The Strongest Hacker

Chapter 98: Unordered array (on)

   Chapter 98 Disordered Array (Part 1)

Probably checked the system, and Zhang Yang did not find anything wrong. If a thorough inspection is needed, the analysis software is still needed. Zhang Yang stood up and walked to the box that came with it, flipped inside, and found this server dedicated Network cable, and then connect the server to the apartment network.

Although Shige pulls a dedicated 10M fiber, the external gateway still uses the school gateway, so even if their dormitory is an independent fiber, the public IP is still the school. The difference is that it is not the same as other dormitory buildings. Only 10M fiber is used in a building.

   Connect the network cable, turn on your computer, and Zhang Yang copied the analysis software he used. It is very different to analyze other people's computers. Because Zhang Yang itself is in the system, the analysis information is also much more comprehensive. It takes about more than 20 minutes for Zhang Yang to get the results he wants.

Looking at the dense analysis results, Zhang Yang's face became a little weird. This analysis software was adapted by Zhang Yang based on six years later, although in the eyes of most people, the computer technology after six years and the current computer technology It seems that apart from the more powerful hardware performance, other things have not changed, XP should be used or XP.

But in fact, many of the core technologies of system software can be described by the earth-shaking. After analyzing the entire system, Zhang Yang found that the hard disk array of the entire server is not only 600 G, but 80 G of space is being used. Hidden.

   And the entire Linux system can be described as perfect, except for the analysis of the vulnerabilities that will be discovered after a few years of scanning, all other vulnerabilities have been filled! Even vulnerabilities that will only be announced a few years later have been patched!

Master, looking at the results of the analysis software, Zhang Yang felt a while. Don’t underestimate the two cabinets. After the entire server array is combined, its computing performance is even more advanced than the S server with millions of dollars. At this time, Zhang Yang realized that this server is not just as simple as a blade server.

   Its computing performance is quite excellent, and it is also equipped with billions of high-definition image processing chips and systems. Disk hiding is not an advanced technology. Many people who have just learned a computer will use it, but the disk hiding in this server is different. It is not like they were turned off from the outside like the blades at the beginning. These disks are still running, the difference is that they are covered by a technical level.

   And unlike any technology that Zhang Yang has seen, even if Zhang Yang hasn't seen it in a few years, he tried to find this kind of disk space, but Zhang Yang soon discovered a hidden trap. If Zhang Yang violently cracks, this trap will be completely detonated, destroying the entire hidden disk space, and the data in it will naturally be nothing.

   And the whole system is also very clean, so clean that there are no other programs besides the system itself. After hesitating, Zhang Yang quickly downloaded a hard disk recovery tool from the Internet and found a disk partition to start recovering these hidden hard disk spaces. Zhang Yang wanted to see if there was anything in it that could explain where the server came from.

The data recovery is very fast, which is about more than 20 minutes. Zhang Yang completed the data recovery of the 20 G-sized partitions. There is no important thing that Zhang Yang thinks about. It is all messy data. Based on the data itself, Zhang Yang just looked like some experimental data, but he couldn't see what the data was in the experiment. Zhang Yang looked dizzy with complicated formulas. This is not just a high number, many formula symbols Zhang Yang has never even seen it before. It should be something like chemistry or physics.

   copied some of the formulas. Zhang Yang thought about it and simply deleted the data again. Mao didn’t use it. It seems that the most important thing is in the hidden 80 G space.

  After deleting these data, Zhang Yang was ready to re-do the system. Although the whole system is clean according to the analysis software, there is no other software or traps. But this server is a very important thing at first glance. Although it is not known how to get out, it is clear that its owner has taken preventive measures.

   A server used by a computer expert, Zhang Yang doesn't want to be overwhelmed, God knows what traps are hidden in this system.

   Directly deep-format all hard disks. As for the obscured disk space, if you can't crack the traps outside it and its password, no further formatting will affect it. It will take some time for the 600 G disk to be deeply formatted.

  It took more than an hour for Zhang Yang to format all of the disks to ensure that no data in them would remain, before Zhang Yang started to do the system again. Zhang Yang is also accustomed to using the Linux system, re-doing the Linux system aside~www.wuxiahere.com~ Zhang Yang thoroughly patched all the vulnerabilities of the entire system, including those discovered a few years later.

  After installing his own firewall, Zhang Yang conducted a side-to-side virus scan. Until it was confirmed that there were no problems, Zhang Yang began to crack the covered disk space.

After careful analysis of the surrounding trap, Zhang Yang immediately determined that this trap is a well-known disordered array in the hacker world. The disordered array is just a name, but it illustrates the cleverness of this trap, just as Zhang Yang is involved. The two computer viruses are set according to the mutation rules of the DNA sequences of AIDS and Ebola. This disordered array is also set according to certain rules. It is like the formation method in Chinese Taoism.

  If you don't know the exact way of entering and leaving the array, you can't bypass this trap completely! After carefully checking the entire enclosed disk space, Zhang Yang once again confirmed that the data in this disk space is definitely highly encrypted. If you do not crack this external trap, or decoding method, even if you get the data , I am afraid that it is also a bunch of useless 0s and 1s. If they are not arranged according to the decoding method, you simply cannot get what data is inside.

After confirming that it is a disordered array, Zhang Yang was somewhat depressed, but he was also relieved, because the disordered array is also a normal access cracking method. It can be set by the setter in any way. It can be a question or a game. , Can be an animation, or even some topics that need to be calculated. Or you can think of it as a piece of software. After you visit, follow the questions set by the setter step by step, and then unlock it.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like