Super-brain hacker

Chapter 235 Official Dedicated Operating System

[It's the middle of the month, ask for a monthly ticket!]

Lin Hong never thought that the distance between hackers and politics could be so close. This incident almost turned into a serious political incident.

"Bite messenger home" bbs data was all lost, but the Free Software Foundation quickly rebuilt it.

This incident made this bbs more famous. Those supporters of free software almost regarded it as a base camp, and also attracted many human rights people who are concerned about freedom of speech.

Although Richard suffered a little in this matter, he also gained a lot of influence. Through this matter, everyone realized some problems, and some understandings that originally belonged to the neutrals also became supporters of free software.

The only pity is that the software of BitCer messenger does not have open source code. Richard appealed on the forum to hope that the author of BitC messenger can open the source code as soon as possible and join the free software camp.

However, the mysterious author has never appeared.

After this incident, everyone speculated whether the confidential information this time was released by the author of the bit messenger.

Perhaps the reason why he wrote a bit messenger is to publish these materials more secretly?

When Lin Hong saw these rumors, he suddenly didn't know whether to laugh or cry.

In fact, he is also interested in the authors who publish these materials.

The information in the other party's hand has obviously been in hand for a long time. It may be intended to be released to the public. It coincides with the birth of the bit messenger, so it used the proxy function of the bit messenger to publish these information on the forum.

Obviously, fbi's anti-hacker team did not find any clues.

The anonymous function of the bit messenger is not bragging. It has been verified by many senior hackers. Even if you are fbi, there is nothing you can do. Computers and software don't care how awesome you are.

In the evening, after Lin Hong went online, Kevin sent him a message.

[martin: The wind has been very tight recently. You should pay attention to it.]

[stone: Because of the previous thing?]

[martin: Yes. The emergence of the bit messenger led to the fact that fbi began to pay more attention to computer cybercrime. They began to set up files for all hackers in the country. Once anything happens, they hope that the suspect can be found in the database at any time...]

Kevin told Lin Hong that it is best not to act rashly in the near future and avoid the limelight. He was worried that after Lin Hong mastered the invasion technology, he couldn't help itching his hands and was accidentally found clues.

Of course, Kevin didn't expect that he strongly recommended the bit messenger software used by Lin Hong, which was written by Lin Hong himself.

After the software came out, Kevin praised the author of the software, believing that he had done a good thing for the whole hacker world, and ordinary people could also benefit from it in the future.

[martin: The emergence of the bit messenger is a heavy blow to the aurora monitoring system. I don't think the people who designed this system at the beginning would have thought that there would be such a software that could completely bypass their monitoring. This is the pace of scientific and technological progress and the general trend. If they want to go against the trend, it depends on whether they have the ability.

Kevin has no good impression on the government and authority.

In fact, he agrees with Richard's remarks very much, believing that the other party is one of the few sober people.

Although Kevin also wants to expose the government's affairs, he still doesn't have the courage in the end.

Now he is still the most wanted criminal of fbi. Although fbi has never given up his wanted, his strength over the years has been much smaller. If he exposes the sas system again, it will definitely stimulate their nerves. If he increases his search, his life will be difficult.

[stone: There is something I have wanted to ask you for a long time. Do you know what system those hosts in the bank use? I once saw it in the bank's computer room, and it doesn't seem to be a common dos, unix or Apple system.]

Lin Hong has been buried in his mind for a long time.

When he peeked at the robbers operating the bank's host at the Manhattan Trust Bank, the system he saw was indeed very strange.

At that time, he was not familiar with the operating system, but roughly remembered some of the other party's operations and interfaces.

But now, he has basically learned all the common operating systems, and still doesn't know what type of system it belongs to. Moreover, the mainframes of the bank are not PCs, and the volume is much larger.

[martin: The operating system used in the bank is the vax/vms operating system, which generally runs on small machines of the vax-11 series, such as vax-11/780.]

[stone:vax-11?]

[martin: Yes. This is a small computer, which is rarely seen at ordinary times. It is developed by dec. Basically, many computers of U.S. government agencies are such machines. For example, the Ministry of National Defense, nasa, and some important government research institutions...]

Kevin obviously knows a good job of this kind of machine and system.

He explained the characteristics of this kind of computer to Lin Hong in detail.

The full name of vax is "virtual address extension", which is a computer system established by dec in the 1970s. The vax-11 system computer based on this system has a unique complex instruction calculation (cisc) architecture.

vax-11 is a big guy, and it was a 32-bit computer at that time, with computing performance of up to 1mips. In the era when other computers were only 16-bit, the speed and performance of this computer were unparalleled, and it also had many other very powerful network and storage functions.

The system running on this computer is vms (virtual memory system), that is, virtual memory system, which is a special computer network operating system. Although it is based on a completely different hardware architecture, this operating system and other operating systems It's still a little similar. For example, its login interface is more like the unix system.

[martin: Therefore, for a hacker who is familiar with the operating system, he can quickly feel that the vms system is basically the same as the unix operating system. A good hacker will use it very well in the short term. For them, the only difference between these systems is only commands. The tips are different.]

Because at that time, vax/vms was very advanced, not only a multi-user system, but also had powerful functions such as communication terminal protocol (cterm), distributed naming service (dns), distributed file system (dfs), distributed queue service (dqs) and so on. Network applications are much better than other operating systems.

Therefore, the dec company won the government's purchase order and became a special computer type for government agencies.

Even the operating system used on the Apollo moon landing ship is like this, and there are various satellites.

Because this computer system is very different from the popular computer architecture and operating system on the market, it is this uniqueness and incompatibility that ensures its security.

Of course, for a hacker like Kevin, this is nothing. He can also use the simulation terminal program on the PC and the vax computer to connect.

[martin: If you are interested in this system, you can check some information in this system first. Although it is not common, I think mit library should have it. However, I personally suggest that you should pay attention to it when you invade. Don't destroy any data or leave any traces, otherwise you may get into trouble like me.]

For a good hacker, he will be interested in all systems, and they usually spend a lot of time researching and learning different operating systems. Not to mention official systems like vax/vms.

Therefore, Kevin was not very surprised that Lin Hong asked this question.

Before ending the chat, Kevin gave Lin Hong the addresses of several vax/vms servers. These servers are not from banks, governments or the military, but servers used by a few commercial institutions. If Lin Hong wants to practice, he can try these servers.

Lin Hong heard of this system for the first time. Only then did he know that the government had already used more powerful computers and operating systems.

Moreover, this system is even used for spacecraft and satellite control, which is exciting to think about.

Like most other hackers, after hearing about this vax/vms, Lin Hong could no longer resist the curiosity and impulse in his heart. On the weekend, he went to the MIT library.

Now he has become a regular guest of the mit library. He usually runs there as soon as he is free. He is like a dry sponge, eagerly absorbing the nutrients in the library, and the library of the Latin School is no longer attractive to him.

As Kevin said, there are indeed books about vax/vms in the mit library, not only there are, but also a lot of them.

Lin Hong sighed that mit is really a place known as a "sacred place for hackers".

He quickly found two major books, one is the Use and Development of the Vax/vms System, and the other is the Principles of Computer Composition of the Vax-11 Series.

These two books are hard and soft, which is enough for Lin Hong to thoroughly understand the system.

When learning knowledge, time always passes quickly.

Lin Hong was immersed in the ocean of vax/vms knowledge, and unconsciously it was almost noon.

"stone, what a coincidence, you're here to read again!"

A familiar voice sounded behind Lin Hong, and then sat next to Lin Hong.

This man is just the left hand. Today, he happened to come here to check some computer information and happened to see Lin Hong sitting in his old position reading.

It's not the first time he has met Lin Hong here.

"Left hand? Why are you here? Lin Hong closed the book in his hand and asked with a smile.

"I'll check some information. By the way, you haven't eaten yet, have you? The left hand asked enthusiastically.

Lin Hong shook his head and said, "No. I'm going to buy a hamburger to make do with it.

"How can this work? You should still be in the stage of growing up your body. You should pay attention to your diet." Seeing that he was going to eat a hamburger in his left hand, he couldn't help shaking his head repeatedly, "There happens to be a dinner for Chinese students today. Let's go together. The venue is set at the Hunan Restaurant, which is just in line with your taste."

"This..." Lin Hong was a little moved, "I joined halfway, isn't it good?"

"It doesn't matter. Don't worry, this time it's aa. No one will have a problem, haha!"