Super software

Chapter 361 Safe Password

This safe can make it difficult for Ma Weihao and others, because they lack the necessary instruments and equipment on hand, but for Li Tianzong, he can try other ways.

Before coming, Li Tianzong tried to compile several softwares, and finally successfully compiled two softwares. One of them is called "Elf Virtual CD-ROM Drive DaemonTools", which is commonly known as "Big Devil" and is a very widely used virtual CD-ROM drive software.

The main function of virtual optical drive software is to read the information in the CD and convert it into a virtual image of the hard disk to simulate the data of the CD without the CD.

The virtual optical drive can enhance the disk reading ability of the optical drive and save the information of the CD.

After successfully compiling and becoming a brain software, the function of this Daemon is to save the external information obtained by the eyes as brain information.

That is to say, Daemon can store all the information obtained by the eyes, but this kind of storage is not a simple memory storage, but can read and reproduce the information obtained at that time afterwards, which is a bit similar to the function of a camera.

Compared with the camera, the camera obtains image data, while the daemon copies all the information obtained by the eyes. This information may be visible or invisible, such as infrared rays, ultraviolet rays, the intensity of light, the touch of the wind blowing on the eyes, etc.

Daemon reproduces not an image, but information. This information can be used for analysis, but it may not be able to be viewed as an image.

Another one that has been successfully compiled at the same time is the scanning enhancement software called VueScan. The main function of this software is to use the function of the scanner to scan to obtain detailed images.

Compared with the normal viewing of the eyes, VueScan scanning focuses more on details, that is to say, through VueScan, more detailed image information can be scanned and recorded.

For Li Tianzong, he is using VueScan now.

He stared at the digital dial of the safe without blinking, while VueScan scanned the image of the digital dial and gave it to Xiao I for analysis at the same time.

Li Tian asked Zheng Dongguo that the police have special instruments and analysis software, which can scan and analyze the fingerprints on the surface of the safe and roughly determine which numbers the safe password may be involved.

But the instrument can only do this. It is impossible to know the password of the safe by looking at the dial, because it also involves several digits of the password, forward dialing or reverse dialing, and repeating numbers, so it is obvious that the password cannot be guessed by observing the dial.

Give the image scanned by VueScan to the small I for analysis, and you can basically get a similar result as the police, that is, to infer which numbers are often used, and there is still a certain distance from the complete password.

However, there is also a virtual optical drive in Li Tianzong's brain. The function of this virtual optical drive seems to be useless, because if it is used by Li Tianzong, the final result is nothing more than the image seen by the eyes again, which is not even as clear as the camera, at least there is no change in focal length.

But he has a small I. As a digital life, he can analyze the digital information copied by the virtual optical drive, which Li Tianzong can't do.

This is like what computer users see on the knowledge screen, while small I can analyze the source file and directly analyze the binary source code.

From these source codes, small I can analyze and extract various analyses under the record.

At a glance, what you receive is not only some images, but also a lot of complex information. To extract useful information from these complicated information, you must first analyze what this information is before you can choose.

Such a calculation is obviously huge.

Fortunately, Li Tianzong's mental power has been constantly tempered and upgraded, and the second core has also risen to four stars, and his computing power is quite considerable.

Half an hour later, Li Tianzong obtained some analyzed information from Xiao I, which was obtained after a comprehensive comparative analysis of the image information scanned by VueScan and the virtual information recorded by Daemon.

This information not only gives the cleanliness and wear of each number key on the keyboard, but also infers the direction in which the key is often dialed from the worn surface.

and comparative analysis between each key.

Whether it is the type of parameters obtained in the final analysis or the degree of detail, the results are no worse than those made by professional instruments and software.

Of course, with these numbers alone, we can't know how they are combined, and it can be seen from the analysis results that a considerable number of keys are used, and the password of the safe is likely to be replaced many times.

Obviously, it is safer to change the password frequently, and the users of this safe are well aware of this.

At this time, the police's instruments and software will be helpless, but for Li Tianzong and Xiao I, this may not be the case. Xiao I has made some inferences about the password combination based on the information obtained, and arranged the most likely password combination in order.

Compared with the police software, Xiao I is not so professional, but it can share Li Tianzong's memory and wisdom, which is more intelligent.

After communicating with Xiao I, Li Tianzong decided to give it a try. Since Ou Xiaojuan often changes the password, this safe should not have the function of entering the wrong or locking, because in that case, it is difficult to guarantee that even the user himself will not enter the wrongly. More importantly, the safe is exposed. It may not be used by one person, and it is easy to be contacted by others. If it is wrong and locked, it is likely to have an accident.

At that time, if you need to open the safe, you need to use some other tools and forces, which may be exposed.

But this may also mean that there is not necessarily anything very important in this safe.

Even if it is not the most important thing, it will obviously be more important to put it in the safe. Maybe there will be some new discoveries. Now that he has come, Li Tianzong will naturally look at what is in it.

I tried to dial a few numbers back and forwards, but there was no movement in the safe. The password I guessed for the first time was still wrong, although this password is the one that Xiao I thought has the most probability.

After all, human wisdom and digital wisdom have shortcomings.

Li Tianzong did not hesitate, and then began to dial the second password. As a result, there was still no movement and it was wrong.

I made a mistake three times in a row, and even Li Tianzong began to doubt whether he could guess the password correctly and open the safe.

He thought about it and decided not to follow the order given by Xiao I, but to select the last digit from the most likely password area and enter it again.

With a " click", the safe was really opened!