Bedroom.
7 PM. It was still early.
Zhang Ye drew the curtains and placed the computer on the table. After testing the internet connection and the mouse, he moved his arms and was ready to take action. First of all, although he had eaten two types of computer skill experience books, he had never used them before. He did not know if he could do it, nor did he know if the experience books he had eaten were enough for him to use his skills, or how much strength he could use. There was never enough of such skill books. No matter how many he ate, he would gain experience. The more he ate, the greater his ability. If he ate too few skill books, then he would only be able to scratch the surface. He had obtained 11 experience books in the Lottery. It was not a small number, but to be safe, Zhang Ye needed to have an estimate first.
On the internet, Zhang Ye first found a foreign website. Then, based on his computer experience from his previous world and the network technology skill books in his mind, he quickly got to work. He found a component for the web browser. This thing was called Go2-proxy in Zhang Ye's previous world's Firefox browser. Although the name was different here and the browser was different, the meaning was the same. Adding the component and operating it, it took Zhang Ye about two minutes to successfully open the foreign website. This was actually the simplest form of proxy.
Hot pictures popped up one after another!
Alluring videos of foreign beauties appeared in his line of sight!
Zhang Ye looked at the excellent foreign website that he had opened with his excellent skills. He could not help but exclaim in his heart, "What a godly tool". Although it was not difficult to operate, Zhang Ye knew that he did not have such skills in the past!
The warm up was over!
His confidence increased greatly!
He began to browse some specialized computer websites. He studied this world's computer development, technology, software, etc. After spending an entire night, it was only until midnight when all the lights in the residential area had been switched off that Zhang Ye rubbed his eyes and took a deep breath. He realized that this world's computer system, hardware, and software were no different from his world's. The principles were the same. The only difference was the names. For example, programming languages existed in this world. Even the typing methods were the same. For example, operating systems that were not called Microsoft but were similar to Microsoft existed in this world. Even the commands were the same. After comparing for a long time, Zhang Ye's preliminary conclusion was that this world's systems and hardware were slightly inferior to his previous world's technology by several years. However, a portion of the technology, such as server firewalls and anti-virus software, were slightly better than his previous world's. Hence, the concept of a "national hacker" from his previous world was not that obvious in this world. This was because this world's security technology was very advanced. Just downloading a firewall would basically block 99% of non-professionals. Even a professional hacker might not be able to do so, so very few people would be foolish enough to not install protection software and anti-virus software. Hence, it was not really a "national hacker".
This created a situation. There were very few hackers in this world, and they were not as rampant as Zhang Ye's world. But on the other hand, any hacker with a bit of fame would be quite skilled. Those hackers who were at the top of the pyramid could already do anything they wanted in the online world.
This was the difference between the two worlds.
This was a good thing as it made it convenient for Zhang Ye to make use of the experience from his previous world. Even if there were some differences, Zhang Ye had eaten the Network Technology and Programming Skill Books before. The experience that these skill books brought to Zhang Ye was not only limited to the technology from his previous world, but also the application of technology in this world. On this point, Zhang Ye did not need to worry about it anymore. However, network security was really a headache for him. Was he still not addicted to hacking? Was he going to be blocked by a fake firewall?
He had to do it anyway!
Li Tao could not escape!
Zhang Ye had already made up his mind, so he no longer hesitated. He went out to the bathroom and saw that Dong Shanshan's door was dark. She was clearly asleep, so he tiptoed back!
Let's begin!
Let's try it out!
This world's hacking software was also open for download. However, most of the software did not provide the source code, so it was not really open. It was not like Zhang Ye's previous world. Many hackers in his world paid attention to the open source code. They felt that it was a rule and honor. The two worlds had a slightly different philosophy.
Zhang Ye began to download the small software. This was a hacker's knife. Even the cleverest housewife can't cook without rice. Without this, not only would he not be able to hack into a computer, he might not even be able to find the IP address.
Small command plugin.
Remote control trojan horse.
Trace cleaning software.
And so on. Zhang Ye downloaded it all.
Then he began to do some simple tests and experiments on this world's software and trojan horses. The results were as he expected. It was just some normal hacking software. You could say that it was useless? Not really. The programs were all normal and effective programs. But you could say that it was useful? These kinds of hacking software that could be easily downloaded from the internet would not have much of an effect. It might not even be able to get past the firewall. Especially with this world's excellent security technology, the chances of it being treated as malicious code were too high. The real masterpieces of hacking software were mostly created by the hackers themselves. Not to mention sharing it with the netizens, they might not even share it with other hacker friends. It was considered a personal secret.
There was another reason why there was such a huge difference between normal and masterpieces of hacking software. It was also related to the quality of the system vulnerabilities that the hackers had in their hands. Normal hacking software had long been thoroughly researched by others. Be it the system developer or the internet security company, they would probably have already patched the system from which loophole they would use. Unless it was a pirated system that had not been updated, if the original operating system had been patched normally, the loophole would have been sealed. The hacking software would then lose most of its effectiveness. It could not be said that it was completely useless, but its attack power would definitely be greatly reduced. But masterpieces of hacking software were different. Its method of infiltration was usually a loophole that only the software creator knew about. Other than him, no one else would discover it, and no one would know about it. The system developer could not patch it even if they wanted to. They could not find it, nor did they know the other party's method of infiltration. This kind of secrecy was the reason why masterpieces of hacking software were so lethal. They were basically invincible. No one could stop them!
However, when Zhang Ye saw a post, it mentioned that there had only been about ten or so instances of master-level hacking software in this world. Of course, these ten or so instances had already been discovered and patched, so there was no longer any harm to it. Although there were definitely a lot of them that had not been discovered, it showed the preciousness of this kind of hacking software. It was equivalent to a martial arts master's weapon. A master-level software or a trojan horse was a godly weapon. It was too precious and too rare. This was because to grasp a loophole that even the system developer did not know about was already very difficult. This world was much more reliable than the internet security companies of Zhang Ye's previous world. Well, to find the loophole, and then create a flawless hacking software or trojan horse program based on the nature of the loophole, was even more difficult than ascending to the heavens.
Hence, this kind of software was probably a legend. Zhang Ye did not think too much about it. What he needed to do now was to hack into the SARFT's network and find Li Tao's computer.
You've already exceeded your reading limit for today. If you want to read more, please log in.
Login
Select text and click 'Report' to let us know about any bad translation.