362 Sheng Bing's Conjecture
Science Computer Engineering Lab.
In a corner of the laboratory, the white mist is lingering. A figure sitting lazily on the seat, a cigarette between the right index finger and the middle finger, and his eyes sweep back and forth on the two light curtains in front of him.
After, the light of the light curtain is particularly conspicuous in the white mist.
Bai Yan was blocked in the corner by the transparent barrier and could not spread to other places.
Suddenly, Sheng Bing condensed, and then suddenly sat straight.
The cigarette in his right hand was held by the ashtray on the table, opened another light curtain, and quickly entered a string of code on it.
A few seconds later, his eyes returned to the original light curtain.
Just now, a window suddenly jumped out of the light curtain, there was only one line on it: good evening, Professor Sheng.
There is no name or time, there is only such a simple greeting.
Even so, this line of the line starts Sheng Bing.
Someone sneaked into his equipment without touching the system's protective wall, which made Sheng Bing feel very embarrassed.
As a network security expert, he has absolute confidence in the security of his own system, but it is difficult to say now.
Seeing that Sheng Bing did not respond, he sent another news.
"I didn't invade your equipment."
Is this a goodwill?
Sheng Bing laughed at himself. He didn't rush to reply, but entered a string of code on the newly opened light curtain.
After a few minutes, after seeing the result of the invaders, Sheng Bing pulled the light curtain with a dialog box and placed it on the light curtain in front of him.
He thought about a few seconds before entering: "I don't know what to call?"
There is no user name and time in this dialog box. At present, there are only three lines of words. It looks like a notes, not like a dialog box.
Sheng Bing was waiting for the other party's answer, while continuing to enter a line of code in the light curtain below.
The other party quickly returned the news: "I am Shirley, you should know me."
Seeing this sentence, Sheng Bing's hand paused, and then raised his hand after entering the instructions below. Enter a sentence on the light curtain above.
"Do you do the Trojan in the Xiao Tingyuan equipment?"
Sheng Bing probably guessed who it was. Although he could not go back to the source from the Trojan horses that had been destroyed by himself, from the information provided by Xiao Tingyuan, he could probably take a survey direction.
The student who will ask Xiao Tingyuan, the dean of the art department, has only one student in the entire college, the little girl named Shu Yan.
She has a big suspicion, but Sheng Bing doesn't think that little girl has that ability.
He had invaded the little girl's portable equipment and did not find any strangeness. The only thing that attracted him was that the little girl chatted with a person named Shirley.
Shu Yan complained that Xiao Tingyuan did not give him a holiday, and the person named Shirley comforted her and said she could help.
Of course, this kind of help that did not explicitly stated is not necessarily using Trojan. But according to Sheng Bing's subsequent investigation, he found that he couldn't find this person named Shirley.
The messages of her and Shu Yan's hair were disguised through layers of camouflage, which could not be traced back to the source.
After further investigation, Sheng Bing found that a person named Shirley may be the mysterious genius arranging. In addition to the same name, the means of hidden traces are also very similar.
Sheng Bing also found that Shu Yan, a little girl who knew her particularly deceiving nephew, was part -time in the travel agency opened by the Duke of Olsini, where she met Paul.
And she helped the fifth Xi contact Shirley, so that the fifth Xi's new movie can be released on time.
Although Sheng Bing did not care much about the entertainment industry, the former fifth and the old antique moved on the Internet. The movement of the old antique was too great.
Sheng Bing asked Paul to investigate the Trojan horses in Xiao Tingyuan's equipment to embarrass him, but to see if Paul could attract the Shirley through Shu Yan.
In other words, Paul knew this Shirley through Shu Yan, and then contacted her.
Sheng Bing has always remembered the script that Paul sent him when the incident at the SPQR Star Ship Airport. From then on, Sheng Bing wrote that the hacker of that script was quite curious.
That's right, in Sheng Bing's heart, Shirley is a very powerful hacker. The strength she shows in this area will definitely not be weaker than the arrangement, otherwise it will not hide such a good.
It was just that Sheng Bing didn't expect the other party to come to the door so soon, or in this way.
No wonder Paul shouted this great god.
"It's just helping my friends, I have not invaded Xiao Tingyuan's equipment."
Seeing this answer, Sheng Bing became more and more determined to speculate. However, seeing that the other party emphasized that there was no invasion equipment, Sheng Bing did not agree.
How can you get off the Trojan horses without invasion?
Just like this situation is not an invasive device, how can you talk directly with him?
In Sheng Bing's opinion, Shirley is a bit confusing.
He raised his hands on the light curtain: "Why do you contact me now?"
After sending this sentence, Sheng Bing continued to be busy below.
Now that he has been in contact, Sheng Bing doesn't want to miss this opportunity.
A new word shows the light curtain above, so that Sheng Bing immediately stopped the movement on his hand.
"You continue to check the internal system of the device is useless. I contact you through a loophole of the connected interface."
Seeing this, Sheng Bing's pupils stay.
He immediately gave up the code he was writing, changed a new window, and started to check his equipment again.
This time, according to Shirley, he first came from the connected interface, and then he found that the other party was right.
She did not invade, but used a vulnerability to change a part of the information collected from the external network. Under the premise of not touching the firewall, it formed the dialog box that appeared on his light curtain.
This method can avoid risks well, so that the other party can leave at any time, leaving a trace of trace in Sheng Bing's system.
"It's amazing." Sheng Bing sighed sincerely.
This vulnerability is not so easy to find, and it is not easy to use it to use it.
At least Sheng Bing did not find this available vulnerability before. For his level of network security experts, it was a big mistake.
However, it is not too late now.
Sheng Bing has conceived in his mind, how to use this vulnerability to solve the outsiders who want to invade the system.
At this moment, he saw the other party a sentence, longer than the previous few sentences.
"I'm not malicious, I just want to ask some things from you, I can pay for you to pay satisfactory."
—————————————————————————
Chapter completed!