425: The Internet world is perilous!

If you have an opportunity, you must grasp it. Su Ming did not stay. He wrote a program at a very fast speed and sent a data exchange application to the computer.

This program is a test of Su Ming. It is a deception program written by Su Ming. As long as it deceives the firewall, Su Ming can pass it and sneak into this supercomputer.

Just like before, this supercomputer still accepted Su Ming’s application. Seeing that his plan was successful, Su Ming jumped up from his chair, that is, this jump, and finally saved him.

–Why is this? The answer is simple, because then he found something unusual!

When Su Ming sat down on the chair and was about to use this method to actually sneak into the computer, he suddenly discovered something wrong: strange, why didn’t the data exchange information sent back come back?

The network world is actually the digital world. Any two parties that have an intersection will form a data stream. No matter what information you send to the other party, your computer will receive the feedback information.

This information may be that the other party has accepted your data or refused to accept your data. It is like the word “hellRo” when Su Ming first sent the supercomputer to this supercomputer.

The other party replied to the message “You do not have access rights”, but now, he sent out a program, but he did not get any feedback data. Why?

Su Ming thought for a while, and immediately broke out in a cold sweat-there is only one explanation for this situation, and that is that there is a “honeypot” system in this computer!

What is a “honeypot system”? To put it bluntly, it is a trap! It can pretend to be a normal system, trick unauthorized intruders into it, and then trap it firmly!

Su Ming just sent an application for access, and the computer agreed. This was to deceive Su Ming. The second time Su Ming sent a data exchange application, the other party showed a cunning face.

Like a gluttonous beast, I want to swallow Su Ming in!

Su Ming figured this out and cheered secretly in his heart. I have to say that the person who designed this “honeypot” system is a master, and he firmly grasped the psychology of hackers.

Generally speaking, when hackers hack into a computer, they will first test it. Once they find that the situation is not abnormal, the next thing they have to do is formally invade.

In other words, most hackers will only try once. Fortunately, Su Ming is a very cautious person. He tried one more time, and he is still a very careful person.

During the second trial, I noticed that the computer did not receive the feedback information. If I changed to someone else, I was afraid that I would plunge into this trap. When I found out that you were in an ambush, then it would be too late to regret. .

Su Ming wiped the cold sweat on his forehead (Wang Zhao Zhao). It was really thrilling just now. He was only a little bit finished! It seems that we need to be more careful in the future. The online world is indeed perilous!

Judging from the situation just now, the organizers of the hacker contest have already increased their vigilance, and they must have modified some programs of this supercomputer.



I used their id to send data exchange, so I almost fell into a trap, it seems that this method is no longer working.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like