Chapter 1766 (1/2)
Qin Feng came to the intranet.
This is the most permanent place for Qin Feng. It is also a permanent place for the world's top hackers.
Everyone is here to speak freely and exchange the experience of hackers.
Qin Feng's hacker technology is really general, so it's difficult to learn a lot of knowledge from it.
Of course, it involves too many fields.
Even if only the same field is subdivided, there are many different fields.
For example, network security, which can be understood literally.
However, network security is divided into several types.
First, it is generally divided into basic system security officers. This is similar to the Internet cafe network management. Of course, it is much more advanced.
The normal work of the company's network administrator is to basically install various systems, firewalls, configure IP addresses, etc. Then carry out system maintenance and so on. Ensure that there are no major loopholes in the company.
However, if it is a loophole in the system itself, this kind of network security officer can't help it. In addition to being able to patch and update the system, he doesn't have many other skills.
This is also the lowest end.
A little up, there's a system penetration tester.
This is an evaluator who conducts penetration testing for system security. This is much more advanced. In this kind of work, we must first learn how to invade other people's computers, find out various vulnerabilities of the system, and complete a system security assessment.
Among them, it is divided into Red Army and blue army. This is the same as the military Red Army and blue army.
The Red Army is responsible for attacking and finding loopholes. The blue army is responsible for intercepting to protect the system.
It can be said that this kind of work not only has higher demand for skills, but also naturally has higher wages.
The other is digital forensics.
This is when network intrusion, that is, after the formation of network crime, network investigators search for evidence and find relevant evidence to try those illegal intruders.
This is another area.
Of course, in addition, there are pure network security developers and other different jobs.
Any field can be divided into many different small fields.
Qin Feng is not omniscient. Therefore, in this case, Qin Feng can only see more and learn more.
”Q, when will bitcoin become popular. Now we've dug a lot. ” In the forum, someone spoke.
Qin Feng did not create an exclusive chat tool.
Although, the county section technology can also burn after reading.
But then you have to download a chat tool. It's easy to reveal flaws. Therefore, Qin Feng has not developed such a tool. But simply created a temporary chat platform.
Each time you log in, a temporary web chat window will open. Once you exit, you will immediately delete the previous chat information from your PC.
In this way, unless caught on the spot, the chat information can be protected.
Generally speaking, whether the CIA or the Homeland Security Bureau, it is often difficult to intercept hackers on the spot. After all, most hackers have relevant defense means and relevant security deletion programs.
Of course, this deletion procedure may not be safe.
Many times, the information can still be found.
When you quit this web chat platform, the information will be gone. You can't find it back. After all, the background is on the website.
”Soon. Dig as much as you can! ” Qin Feng said with a smile.
This is a way to make money.
Those investment banks, it is estimated that they will not promote it until they reach an upper limit.