-
In fact, most of today's hackers are not using the Windows system, because the use of the Windows system is not particularly smooth in terms of operation. And more importantly, Windows is not suitable for hackers.
And now the commonly used mouse is almost operated on the Windows system, so for hackers who do not use the Windows system, the mouse is almost useless.
After all, the identity of the hacker is also very secretive, and there is also a very high technology on the Internet, which is thanks to the Linus operating system. And this operating system is the most primitive operating system, which hardly requires the use of a mouse.
Because even if you use a mouse, it is very inconvenient, and it is better to use some specific keys to operate, so you often see hackers and other videos that only see two hands on the computer fast operation.
Many people may find it incredible, but the mouse is only for the convenience of ordinary people. The most primitive computers only need a keyboard, and if you have enough knowledge of the subject, you can know that even if you only have a keyboard, it is still very easy to operate, of course, this requires personal skills.
-
The hackers in the movie don't use a mouse, which makes the movie look much cooler, and the command line interface is much faster than if there was a graphical user interface to control the operation. There is also the hacker in the movie is to show a hacker image in the hearts of most people, so that it is better accepted by the audience, ordinary audiences can't get in touch with hackers in life, let alone know some of the operations of the system, so the establishment of hacker images is established in accordance with the appearance of previous classic film and television works, basically the hacking behavior of the movie is basically consistent with reality, the more powerful the computer, the less people use the mouse, of course, the movie still has a little bit of exaggeration, The operation of the graphical interface is very consuming of computer resources, and many special computers in a certain field often need to be configured not very high but must be fast due to cost or resource limitations.
-
In fact, when the computer level reaches a certain height, the mouse itself is redundant. Because many shortcuts on the keyboard can completely replace the mouse, for many computer experts, there is no need to use the mouse to operate.
Perhaps many operations cannot be performed without a mouse in the eyes of us ordinary people, but for masters, these are not problems. And use the mouse to choose, the click is actually relatively slow, for the computer master with the eyes and hands, the mouse is actually relatively inefficient, and the skillful use of the keyboard shortcut keys can quickly simulate the action of the mouse.
-
Command line support for scripting languages, related tools, etc., many tools are hacking tools in their own right, and they don't take Windows users into account at all, and it is very cumbersome to use in a graphical interface. Because of the second reason, many programming languages and tools used by hackers are implemented under the command line at the beginning, and they still have to be used in the command line when it comes to Windows. Because Windows has always been responsible for eliminating commands, the system only comes with an extremely difficult one, which is simply maddening to use.
The command line is more efficient for many tasks, and a skilled Linux hacker can quickly type out a line of commands and combine various tools within the system to complete a task. In the case of a graphical interface, on the one hand, it is difficult for you to make the tools of the graphical interface work together, and on the other hand, it will be much less efficient to click N tools back and forth with the mouse. For example, find all the text files containing credit card numbers in a directory, extract the credit card number, encrypt it and send it to a certain mailbox, and children's shoes who are familiar with Linux can do it with a gorgeous line or two of commands.
How long does it take to use the GUI?
-
Each industry has its own norms of doing things, which is more conducive to the healthy development of this industry
-
Any program has instructions, as long as you remember the instructions, the movie is to show that the hacker technology is superb, in fact, the original appearance of the computer did not have a mouse, the emergence of the mouse improved the human-computer interaction conditions, is the popularization of computers more convenient.
-
Hackers are masters of programming with computer languages, and using a mouse is to choose what others have done to use in order. The former is like a great chef, and the latter can only be said to be a customer who goes to a restaurant to eat. Personally, there is no level, only to this extent. Hope for advice.
-
To type, you need a keyboard, and the mouse should not work!
-
The speed of mouse operation is very slow for hackers, only the keyboard is the fastest speed, hackers can complete complex tasks without a mouse, the keyboard can replace the mouse, the mouse is only an auxiliary role is not very useful, or the keyboard is relatively fast.
-
Because film is a reprocessing and re-creation of reality, it presents what people expect in their imagination. People imagine that hackers almost don't use a mouse, and this impression has been reinforced again and again and has become a consensus, so hackers in the movie almost don't use a mouse. Similar to the story of the monkey and the banana.
-
It seems to be very powerful, when I used DOS, I could only use the keyboard, and hackers need the Internet. DoS does not require an internet connection.
-
If you are proficient in shortcuts, you will find that the processing speed is much faster than that of a mouse, just click on the keyboard, why bother yourself?
-
Yang long, is to carry forward their own advantages, a person can not be perfect, and as a person known as excellent, he is not seen to be excellent in everything, he must have unknown shortcomings, but his advantages cover his shortcomings, so he is better than not excellent, so you must find out your most outstanding advantages, and grasp your own advantages, carry forward your own advantages, and strive to cultivate your own advantages, for your own shortcomings, to promote your strengths, is to carry forward your own advantages, A person cannot be perfect, and as a person who is called excellent, he is excellent in everything, he must have unknown shortcomings, but his advantages cover his shortcomings, so he is better than not excellent, so you must find out your most outstanding advantages, and grasp your own advantages, carry forward your own advantages, and strive to cultivate your various advantages, for your own strengths, is to carry forward your own advantages, a person can not be perfect, and as a person known as excellent, I don't see him who is excellent in everything, he must have unknown shortcomings, but his advantages cover his shortcomings, so he is better than not excellent, so he must promote his most prominent advantages, that is, to carry forward his own advantages, a person can not be perfect, and as a person who is called excellent, he is excellent in everything, he must have unknown shortcomings, but his advantages cover his shortcomings, so he is better than not excellent, so we must be good, It is to carry forward his own advantages, a person can not be perfect, and as a person who is called excellent, he is excellent in everything, he must have unknown shortcomings, but his advantages cover his shortcomings, so he is better than not excellent, so you must find out your most outstanding advantages, and grasp your own advantages, carry forward your own advantages, and strive to cultivate your own advantages, for your own shortcomings, you must learn to face your own shortcomings, correct your shortcomings. Find out your most outstanding advantages, and grasp your own advantages, carry forward your own advantages, and strive to cultivate your own advantages, for your own shortcomings, you must learn to face your own shortcomings, correct your own shortcomings. out, and grasp your own advantages, carry forward your own advantages, and strive to cultivate your own advantages, for your own shortcomings, you must learn to face your own shortcomings, correct your own shortcomings.
You must learn to face your shortcomings and correct them. You must learn to face your shortcomings and correct them.
-
I think what the movie presents to us is people's imagination of hackers, imagining that hackers don't use a mouse, hackers are very powerful.
-
The earliest was the keyboard that appeared first, and then there was a mouse, and there were still operations under the retention, and now I can operate the computer with the keyboard, without a mouse, and not with specific hackers. Because I don't know why
-
Hackers are super high-level, and they don't need this mouse at all, just control the keyboard directly.
-
.It may look more powerful to complete the whole process on the keyboard, but if you click the mouse on the keyboard, will it be very handsome?
-
Both the mouse and the keyboard are the process of information input, and the information input efficiency of the keyboard is higher than that of the mouse.
-
It looks like they're playing a game, and you don't need a mouse to look like they're good.
-
Movies are generally exaggerated. The whole is very high, and now the hackers are more mysterious, and not many people know whether to use a mouse or not
-
At present, most programmers and hackers use most of the MAC, Linux and other graphical interface + command system, the graphical interface is convenient and concise and use some existing tools, and the command is fast and flexible and can manipulate the underlying data and commands (programmers understand), which causes the operation speed of the keyboard to be far faster than the keyboard + mouse.
-
If you don't give hackers a mouse and keyboard, hackers can still get in, they have a lot of technology, they are very familiar with computers.
-
Yes, the mouse is dispensable, win is visually controlled, and with the on-screen keyboard, it can still be invaded.
-
Why do hackers never use a mouse? After reading it, I realized how powerful they are!
Nowadays, although the speed of development of the times has been very fast, but the sense of security to people has been greatly reduced than before, this security is not in the road robbery and theft accidents, but the leakage of human information, some time ago it was revealed that in public even other people's wireless networks will make their mobile phone information leak, so that many people can't believe that the mobile phone in their hands only belongs to themselves, even if the confidential information in the computer used for work is encrypted layer after layer, or very uneasy!
There is a job called hacking, although it is not legal, but as long as the computer technology is superb enough, ordinary people can also become hackers, so this kind of person is unguardable, we can often see such news on the Internet, some celebrities' private photos are stored in mobile phones, computers and other USB flash drives, it is easy to leak the problem, once it flows into the Internet, even if it is mosaic for these stars, it will also affect the future career development of these stars, It can be seen that if hackers do not use their own technology in the regular industry, they will kill people invisibly!
So just how good are hackers? Often in TV dramas, you can also see the existence of hackers, they generally wear black clothes, with black hats, carrying a black bag, the bag contains a notebook, and they are extremely low-key when they go to **, they don't need a mouse to pick up a notebook, they can do whatever they want on the computer, and we ordinary people lack a mouse, and the computer is almost useless, which can also be seen how powerful hackers are!
In fact, all the buttons on the keyboard can be used to type in addition to people's many operations, which can be replaced by a mouse, and at the same time, there is no need for a mouse, the difference is that the hacker's computer system is generally not Windows but Linux, the Linux interface is much more simplified than the Windows interface, and it can also help the computer save a lot of disk space, so that the computer system can be applied more smoothly, Linux is just like people use ** to communicate, using 0 and 1 represents a lot of meaning, and we ordinary people naturally seem to be confused!
-
Because the keyboard is much faster to use. Faster than clicking the mouse. So people who use the keyboard are used to using the keyboard.
-
It's because the computer used by hackers doesn't have graphics, so it's enough to use a keyboard instead of a mouse.
-
Because hackers generally use dos commands to carry out attacks, they need to type a lot of letters, and the mouse is almost useless, so hackers prefer to use a keyboard instead of a mouse.
-
Xiao'er sees the world: Hackers always keep typing on the keyboard, why do they hardly use a mouse? You may not believe it after reading it.
-
Yes. Because the mouse is an important input device for the computer, the mouse is a must, but hackers use the keyboard more.
-
They generally rarely use a mouse, almost none, because the keys on the keyboard can control the computer.
-
They also use a mouse sometimes, and the reason why they keep typing on the keyboard is because they are not using the system that we normally use.
-
On a technical level, there are noticeable differences.
This is common sense, the subject does not understand?
Let's look at an example:
When the driver is driving, his hands are inseparable from the steering wheel.
However, when manufacturing and repairing cars, how can a steering wheel be used?
Turtles don't eat much after the end of October, and they go into hibernation, which depends on the temperature, and if the temperature is high, hibernation will be delayed, and vice versa. After hibernation, the turtle does not eat or drink, and its head shrinks into its shell. At this time, put it in a cardboard box, put some newspapers, rags, foam and the like in the cardboard box, it will be cold, it will naturally get into the cloth, and then put the box in a warm room. >>>More
Yours are too brain-dead, aren't you? The one who said Kane was fat, you don't have a sick brain, right? Do you have a kind of nail head that you came to the tombstone? >>>More
Because love is a joy between two lovers, but often do not think of reality, such as distance and other issues, resulting in lovers can not go together, if one party does not pay true feelings, it will not become a reality. In reality, the Internet is also a tool for acquaintance and a platform for heart-to-heart communication, so it acts as a platform for online love"Matchmaker", but first of all, the other party and themselves are sincere, but they can become a reality but the probability is particularly small, so it is best not to have online dating. To correctly understand yourself and reality, you often have feelings and can't get together for special reasons, reality plus sincerity is the success rate of online dating, the most important thing is the sincerity of both parties, otherwise the injury can only be yourself.
Because the dryness and wetness of the pastoral soil is not good, the soil is easy to harden when it is dry, which makes the soil hard, and when it is wet, the soil will not be breathable, which may lead to root rot of flowers and plants. >>>More
Most soy sauce wines do not choose to use clear glass bottles. The reasons why sauce-flavored liquor is not bottled in glass are as follows: >>>More