The day ended quickly, lying on the big bed in Western Jiujiang Hotel, Ye Feng opened his luggage.
Inside, there were a series of books on computer hacking techniques, ranging from beginner to advanced.
Among them were Ghost in the Wires: My Adventurers is the World's Most Wanted Hacker, Rtdm: Red Team Field Manual, Hacking: The Art of Explosion, and many more.
However, Ye Feng first took out a book called " The Secret of Radio Security ".
This book mainly focused on the field of wireless communication security. It discussed the security issues of various wireless communication systems in the order of distance.
The protocol analysis combined with the attack and defense examples, and the security attack and defense techniques were introduced in depth.
The case topics included the Internet of Things, the Internet of Cars, mobile communications, satellite navigation, and related software and hardware security.
The reason why Ye Feng read this book was mainly to master the technology of obtaining information from mobile phones in the shortest time possible.
In this information age, computer hacking was becoming more and more important.
Now that everyone had a smartphone, hacking skills related to mobile phones were of utmost importance.
Especially after this video incident, it strengthened Ye Feng's determination to learn hacking skills!
This time, he was prepared in advance, so he could counterattack quickly.
But what if he couldn't prepare in advance or something unexpected happened?
At this time, top-notch hacking skills could help Ye Feng to quickly trace back to the source, find out the mastermind behind the scenes, or find out the truth of the matter.
The Internet had memories. As long as you left a trace on the Internet, no one could escape the pursuit of the Internet.
For the rest of the time, Ye Feng was training in the training team during the day, and at night, he was engrossed in reading books on hacking techniques in Western Jiujiang Hotel.
And because of Ye Feng's video, there were more and more voices on the internet about re-establishing the international student policy.
Of course, this was a long-winded matter, and there would not be a result so quickly.
However, a hacker revealed the fact that two international students had taken drugs.
This time, the universities where the two international students were from did not dare to cover up for them anymore and directly expelled them.
If they were handed over to the judicial authorities, the only thing waiting for the two international students would be forced expulsion.
Ye Feng had also seen this news, but his attention was not on the two of them, he wanted to know who uploaded the video that was obviously edited with malicious intent.
Find him, and then
Ye Feng's hacking skills improved very quickly, he even bought a computer that did not have any information stored on it, it was used to practice his hacking skills.
In the beginning, he could barely hack into the backstage of some nameless small forums and modify some unimportant privileges.
Gradually, he could hack into some unscrupulous web-based games and farm some equipment such as ingots.
For example, 999 with a single slash and equipment everywhere.
Later on, he could quietly hack into the backstage of some famous websites and check their internal information.
Of course, Ye Feng did not do anything destructive, he knew about illegal things, it was not that he did not dare to, but he could not, he needed to maintain his bottom line.
At the very least, Ye Feng did not want to cause destruction and destruction for no reason.
Ten days later, after a period of crazy learning, Ye Feng's computer skills finally improved.
He knew that it was time to find the mastermind.
In modern society, almost everyone carried their phones with them. Perhaps many people felt that the probability of getting infected on their phones was not as high as on their computers?
In fact, that was not the case. In this era, many hackers no longer cared about using low-end viruses to control the system.
Nowadays, hackers were smarter. They would openly enter your phone through something called an app. They would openly monitor your every word and action and know everything about you.
And through the guidance of big data, it will have a subtle influence on your life.
Ye Feng started to search for the source of the defamation video, it was like looking for a needle in a haystack for ordinary people.
But now, Ye Feng only needed to set up a Mini programs to find all the people who posted this video on the internet.
Then, Ye Feng found the account that posted the video first.
The IP address of the account showed that it was in Beijing, so this person was most likely a witness at the scene that night.
Through the videos and pictures that were uploaded on this account, Ye Feng soon found out the reason, the owner of this account was a Korean.
Alright, as expected, only the disgusting Koreans would deliberately smear and distort the truth.
Ye Feng's eyes turned cold, after searching for the IP address's message history, he soon found the phone number left behind by the other party on a dating website.
He looked at the time of the message. It was the latest.
Okay, this was easy, Ye Feng hacked into the website's background and sent a message to the other party.
On the surface, this text message seemed to be a matching message sent by the website, but in fact, as long as the other party clicked on the text message, it would instantly download a trojan-horse on the other party's mobile phone.
After that, all the information on his phone would be exposed, and as long as the camera was not broken or blocked, Ye Feng could even monitor this person's every move.
Ye Feng did not have to wait for too long, the Mini programs was successfully downloaded by the other party.
Ye Feng smiled, he did not alert the other party, he directly checked the videos and pictures on the other party's phone.
In the end, when he saw the other videos on his phone, he felt terrible!
This book is provided by FunNovel Novel Book | Fan Fiction Novel [Beautiful Free Novel Book]