Font
Large
Medium
Small
Night
PrevPage Index    Favorite Next

Chapter 398 37 Antivirus Coffee(4200 words(2/2)

It is not the commonly used free civil version, but a commercial encryption kit known for its stability and security. It is indeed amazing and has no loopholes at all.

If there is a vulnerability, no matter how complicated the password is, he can directly break into the vulnerability and extract the file.

But now, this seemingly traditional commercial encryption kit is similar to what he did at the beginning.

It seems that there is no new idea, it is a very conventional method, but it is extremely stable and has no loopholes in reality.

A great trick is not crafty. The more conventional things are, the more they have experienced gradual improvements.

Since there are no loopholes, we can only brute-force cracking.

This cannot defeat him.

Many of the file packages he downloaded in his previous life were deeply encrypted by many film sellers who were in a spirit of sharing, but in fact, they were deeply encrypted for profit.

As a professional, he will never contribute even a penny to the cereal group owner. This is the shame of their friends circle. They even often engage in competitions to see who breaks the conspiracy and tricks of the cereal group owner first, so he has rich experience in breach.

When writing the breach program, about an hour later, a breach script for the traditional optimization encryption suite used by Lin Zhishu was written.

Import and decipher the algorithm starts running.

The initial setting range ranges from 1-digit to 9-digit numbers. Each character code includes uppercase and lowercase a to z, and also includes all numbers and special symbols.

Then Shen Chong focused on entering some known information with the highest possibility, such as Lin Zhishu's birth date, Xinxin's birth date, Lin Zhishu's last four digits of ID number, mobile phone number, and even his own mobile phone number.

I started trying and calculating. Unfortunately, all the suspected possible values ​​were quickly failed to try and miss, which shows that Lin Zhishu's password setting should not be regular.

Then there can only be more than fifty possibilities for each character, and each possibility will continue to trial and error from 1 to 9 digits.

The calculation volume estimated by the script is extremely high. With the performance of the high-end purple painted machine, the decoding time initially estimated by the Breaking script is as high as more than six months.

Master Shen felt a little headache, but he was not panicked.

Raise troops for a thousand days, and use troops for a while.

I have built so many servers myself, and Isn’t it just today?

I decisively copied the encryption algorithm of the file package and copied it into the personal data center in the next computer room, and the server performance was fully fully loaded.

The estimated cracking time was shortened from more than six months to more than twenty days.

This is still too long.

But this is still not difficult for him. Smart people can always find ways to solve the problem.

There is nothing difficult in the world, I am afraid of the iron-headed kids.

He immediately continued to remotely import the copied algorithm sub-file into the Shichu Technology Company server, setting the upper limit of computing power call to 80%, and the commercial server worth tens of millions there was slowly starting silently.

Fortunately, Shifa Technology has completely suspended the release of the 2.1 version of Tuning King recently, and the sales of the popular version are becoming increasingly stable. The number of visits and downloads of the website servers is no longer explosively. The 3.0 and 3.1 versions, which require extremely high computing power, are not officially limited.

His computing power mobilization will not affect the company's operations.

The estimated remaining time suddenly shortened and became ten hours.

Very good, just hang it here and set up an association prompt. When the breach script is successful, the program on the computer will automatically dial the phone and knock it out of the bed.

Shen Chong went to bed happily. Before he knew it, he was already past two in the morning and was a little sleepy.

What?

Ranch design drawing?

What is that?

Do what you have tomorrow!

Today I have something more important!

Lin Zhishu's biggest mistake was that he underestimated Shen Chong's fighting spirit and cracking ability, and over-trust commercial encryption software.

Yes, this encryption algorithm is indeed impossible to crack with super complex passwords, but who would have thought that he would encounter a shameless and shameless Chen, who has both technology and servers, personally called a commercial server worth tens of millions to attack mosquitoes and kill chickens with a slaughter?

Before ten hours had passed, just four hours had passed. At six o'clock in the morning, Shen Chong woke up quietly in the noisy alarm clock, shook his head and immediately became energetic.

He looked down at the out-of-order password displayed on his phone.

It's done!

Nine digits.

It is super complex, covering upper and lower case letters and numbers, and a special symbol of * and ¥ in half.

This must be the forced memory password that Lin Zhishu himself often uses, which is completely impossible for ordinary people to guess.

But I couldn't stop the unreasonable Master Chen.
Chapter completed!
PrevPage Index    Favorite Next