Font
Large
Medium
Small
Night
PrevPage Index    Favorite Next

Chapter 266 Weapon Grade Program Package(2/2)

You know, computers like nuclear facilities are almost unconnected to the Internet." Some people were a little confused about how this package should be attacked.

"What's wrong with this? Isn't it easy?

It only takes someone to operate illegally, connect the computers of the nuclear power plant to the Internet, or plug some U disks infected with the virus into these computers.

This makes it easy to inject these programs into these computers without internet connection.

As long as the program enters these computers, the package will automatically complete communication with the hardware backdoors and use the backdoor to start doing what they want to do.

Even though there is still no network connection, the virus can bypass all antivirus software and start executing programs directly on the hardware." Someone directly praised the illegal operation of carrying a U disk when a country's nuclear power plant was attacked.

"Since that's the case, it won't make sense!

Since this program package is so powerful, why did he sell it for $2 million?

I always feel that the seller told us a very credible story and then tricked us into paying. As long as we finished paying, he would disappear and leave.

Therefore, we must verify the reliability of this program.

Hurry up and ask him to send us some reliable operation videos.

See how to change the original information of those chips.

At the same time, we also need to prepare some chips to provide a express address.

We tamper with these chips to make sure that he will not be transferred.

As long as these chips can be successfully modified, we can pay the money.

Anyway, the boss will pay for it in the end, so it has nothing to do with us.

If we are afraid, we find that we have been cheated after paying.

At that time, we can't explain to the boss. With such a large sum of money, the boss will tear a few of us apart." Everyone decided to let the seller verify its program reliability through offline verification.

"How do we do things? Each chip looks exactly the same. Could it be that I can write a text on it? Make a mark?" Some people feel that marking it on the chip is too easy for the other party to find out and take the trick.

"It's easy to make marks.

We can use the school’s ultra-high resolution microscope to remove the outer shell of the chip and carve some special words and symbols in some places inside.

Once this seller replaces our chips, we can easily find that the stuff has been transferred.

And I know someone who does micro-sculpting, and they can't tell at all with the naked eye.

Unless the other party uses a microscope, carefully observe the ones we sent to him

chip.

If he makes a false move, we will soon see through it. After all, my friend who does fine-tuning is difficult to imitate without decades of foundation with his ability.

If the other party really finds that we have done something, he or she will either choose not to contact us anymore.

Either you completely modify the information of these chips and then send it back to us.

As long as we confirm that it was the batch of chips we sent to him, and the information of each chip has changed, it means that his program package is real. "In order to ensure that we are not cheated, several people tried their best to do anything.

.

This method of micro-etching under high microscope is the most feasible.

This is far more difficult to fake than making a symbolic text.

"It seems that we have to report to the boss that in addition to the increase in the price of purchasing the program package, we also have to pay an additional amount of money for making micro-drawns." Several people confirmed that they had anti-fraud measures.

When several people sent their ideas to the seller, the seller hesitated for a moment and chose to agree.

However, the express delivery address left by the seller is San Francisco on the other side of the ocean.

Moreover, this express address is just a public address.

Obviously, the other party was also afraid that this was a fishing technique.

If you have such a killer weapon in your hand, if someone uses this method to fish, you will be completely spent in the cell for the rest of your life.

However, when the seller knew that this group of people came from the other side of the ocean, he felt a little relaxed.

Seeing the seller agreeing, several people quickly went to the computer city near the school and directly purchased some CPUs of various eras and various second-hand graphics cards.

After confirming that these graphics cards are intact and running perfectly, these people directly found a repair point and disassembled all the chips on the graphics cards.

Soon, several people came to Master Wei Diao's home.
Chapter completed!
PrevPage Index    Favorite Next