The strange thing was that the system only flashed once and there was no response? In his confusion, Danny looked at it in detail and found that after trying three numbers, the host refused to access it. It seemed that this was not as simple as he thought. After a few attempts, the host computer refused to give it a try. He slowly analyzed it. If a computer on the network was not allowed to be accessed after being invaded by an illegal intruder, wouldn't regular users be unable to log in?
In theory, the access denial could not be so rigid. If the imposter tried three times, the original user would not be able to access it. How could that be justified? This restriction should only be relative to one address. For example, if a computer tried three times, it would not be allowed to access the computer again within the day. In other words, a computer only had three chances.
" What should I do?" Danny began to think hard. Even if he used all the computers in the computer room and tried three times on each computer, he could only try it a hundred times. This hundred times was far from the million times he needed to crack it.
After thinking for a while, Danny came up with a solution, which was to keep changing the computer address, changing it every three times. Although it would greatly affect the cracking speed, this was the only way at the moment.
Thinking of this, Danny immediately pulled out the source program and began to modify it. He added a program that changed the computer address every three times.
He immediately put it into use, and the brute force cracking program began to work. This process was not easy. Various methods appeared on the host to limit the intrusion. Danny also tried every means to resolve it. Just like that, the game ended, but the host was still not hacked.
When Mr. Gander announced the end of today's class, Danny had to leave unhappily. He was really unwilling. When he returned to the classroom, he still couldn't get rid of the computer that he failed to hack into.
After that, he flipped through books about the Internet like crazy, but he couldn't find any books about hacking techniques. He had no choice but to figure it out himself.
After a deeper study of network technology, Danny began to write programs crazily. The last time he was online, he didn't have enough time, so the completed program was very simple. Now that he was back, he had plenty of time. He began to write a grand program that was brilliant and quick. It combined the performance of the model of the computer and was designed to fit it with various functions and backup functions. He did various analysis and predictions on the defense system of the host. Put yourself in the position of a defender and imagine how to defend. Imagine what other defensive measures can be taken on top of the hardware of the host.
Just like that, Danny was researching and writing every day. He went home, went to class, and did not miss any breaks. He wrote these programs on paper and waited for the next time he went to the computer room to input them all into the computer.
Finally, the second week came. The computer class that he was looking forward to was here. Danny walked into the computer room with a homework book. On it was the essence of what he had written in the past week.
Since the students had experience with computers, they were no longer restricted from touching them. As soon as they sat down, they opened the computers in front of them familiarly. Danny went back to the computer in the corner. After sitting down, he couldn't wait to turn on the computer and quickly enter the operating system.
Mr. Gander's voice sounded from the podium."" Alright, what I'm going to teach you today is a brand new thing, the operating system. This is a platform for communication between humans and computers. Through this, you can control the computer in various ways. Now, I'll teach you some basic commands. The command to display the contents of the hard disk is..."
Thomas's voice rang out.”
Mr. Gander nodded in satisfaction and praised,""Not bad, not bad. You have a bright future. Everyone should learn from the class monitor!”
Under the gazes of the crowd, Thomas revealed a proud smile.
Mr. Gander smiled and patted Thomas on the shoulder.""Continue to work hard. At such a young age, you can master it to such a degree so quickly. With such talent and such drive, you will definitely become an outstanding computer expert in the future.”
Mr. Gander said excitedly to the class,"Did everyone see that? What is a genius? This is a genius.”
Then, he waved his hand and pointed out the window."Can you say that the old man sweeping the floor is a genius? It can't be!"
Outside the window, old man Bern walked past the computer room with a broom.
Then, he turned to Danny, who was working hard.""Look at him. Does Danny look like a genius? That's impossible. So, gold is gold. It will shine anywhere!”
Danny couldn't hear anything. He quickly called up the system's source program, opened the exercise book, and entered the program into the computer as quickly as possible. He modified the various functions, converted the internal code, and entered the latest program.
Half of the class had passed, and Danny's program had been mostly completed. In order to complete it in class, he had tried his best to make the program simple, but it was still very big. At this time, Mr. Gander had finished explaining the theory. Now, the students were allowed to practice by themselves. Just like before, Mr. Gander was beside Thomas, teaching him with all his heart. He even explained the following lessons to Thomas in advance.
No one disturbed him. Danny's program was progressing very quickly. When there was still half a class left, he had finished typing thousands of simplified programs. He debugged them and corrected a few mistakes.
When everything was done, Danny exhaled and wiped the sweat off his forehead. He looked up and saw that his classmates were busy with their own things. Mr. Gander was also teaching Thomas. Danny was secretly sweating. He was too engrossed in what was happening outside. If Mr. Gander came, he would not know.
Fortunately, there was nothing much to do now. Danny casually typed in a few commands to check the program he had painstakingly created. The results showed that everything was working normally.
Seeing that there was not much time left, Danny began to hack into the host. The carefully designed program was very comfortable to use. At this time, the host also made various anti-intrusion reactions. Danny had already expected these reactions. He adjusted the functions in his program and immediately resolved them.
It was time to attack. Danny entered a few commands and increased the cracking attack. The numbers on the screen flowed down like water. After a while, he still couldn't crack it. Danny realized that this should be a complex combination of letters and numbers. In this case, the complexity would increase exponentially.
Since that was the case, he turned on the backup function. Danny stopped hacking into the mainframe, and the program began to attack every computer in the computer room. As the saying goes, it is hard to guard against a thief in the house. These computers did not have any special defense measures. In an instant, these computers fell into Danny's control.
Danny smiled sinisterly and sent a program to each computer. This program was a branch of the main program, and its function was probably: Control them to attack the mainframe together!
This book comes from:m.funovel.com。