The Strongest Hacker

v2 Chapter 1: Heap nonsense, let's see if you want to

A bunch of nonsense, let's take a look if you want to see it ()

Because of the busy relationship, I rarely communicate with readers. Stones in the book review area have been watching and various opinions have been paying attention.

In fact, many readers have discovered that although the theme is hacking, there are still many other things mixed in. This stone does not deny that, in fact, the stone just wants to tell everyone what a hacker can do.

Just hacking someone else's computer on the Internet every day. Is there something stealing today, something stealing tomorrow? Everyone looked lively after writing it, but I think a lot of people would get bored after writing a hundred times. This is why most of the hacker books you see are only a million words, and even a few hundred thousand in the end.

Although it is also an exaggerated component of this book, it is only a dream in the heart of the stone. In reality, it is destined to be impossible to achieve, and can only be realized in the book.

Technology is a means to achieve the goal. If you have the technology but do not understand the use, it is a pure waste. The hacker has written 1.5 million words so far, and will soon enter the entire book.

Many readers think that they may want to read all kinds of intrusions. Stone also prefers to read such books, but when reading some pure hacking books, many stones actually think that the protagonist in the book sometimes Will give people a very weak feeling.

For example, a very powerful hacker, because the government of a country offended him, or he could not be used to this government, even if he hacked the intelligence system or the military system of the other party, but a backup of others will be fully restored coming. What's the use of being black again?

It will cause damage to the other party, but there is no way to hurt the bones, even more exaggerated, even if your strength is horrible, if a country really wants to restrict your play, it is not impossible, simply hacking you black Do others always use the Internet?

But for a country's network, it is actually a large-scale local area network, which can be disconnected from the global network. What else can you do? Although such a price is high, if a major event occurs, such as a war, you cannot influence it at all. The other party is only opening their own local area network. If you want to invade, their network is not connected to the public network at all. What can you do?

For example, the military systems of various countries are actually operational. Stone said that, it was not really interesting, just to talk about his own ideas. After reading too many hacker books, I always wanted the protagonist inside to be able to influence some people in reality, but the protagonist was very weak, so I had the most The birth of a strong hacker. This book can have today, but I still want to thank all the readers who have been watching today for their support. thank you all.

Uh, in the end, in fact, this is a bunch of nonsense, everyone can be bored and look at it. In fact, the main line of this book is very simple, that is, Stone wants everyone to see, to what extent a hacker can really do in the end, of course, Some fantasy exaggerated ingredients. It's almost a thousand words, so it's over, or it will cause a charge.