Chapter 1110: Broiler
-
Rebirth of the Military Industrial Overlord
- Qian's Feather
- 1280 characters
- 2021-01-30 08:03:06
McGregor can't do the unknown hacker, but it's easy to deal with the FBI's virtual network security defense measures-the FBI's network system all adopts the network equipment structure produced by Cisco, and its main terminals are all produced by HP. Cheap personal computers, and HP’s latest personal computers, all adopt the complete set of software and hardware solutions introduced by the "Matrix" laboratory-MIPS architecture, "iDoor" operating system, these things for McGregor, simply You can play with your eyes closed.
Besides, it is still in 1986, and even the Internet has not officially announced its birth, but in its embryonic form, that is, ARPAnet, NSFne, the two major public networks exist and silently evolve, whether it is a computer virus or a network attack. They are still very new things, and almost no one really pays attention.
Therefore, McGregor easily hacked into the FBI's network-Tan Zhenhua helped him pinch a watch behind him. Starting from his finger tapping the first letter on the computer keyboard, Mr. Mike only took 1 point 26 In seconds, he completed the first step. He obtained full control of an FBI staff computer and began to use this computer to search the database of the largest law enforcement agency in the United States.
Well, Mr. Mike has to thank the unknown hacker for helping him find many system vulnerabilities, which made his invasion so simple and easy.
"Will someone find out if he did this?" Guo Zhaode asked with some guilty conscience. He was unaware that he was committing crimes all the time dealing with legal provisions.
"It's okay. I have blocked our IP address and used multiple fake addresses to disguise it. Unless there is a hacker with a level of expertise among them, it is impossible to discover our existence, but the owner of the computer will find out. His computer suddenly slowed down, but I think he might think that his computer is malfunctioning, right? And I chose this computer to be a "broiler" just now, but I found that it has been dormant for a long time. , Um, I think his owner shouldn't be next to the computer now, but he just forgot to turn off the computer when he left-but if there are such masters in the FBI, their network security measures will not be so bad, well, they Almost nothing was done, just a few simple passwords were set. With the support of our central server's computing power, it only takes 10 seconds to decipher those passwords."
While talking, McGregor continued to tap on the keyboard at an extremely fast speed. Soon, he broke into the first target subsystem, the FBI's wanted criminals database.
"Wow, it's amazing!" After hurriedly browsing the information of several wanted criminals, he couldn't help but exclaimed: "Look at what these scumbags did? The Texas Chainsaw Murder, Hatchet Serial killer, oh my god, this one is the most exciting, this guy can eat people!"
"It's so good. I thought that American horror movies can be made so well because the screenwriter's brains are so big. It turns out that these are real things!" Guo Zhaode looked at the photos of the crime scene and the description of the case on the screen. Tao.
"It's okay, you have to be interested. Turn around and ask Mike to pack it and download it for you. When you go home at night, you can watch it slowly when you are all alone. It is guaranteed to be more enjoyable than watching movies-Oh, Zhaode, you are not planning Ask a little girl to watch these things together? This is a good idea, but we still have business to do now, so we have to hurry up!" Although Tan Zhenhua also wants to see the dark side of Liberty Bright Milliken, as a leader, he still has It is necessary to remind that business matters.
Mike closed the folder labeled "Extremely Dangerous Criminals", and after browsing the directory, he clicked on another folder labeled "New Type of Criminal Behavior", and quickly discovered that here, right? It is the target he is looking for.
Because he didn't know how much time he could control this computer, he scanned the index directory and opened a few files and confirmed that this folder was likely to have what he wanted, and immediately started downloading the document. Of course, the "Extremely Dangerous Criminals" folder full of blood and perversion was also handed over by him. When the download progress started to read, he planted a small piece of code on this "broiler" to facilitate his future luck from time to time-the reason is of course high-sounding, he declared If there are no gains from the information found this time, you will need to use this computer next time, so it will be more convenient to open the back door in advance.
However, Tan Zhenhua believes that as an excellent programmer and a senior homeboy, McGregor’s voyeurism is his genetic instinct hidden in his genes. Now that it has been stimulated, it is true that it will develop in the future. It's hard to say.
Thanks to the tortoise speed of the network transmission at this time, the download progress bar is moving firmly and slowly, and everyone can't help but worry about whether this controlled computer will be discovered during this period of time, which makes this operation impossible. It worked, but fortunately, after more than ten minutes of hard work, with a clear beep, the progress bar finally climbed to the top. Everyone was relieved and McGregor quickly cleaned the battlefield. All traces of this illegal login were removed, and the relevant traces of the local computer used to perform this operation were also removed very carefully. The downloaded file was transferred to an MO disc-this Taiwan equipment also has to thank Sony CEO Akio Morita for his generous sponsorship.
The CD technology jointly promoted by Sony and Philips was naturally applied to data storage after the first generation of CDaudio was successful and gradually expelled vinyl records and cassettes from the music distribution market, representing the first generation of optical storage. The Red Book standard of the standard CD-DA CD-ROM was also officially evolved into the Yellow Book standard of CD-ROM in 1983, which stipulated the cyclic redundancy detection code CRC and error correction Reed Solomon (ReedSolomon) code. The Yellow Book also established the physical structure of the CD-ROM, and in order to make it fully compatible on computers, in 1985 it formulated the CD-ROM file system standard, namely ISO9660.
Of course, since 1985 was the first year of the "Midoor" alliance, and Sony was one of the first members to join the partnership, this ISO9660 standard almost completely copied the file system standard approved by the "Midoor" alliance.
At the beginning of this year, Sony developed a rewritable magneto-opticaldisc based on the Kerr Effect (KerrEffect), or MO for short, using temperature-sensitive magnetic materials. With special reading equipment, this MO disc is currently It has been possible to store 128MB of data on a standard 3.5-inch optical disk, but it is still in the experimental stage and has not been officially put on the market for commercial use-how can such a good "matrix" laboratory let it go? Tan Zhenhua used the name of helping with the test to get several test prototypes from Akio Morita. Of course Akio Morita was willing to do this, because SGI has already scheduled this equipment to become the standard configuration of the graphics workstation when it matures. Included in its accessories list.
McGregor finally completed his removal of traces, and now it is time to read the contents of this MO disc carefully.
"Let's see what surprises the FBI will bring us." Tan Zhenhua smiled and said, "I'm really looking forward to it!"