Why do hackers have a laptop?

In the words of a programmer: Although I am not a hacker, I also like to do some programming. For me, the computer is my tool. There must be many programs written by myself in my system. When operating, I must use the software I am familiar with, so that I can complete one thing more efficiently. Use the environment you are familiar with to be effective. It is very convenient to take a notebook with you when you go out. There is a familiar software environment wherever you go, such as airports, trains, cars, etc., even on the road.

 

A hacker is a person who is more powerful than a programmer, a better programmer, and a programmer generally has two sets of equipment or even more, so there is no need to say more about hackers. First of all, high-performance desktop computers are indispensable, and they are used in less "black" operations, such as scanning "broilers", using "springboards" to check information, and so on. After all, now that the anti-criminal forces in various countries are increasing, I always worry that the FBI will come along the network cable to catch you. You must have a notebook, so that you can take it out to "work" at any time, and it is more convenient to run around at any time. In the process of running, you can also black out the "chasing soldiers" at any time. According to the description of the American TV series, many hackers have emergency backup computers, which are usually in the lockers at the station, and they find a locker in the corner while running, and take them out to stop the "chasers"

When it comes to computers that can be stuffed into a cabinet, there are a group of people who must have experienced such a student age. The first thing I did when I went to college was to go to the computer city under the banner of learning to ask my parents for a learning notebook that can play games. At the same time, I secretly despise the "earth dog" roommate who just bought a desktop assembly machine. Even if you have a "light pollution + water-cooled" desktop computer, it becomes a "bus" in the dormitory, or your own laptop is the best, which can be stuffed into a satchel, locked in a cabinet, and taken out to play at any time.

After going to work, the "game attribute" of the notebook dropped, and the "work attribute" increased. What office\wps, what word\excel, what CAD\PE, and other work software occupy the C drive and memory. Laptops seem to be the best companion and source of pain for "community animals" working overtime 24 hours a day!

In the plot of the movie, hackers are always playing cool things with their laptops.

But in real life, it is only for work needs, and you can’t carry your desktop and monitor everywhere, and you have to find a socket or something to connect electricity when you do something. The notebook is easy to carry, and no one will pay too much attention to you because you use the computer in public places such as coffee shops, KFC, McDonald's, hotels, and stations. If it is really discovered, you can also run away at any time in plain clothes.

Not to mention hackers, those who engage in IT, always bring a laptop when running business. The business laptop is convenient, with its own power supply, and you can turn on the laptop anytime, anywhere to handle various affairs. In the white-collar industry, the magic of Starbucks is circulating. Starbucks coffee and laptops are a perfect match. Therefore, using a laptop in a public place is not an alternative, but easy to hide.

Hackers and computer programmers are completely different routines. General programmers have been thinking about how to build and improve the software building, such as making the code maintainable and scalable, and designing a good user experience. Interactive interface, how to perform bug fixes and version management.

The above has nothing to do with hackers. Hackers don’t need to think about the UI interface, user friendliness, or so many design frameworks, APIs, etc. issues. Hackers pay attention to reverse thinking, they are born destroyers, they need to find the fixed point of "blasting", and then carry out "undescribable" operations.

The series of actions from discovery of a breakthrough, to intrusion or interception, to the end of the campaign is always inseparable from an electronic device. This electronic device can be a mobile phone, tablet or notebook. These electronic devices will run some scans and intrusions stored in advance by hackers. some tools. One advantage of a notebook is that it has a physical keyboard that is very friendly to input. Nowadays, it is necessary to enter a password of more than 8 digits to connect to a Wi-Fi, so a notebook with a physical keyboard is a very convenient tool for hackers.

Hackers' Workhorse Machines Are More Than Just Laptops

In many scenarios, the laptop computer used by the hacker is only the front-end control computer, and the computer or server may be the one charging forward. For example, the famous DDOS attack is an attack on a certain computer or host computer by numerous bot groups captured by hackers in advance, causing the network of the host to be paralyzed or the data processing of the host to exceed the standard and cause the host to go down.

In some links of brute force cracking passwords, no matter how easy to use a laptop is, it is difficult to achieve the purpose of fast cracking. At this time, it is necessary to control the remote desktop or server to perform exhaustive guessing. The process of guessing solutions is not to try one by one, it may be a group of 10 or 100 to exhaustively in parallel at the same time, which has high requirements on the performance of the computer.

Laptops make hackers' locations less likely to be exposed

Hackers belong to a very hidden profession. They can easily invade, intercept, and tamper with other people's information through the network while typing on the keyboard. In today's society, this kind of behavior is illegal no matter which country it is in, so hackers must be prepared to run away at any time. No top hacker will be stupid enough to use his ID card to register the network and blatantly carry out "indescribable" in his own home. Those caught at home can only be regarded as amateurs, because of the existence of IP addresses, which can accurately locate the people who are surfing the Internet.

Locking an IP address on the network means that it has become a living target. There is always another mountain, and the data in the hacker's own notebook is likely to be obtained by the other party in an instant between attack and defense. Using a notebook, you can quickly and freely shuttle between cities and quickly change IP addresses among the crowd, making it impossible for others to lock you.

For a hacker, the more skilled you are, the closer you are to that permanent meal ticket.

Once you enter the prison, the door is as deep as the sea, and the permanent meal ticket is easy to get, but the food inside is not delicious. Those who can become hackers are not talented and have first-class technology. They are probably the programmers around you, but not all programmers wearing plaid shirts are hackers, and not all hackers are programmers. Hackers also need very solid boy skills. There are heads and tails of the coin tossed. With such a skillful ability, why don't you want to make some contributions to society?

Guess you like

Origin blog.csdn.net/qq_69775412/article/details/128827820