The question is what year and day the pigsty password encryption today is. The answer is naturally not today or a specific day. But Qin Feng casually got an English Name: Jerry. Yes, just five letters, that's the answer.

Obviously, Jerry is the name of the mouse in cat and mouse when I was a child. The name itself is a little ironic.

In short, you can log in to the computer whether you enter the correct password or not. The only difference is that if the input is wrong, all the information in it will be cleared after slow login.

In the end, I got nothing.

As for whether Qin Feng will lose wrong, he is treated equally.

What if you lose it wrong? There's no way. Get the information again. There's really no way.

After all, some sacrifices must be made to ensure the confidentiality of information.

Fortunately, these sacrifices are not likely to affect anything.

As long as you are careful, you won't make mistakes.

If you really want to make a mistake, you can only blame yourself for being careless.

Before starting, Qin Feng went out again, determined that the room was locked, and locked his door.

Although there should be no FBI breaking in here, caution is always harmless for Qin Feng. The more cautious the better, the less likely it is to make mistakes.

After confirming that everything was safe, Qin Feng began to log in to the computer and enter the password.

After that, enter the password again and log in to the dark network.

Now dark net is a website hidden in the dark side of the world.

You can't enter the URL directly to access this website.

Because this website is often changed, there is no fixed website.

You must start a login device for dark network download, calculate the web address of dark network through this login device, and then use a specially built browser to hide your IP address and privacy data to enter the dark network.

This should be described in fairy Xia novels. The organization of dark net floats in each hidden void. It has no fixed position and constantly drifts. It is always moving and difficult to lock.

Even if you enter, you also need to verify your identity and password, and after you enter, everyone's information is hidden.

Of course, Qin Feng, this is the mother end. The rest of the people are Zi Duan.

Qin Feng released the information of extraordinary spectrum in a secret hacker Level Forum.

This hacker level forum is only allowed to enter by hackers who have passed senior certification. The rest can only enter ordinary areas.

Here is the core area.

And everyone, posting, will have a unified format. This unified format is a sentence: where there is sunshine, there will be shadows.

This sentence is a unified title. After the title, it will be followed by various topics. At the end of this topic, we will manage.

If not, it proves that the hacker may have been controlled. Then, he can use what he knows and others don't know to leave information.

At that time, according to Article 3 of the hacker convention, all hackers had the obligation to save those caught hackers.

At that time, everyone will find ways to save.

And a little neglect, I'm afraid no one will care.

Qin Feng offered a reward, and someone replied soon.

Of course, reply is not really going to reply, but a praise.

In this forum, like means someone answers the order.

There is no need for a deposit, no need to sign a contract or anything.

If you want to do it, give it a compliment. This does not show any of your personal information on it. Just let the publisher know how many people do it.

When you're really done, go and have a private conversation.

To complete the remaining transactions.

In this process, it is purely completed by each other's credibility. There is no convention.

As for each other's credibility, what do you rely on to maintain it? Naturally, it depends more on character.

This character can't maintain anything.

The maintenance of character has always been the most bullshit. Because, when there is character that day, character is used to corrupt.

The maintenance of credibility depends on the hacker convention. You either don't join the dark net. Once you join, you must abide by the hacker convention.

If you don't comply, you will be attacked by all hackers.

Of course, the fight between hackers will not be your fist or my vulgar foot.

The battle between hackers is the information war between them. Use their own means to attack each other and steal each other's information. Once stolen, the other party's information will be made public.

If all the hackers hit you together, you're finished. As a hacker, nothing is more tragic than the exposure of personal information.

To Qin Feng's surprise, Qin Feng released the information at noon and received the information at dinner in the evening.

Two pieces of information have been placed in the hacker database.

The database is inaccessible to anyone except Qin Feng.

Except that the person who uploads the data can access it, if you want to access it, you must obtain the authorization and permission of the data uploader.

It is also convenient to communicate with each other.

Qin Feng's current identity is also hidden, with only one code. For the whole organization, Qin Feng is Q. But privately, Qin Feng is Leon. At this time, if Qin Feng wants to obtain this information, he needs to put the money into his public account.

At present, because the virtual currency has not been developed, Qin Feng has adopted a special electronic currency for the time being.

Dark net electronic currency, at present, is issued by Qin Feng. It's 10:1 for real gold and silver, and 1 dark net currency is equal to $10.

Qin Feng directly put 10000 dark net coins into the other party's account and completed the transaction.

Subsequently, Qin Feng got the unlock password and got the file.

As for how to cash these dark net coins, at present, there is no good channel. Because it can't spread yet. This is issued by Qin Feng on the dark net, which can't be circulated, so it doesn't have external transaction value.

At present, it is only used as a voucher after earning remuneration. Once the virtual currency is obtained in the future, the dark net currency can be traded immediately and can be used to withdraw cash.

Of course, if you really need money, you can also tell Q, that is, Qin Feng. Then provide a public address, and Qin Feng will send someone to deliver the money. However, it takes time and will be very troublesome. It can't be arrived in a short time.

However, there is no way to do everything for safety.

For a hacker, the best security means is not known. Once known. Then it's not safe.