ghost hacker
34 The confrontation in class

young gene

Settings
ScrollingScrolling

Seeing that no one answered, Professor Brown was suddenly discouraged. He had talked so much excitedly, but it seemed that it was all for nothing. His mood suddenly plummeted, and he said sternly,"Is it module 7450?"

Someone mustered up the courage and timidly replied,"It should be…it should be!"

"It's a ghost head. All you people know is to blindly make a fuss about wanting to enter some network engineering. You even applied to the school. So what if the school approved it!”Professor Blanc slammed the table in excitement.""Do you understand now? Do any of you understand?"

No one dared to speak. Professor Brown pointed at the university student in front of Danny and said,""You, stand up and answer this question. Which one is the K623 module, J82 module, T284 module, or P847 module?”

The university student stood up with his head down, not daring to look at Professor Blanc in the eye. At this awkward moment, a small voice came from behind him," It's T284.""It's a T284!"

Professor Blanc was stunned. He had been fooled by this student. He could only suppress his anger and continue to speak. The university student who was called up took a deep breath and sat down. He turned his head to look at the person who saved his life. He was stunned because he saw a child with a smile on his face. He was actually listening to a child's nonsense. Fortunately, he had guessed correctly. Otherwise, he would have been in trouble.

The following content was even more profound. Danny looked behind him. At this time, Polo and the others were already reading extra-cursory novels.

Before they knew it, half of the class had passed. The students below were already listless, while Professor Blanc was still talking non-stop. At this time, he mentioned a concept topic."Regarding computer security, computer security experts have pointed out that managing the access password of the data channel is equivalent to controlling everything!”

Danny couldn't help but mutter,""What should we do if the data packet is intercepted?”

Professor Blanc was stunned and looked in the direction of the voice. Danny was too short, so Professor Blanc only saw the university student who was just woken up by him. This university student's question made him feel troubled. This was a gap in recent computer research. He didn't expect the student to ask this question so coincidentally.

Pushing his glasses up his nose bridge, he analyzed it with his deep professional knowledge and coughed lightly."Maybe it can be solved by encryption!”

Professor Brown knew that he was just being perfunctory, but these students wouldn't know so much, so he changed the topic and cleared his throat."After passing the password verification of the data channel, you can access the computer. This is the method commonly used by computers at present. The data channel of a computer is like a sieve, composed of various opened and unopened ports. The commonly used ports are 1080, 4080, etc., which correspond to the commonly used communication services of computers such as secure and ftp. However, the ones used in scientific research and national defense are much more complicated. It was all about network security!”

"What if we exploit a loophole in the system?”

Looking in the direction of the voice, Professor Brown frowned. It seemed that this student was deliberately making a fuss. Professor Brown said angrily,"There are no loopholes in the system. This is common knowledge in the computing world. You won't understand even if I tell you!”

When the university student realized that Professor Blanc was talking to him, he waved his hands in panic and said,""No, no, Professor Brown, I didn't say that. It was him!”

With that, he moved to the right and Danny appeared in front of Professor Brown. The whole classroom became dead silent, and the air seemed to be frozen. More than 300 pairs of eyes were focused on Danny. Paolo was so shocked that his mouth was wide open, and his extra-cursory book fell from his hand.

The professor was so quiet that even a pin drop could be heard. Danny came back to his senses and realized that he was being watched by everyone. With his personality, he should have been frightened by this time. However, when things reached an extreme, the opposite would happen. Sometimes, when he was dead, he would be more relaxed. At this moment, Danny was very calm. He stood up and retorted," Your perspective is wrong. Let's not talk about the complexity of the software and hardware of the computer. The first generation of computers was once as big as a few rooms. Although the computers nowadays have become smaller due to integration technology, it doesn't mean that their complexity has decreased. On the contrary, with the rapid development of computers, their complexity has increased exponentially. Under such a complicated combination of software and hardware, it is inevitable that there will be defects. Most of these defects are harmless. However, there would definitely be some hidden flaws!”

Everyone in the classroom looked as if they were looking at a prehistoric creature. Their expressions were indescribable. The old professor took off his glasses and rubbed his eyes to confirm the child in front of him. This was the first time he heard such a new concept. It almost broke the traditional computer. What a terrifying child. He began to wonder if he was dreaming. He did not know why he was so serious with the child. He retorted,"This is just a theory. Theory and reality are not always linked. At least, there are no examples of loopholes now.”

Danny said with certainty,"" The facts can prove everything. The email system has a very large loophole. As we all know, the data of the email system does not need to be verified by the password of the data port. If the data is disguised as email data, it will pass. This is just a normal loophole. There are many flaws in the hardware design, the integration between the hardware and software, and the weak control of the software. The designer cannot take all of them into account and find an absolute loophole. You can easily hack into the computer."

The university students below were about to break down. If this was called a child, then could they also be called university students?

He immediately had the urge to jump off a building.

Professor Blanc was shocked and embarrassed. He was shocked that there was such a child in the world. He had lived for most of his life and had never even thought about it, let alone seen it. He was embarrassed that as a professor, he couldn't deal with a kid. He gritted his teeth and said, Do you think you've hacked into any important systems? It's not like you've experienced a real computer defense system. Don't take this so lightly. It's impossible to hack into a high-level defense system.

Danny said seriously," Although I haven't come into contact with much in this area, I think that all computers on the network can be hacked. Just like you said, a computer without a data channel is meaningless to be connected to the network. Since there is data that can be accessed, it means that there must be a place to enter. Based on this alone, we can be sure that all computers on the network can be hacked. This is purely a technical problem!”

This book is provided by FunNovel Novel Book | Fan Fiction Novel [Beautiful Free Novel Book]

Last Next Contents
Bookshelf ADD Settings
Reviews Add a review
Chapter loading