Chapter 461 Solution



Chapter 461 Solution

Instead of being angry, Xing Baohua laughed, explaining that the power failure of the motherboard was due to the external fuse playing a protective role.

In other words, when he clicked on the data packet to unlock the password, the virus's destructive commands were triggered.

The virus described by the other party is quite interesting!

It is extremely destructive, and without an electrical fuse, it can severely damage the motherboard and hard drive.

The virus can instantly damage electronic components in the motherboard and hard drive; it targets capacitors.

Capacitors store electricity and can release a large amount of current instantly. It is this instantaneous increase in current that burns out other electronic components.

This guy is an expert; he's not only incredibly skilled at software programming, but he's also extremely knowledgeable about circuits. He knows exactly where to burn the circuit and where to start.

Xing Baohua began to be cautious about the data packet containing the virus.

At first, I didn't know and thought it was a regular virus, which is why I fell for it.

Now that we understand the principles to some extent, we need to develop a special scanning software to detect what kind of virus is in the data packet and what its format is.

Only with these features can a dedicated removal tool be developed to decrypt the data packets.

Otherwise, you'll burn out all your motherboards and hard drives.

If it were someone else, dealing with this kind of hidden virus would be extremely difficult, but Xing Baohua had some solutions after understanding the principle, and he also knew what the principle was.

The data packet is the outer shell; the virus inside is the real core.

To remove a virus, you need to unpack the data packet. Before you can even unpack it, the virus is triggered and instantly delivers a devastating blow.

No, peeling the shell doesn't kill the virus, and it doesn't even allow you to study what kind of virus is inside the data packet.

It's like a hedgehog, impossible to bite.

To solve this, we must first understand the principles, which are theoretical concepts.

Most of them are decrypted by reverse engineering, but you can't touch the outer shell, or it will burn your things.

The principle behind this is actually quite simple.

Xing Baohua encountered this when he was making counterfeit phones. Of course, it wasn't a virus; it was a normal file, a hidden file.

Ever since mobile phones had cameras, there has been a photo album app where photos taken, uploaded wallpapers, and other images are stored.

Early mobile phone photo albums were open; you could see anything in them just by opening them. Later models included a hidden feature.

You can upload some private photos, short videos, or things you want to see.

To open it, you need to enter a password, and only you can see it. It seems secure, but it's really just a gimmick—it fools outsiders and fools yourself, serving only as a psychological safety measure.

No matter how you lock or hide it, as long as you open third-party software like QQ or WeChat and upload pictures or videos, you'll find that everything you've hidden appears here.

Actually, it's not just chat software like QQ, but also other software like Taobao, Pinduoduo, Meituan, and so on.

Why would this happen? Then what's the point of hiding the photo album?

It does have some use, actually, because no matter who opens your photo album, they won't see your private things.

Third-party software can see it because you've granted permission.

When you install the software, you will be prompted to allow access to your photo album.

You can disable these permissions, but after disabling them, you won't be able to send pictures when you need them in third-party software. You'll have to re-authorize them, and once authorized, you'll be able to see the hidden photos and videos again.

So, this thing is just a thin layer of paper.

The technique used to hide photos in the album is similar to the technique used to hide data packets in front of Xing Baohua.

The ability to display hidden photos in third-party software relies on scanning technology that can scan out photos regardless of whether they are locked or password-protected.

Xing Baohua used this technology to find the viruses hidden in the data packets.

Of course, there's no problem with the technology; the problem lies in the first step, which destroys the outer shell the moment it's touched.

So here's the question: if we can solve the first step and just peel off the shell to get the virus out, why do we need a dedicated scanning software?

Because there's a password?

This involves another technology.

The theory is the same as with compressed files. If a compressed file has a password lock, you can only scan and view a little bit of the content, but you can't open or decrypt the file.

Any scanning software can only show you the directory inside the compressed file; you can only log in with a password or crack it.

Xing Baohua's first incident involved a virus that destroyed his server after he entered the correct password.

The bare board, hastily assembled, is plugged into the repaired hard drive. Upon contact, it loses power because the hard drive is in unlocked mode after repair, at which point the virus is activated.

Only by restoring to the original state and scanning with special scanning software can the virus be found, and the special features of third-party software can be used to unpack the virus.

Xing Baohua has the theory and the technology, but whether he will fail again is another question.

Unless this mastermind sets up a series of traps for him.

Regardless of the method, Xing Baohua had to continue according to his own ideas and order.

I found a laptop and started writing software, taking into account everything I could think of.

Not only do we need targeted scanning, but we also need to create a closed space, which serves as a self-protection mechanism to handle high and low current levels.

This creates a dual protection mechanism of software and hardware, preventing him from being tricked during the scan.

They've been scammed so many times that they have to be extra careful.

I definitely couldn't finish writing it in one day, so I took my notebook home and wrote it whenever I had a spare moment.

This chapter is not finished yet. Please click on the next page to continue reading the exciting content!

Continue read on readnovelmtl.com


Recommendation



Comments

Please login to comment

Support Us

Donate to disable ads.

Buy Me a Coffee at ko-fi.com
Chapter List