Chapter 229 Release Bit messenger!
With the first invasion experience, Lin Hong was out of control and began to really pay attention to network technology. All of his spare time, except for writing the Linux operating system, is used to learn network intrusion technology.
Kevin helped him a lot during this period, and Lin Hong often communicated with him in the evening.
Fearing that their communication would be monitored, Lin Hong later simply wrote a set of encryption software for communication in the calculator. Kevin also bought a cdad device and calculator to synchronize and receive information.
He greatly appreciated this device, because it is too niche, and fbi has not spent any energy on such a thing for the time being.
Only the two of them can use this software to avoid being monitored in this way.
With the help of Kevin, Lin Hong's network technology has made rapid progress in recent days. Of course, there is a big reason because he has a very thorough understanding of the underlying layer of the network.
He has begun to implement more complex network functions in Linux, including various utilities for intrusion and detection, such as "scanner", a tool that can automatically scan ports and services on the target server.
Kevin's help to Lin Hong is not in details, but in his thoughts. He pointed out Lin Hong's direction and let him take a lot of detours. More importantly, he has been emphasizing that the most powerful tool for hackers is social engineering. Technology is just an auxiliary. Only by mastering this know-how can it be regarded as a real introduction.
In Kevin's eyes, it is very exciting and interesting to deal with others disguised as various identities and professions, especially when he can perceive each other's emotions to a certain extent in advance.
Kevin regards this skill as a knowledge tailored for people like him and believes that it is an art of invasion.
When Kevin was very young, he felt that he could let others do things for himself by pretending other identities.
For example, he once claimed that his father was a senior official in a government department, but he was respected as the boss by his friends and listened to his command one after another. This lie was not known until he was fourteen years old, and at that time, he had already gone to other places to live and study.
It is precisely by constantly practicing and trying that Kevin has mastered the trick of how to make others obey his instructions. He will spend a lot of time studying other people's work, such as how many kinds of departments there are in a company, a telecommunications staff, and what he usually needs to do. What to do and what language can make people believe more that they are the person he thinks he is...
Under the influence of Kevin, Lin Hong gradually began to try to use another identity to enter and exit some places.
Lin Hong's personality is different from Kevin's. He has been educated orthodox since he was a child. In addition to hiding his secrets, he seldom deceives others.
So when he first tried these things, there was always some awkwardness in his heart. Several times, he pretended to be recognized by others. Of course, others just regarded this as a good joke, because Lin Hong did not do anything bad with his fake identity.
However, it is in the continuous failure and summary that Lin Hong has slowly mastered the skills of social engineering, or the skill of deceiving others. Even if he is confronted by others, he can use his ability to successfully solve the crisis without changing his face, and can also fool him into the clouds, thinking that he is himself. I made a mistake.
......
Time has passed, and a month has passed in a blink of an eye.
During this period, Diana of Texas Instruments Company came to visit Lin Hong, but she did not come alone, but brought another man, Miller of Intel.
After the three of them talked for a while in a high-end cafe, Diana and Miller quickly left.
They came here mainly to acquire the infrared transmission patent in Lin Hong's hand, but Lin Hong has completely entrusted this matter to Phyliz and asked them to talk to Phyliz.
Although there is no news so far, Lin Hong knows that he will definitely be in a large amount of dollars.
Because this time Miller represents a joint organization called the "Infrared Data Association", which is a group co-sponsored by more than 20 companies in the electronics industry, such as Intel, Hewlett-Packard, Compaq, Texas Instruments, etc., in order to establish a unified infrared data standard.
They took a fancy to Lin Hong's infrared data transmission protocol, and planned to continue to expand based on this, and finally establish this standard.
This time, they didn't play any tricks. After seeing Lin Hong, they showed their identity and intention.
However, Miller also told Lin Hong that this association is a non-profit organization. Once the standard is established, it will be released to the whole society for free. I hope Lin Hong can consider this factor.
Of course, Lin Hong also discussed this matter with Phylise. According to Phyl, these companies are world-class giants. They are not short of money. You can't talk to them about the problem of profit or not. What's more, after the opening of this agreement, the beneficiaries are not these electronic companies themselves?
Lin Hong originally wanted to learn from old-fashioned hackers and make some contributions to society, but he was rejected by Felix, saying that although he now has more than 10 million dollars, it is not enough. In the eyes of some people, he is still poor. If you want to make a contribution, it's not too late to do charity when he becomes a world-class millionaire.
This business negotiation has been inconclusive for nearly a month. Obviously, in business, Phylise is not an easy person to deal with.
※※※※※
It was Saturday again. After dinner, Lin Hong returned to his room early.
He went to the computer, turned on the computer, selected the Linux startup menu, and entered.
At this time, Linux is not as simple as the original v0.00. Lin Hong not only implemented hundreds of system calls in bash, but also implemented some hacker-specific commands, such as automatic scanning, tracking routing, and finger commands in unix. ...Wait, wait.
A lot of common gnu software has also been ported, such as gcc, emacs, telnet, ftp...
At this moment, the Linux version used by Lin Hong is already more powerful than his minix.
Lin Hong has completely abandoned minix. He usually uses Linux. He knows all the operating mechanisms in it clearly. If he encounters something that is not available in the function, he will implement it by himself. This feeling of controlling everything is very good.
The only regret is that he hasn't done the file system. Because Linus once said before that he wanted to design a file system by himself, Lin Hong was worried that he had a plan, so he put this matter aside for the time being. Although he had also studied the file system recently, he did not do it in the end.
Today, he has to do a very important thing - to release the bit messenger that has been constantly improving one after another!
After more than a month of research and practice, Lin Hong has been very confident in his network intrusion technology.
These days, he has visited almost all the more famous hackers in the world.
Note that it is not those public bbs, but the bbs within major hacker organizations.
When he had not been exposed to this circle before, the only professional hacker bbs that Lin Hong came into contact with was "Blue Eagle", and no other hacker bbs knew about it.
The circle is like this. When you don't reach this height, you never know, and even think that those things don't exist at all. And when you really become a part of it, you will find that a brand-new world is open to you.
Except for Lin Hong, the internal bbs of the two hacker organizations, the number one "Mask Island" and the second "Anonymous" in the United States, has no clue at all. Other top ten hacker organizations in the United States, such as "Mocking the World" and "Holocaust 2600" have been successfully won
In addition, Lin Hong also found that Australian hackers are also relatively active. According to the information he saw, during this period, there were at least 100 hackers in Australia.
Among them, the more famous ones are "Pacific Island", "Field", "zen" and so on.
These bbs are not open to the public. Only internal members, or those recommended by internal members, have access rights.
But obviously, these are not as difficult as Lin Hong. He is a regular customer of these bbs in order to check the latest technology and news.
Of course, this does not mean that Lin Hong's technology is better than that of those organizations, but that Lin Hong has successfully invaded the servers running these bbs. As for the way of intrusion, there are successful intrusions directly relying on the loopholes and technologies you have mastered, and there are also accounts obtained through social engineering methods, and then the power is raised... and so on.
After a period of preparation, Lin Hong finally felt that the time was ripe, and he couldn't wait to release his bit messenger.
At the beginning, Lin Hong did not want to announce it directly to the public, because in essence, this is a completely anti-monitoring and anti-authority software. At the beginning, everyone knew that it was very bad, which was likely to have a negative impact on its growth.
Therefore, Lin Hong intends to start with hackers. I believe that many hackers want to have such a tool that can communicate safely.
Lin Hong took a lot of thought and carefully prepared a post. In this post, Lin Hong described in detail the original intention of developing this software.
Of course, what he wrote was not to say that it was born for communication within the team, but that for the freedom of communication, he did not want to be monitored for chatting on the Internet.
At the front of the post, he quoted Richard, the father of free software--
"The freedom of software is related to the freedom of human beings."