Chapter 16
Strangely, this system just flashed one and didn't respond? In a puzzled way, Nick looked at it in detail and found that after only three numbers were tried, the host refused to access. It seemed that this was not as simple as he imagined. After several attempts, the host did not try it once. He slowly analyzed it. If the computer on the network is not accessed after being tried by an illegal intruder, then the regular user can't log in?
Therefore, this denial of access is only relative to an address. For example, if this computer has been tried three times, the computer will not be accessed again within today. That is to say, a computer only has three chances.
What should I do? Nick began to think hard. Even if he used all the computers in the entire computer room, he could only try it for 100 times, and these 100 times were far from the millions and hundreds of millions of times required for cracking.
After thinking for a while, Nick found a way, which was to constantly change the computer address and try to change one every three times. Although it would greatly affect the cracking speed, there was only this method at present.
Thinking of this, Nick immediately called out the source program and started to modify it, adding a program that changed the computer address every three times.
It was put into use immediately, and the brute-force cracking program began to work. This process was not comfortable. Various methods appeared on the host to limit the invasion. Nick also tried every means to resolve it. In this way, the battle was over and the host still did not invade.
When Professor Gander announced that today's course was over, Nick had to leave in a bad mood. He was really unwilling to go back to the classroom, and the host who still couldn't understand it in his mind was the one who had not successfully invaded.
Afterwards, he was almost frantically flirting with books on the Internet, but he couldn't find any books about invasion technology. He had no choice but to think about it himself.
After conducting a deeper research on network technology, Nick began to write programs crazy. The last time I went on the computer was not very enough, so the completed program was very simple. Now that I am back, I have time. He started to compile a grand program with incisive and quick results. Combining the computer performance of that model, it carries the top functions and backup functions, and made various analysis and predictions on the defense system on the host. He put himself in the defender's perspective to imagine how to defend, and imagine what other defense measures can be taken based on the host's hardware.
In this way, Nick was studying and writing every day, going home, class, and not missing any rest time. These programs were written on paper, waiting for the next time he went to the computer room, and all of them were entered into the computer.
Finally, the second week was waiting for the computer class that was extremely anticipated. Nick walked into the computer room with a homework book, which was the essence of what he had written over the past week.
Chapter completed!