Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in hlnovel.com -> Historic -> battlefield contractors

Chapter 3200 Forged QR code

Previous page        Return to Catalog        Next page

    At a street corner, the black man turned around and said, "Can you avoid searchlights?" "You know better." Lin Rui nodded.

    The black man whispered, "Then follow me. Remember that the searchlight moves slower than our movement speed by about a few seconds. Count down five numbers. Follow the light and keep the distance from the light circle ten meters away."  , which can ensure safety.¡±

    In fact, there is no need for him to explain at all. Lin Rui and others are experts in this field. Avoiding searchlights is not that difficult for them.  However, they were quite surprised by this black man's skills. They could see that this black man was well trained, which was rare among the resistance forces.

    After all, most of the rebels are half-baked militiamen or even civilians.  There are really not many people with his agility.  The black man took Lin Rui and others to a nearby building. When he saw that no one was following him, the black man breathed a sigh of relief.  "Okay, it's safe here."

    Lin Rui turned around and looked around, and whispered, "Where is this place?"

    "It's an old house. The owner was captured by government troops last year. This place has been uninhabited." The black man whispered, "Patrol teams don't come here very often, so it's considered safe during the day.  But you'd better not get too close to the window to avoid being noticed. There are stairs leading to the attic, where you can see the surrounding situation clearly. A dish antenna can be set up there, and the communication signal is good. There are also food and sleeping bags above for you.  Use it for a few days.¡±

    Lin Rui nodded, "Where are the others?"

    "Others are at the contact point. I can't take you there. For safety reasons, we can only provide so much help." The black man whispered.  "My mission is to bring you here, and I won't care about anything else. I'm sorry, but I have to go back. If I haven't gone back by daybreak, others will be worried."

    Lin Rui nodded, "That's okay." The black man nodded, turned around and went out, closing the door.

    "Boss, it is indeed safe here. I checked the surrounding area and there is no sign of government military activity." Scarface walked over and replied, "The nearest checkpoint is also 1.6 kilometers away."

    Lin Rui breathed a sigh of relief and was about to speak when Sausage ran over and said, "The intelligence team has arrived. They have obtained detailed information from an Olumi Federation officer. The day after tomorrow, the Red Baron will attend a meeting. This meeting  It¡¯s about the anti-terrorism operation in Libya. Most of the secret society¡¯s senior officials, including the Red Baron, will attend.¡±

    "Great, this proves that Aladdin's information is correct. We finally caught up." Lin Rui nodded.  "Is there any other information?"

    "Yes, Cobain requested video communication." Sausage nodded.

    "Come in. Maybe there is news in those QR codes." Lin Rui nodded.  Sausage took out the tactical computer and placed it on the table. Cobain's image emerged. He frowned slightly and said, "It seems very dark over there."

    "Sorry, there is a curfew and light control in the city." Lin Rui whispered, "We don't want to attract attention. Tell me, what progress have you made there?"

    Cobain nodded, "QR code is also called QRcode. The full name of QR is quickresponse. It is a very popular encoding method on mobile devices in recent years. It can store more information than the traditional barcode and can also express more information.  Multiple data types.

    QR codes record data symbol information using black and white graphics that are distributed on a plane according to certain geometric patterns according to certain rules; in coding, the concept of 0 and 1 bit streams, which form the basis of the computer's internal logic, is cleverly used.  Several geometric shapes corresponding to binary are used to represent text numerical information, which are automatically read through image input equipment or photoelectric scanning equipment to achieve automatic information processing.

    It has some common features of barcode technology: each code system has its own specific character set; each character occupies a certain width; it has certain verification functions, etc.  At the same time, it also has the function of automatically identifying different lines of information and processing graphic rotation change points.  At this point, it's not complicated.  I analyzed the encoding rules of these barcodes based on the video information you provided.  It is basically possible to determine the rules used in these encodings.  "

    "That means you can imitate this type of code to forge information?" Lin Rui asked.

    "This is possible, but this can only forge information. Once it does not match the real information in the other party's system, the flaws will soon be exposed." Cobain shook his head and said, "So this method cannot help you sneak in safely.  .¡±

    "Damn it, I forgot all about this." Lin Rui shook his head and said, "That is to say, these QR codes are only used to verify identity. Even if we impersonate this QR code, we can't get in. Because even if weThe QR code on the side complies with the rules, but there is no corresponding information on the enemy's end.  "

    "Yes. But in this QR code, I can do something special to make the computer delay for dozens of seconds during the recognition and verification process. At least it can help you enter after dozens of seconds.  Set off alarms," ??Cobain replied.

    "Isn't this more of a self-inflicted trap? Wait until someone gets in, then trigger the alarm." Sergey shook his head and said, "It's clear that he was captured alive."

    "No, that's not the case. I can manipulate the QR code, so when you go through the security check, the alarm will be triggered with a delay. You just need to go through the security check when there are many people. Then the alarm will fall behind you.  , at least five or six people later. The guards will only control the person they think triggered the alarm on the spot, and when they return to check the computer data, they can find out that you triggered the alarm. This process may last several minutes, that is  , when you were actually discovered, it was already a few minutes later." Cobain shook his head.  "This is the best we can do."

    "That is to say, if we use a fake QR code to enter, it will take a few minutes to be discovered. It is enough for us to make a time difference." Lin Rui nodded.

    "I'm sorry, it's not you, it can only be one person. We did tricks on the QR code, which can indeed delay the recognition time, but it cannot avoid being discovered. If more than one of you enters, the speed at which the system detects abnormalities will be  Much improved. It may only be a few seconds, which is enough time for you to leave. In other words, if two of you use fake QR codes at the same time, you will be discovered immediately." Cobain replied.

    "What's this? You spent so much effort, just telling us that we only have a few dozen seconds to be discovered, and only one person can sneak in." Sergey said in shock.

    If you like battlefield contractors, please collect them: battlefield contractors are updated the fastest.  (Remember the website address: www.hlnovel.com
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report