Thursday, March 31, 2011

Hackers debut Hell

Answer a few questions:

[Extract] - Chapter protagonist recent forum on the United States to download pictures. Results of operations for too long to be administrators found it! Since the protagonists know PHP, then I think it will always acquisition system PHP, PHP for web development, it is very simple, but speed is the fastest, so the protagonist can use PHP to capture images capture a few seconds Pictures can be downloaded over. Picture a few times too many words to multisection! ~ ~ Blue giant fast speed ¢ You Yu

- First, prepare acquisition system takes time; second, it was a limited forum, and can not go directly to that collection. By the speed of download speed, the former giant slow speed.

- Another is the book or not to add some fantasy elements (such as martial arts, and superb medical skills, etc.) is still under consideration, in fact, the original plan was to join, but there are books Friends of the opposition, I do not how a good decision. My idea is, the protagonist should be a little self-protection skills.

- Let me say plot, this book is definitely a love scene, although I do not how good, but individuals still want to write some. Most of the lack of real feelings of hackers, I do not want to born again after the main character is like this. In addition, some commercial plot description, after all, need to make money.

=========================

A Pentagon office.

Seven or eight people sitting in the office twenty-year-old boys and a middle-aged men, they now operate all rapture in front of the luxury of their own computer. The office had no one to speak, very lively, it is their quick click of the keyboard, like the rain and jade plate, one after another.

"Shit!" A thin body shape, face smallpox, wore a chicken coop roots of the American guy some anger out of curse, the mouth has been chewing gum, his eyes still staring at their own 19-inch LCD display, said : "leader, the target is lost, he has found himself being followed ... ... What a coward, even the chickens are disconnected from the network connection! to give a little time, I will be able to catch him!" This guy not only body lean, such as monkeys, the sound is difficult to hear.

Then, in an office with other staff have also reported their own situation, the target has been completely missing. From our eyes can see, they respect the opponents is another fear, along with a trace admit defeat.

Yes ah, these young people are able to casually points out a major Internet companies gripped the world's people, usually on a mission, which one is not easy to get? Thought this is the same, we each division of labor, according to an intruder slowly traces of deeper investigation, no one thought about to reach the finish line to a big reversal of the situation, as if standing in the rain, the other scour marks have those erased, so that they speed the elite group of American hackers do nothing.

Shouhou then faded sound, a voice strange air and said: "Sri Lanka and more, do not blow, and alone, you can catch him? Really is not an ordinary thick skinned!" The speaker was a guy wearing gold-rimmed glasses , has a straight and a Junlian polite as pie, but the face, and this is his style completely different from that outfit. Hair is explosive, do not know is that for too long, or find someone deliberately did not wash your hair done shape, color, dyed red and green. The clothing worn is also very stylish, flashing silver ornaments hung on her body, lower body riddled wearing a pair of jeans.

Sri Lanka is more stylish glasses Shouhou say this, smallpox face up to the red, concave convex to concave and convex and more obvious, he angrily said: "Of course I can catch him! Either overconfident rookie Jack was a waste a lot of time, I'd kick him out! "

"Oh? Is it? That have just broken a chicken who have spent so long?"

"You ... ... you is not the same!"

Stylish glasses Liangshouyitan, shrugged looking through the eyes and said: "I can not boast to catch him in some thick-skinned."

Sri Lanka is more than most people say he hated cheeky, often heard this, he thought that his face layers of smallpox, see each other again and again for their personal attacks, he could not help, it is necessary jump hands Zouren.

"Martin, Adams and more, all the less two!" A deep voice sounded like two fighting cocks at once quiet.

Let the two of them convinced their natural leader. Head of about thirty years old, some fat body slightly, due to little contact with the sun, his face pale almost certain to such a seemingly ordinary middle-aged man, the whole office but a group of highly skilled young and fit American guy managed instill obedience. If the presence of Xu Yi at the moment, he will be jumped and shouted "Idol Idol ... ... ... ..." Yes, this man was the spiritual leader of the world of hackers, who screw around with the U.S. FBI around, was arrested last year of hell hacker Kevin **** g (where mosaic processing, the novel completely fictitious and any similarity is purely coincidental, Kevin's Fans Do not call me..)

Hackers do not need politics, but politics often find the hacker.

Do not know Kevin as the idol in the world of hackers have found freedom fighters past, is now sitting in the Pentagon would feel for the FBI service.

Kevin has not stopped the hands, told: "This is indeed very powerful opponents, we have broken four chickens, one of their security is better than one. I have found the IP address of the fifth station, exactly somewhere in California IP. I guess the other side and then no more than five chicken carefully. Martin, you tune a few people from the action group, to put the machine to move back to. "

"Understood, head." Martin, Kevin was obtained from the IP immediately after the start query the full address of that computer.

After Kevin finished, her eyes still did not leave the monitor, he according to the log, found the pictures downloaded and saved to that computer, but to his surprise he found no trace of those pictures. Is this computer just transfer? Kevin are confused, where to download the pictures in the end go? Have reached that person's machine yet? Kevin once again that computer will be detailed in the paper filter again, and did not find a very large folder.

He moved the mouse pointer to the last D drive called "new" folder at the top, this time a system pop-up bubble boxes "FileFolderisempty (folder is empty)," Kevin customary to double a little, but pop up a warning box with a red cross on "... ... not by reference to the location of a ... ... please check to confirm that the correct link for this offer ... ...."

Warning sound "Om" to cry, and the thought of Kevin woke up, he first saw the balloon was surprised a moment, so see also relieved after warning content, that this is a small windows system bug, the bug to delete a folder, as sometimes can not afford, and so was able to reboot to delete the truth is the same. He pressed a button "DELETE" button, and sure enough, as he expected, the system also pop up a warning box "system can not delete file: Can not read source file or disk." Kevin talking about the bug of Microsoft's operating system more than the same time, gave up on Find pictures, disconnected, and that machine's connection. He did not notice the size of this 2G D disk space has run more than one hundred megabytes do not know where to go.

Half an hour later, an intruder secretly connected again, just focus on the Kevin that computer. I saw the character interface, run a copy command with a batch cycle, and then run a batch download with a circular order, intermittently sustained a total of more than two hours later, disconnected, and all they have responded quiet, the only change is that the name "new" folder was gone, and D which lost more than a hundred megabytes disk space are unconsciously restored.

No comments:

Post a Comment