Chapter eight hundred and sixty fifth awesome hacker
Just last year, experts from West Germany came to East Germany to attend a meeting. As a result, they were shocked by the East Germany network. They did not expect that East Germany's technology was developing so rapidly! East Germany's network is really too powerful!
What made them most enthusiastic was distributed computing. Without large-scale computers, a large number of microcomputers were used to calculate online to complete many difficult tasks! After seeing these applications, West German experts couldn't sit still and immediately expressed their intention to input East German network technology.
Faced with the application of a friend, East Germany was certainly embarrassed to refuse. So, a few days later, the West German government approved that the cooperation project between the two sides began. An optical fiber connected East Germany and West Germany. At the same time, a large number of network equipment were installed in West Germany. The universities in West Germany were also the first batch of network access, and soon they felt the convenience.
At the same time, the government office system in West Germany has also been connected to the network. Using the network, they can complete various tasks more easily, such as sending documents to subordinate units, and the matter will be completed in a few seconds. In the past, they needed to send liaison officers to deliver documents, which took half a day and were easily missed!
When the network was spreading in West Germany, they felt the huge advantages of the network. As a result, even the Ministry of Defense could not hold back and connected to the network!
At this time, there is obviously no saying about cybercrime!
Not to mention cybercrime, there was no Internet in this era. Even Kevin Mitnik, the world's famous Kevin Mitnik, just invaded the telephone network. In history, in 1983, he used a computer from a university to enter the predecessor of the Internet without authorization, and entered the Pentagon computer in the US, through which he was sentenced to discipline in the Youth Discipline Inspection Institute in California for 6 months. The statement of cyber hacking has not officially begun.
However, now in the Soviet Union, the rapid development of computer network technology has finally begun to bring ordinary people into contact with computers. Moreover, since ancient times, heroes have been young.
Isn't you still a little brat at the age of ten? However, when it comes to computers, it really depends on the genius brain.
In later China, there was a computer genius Wang Zhengyang, who was a primary school affiliated to Tsinghua University. When he was 8 years old, he suddenly became obsessed with writing codes. So his father immediately bought him the top-level laptop at that time. Wang Zhengyang began his program career and wrote codes for 5 years. In the end, he broke the computer keyboard. He often looked for loopholes in various websites and then trained his computer technology. He bought 2,500 yuan products on a website with a penny, but he was less than ten years old at that time. Of course, he did not ask for these products, but told the website about the loophole.
Computer networks are a new thing, and the Soviet Union was at the forefront of this aspect, and another awesome hacker was born in the Soviet Union!
Hackers do not matter age, only look at talent. I have to say that this thing is really related to talent. In the eyes of ordinary people, line-by-line code is quite boring, and in the eyes of others, code is beating notes.
And now, in front of Andre, an awesome hacker is emerging, and he is now invading the computer system of the Western German Ministry of Defense!
When the computer is connected to the Internet, it will face security problems. In order to protect your information from losing it, computers in important departments must have password systems. If you are familiar with it, you can try to use birthday combinations. For broilers who don’t know, you can only use violent means to constantly try passwords to crack them!
It may take a long time, maybe it only takes a few minutes, it depends entirely on luck!
"Ivan, where did you get this code-deciphering program?" Andre suppressed his inner excitement and asked Ivan.
"Of course I wrote it myself. The system of the Ministry of Defense in West Germany uses a uni system. I have optimized it specifically for this system." Ivan said: "Besides, this kind of program can only be written by itself. Do you still expect others to succeed?"
Andre then noticed that there were some computer books on the head of Ivan's bed, the latest computer introductions, assembly principles, etc. Andre, before traveling through time, had a headache when reading these books. After all, programs in later generations have developed to the advanced stage. Many programmers are just code porters. They just copy the corresponding code for copying and pasting whatever functions are needed. But now, these are assembly language and they deal directly with machines.
If you don’t know the computer hardware and are not familiar with various technical parameters, you can’t write programs at all, this little Yifan is simply amazing!
And at this moment, suddenly, the jumping screen stopped! Ivan ran over quickly, sat on the chair, and then continued to fly his fingers: "I went in, finally got in. Now, I want to copy the contents in the shortest time! I hope the Germans will leave me for a longer time and greet your God!"
Ivan kept chattering, his fingers kept beating, and the keyboard was clamoring. At this time, Ivan was extremely excited: "Okay, I successfully copied one of their documents, um, then the second one. It seems that I have to save my pocket money next month. I want to buy a big hard drive and save all these information. Oh, no!"
The characters that were jumping on the screen suddenly disappeared, and the copy failed!
"The connection is interrupted, the internet is out of the way!" Xiao Yifan said depressedly: "I could have copied more, well, now look at what's good about it."
Ivan opened the file just now, but the ones displayed on the screen are all German!
The documents inside the invasion of the German Ministry of Defense system were of course all in German! Andre approached and saw the content above, his face changed immediately.
Analysis on the feasibility of holding military exchanges with East Germany.
Andrei also knew German. After seeing this report, he immediately knew what this meant. After a long period of contact and exchange, the West German government finally wanted to take more substantial steps!
Have military exchanges with East Germany! What does this mean? It means that some of them want to break away from the embrace of the United States and come with the Soviet Union! Even if it is a few of them, this is a gratifying change!
They exchanged with East Germany, that was to move closer to the Soviet Union. They had realized that with the weakening of the United States' national strength, West Germany faced profound political, economic and military crises. Only by changing its concepts can East Germany be given a future! (To be continued.)
Chapter completed!