I’m Really a Superstar Chapter 278
Advertisement
Chapter 278
Chapter 278: Hacker Zhang Ye!
In the bedroom .
It was 7PM, so the night was still young .
Zhang Ye drew his curtains and placed the laptop on the table . He tested the internet connection and mouse pointer then stretched his arms a little and prepared for action . Although he had ‘eaten’ the two types of computer programming skills experience books, he had never put them to practical use before . He did not know if he could do it, nor did he know whether the experience he gained was enough to let him do what he planned to do, or rather, how much he could execute the plan with his experience . There was never enough of these experience books . It seemed like he could keep gaining more experience no matter how many he ‘ate’ . The more he ‘ate’ the more experience he received . If he only ate a few, then he would certainly only know a trivial amount . The 11 [ Computer Programming Skills – Network Technology Experience Book ] could not be considered few, but to be on the safe side, Zhang Ye still needed to know how he’d do .
Zhang Ye found a foreign website and with the computer knowledge from his world and the skills experience that he’d gained, he was soon doing his thing . He installed an add-on for his browser . This was something similar to his previous world’s Firefox browser’s add-on called Go2 proxy, but was named differently in this world . The browser was also a different one, but they were similar in most aspects . After installing the add-on and activating it — after around 2 minutes, Zhang Ye had successfully loaded that foreign website . This was actually one of the simplest forms of proxies .
Hot pictures started loading up one by one!
One by one, tempting videos of hot foreign women came into view!
Zhang Ye looked hard at this outstanding foreign website that he had just loaded up with his outstanding skills! He couldn’t help but exclaim ‘Godly!’ . Although it wasn’t a difficult technique, Zhang Ye knew that he never had such skills in the past!
After the warm up!
His confidence was boosted!
He started off by browsing some programming-based websites and researched on this world’s development of computer programming, techniques, and software, etc . After spending the whole night, until midnight, when the public lights were turned off, Zhang Ye finally took a rest, rubbed his eyes, and took a deep breath . He found out that this world’s computer systems, hardware, and software had no big differences to those from his previous world . The principles of it were all the same, like the types of programming language used and the concept of programming . The main differences were only the naming conventions . For example, those operating systems that were like Microsoft Windows, but were not called Microsoft Windows were also available in this world . Even the commands were the same . After comparing for a long time, Zhang Ye had reached a preliminary conclusion . This world’s operating systems and hardware, etc were slightly less advanced than his previous world’s . It was behind by a few years, except for the technology in server firewall and antivirus softwares, which were somewhat more advanced . This was why amateur hackers like those from his previous world were not so apparent in this world . This world’s network security protocols were of a much higher standard . Any download of a firewall software would be able to block out 99% of non-professionals . Even professional hackers would have to put in some work, as there weren’t many people silly enough to not install a firewall or anti-virus software on their computer . As such, there was no chance of any mass amateur hackers .
Advertisement
This resulted in the current situation . There were only very few hackers in this world and they were not as rampant compared to Zhang Ye’s previous world, but conversely speaking, the hackers, who were more well known here, had more sophisticated skills and were at the top of the pyramid . They could do as they wished in the online world .
These were the main differences between the two worlds .
Operating systems, hardware, programming languages, and software architecture were also of similar origins . This was a good thing as it meant that Zhang Ye could conveniently use his past experience from his previous world . Even if there were slight differences, Zhang Ye also had the experience he gained from the skills experience books . The experience he gained was knowledge from this world and could be used here . From this point, there was nothing Zhang Ye needed to worry about . However, one thing that gave him a headache was the security of networks here . Even before he could even satisfy himself with the thrill of hacking, he would already be stopped by the firewall?
He still had to do it anyway!
Li Tao wouldn’t be able to escape him!
Zhang Ye had already set his mind to the task and did not hesitate . When he went to the bathroom outside, he saw no lights from the gap under Dong Shanshan’s room door . She must’ve fallen asleep, so he made his way back to the room silently!
Let’s get started!
By trying out a little hacking!
This world’s hacking tools were also available freely online, but most of them were not available in it’s source code form, so they couldn’t be considered open-sourced . In Zhang Ye’s previous world, the hackers there were very particular about open-sourced . They felt that it was a general rule and honor to list them in open-sourced forms . This was where the notion of such matters differed between the two worlds .
Zhang Ye began downloading a simple software — This was a hackers knife, an essential tool to hacking . Without them, you couldn’t even find the IP address of someone, let alone attempt to gain access .
Command injecting plugin .
Remote access Trojans .
Event logs clearing software .
Etc, etc, etc . Zhang Ye downloaded a list of tools .
Then, he started testing this world’s software and trojan horses, and as expected, they were the same as his previous world’s . It was just like any other common hacking software . You are going to say that they were useless, right? That’s not really it . Such softwares were normal and could be used . but to say if they were effective? This sort of hacking software that could be freely downloaded off the internet was not so effective . They might not even break past a firewall, especially when this world’s network security was so tight . The chances of them being intercepted as malicious code was too high . The truly world class hacking software was all written by the hackers themselves . These hackers wouldn’t even share them with their hacker friends, let alone put them up on the internet . Such softwares were considered their own trade secrets .
Advertisement
Another reason why common software and the world class hacking software had such a gulf of a difference was mainly down to the system loopholes that these hackers knew of . The common hacking software had already been researched thoroughly by others, such as the operating system developers or network security companies . These system loopholes had been patched by these researchers . Unless you were using a pirated system that did not get updates, these genuine operating systems would get patched with every update . Then, the hacking software’s effectiveness would greatly decrease . It might not be totally ineffective, but its damage would be considerably reduced . However, a world class hacking software was different . It could invade a system based on the creator’s own knowledge of loopholes and control of the operating system . Besides the creator, no one else would know of the loopholes . As such, the operating systems developer would not be able to patch these security loopholes . They would not be able to know how the hacker invaded either . Such confidentiality was the reason why world class hacking software has such widespread damage and basically could not be stopped!
But Zhang Ye read a thread that explained that there were only about ten world class hacking softwares in this world . Of course, these softwares only appeared in this world slightly over ten times . And naturally, all of these have been patched after being discovered, so they were no longer as effective . Although it was certain that there were many other undiscovered hacking softwares, it could also be seen as the reason why such softwares were extremely rare . It was comparable to a top pugilist’s weapon . The world class software or trojan horses — were those divine weapons, precious and rare . To exploit a loophole that even the software developer did not know of was already extremely difficult and this world’s software developers were a lot more reliable than his previous world’s . Yes . Once a vulnerability was found, one still had to take into consideration the nature of the loophole to exploit it with either a software or trojan horse . This was prohibitively difficult to achieve .
This was the reason why such software was so rare . Zhang Ye did not think too much about it . What he needed to do now was to get into the SARFT’s network and locate Li Tao’s workstation .
Advertisement
- In Serial11 Chapters
Torn Asunder
Demons and devils are only myths... until they're not. An outcast detective, criticized for his crazy ideas, stumbles upon a case that could prove his wild theories true. Mysteries abound as a disturbed man struggles with his inner demons, wreaking havoc upon the physical world. Both hold pieces of an ancient puzzle that could plunge the world spiraling into chaos. Will their paths lead to salvation? Or will it tear the world asunder?
8 208 - In Serial32 Chapters
The New Babylon
A lost goblin with patchy memories from his past life remembers, with the help of a vagabond god, who he really is.He then start his new story in this unknown world. I am not a native english so do point out the errors you may find
8 133 - In Serial21 Chapters
An Awful Story
An Awful Story makes use of polls and reader comments to decide the direction of the story. You awake in an unfamiliar tent. You have been called here, but by who and for what? Violence flares all around you, but are you an instrument of (peace) or (war)? An Awful Story currently receives a new chapter once a day to allow for readers to participate in polls and discussion.
8 358 - In Serial7 Chapters
Blackjack Thorn, Space Pirate
A thirteen year old stowaway throws a monkey wrench in what was to be a simple heist for Captain Blackjack Thorn, his partner Campo Tupua, and the crew of the Privateer Green Lady. Lucky for him, the crew was actually a group of elite Marines that worked undercover for the Empire. As they discover the events leading up, Blackjack Thorn uncovers a plot to overthrow the Monarch. Now thrown into the midst of intrigue, the crew of the Green Lady must protect the stowaway and themselves from forces seeking to wipe them all out.
8 160 - In Serial31 Chapters
Silence ✔️
Zelda Harkinian is a girl with impaired hearing and has been bullied mercilessly for it her entire life. Years later, one of her former tormentors, Link Forrester, sets out to make amends, in hopes of earning her forgiveness and help with the new problems he now faces. ••The Legend of Zelda and its characters belong to Nintendo. Cover art was created by Finni Chang. If you would like your art removed, please pm me!Inspired by the Japanese animated movie "Koe No Katachi" (A Silent Voice). All writing is mine. Please do not repost my work anywhere else.Highest Rank: #1 in Zelink3rd place in the Popularity Contest under the Modern AU category for the Zelda Watty Awards 2018!Word Count: 52KPublished: January 22, 2017 11:07 PMCompleted: May 2, 2017 10:51 AM-KatyWritesStuff- ©
8 174 - In Serial56 Chapters
Is it worth it? (Naruto fanfic)
Naruto lives at the orphanage, is everyone's favorite nii-chan, and is the only person the other kids will listen to. Naruto however, is beaten and starved there. This causes the blonde to fall into a deep depression, and in a flash of hope, the Hokage allows Naruto to join the academy early after his 4th birthday.With an especially traumatizing birthday, Naruto stops talking altogether. With the help of "'Rama-sensei," Naruto goes to great lengths in the ninja ranks.Naruto makes friends with the most unlikely people, none of which are even close to his age- not that anyone else realises that...Can these friends drag Naruto into the light and bring back his voice?HEY GUYS, SO THIS BOOK IS ENTERED IN THE WATTY AWARDS!!!!!SO GUYS ... PLEASE all of you vote for this book on twitter XDenjoy my fan fiction love you all xoxo K.OXOX
8 180

