which can't endure! Kingson decided to give each other a lesson, so he is striking back! ! First solve the problem is traced to each other's real IP, although his mind may be inclined to second, but now some shake this conclusion, so that Kingson headache is that he had never been tracking other hackers, that this technology He did not know, but he will not give up, so he temporarily try to the side while playing for time, back asked about each other's name. Kingson feel so depressed that the other side responded to a "XYZ" after himself only to see the display flash into the black - even on their machines so was the other black.
Kingson filled with anger and forced back to restart the computer, the results "tick" sound can not be found after the computer has restarted, and he is very familiar with the symptoms, and his hard drive exactly the same bomb, he thought in a martial arts term "eye for an eye a man as body. " Floppy disk with the system quickly to repair the hard disk, floppy disk, but even he should have found that does not work! ! Kingson eyeball pop out faster, and finally cursed out: "Damn, he did what my hard drive!!!" Then, get another for a long time, still no way to allow the system to start, and now he just kind of want to cry - that he has a hard drive inside, but a lot of hard work ah!
No comments:
Post a Comment