home

search

Chapter 60: Inner Response (Part 2)

  Chapter 60: Inner Response (Part 2)

  Familiar with the road, Yang Yawei found the hidden partition without any hesitation and directly started to let the mechanical mouse crack the external hidden program. As soon as Yang Yawei took action, a new program suddenly popped out, and Yang Yawei was startled at first, thinking that he had triggered something. However, it quickly turned out to be a dormant security encryption program.

  Similarly, in order to protect that hidden partition, he slightly narrowed his eyes. This program didn't send out any data, and others like Yang Yawei couldn't detect it either. However, in terms of data exchange, this program wasn't connected to other programs and couldn't escape the "eyes" of Mechanical Mouse. Any data exchange would be converted into signals, but Mechanical Mouse hadn't captured any new signal transmissions. This meant that this encryption program was merely a passive dormant security program.

  Only one person tried to crack the encrypted hidden space, it would automatically pop out. After a slight check of the encryption program, Yang Yawei had a headache. The hidden space was not as simple as it seemed on the surface. At least this encryption program could only be cracked by a master. After a brief examination, Yang Yawei knew that this encryption program was absolutely one of the world's top-notch encryption programs at present.

  The mechanical mouse is quite powerful in terms of signal tracking, but when it comes to cracking passwords, it's not that great. The only thing it can do is use its powerful computing power along with the biological modification device to force a crack. Apart from this, there might be other ways, but Yang Yawei's current strength isn't enough, so he simply doesn't think about it and directly lets the biological modification device start cracking. Yang Yawei takes a look at the cracking time, which requires four hours.

  A 256-bit encrypted program can be cracked in just 4 hours, this computing power is simply too terrifying. But thinking about it carefully, the civilization where the biological modifier is located has a technological strength that far surpasses that of Earth, just like taking a 100-200 yuan knockoff smartphone back to before 2000, it's a divine artifact! And the CPU of the knockoff smartphone is absolutely more powerful than the CPU of personal computers from before 2000.

  This is the power of overall technological advancement, Yang Yawei shook his head slightly, and after about four hours of forced cracking time, Yang Yawei had no other choice but to wait. Fortunately, no one would come over for a trip throughout the night, so Yang Yawei didn't have to worry about anything.

  Time passed very slowly, especially when you were waiting for something. Yang Yawei opened World of Warcraft and played a large-scale copy with Bian Ming. It has to be said that the copies in World of Warcraft are not as abnormal as they used to be. After playing several copies, they finally spent more than three hours, and after saying goodbye to Bian Ming, Yang Yawei closed World of Warcraft.

  As the last second of countdown was completed, the encryption program in front of him was directly cracked by Yang Yawei. The password that was cracked was entered, and the encryption program flashed and disappeared instantly. Throughout this process, Yang Yawei kept an eye on the mechanical mouse's page to confirm that the program did not exchange data with the outside world. Only then did he begin the next step. After cracking the encryption program, what followed was the relatively simple hidden method of the originally hidden space.

  Yang Yawei felt a bit strange, the encryption program just now seemed to be added later, after all, if there was that encryption program, it would not have been necessary to set up this simple encryption program in front of him. Was this a honeypot? Yang Yawei hesitated, but if he were to call it a honeypot, it wouldn't be anything good, a honeypot is a trap in the online world, and this thing was used to harm people.

  However, Yang Yawei didn't have to worry too much about the biological modification device. After thinking for a moment, he decided to forcefully crack this simple hidden space. The cracking process went very smoothly, and it only took about ten minutes before Yang Yawei finally entered the hidden space. Until he entered the hidden space, Yang Yawei was still carefully guarding against sudden outbreaks of Trojans or viruses, but there were none.

  Nothing happened, and after repeated confirmation that nothing had happened, Yang Yiwei finally somewhat unbelievably confirmed that this thing was not a honeypot. What on earth is going on?! Yang Yiwei was somewhat entangled, this broken and crude hiding method, isn't it just like pulling down one's pants to fart, going through so much trouble for nothing?

  However, Yang Yiwei couldn't care about that now. He needed to see what was inside. With the powerful computing function of the biological modification instrument, Yang Yiwei simply packaged and copied all the data into the storage space of the biological modification instrument. After copying it back, Yang Yiwei started to look at it carefully. Half an hour later, Yang Yiwei raised his head with a strange expression.

  What the heck is this? If Yang Yawei wasn't mistaken, this pile of data he copied back should be a client for an online game, right? After triple-checking, Yang Yawei was completely bewildered - what on earth was going on here? There were no Trojan horses or anything like that, but instead, it was actually a client for some obscure web game?

  After being stunned for a long time, Yang Yawei suddenly remembered something and re-entered the client of Xingmeng Jewelry Store. He let Mechanical Mouse monitor the data traffic of that hidden space for a while. About ten or twenty minutes later, Yang Yawei was sure that this was indeed a web game client, and obviously someone was playing it. The data exchange here not only had rules but also a large amount of data, which proved that this web game still had some popularity.

  It's just that the server of Xing Meng Jewelry is quite high-end, so this traffic usage doesn't matter at all. Those security personnel can't even tell it apart. Besides, with those two clever programs hiding outside, it's impossible for security personnel to discover anything here. So... a thought flashed through Yang Yawei's mind - could Ye Youlin be the same as himself? Also a scapegoat?

  In that case, it's easier to explain why the two accounts hanging on the server in this hidden space are in a dormant state. They're only used to place web game clients, so they don't need to be constantly active. In other words, these two hackers were just stealing server resources, not the assassins Yang Yawei imagined.

  There is absolutely one Ye Yulin, this point Yang Yiwei dares to confirm, so that means Ye Yulin is just a hacker who steals company server resources? And the insider of those thieves is someone else?

  This is a bit of a setback, the entire security department has dozens of personnel and anyone could be the target. However, it's not time to jump to conclusions yet. Yang Yiwei directly activated the auxiliary system and began searching through the massive amount of web game client data for any matches with the Trojan horse source code and related data found on his laptop.

  First update! Vote for me!!!!

Recommended Popular Novels