But it''s no use explaining. If Huo Bufan really tells Ning Xueqing everything, she says more is in vain.
Most importantly, Ning Xueqing didn''t question her this morning. Is Huo Bufan lying? In fact, he didn''t say this, or did Ning Xueqing do it on purpose?
The story of the axe thief tells us that when you doubt something in your heart, no matter what others do or say, you will take the initiative to pull him in the relevant direction.
Therefore, pansimi doesn''t think the first possibility is very big. She thinks Ning Xueqing really knows everything, but she doesn''t say it on purpose.
Either want to humiliate themselves, or take the opportunity to let her retreat.
Thinking of this, pansy''s anger was speechless.
After staying at home for so many days, I didn''t do what I wanted to do. Instead, I was sold first!
"OK, you''re great!" Pansy stared at Huo Bufan and left angrily.
Looking at her back, Huo Bufan lost his smile.
I didn''t do anything wrong. On the contrary, she made mistakes first. How did it happen? It seemed that others were sorry for her.
After closing the door and leaving, Huo Bufan didn''t go to Ji''s branch, but came to an Internet cafe.
After helping Huo Bufan collect all the emails of the Huo family in the past two years, the unknown online expert put forward a request to compete.
He has been waiting for this competition for more than ten years. I really don''t know what kind of psychology he can stick to.
However, a person who can have such ability on the network must be persistent enough. Without persistent psychology, it is impossible to reach the extreme in any field.
Therefore, some people say that any top person in the industry must be mentally ill. This sentence is still reasonable.
After Huo Bufan came to the Internet cafe, he opened the temporary mailbox and sent an email to the unknown Master.
The title and content of the email are only two words, very simple and straightforward.
"Come to war!"
When the email was sent to the unknown Master''s computer, the man with messy hair in front of the screen, like a chicken nest, immediately came to his senses.
He looked at this email with shining eyes. His wish for many years was finally coming true. The man who had defeated him finally gave him another chance to turn defeat into victory!
Over the years, unknown masters often challenge all kinds of great gods on the Internet, but no one can beat him.
To be exact, the only failure since he could play computer was that Huo Bufan took it away.
This is equivalent to nailing a crooked nail with a perfect flat plate in front of OCD patients.
Without pulling out the nail, he will never be able to really live a personal life.
Within five seconds of e-mail acceptance, a large number of cyber attacks followed.
Huo Bufan didn''t give the unknown Master too much time to respond, because he knew the man''s power. Giving him time is not giving himself time.
The most common way of network attack is to create a large amount of spam to break through the other party''s network defense, and then try to open a channel from the back door of the system, so as to seize the control of the computer.
The process is familiar, but it is difficult to do it.
Because the unknown Master''s computer system is not the type commonly used by ordinary people, but a very primitive DOS system.
This kind of system was only popular when computers first appeared. It is mainly convenient to program, but it is also troublesome to use. Whatever you want to do, you have to enter a command first.
Ordinary people click the mouse, but they have to type a few English words.
Each step has different English commands. If you want to skillfully control a computer, you must remember these countless professional words.
Therefore, the DOS system that can not be easily used by ordinary people has been eliminated. Now only those who are good at programming and hacker industry will continue to use it.
The original DOS system is more intuitive than the system used by ordinary people. The attack launched by Huo Bufan can be said to directly face the unknown Master.
When his own alarm software issued a harsh warning sound, the fingers of the unknown Master had subconsciously bounced on the keyboard.
A large number of commands were sent out, and the self programmed counterattack software counterattacked along the origin of the network attack.
Both of them are experts in this field. While launching an attack, they look for each other''s real IP address.
Huo Bufan started five seconds first and had the first opportunity, but he was still one second slower than the other when identifying the real IP address.
He just found the IP address of the unknown Master, and the back door of his system has been attacked.
Internet cafe systems are pirated. The so-called firewall and anti-virus software can be almost completely ignored by real hackers.
They are too familiar with this system. Even if a large number of patches are launched every month in order to make up for backdoor vulnerabilities, the more complex the system is, the more vulnerable vulnerabilities are.
If you attack me, I''ll block the back door and fight back.
Now it''s who''s faster to break through the back door and surpass the other party''s repair speed.
Huo Bufan has done his best. His fingers crackled on the keyboard, and his commands line by line dazzled the audience.
Several young people nearby turned their heads, but they couldn''t understand anything. They looked at Huo Bufan curiously and doubtfully, and didn''t understand what the man was doing.
Come to the Internet cafe and don''t play games well. What do you want to do by crazy typing on the keyboard there?
In less than five minutes, the main engine used by Huo Bufan suddenly made a dull noise, and then the main engine squeaked, emitting sparks and black smoke. Then, all the machines in the whole Internet cafe shut down instantly.
Looking at the black screen, Huo Bufan pushed away the keyboard in front of him and shook his head slightly.
After many years, he has fallen behind in this field and is no longer the man who was almost invincible.
The unknown Master has always made progress in this industry.
One is still in place, the other has made progress for more than ten years, and the gap between them has widened greatly.
In five minutes, the unknown Master hacked Huo Bufan''s computer system. Not only did he succeed in burning his hard disk because of the too fast speed, but also the computer of the whole Internet cafe was blacked out.
Those who were originally playing games, chatting and talking about work were scolding angrily.
The network manager ran over and was sweating. He didn''t know what happened.
The power supply is good, and the network is also good. Why is the collective power off suddenly?
Huo Bufan called the network management, changed a new machine, and then turned on the computer again.
The unknown Master didn''t do everything completely. He has found out that this is the IP address of an Internet cafe, so he only let the computer black screen once to prove his victory. Otherwise, with his ability, it is not difficult to burn the hard disks of all computers in the whole Internet cafe.
These computers are connected by a router. Even if they are connected to a splitter, it makes no difference.
They are connected to each other. Hacking into a machine is equivalent to hacking the whole Internet cafe.
After the computer restarts, Huo Bufan logs in to the mailbox, and a new email has appeared in it.
After opening it, he saw a line in the text: "you are too weak now, which makes me very disappointed."
Huo Bufan can almost imagine how disappointed the unknown Master sitting opposite the computer is now.
After waiting for the challenge for more than ten years, he won so easily. The imagined war did not appear, which made people feel like doing their best but punching in the air.
That feeling is very uncomfortable.
Huo Bufan has no excuse. His current strength is really far from the other side.
Not only the understanding of the system, but also the way of attack. In more than a decade, the other party has evolved to a point almost like God. But he, because he hasn''t touched these things for too long, is still using the old means of more than ten years ago. How can he be an opponent?
At this time, the second email came, which said: "are you belittling me, or have you really made no progress at all? I can see that you are still using the tide tactics of that year. "
The so-called tide tactics refer to filling each other''s network with a large amount of junk information, so that he can''t identify which information is useful and which is useless from these information. When the other party distinguishes, you can fish in troubled waters and take the opportunity to attack the loophole in the back door.
However, after more than ten years of development, tide tactics have long been replaced by more advanced technology.
Although essentially the same, the means have evolved too much. Huo Bufan has enough time to do one thing for others to come and go back several times.