Super-brain hacker

Chapter 144 monkey virus

[Finally, the code is over, the update is presented, and the update is planned to be suspended first. Xiaoqiang should think about the following plot so that it can be more exciting. I hope everyone can understand]

Lin Hong restarted it twice, and there was still a line of text on the display: "Invalid drive"

Fortunately, he is no longer a rookie who doesn't know anything about it. He probably knows something about this situation and won't be as panicked as before.

However, he has not reached the point where he can solve this problem for the time being. I had no choice but to turn to Arthur. Arthur should have experience in this field.

He looked at the time. After one o'clock in the morning, didn't Arthur fall asleep at this moment?

If it had been normal, he would have fallen asleep long ago, but it is estimated that his sleep would be chaotic in the past two days.

Lin Hong went outside and stood quietly outside Arthur's door for a while. Sure enough, he heard some noise, so he knocked on the door a few times.

"Ding Dong Dong."

The noise inside suddenly became louder, and the sudden knock on the door seemed to scare Arthur.

After a while, he asked, "Fraud?"

"It's me, STONE." Lin Hong answered in a low voice.

The door was opened, and Arthur looked at Lin Hong in surprise: "You haven't slept yet?"

"Don't you also haven't slept?" Arthur smiled at him, "I connected to the Internet today, and I've been surfing the Internet."

"I can't sleep either, you know, for the program on the calculator. Matthew hasn't slept yet. He has been chatting with me online for a long time. Arthur welcomed Lin Hong into the room, and then creptly closed the door. If his parents heard it, he would be scolded.

"How's it going?"

Lin Hong saw that a code editor was opening in Arthur's computer, and he was obviously writing code just now.

"I'm writing a ping-pong game." Arthur sat back in his seat. "You should know, right? Ping-pong [luck] movement in [middle] should be very popular in the country.

Lin Hong nodded, and he instantly understood Arthur's meaning: "Can we play ping-pong games online?"

"Yes. Although this game is simple, if you can connect the two calculators to play, it will be much more interesting and playable. Once this is completed, we can also port multiplayer games on other platforms to TI-82.

He discussed with Matthew for a long time, and finally decided to solve the online problem first, and then think about other interesting game content. As long as the two calculators can be successfully connected, ordinary games can also become very interesting.

The homecoming party is coming, and they have to finish the game before the party starts.

Lin Hong agreed with their idea and casually asked, "Have you studied infrared communication technology before?"

Arthur shook his head: "There is too little technical information in this area. I checked that there are many communication protocols in this regard, and there is no unified standard, and I have studied several more common communication protocols, all of which are relatively bloated and not suitable for us."

"What about the agreement officially used by Texas Instruments?" Lin Hong remembers that they have their own communication function.

"I don't know which protocol they are using. They didn't make it public." Speaking of this, Arthur is a little impatient. "The time is too short. There is only one day left. We can't develop it before the dance begins!"

When Lin Hong was at school today, he had taken the time to read the TCP/IP communication protocol. For this part, he was no longer as dark as before, so now he can have a smooth dialogue with Arthur.

He knew that infrared communication must have its own protocol, but he didn't expect that a unified standard had not been formed at all. Everyone fought separately, and almost every manufacturer has its own set of standards.

"How is your table tennis program going?"

"It's almost done, and only the communication function is left. If the communication cannot be carried out, the next development cannot be carried out at all."

Lin Hong patted Arthur on the shoulder: "Man, don't worry. Since their agreement cannot meet our requirements, we will make our own agreement like other manufacturers."

"Did you make it yourself?" Arthur was a little moved when he heard his words. "It's indeed a solution, but is it too late?"

"Of course, it's too late. We still have a day and a night. I think it should be enough. Let's design this agreement together. But before that, I need you to do me a favor." Lin Hong finally talked about his own affairs.

"What's the matter?"

"My computer can't start anymore."

When he came to Lin Hong's room, Arthur only glanced at the monitor and knew what had happened.

"The computer is poisoned."

"I know, it's all my fault." Lin Hong was a little depressed and told Arthur about the stupid things he had just done.

Arthur said that he understood the occurrence of this situation very well. He said that this situation usually occurs in the rookie stage. The current computer network environment is no longer the same as before. All kinds of viruses and Trojans begin to appear. When novices enter the network, it is easy to be poisoned.

Arthur found a system floppy disk from his room, then restarted it, and soon entered an interface. After entering an instruction, he said, "The hard disk is missing."

Lin Hong was shocked when he heard the words! How come? I haven't dismantled this machine.

"Hehe, don't worry." Arthur saw that he was scared and immediately laughed. "I mean, the virus has destroyed the boot record of the hard disk, so I can't find the existence of the hard disk after using the system on the floppy disk now."

Then he took out one of the gadgets, then entered several commands to detect it, and found that the hard disk was not there.

"This is a variant of the Monkey virus." He already knows the type of virus.

"Monkey virus?" Lin Hong suddenly became energetic when he heard this. This was his first time to experience poisoning. Some of them were not his fear and fear of it, but an alternative feeling of [xing].

"Yes. The Australian hacker modified the Monkey virus himself, but his technology is obviously not home, otherwise this will not happen when the factory starts..."

After Arthur's introduction, Lin Hong learned that this Monkey virus itself is indeed a very powerful virus. It can modify the boot sector in the computer's hard disk, move the boot record originally stored in the first sector to the third sector, and then The dove occupies the magpie's nest instead, so that when the computer starts up, it will be loaded into memory as soon as possible, and then the system will be loaded, so as to achieve the purpose of hiding themselves. People who do not know its principle can't kill it.

The hard disk structure of the computer is circular, and its principle is roughly similar to that of a record. The hard disk is constantly rotating, so that the head can read the data stored on the disk. Usually, the division of the hard disk data area is carried out according to the sector, just like the folding fan structure of the country. The reason for this is to locate the position of the data on the disk. In addition to the sector, there are also parameters such as the cylinder and track, which constitute the address coordinates of the data on the hard disk. Through this coordinate, programmers can easily store and read data. Therefore, the process of the head looking for data is called the "addressing" process.

The main boot sector is located in the first sector of the 0th column of the 0th track of the entire hard disk (the coordinates can be considered as [0,0,1]), which is the first part of the disk.

If the hard disk is a hovering highway, then the main guidance sector is the "entry" of this highway. At this entrance, there is a "map" map with important information about the highway (guide record MBR and zoning table DPT), and then the "driver" who enters the highway is road blind and amnesia. Every time you enter, you must rely on a map to not get lost.

Monkey is a smart "car bandit roadblock". After he arrived, he directly forced the "entry" of the map. He pushed it back two kilometers, changed its coordinates to [0,0,3 small, and then disguised himself as the entrance of the highway, so that every time the driver entered, he would pass in front of him. At this time, he secretly jumped into the driver's trunk (memory)" and quietly hid in it, waiting for the opportunity to do something bad. Things.

Monkey's cleverness is that it successfully hid in the "t trunk" before entering the highway. In this way, even if the driver suspects that there is something wrong with the highway, he will invite his enemy "sweeper" to clean up the obstacles on the road, and he can't find his existence at all. Every time he cleans him They can successfully avoid the inspection of the scavenger and laugh at the stupidity of other colleagues.

However, the car bandit road bully Lin Hong is encountering now is obviously incompetent. When he camouflaged the entrance of the highway, he was not good at his craft and led the highway to a fork in the road, so he was immediately found to be abnormal.

What Arthur is doing now is to repair the reversed high-speed entrance, and then move the removed entrance back so that the driver can find the right way.

"OK, it has been repaired." Arthur withdrew the floppy disk in the floppy drive and restarted the computer. After self-testing, the system successfully entered the familiar DOS interface.

"Thank you." Lin Hong now has a deep understanding of this guided virus.

Then, Arthur studied the program downloaded by Lin Hong, and finally found that the program was still a Trojan horse program. He disguised himself as a dial-up login software, under the guise of free Internet access, deceived unfamiliar users into entering the account number and password, and then passed The EU sister sending function hidden in the program sends the account number and password to the email account designated by the other party, so that the other party can steal the Internet accounts of other users.

After learning about this situation, Lin Hong couldn't help but feel very stunned. He didn't expect that there was such a trap on the Internet before, but he soon understood this situation. The main body on the Internet is also human. All behaviors and habits in real life will be projected to the Internet, and by With the anonymous characteristics of Yu Wenluo, these negative emotions and behaviors will be amplified and become more aggravated.

In a word, the network is not as beautiful as he thought. The network is risky, and you need to be cautious when surfing the Internet! Fortunately, the other party is far away from Australia. Even if he gets his account password, it is useless, and now that he knows about it, he can change the password immediately to prevent others from stealing it.