Zhengyan nodded, and I took the mobile phone and the bottle in my hand.

Zheng Yan did not immediately turn on the mobile phone. Instead, he took the mobile phone and observed it in his hand. He found nothing unusual in the appearance. Then he opened the bottle and took out the finger inside.

Zheng Yan used that finger to press the big key in the middle of the mobile phone, and soon the screen lit up. The real fingerprint was successfully unlocked, and then a password box appeared to let you enter the password.

Seeing this interface, Zheng Yan can't help frowning, which makes me feel strange. I wonder if Zheng Yan is not a super hacker? How to unlock a mobile phone password will reveal such an expression?

"What's the matter? Is that hard? " I asked.

"Young master, it is like this." Zheng Yan replied.

"Generally speaking, mobile operating systems are developed for Linux and UNIX, so it is not difficult to crack ordinary mobile phones, because their source code is open. But this mobile phone is different. It's obviously an independent operating system. Just like the core field of the Chinese military, it uses an independently developed operating system. In this way, the security is greatly improved, and it won't be easily cracked and broken by others. And the mobile phone is obviously an operating system developed by ourselves. The source code is closed. I'm afraid no one knows about it except the author. In this way, it is more difficult to crack such a mobile phone password. "

When I heard Zheng Yan's words, I was stunned. I didn't expect that a small mobile phone was so mysterious!

What's the identity of the man who followed me? A mobile phone used is so hidden, in order not to let the secret inside out, it also uses the self-developed operating system.

What kind of secret is there in this mobile phone? It's really strange.

"Can you skip the mobile phone password and copy the contents? Like call logs, text messages and so on. " I thought about it, and then asked Zheng Yan again.

"No way." Zhengyan shook his head.

"This mobile phone is completely closed, and since the other party uses such a secret locking method, it will certainly do something else. If you want to rely on external force to take out the contents, I'm afraid this mobile phone will start a self destruct program."

I frowned slightly. I thought it would be easy to break such a mobile phone if I could find a hacker who is proficient in computer. I didn't expect that I thought too much. In fact, it seems difficult to break this mobile phone.

"Now what? Do you want to give it up? " I'm not reconciled. This mobile phone is so mysterious that I think it may provide me with important clues, which makes me reluctant to give up.

"There's a way, but it's a very old-fashioned way." Zheng Yan thought about it, then said to me.

"What can I do? As long as it works! " I said quickly.

"It's to try out the power on password one by one with all the number combinations." Zheng Yan said.

I feel depressed in my heart, thinking what kind of method is this?

Who knows the length of his password? So many numbers one by one, try to go to the next monkey year?

"This is unreliable. How can we try so many combinations of numbers?" I asked.

"Of course, it's not human effort." Zhengyan shook his head.

"I have a computer that can filter passwords one by one. That's more than a block."

After hearing Zheng Yan's words, I suddenly realized that Zheng Yan wanted to use this method to try. Computers should be much faster than human power.

"But for such a mobile phone, I guess if the password is not entered correctly several times, you have to start the self explosion program, right? In this way, the mobile phone is not directly destroyed? " I thought about it and raised my question again.

"I have a way to prevent him from triggering the self destruct program of the mobile phone. It's very easy to bypass this, because it involves hardware, and you just need to modify the instruction." Zheng Yan opened his mouth and explained. Then he opened a backpack he had put on the sofa.

To my surprise, there is a small password box in this backpack. It seems that this should be Zheng Yan's tool. As a super hacker, his own tool should be taken with him.

Zheng Yan opens the password box. Inside lies a very thin and small notebook computer, which is estimated to be about 10 inches in size. However, it is not a tablet computer, but one with a keyboard.

There are all kinds of tools beside the computer that make people feel dazzled. It seems that these are the tools used by Zheng Yan's hackers.

After turning on the computer, Zheng Yan picked up the mobile phone in his hand and observed it. Then he looked in the password box and found a black cable to connect the mobile phone with the computer.

Zheng Yan's fingers beat on the keyboard quickly, and soon the computer entered the interface.Zhengyan started a program in the shape of a black frame and began to type letters on the keyboard.

I looked at the computer screen without blinking. I was dazzled by all kinds of dense codes on it. I said I couldn't understand it at all.

How do these hackers understand what they operate? I'm a layman. Anyway, my head hurts when I look at it.

Zheng Yan quickly clicks the enter button, the black box disappears and a progress bar appears.

When the progress bar was finished, Zheng Yan said again, "this mobile phone does have a self destruct program, but now I have bypassed it and modified the instructions. Now how to enter the password will not trigger the self destruct program inside the mobile phone. Now we have to try out the password one by one."

Zheng Yan then clicks an icon again. The next moment, the same screen will appear on the interface as on the mobile phone. There is a box for entering the password. Here are some numbers.

Zheng Yan once again operated on the computer, and then the password was automatically entered on the screen of his mobile phone.

"Let it combine by itself. There's always a right password." Zheng Yan said.

"How long will this take?" I asked.

"It depends on how long the password is set by the owner of the phone." Zheng Yan thought about it and then replied.

"If it's just four or five digits, then one morning is enough, but if it's longer, it may take about three or four days."

www.novelhall.com , the fastest update of the webnovel!