Today's Internet cafes are the source of evil-Internet cafe intrusion methods

Source: Internet
Author: User

First, we should understand the objective environment of the damaged Internet cafe and the field monitoring of Internet cafe personnel. Pay special attention to the absence of closed-circuit television monitoring. If the Internet cafe staff are quite familiar with your personal data, stop and avoid any trouble. Some Internet cafes need to show their ID cards and do not destroy them. The following methods of destruction are different in sequence. Please use several damage combinations flexibly. The operation details are not detailed.
1. Coms damage

Let's try it out. A lot of computer system problems are caused by COMS setup errors !! For example, power supply setting error or hard disk data debugging error. Many of these invisible errors are not easy to find. The most obvious reason is to add a boot password before leaving. It takes only a few seconds for the Administrator to remove the COMs password after several minutes.

2. CIH-type viruses that damage CIH are powerful enough.

Apart from the CIH virus, there are also many other viruses that attack hardware! Set the virus attack condition to when we leave.

3. Hard Disks damage hard disks and damage software. The hacker station (virus station) has a more severe new virus every day. The old virus "kv300 logic lock" is very powerful, and hard disks cannot be started! HD-FILL and other worm software is also highly lethal, hard disk instantly filled with waste files, hard disk can not be used! On the contrary, it is a low-cell hard disk virus, which will physically damage the hard disk, and will be decommissioned if the low-cell hard disk is used!

4. overclock damage

Super frequency is harmful to computers. We all know that! The system stability caused by overclocking is implicit and difficult to detect! CPU soft overclocking, graphics card overclocking, hard disk overclocking, etc! Overclocking also easily attracts black and blue screens. This method is sinister and requires attackers to have a considerable degree of computer knowledge.

5. Required Course for damage to the System

Deal with network management software (Meiping, master of network management, etc.) and pay more attention to new cracking methods on hacker websites. It is easy to find. We also need to find hidden system clone files (such as pq6). We need to add at least some viruses to the attack. At the same time, we also need to find hidden partitions for necessary damages. We 'd better also hide it to hide the internet cafe partition (File) and so on. When you do this, you must never show your mercy. If you are benevolent to the enemy, you are cruel to yourself! In addition, it is necessary to destroy anti-virus software and firewalls in Internet cafes, such as removing kv3000 and installing fake kv3000. At least anti-virus software should be infected with viruses. Find the software that broke the firewall on a virus website. Of course, we can also download other system protection software to lock windows and prevent others from setting and saving them.

6. Cracking passwords many passwords are useful on computers.

The passwords of network management software (such as Meiping) can be cracked. The hacker station has the information you need. If you don't know, ask senior hackers. They are willing to help you modestly. The shared password of the LAN can also be cracked (I only came into contact with the cracking information in April), extending the damage to other computers, anti-war results. If you have time, crack the internet password of the proxy host of the Internet cafe. Simply install a keyboard ghost or other key record software, and the password of any account cannot be retained. Software cracking the OICQ password is everywhere. Cleverly publish the obtained account and password to the rest of the world! It is best to steal the Internet cafes! Insecure Internet cafes are hard to be consumed, and no consumers are the biggest damage to Internet cafes.

7. Trojan damage installation on a computer has a long history and the most experienced method of destruction

Trojans can remotely control the computers in Internet cafes and cause remote damage. Such articles and software are introduced without wasting time. It is best to install the Trojan on the Internet proxy host of the Internet cafe. The key is to select the right Trojan! Use bundled software to bundle viruses and Trojans with the main software! (Such as IE and OICQ ). Hacker websites and Trojan websites will surprise you!

8. Other simple hardware damages, such as blocking the reset key of the host (equivalent to holding down the reset), and entering the water accidentally

For a high risk, post uncivilized articles on other large websites, attack Zhengfu articles, and help Internet cafes attract a lot of "political" problems. By posting more articles, public security personnel will take measures! Great trouble! You can also make your computer a stepping stone and attack more famous websites. no matter whether the website is successful or not, IP addresses will cause problems for Internet cafes!

9. More damages pay more attention to fault and repair articles in computer books

There is too much experience to absorb! There are many annoying ways to destroy it. Hacker website to learn about the latest anti-DDoS knowledge! We also have a full understanding of China's criminal law.

Think about the order before you break it down. It is best to step on the site first to learn first-hand details. Do not frequently access the same Internet cafe, which is easy to attract attention. Personal security must be sufficient. It is best to make a full screen covering of the quick cut key (way), to prevent Internet cafe staff approaching. If it is discovered, it must be XXX (not a younger brother's strength. I don't know what to write ).

Finally, I hope you will not use these methods to do anything improper.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.