Metropolis: King of Hackers!

Chapter 142 : The opponent is very strong!

Martin was surprised: "Not yet?"

"He is very strong."

After speaking, Kane removed the hard disk and connected it to the same strange machine. Martin knew this was Kane's killer bronze. He rarely saw Kane use this machine. It was a special hardware device used for data recovery. Martin did not know the specific principle.

Kane seemed to know Martin's mind and explained: "I will tell you the principle. You know, the strength of the magnetization signal in the disk is used to represent the ~0 and 1 of the data bits."

"When the read/write head writes data to the disk, it will adjust the signal of the magnetized data bit to a certain strength, but the signal is not as strong as possible, and it should not exceed a certain limit, so as not to affect the adjacent- Data bits."

"Because the signal strength is not enough to make the storage medium reach a saturated magnetization state, the signal actually recorded on the medium is affected by the signal previously stored in the same location.

"For example, if the originally recorded data bit is 0 and is now overwritten by a 1, then the signal strength actually recorded on the disk medium is definitely not as strong as the original data bit is 1.

Martin understood a little: "It turns out that data recovery is based on the electrical characteristics of the disk."

"Yes. A dedicated hardware device can accurately detect the actual value of the signal strength, and subtract this value from the standard strength of the current data bit to get a copy of the overwritten data.

"Theoretically, this process can be recursively forwarded seven times, so if you want to completely clear the file, you must overwrite the data more than seven times, each time with randomly generated data.

"Seven times?" Martin said in surprise, and then he remembered how they usually destroy documents, "Why do we only use it three times?"

Kane patiently said: "Usually we destroy files in accordance with the "Disk Cleaning Specification" of the Ministry of Defense. It requires that the data must be overwritten three times: the first time it is overwritten with an 8-bit character, and the second time it is overwritten with the character. Complement (0 and 1 are completely reversed characters overwritten, and finally overwritten with a random character.

"However, this cleaning method is not suitable for media containing highly confidential information. Such media must be degaussed, or its physical carrier must be destroyed. Of course, for most occasions, simple coverage processing is sufficient. Those we usually deal with The file is not highly confidential, so it only needs to be overwritten a few times."

...Seeking flowers 0...

"God, it turns out that there is so much attention to simple document destruction. Today I have learned a lot. Kane, thank you so much! Haha, it seems that guy can't run!" Martin finished talking and went up. "How is it, did you find it?"

.........0

Kane shook his head helplessly.

"You mean him"

"Well, he is very strong.

After this incident, the Federal Agent Cyber ​​Security Task Force knew that there was such a powerful person on the Internet, and their entire task force was stunned by him. Because the other party was discovered because of downloading those pictures, they secretly said It is "Medusa".

Chu Hao found "Medusa" (aurora is the goddess of the weaving frame in ancient Roman mythology, who is in charge of the northern lights and represents the dawn before the rising sun. The northern lights are a beautiful gift from nature to mankind, and Medusa is the order The goddess of hope and expectation. Her identity is equivalent to Ios in Greek mythology. Eight,

Thank you for reading this story at mtlarchive.com. Your support enables us to keep the site running!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like