According to reports, this story begins at an entirely unscientific moment: Zhou Ziye, a designer who rose from creating counterfeit mobile phones, suddenly time-traveled back to the year 1984.
...This is just one of them; there's another one, also related to mathematics, which should be called a constructor bug.
In Java, if a class does not define a constructor, the compiler will automatically insert a default parameterless constructor for that class.
On a larger scale, these kinds of bugs are quite serious.
What will be the consequences?
To give a simple example, if a runtime error occurs, and the constructor doesn't receive valid input or cannot construct objects in a valid way, then they are only partially initialized, except for throwing an exception and warning its caller. If it's not final, then it's vulnerable to attack!
After reading it, Xing Baohua had to give this person a thumbs up. This person is an expert, combining some C++ concepts to look at Java from a different perspective.
This allows one to find fault from a third-person perspective, where an outsider has a clearer view.
Okay! Since someone found the problem and pointed it out, it needs to be fixed. This time, I'll call the people at the software park and ask them to take a look at this post and make some changes.
Continuing down the page, I saw someone posting that they needed a paid software subscription.
They didn't ask for anything, just left an email address.
This is something they don't want to say publicly; those who want to earn some extra money will ask the other party for their needs via email.
If we have the capability, we will create a customized software for our clients.
Lei Jun did the same thing back then, except he did it part-time through an introduction from an acquaintance. It seems that Liu Qiangdong of JD.com also did the same thing.
Xing Baohua used a botnet to register an alternate account on an overseas email website. He then contacted the other party via email.
He wanted to see what kind of software the other party needed and what price they were willing to pay, so as to understand the market situation.
I received the email reply just before I was about to leave work in the afternoon. First, I apologize, and then I'll say that I've already found the right person.
The person who made the move was really quick.
The IP address has been released, so he needs to be extra careful if he wants to hack into other people's computers.
Be prepared to destroy the botnet's hardware at any time, and use a dedicated computer to control the last botnet to clean up traces.
At this point, don't even think about using your computer for fast-paced combat. Running multiple programs simultaneously will cause it to lag so badly you won't be able to escape.
With everything prepared, Xing Baohua easily gained access to the email server of the software buyer.
He needs to access the backend to view the contents of that email address.
There is indeed a sense that curiosity killed the cat mentality.
The email server was easy to access; this guy was very confident in his skills, which should have been a good thing.
Before long, they were a little dumbfounded.
The email address is encrypted.
It's the kind of encryption that works in the background, meaning that Xing Baohua would have to enter the correct password to view the other party's email content through the background.
Xing Baohua felt a cold sweat break out on his back instantly.
If this is the case, there's only one possibility: the email website server is also the owner of the software.
I almost fell for their trap.
If someone were to set a reminder function on the password device, their location could easily be exposed.
Therefore, Xing Baohua now deeply resents his company's employee for uploading his weapon online to make it convenient for others.