Chapter 865: awesome hacker

?Just last year, experts from West Germany came to East Germany to attend a conference. As a result, they were shocked by East Germany's network. They did not expect that East Germany's technology had developed so rapidly! East Germany's network is too powerful!

What makes them most enthusiastic is distributed computing. If there is no large computer, then a large number of microcomputers are networked to complete many difficult tasks! After seeing these applications, West German experts could not sit still, and immediately expressed their desire to import East German network technology.

Facing a friend's application, East Germany was of course embarrassed to refuse it. Therefore, a few days later, the West German government approved the cooperation project between the two sides. An optical fiber connected East Germany and West Germany. At the same time, a large number of The network equipment was installed in West Germany, and the universities in West Germany were also the first to access the network, and they soon felt the convenience.

At the same time, the government office system in West Germany is also connected to the network. Using the network, they can complete various tasks more conveniently, such as sending documents to subordinate units, and the matter is over in a few seconds. In the past, it was necessary to send a liaison It takes half a day for the staff to send the documents, and it is easy to miss!

When the Internet spread in West Germany, they felt the huge advantages of the Internet. As a result, even the Ministry of Defense could not hold back and connected to the Internet!

And at this point, there is clearly no talk of cybercrime!

Let alone cybercrime, in this era, there is no Internet, even the world-famous Kevin Mitnick has just hacked into the telephone network. Historically, now in 1983, he used a The computer in the university entered the ARPA network, the predecessor of the Internet, and entered the computer of the Pentagon in the United States through this network, and was sentenced to six months in the youth correctional center in California. The claim of cyber hackers has not officially begun.

However, now in the Soviet Union, the rapid development of computer network technology has finally begun to allow ordinary people to have access to computers, and since ancient times, young heroes have emerged.

At ten years old, isn't he still a little kid? However, when it comes to computers, it really depends on the genius brain.

In Huaxia in later generations, there was a computer genius Wang Zhengyang who attended the Primary School Affiliated to Tsinghua University. When I was 8 years old, I suddenly became obsessed with writing code. So his father immediately bought him a laptop with the best configuration at that time, Wang Zhengyang started his programming career, wrote code for 5 years, and finally the computer keyboard was broken by him. He often finds loopholes in various websites, and then trains his computer skills. I bought 2,500 yuan worth of goods on a website with a penny, when I was less than ten years old. Of course, instead of asking for these products, he told the website about the loophole.

The computer network is a new thing, and the Soviet Union is at the forefront of this. In the Soviet Union, another awesome hacker was born!

Hackers are of no age. They only look at talent. I have to say that this thing is really related to talent. In the eyes of ordinary people, lines of code are quite boring, while in the eyes of others, code is Beating notes.

And now, in front of Andre's eyes, a powerful hacker is appearing, and they are now invading the computer system of the West German Ministry of Defense!

When the computer is connected to the Internet, it will face security problems. In order to protect your data from being lost, the computers of important departments must have a password system. If you are familiar with people, you can try to use a combination of numbers such as birthdays. For unfamiliar broilers, it can only be cracked by brute force and constantly trying passwords!

It may take a long time, it may only be a few minutes, it's entirely up to luck!

"Ivan, where did you get this code-breaking program?" Andre suppressed his inner excitement and asked Ivan.

"Of course I wrote it myself. The system of the Ministry of Defense of West Germany uses the UNIX system, and I optimized it specifically for this kind of system." Ivan said: "Besides, this kind of program can only be written by myself. Are you expecting others to fail?"

Only then did Andre notice that there were some computer books on Ivan's bedside, the newly written introduction to computers, the principles of compilation, etc. Andre before the time traveled, when he read these books, he had a lot of headaches. Yes, after all, the programs of later generations have developed to an advanced stage. Many programmers are just code porters, copying and pasting whatever functions they need, just copy the corresponding code. But now, it's all assembly language, dealing directly with machines.

If you don't know computer hardware and are not familiar with various technical parameters, you can't write a program at all. This little Ivan is simply too surprising!

And at this moment, suddenly, the beating picture on the screen stopped! Ivan ran over quickly and sat on the chair, and then his fingers continued to fly: "Go in, finally go in, I just want to copy the content in the shortest time! I hope the Germans will leave it for me. a little longer, and greetings to your God!"

Ivan was chattering, his fingers were beating constantly, the keyboard was ringing, and Ivan's face was very excited at this time: "Okay, I successfully copied one of their files, um, then the first Two copies. It seems that next month's pocket money has to be saved, and I'm going to buy a big hard drive to save all this information. Oh, no!"

The beating characters on the screen suddenly disappeared, and the copy failed!

"The connection is interrupted the network is disconnected over there!" Little Ivan said gloomily: "I could have copied more, um, look at it now and see what's in it."

Ivan opened the file just now, but what was displayed on the screen was all in German!

Invading the German Ministry of Defense system, the documents inside are of course all in German! Andre got closer and saw the content above, and his face changed immediately.

An analysis of the feasibility of military exchanges with East Germany.

Andre, who also understands German, saw this report and immediately knew what it meant. After a long period of contact and communication, the West German government finally wanted to take a more substantive step!

Military exchanges with East Germany! what does that mean? It means that some of them want to break away from the embrace of the United States and come together with the Soviet Union! Even for a few of them, this is a welcome change!

They communicated with East Germany, that is, they wanted to move closer to the Soviet Union. They have realized that with the weakening of the US national strength, West Germany is facing a profound crisis in politics, economy and military. Only by changing their ideas can they give East Germany a future. ! (To be continued.)