Chapter 678

"That's interesting..." He murmured to himself.

She leaned on the bed with her left arm hanging around her neck and typing with her right hand. She looked clumsy.

The blonde landlady and the bartender's brother often come in to see her. Seeing her typing on her laptop with one hand, they all feel very interesting. They try to persuade her to stop typing and go straight to the movies. Thinking about it, she says with a smile, "I'll watch it later. Now I'm browsing the forum and watching others fight."

She said so, and the boss's wife and the bartender's brother stopped persuading.

After they left, she remembered the law she had just discovered.

What kind of network can cause some news to appear and some news not to appear?

This question is too easy to think about. ——Shielding.

Someone set up a keyword mask on her computer network.

As a result, all the web pages with screened keywords are filtered out.

This practice is very simple.

Just like the ad block software that everyone uses to filter advertising plug-ins and filter certain websites, it is almost the same principle.

Is that right?

I think I should try.

Bold hypothesis, careful proof.

Such a network shielding, for others may be an insurmountable gap, but not for the people who care about it.

In the past few years, she studied network hacking knowledge with Zhao Liangze, one of the top five hackers in blue star, in the special operations department.

Zhao Liangze laid a very solid foundation for her, because he taught her from the most basic DOS program, which is now widely used Windows operating system grandmothers.

As a really powerful hacker, you can't just use hacker software.

The real hackers are software engineers who are very good at programming.

In their eyes, the whole network seems to have its own logic and rules just like the flashing green digital symbols and lines in the matrix.

Thinking of staring at the laptop in front of him, he used one hand to input several DOS instructions on the laptop, and quietly crossed the monitoring program of the laptop and sent several Ping signals to the network world outside the system.

Soon, most of the feedback was complete and rapid, but a few were intercepted.

The intercepted signals were when she tried to Ping the webpage signals related to he Zhichu or he counsel.

So it is

The owner's wife here, is she with ARS?

Someone really set a shielding system for her login network, as if she had been in a LAN, all the information in the LAN was filtered before it was put in.

But shielding? Building walls?

Trying to lock a blue star top computer hacker in the network fence, are you sure?

The heart is also very bad taste.

If you just want to describe her mood, it may be like the old movie "the Trueman show", when the protagonist first found himself living in a studio since childhood.

However, the protagonist was so excited that he was about to collapse at that time. However, after more than a month's wandering, his bearing capacity was much higher.

She was not so excited that she broke down. She was calm enough to call herself a fool.

She felt that her escape at all costs a few days ago was just too much.

What are her strengths? Of course, it's her intelligence!

It's not her physical strength.

It's really funny. I didn't take a good shortcut. I tried every means to escape and hurt myself

Bang!

He slapped himself in the face.

To remember this lesson, with their own shortcomings with others' strengths, called silly fork.

She is a little cruel.

When the bartender brought her dinner in the evening, he saw five clear finger marks on her face, and he was surprised to see his eyes and asked, "who hit you?"

In consideration of this, he said, "I'm sorry to say that

I am sorry to say that it was my own fight, so I just lowered my head and said vaguely, "don't ask me. In short, I'm not good..."

Goblet boy:.... "

Quietly turned around and went out.

And then I heard the little brother of the wine cup shouting German with people outside the door

After eating two mouthfuls of bread, he went to wash himself. Then he opened the door and said to the landlady and the bartender, "I'll go to bed after a while. Good night."

That means she's going to lock the door.

The landlady glared at the bartender's younger brother, turned her head and said with a smile, "well, you look bad. Go to bed early and get up early tomorrow."Thinking of the point nodded, "thank you. I'll be able to get out of here earlier if I get better. I won't bother you too long. "

"Don't say that. I'm glad you're here. You can trouble as long as you want. Don't be embarrassed. " The landlady quickly pacifies her and sends her in.

He nodded at her, closed the door in front of her, and then locked it.

After the anti lock, he sat on the bed and looked at the four corners of the room.

If her network has been monitored, this room will be monitored, but she does not know where the camera is installed.

She also does not have the tools that special operations departments often use to check infrared cameras.

However, if the other party installed a camera here, it must be monitoring through the network.

As long as it is on the Internet, there are ways to think about it.

She turned her eyes and went to bed with her laptop in her arms. Then she pulled the quilt over and covered herself from head to toe.

In this way, even if there is a camera in this room, those people can only see a quilt like a cocoon from the surveillance screen, and can't see what she is doing

Thinking of hiding in the black quilt, slightly hook the corner of the lip, will hang the left arm from the bandage on the neck, and then began to flip ten fingers, typing quickly.

The other person is monitoring her computer, so no matter what she's doing, in theory, the other person can see it.

Taking advantage of the opportunity of playing Blu ray movies on the computer, I entered DOS program and quickly made a series of instructions to make a zombie image virtual hard disk for the computer.

This zombie image virtual hard disk is not in the computer's hard disk, but is built on the network and simulated with the virtual memory of the computer.

This laptop model is very old, and the memory is not big, but also dug a large block from the memory to build a zombie image virtual hard disk. The speed of the whole computer was slowed down.

Not only is her side slow, but the other side's monitoring of her side will also slow down.

According to the different network bandwidth, the other party's monitoring of her computer will appear from a minute to infinite delay.

That is to say, when the lag time is long enough, the other party's monitoring will be quietly frozen.

What appears on the monitor screen is always the picture before freezing. In fact, it is impossible to effectively monitor her.

As you often see on TV, in order to get rid of the monitoring camera in the elevator, someone can paste a picture of the elevator empty there. Then the computer screen in the monitoring room shows a picture that will never change. You think there is no one going in and out of the elevator. In fact, there are a group of people holding a party, which you don't know.

She patiently expanded the virtual hard disk of her zombie image step by step, eating into the bandwidth of the network. She did not stop until the Blu ray movies on her side began to appear discontinuous sounds and images.

The size of the virtual hard disk should have reached a critical point, and she can't continue to expand.

After waiting for a few seconds, the computer runs smoothly and is sure that the other party's monitoring is invalid. He turns off the Blu ray movie and starts to program crazily with the original DOS program.

The other party wants to use this shielded LAN to deceive her and cut off her contact with the outside world, so let them taste the power of "taking the other's way, giving back to the other side"!

The efficiency of thinking into the programming state is very high.

She spent a whole night writing a very effective and targeted application program. According to the function of the program, she gave it the name of "swallower. Exe".

In the quilt for almost a night, to the dawn of the day to open the quilt to climb out.

I will continue to tie my left hand, and I will go to sleep after washing to make up for the night's sleep.

Because she was sure someone was monitoring her computer, she planned to do it at night.

Night is the most sleepy time for ordinary people. No matter how much preparation they make, they can't keep staring at the invariable images on the computer all the time.

After a day's sleep, I woke up at dinner time.

Happily, I had dinner with the landlady and the bartender, and then took a bath.

After washing, she went back to her room, opened her laptop and opened her own small program.

This small program almost in an instant to seize 99% of the network bandwidth, while freezing the monitoring page, bypassing the shielding keywords.

I don't have to hide in the quilt.

She swaggered back on her bed and began browsing the web.

This time, she searched for "Li Haiqing case" and found many websites with the name of "lawyer he" or "he Zhichu".

It's not like yesterday, as if it didn't exist in this world at all.

Now that the web page with the name "he Zhichu" appears, it means that she has at least bypassed a key shielding word.The first person to search for "he Zhichu" directly on the Internet is he Zhichu's official account set up on Germany's largest social media.

When you see that the account is obviously the head picture of your back photo, and the note on the account says "wait for you to go home..." He bit his lower lip tightly, and his heart was sour and astringent.

This is the first change. It's still three shifts today!

To remind you of the recommended vote Oh!

The second watch is at 1:00 p.m. and the monthly ticket is 1200 plus shifts.

The third watch at 7 p.m.

Come on, please don't carelessly vote for the guaranteed monthly ticket!

PS: if you can't see when you arrive, you can refresh the directory several times, or exit the app program and refresh again.

O(∩_ ∩)O~。

www.novelhold.com , the fastest update of the webnovel!