One line of code to modify power-on password, a picture so that a computer crash! You afraid of it?

       Programmers busy, busy knocking the code debug, programmers sometimes very busy, retired and sit is to start from the black, since black piece is more and more also made out a poem:

        Plaid shirt shoulder bag, less money, then die early,

         Late and sleeping late overtime, nothing on the product and noisy. "

It belongs to Art comes from life, higher than life, with the hyperbole.

       As a programmer higher threshold for professional employees are generally relatively high IQ, which means EQ is more important than IQ in circles programmer, said the hype, can not solve the bug as despised.

       Temper and programmers are more straight, like a computer, right is right, wrong, logical sense, which also led to a lot of programmers to create friction with other departments or employees with colleagues, usually the little things okay.

☄ simple spoof: Modify the power-on password

       In fact, this is mainly for those who forgot to prepare the computer power-on password, but also has the function to modify the power-on password, as long as you remember to do useful things like, it is very simple line of code:

net user %username% yourpassword;

       As long as the "yourpassword" to change the password you need it. Skip perfect power-on password is modified while the power-on password.

☄ Advanced: a picture can control your computer

       You just open a picture, your computer will be black, say it is not hard to believe? This program is called "  Stegosploit  ", can use the information to hide a picture of "Steganography" technology, malicious code is written into the image pixels, and then use html5 may submit scripts dynamically Canvas element reduction.

       Essentially it is a mixed picture code and scripts, this program can design a variety of functions, such as allowing non-stop computer to download and install unwanted software crashes blue screen and so on.

       Then the picture to the web, when you open this image in your browser when a malicious program on your computer to start running, it is generally difficult to know.

☄ Advanced: enter your cell phone, check your information

       There is little work in the computer privacy of personal information, but the phone is not the same, the company now has a wireless router so that employees online, but it also has some security risks, the company's router technology will be able to know a little enter, re-enter the router through the router into your cell phone is not difficult.

       The simplest is to know which sites you visited, what interested in, and then use some of the tips to get permission to your phone, spy phone book, text messages, call records, if the cattle that hackers can directly to your cell phone crack, chats, your social software, all kinds of shopping.

       Of course, this is only the tip of the iceberg, if you find that your computer often crashes, often blue screen, power does not really open, shut authorities can not, when the situation of inexplicable Caton, crazy pop, etc., in addition to taking into account that they have no browse some good sites , but also carefully think about if there had been offended programmer.

       For those who love programming, there are a group of small partners together to learn more with less! If you are interested or in need, then we have an introductory programming learning exchange clubs , as well as learning video files, are welcome beginners and advanced in little friends!

Published 520 original articles · won praise 132 · views 80000 +

Guess you like

Origin blog.csdn.net/HUYA69/article/details/105140645