当前位置:网站首页>Thoughts on Technology Sharing
Thoughts on Technology Sharing
2022-08-10 18:18:00 【51CTO】
Story Reason
Tell a story about yourself, at the request of netizens, help him find a person who has had financial transactions with him through Alipay, and there may be some disputes later,I don't know the specific reason, but his request is: can the mobile phone number of the other party be queried through the transfer record on Alipay.
Due to Alipay's privacy mechanism, if the other party's mobile phone number does not exist in your mobile phone address book, you will not be able to see the other party's full mobile phone number, only the first threeThe first and last two digits, you can see the other party's avatar and nickname when transferring money. When the amount is relatively large, you can still know the other party's name, but you can't see the complete 11-digit mobile phone number
In the above paragraph, there areA very important implicit condition, the other party's mobile phone number is stored in your mobile phone address book, then I can see his complete number through Alipay!
This piqued my interest and thought I could try it, because the idea is to revolve around the above mechanism, the problem will be simplified to add all possible numbers to my mobile communicationrecord.
How do I find all possible numbers?The simple and rude thing is to list all the default 6-digit numbers in the middle in the form of permutation and combination. Anyone who has learned point permutation and combination knows that there are ten possibilities of 0-9 for each digit of 6 digits.There are 10 to the 6th power, that is, one million kinds... Even if it can be listed, the mobile phone will have to explode. Does it have such a large capacity to store 1 million numbers?
The problem has become to narrow the scope as much as possible, not to mention too detailed, for fear of being used by people with ulterior motives.
Then is to use the code to generate all possible numbers, the problem becomes how to import the generated mobile phone number into the mobile phone, this is another problem, I still use the code to solve, and don't say too much, for fear of being used by people with ulterior motives.
As a result, I finally found it for him.
But I'm going to say two other things:
General ideas for problem solving:
When you face a problem, you must first focus on the final result, propose solutions around the final result, and be able to propose a solution, indicating that the problem is theoretically solvable, otherwise there is no feasibility; then gradually dissect the problem around the solution, decompose the transaction into the most basic components, and use various methods to solve every problem in the process of decomposition. The final result in the case is found through Alipay.Someone's number, the solution is to use Alipay's mobile phone address book to add friends, the problem becomes adding the other party's number to the address book, the premise of adding is to get the number, the solution to get the number isViolent traversal, but after analyzing too many violent traversal results, it is almost unfeasible, the problem becomes how to reduce the traversal results, the solution to this problem is *****************Narrowing down the scope, this solution can be implemented after optimization. It can be done with three or two clicks of the code, and a bunch of numbers are obtained. The problem arises again. How to quickly import thousands of numbers into the mobile phone?Think about this problem and find a solution. In short, under the guidance of this kind of thinking, you will be able to slowly approach the final goal.
Consequences of Technology Abuse
In the end, I helped that person achieve his goal. I wanted to record the complete process and share it with everyone, but I thought that if this solution was used by people with ulterior motives,Wouldn't that be a trick of the tiger and help the tyrant to abuse it? This goes back to the old-fashioned question, technology is not guilty of human beings, any technology is neutral, and what it is used for depends on people. Angels can be used to create heaven, and devils can be used to create nightmares.
Summary
Influenced by open source culture, sharing is the virtue of programmers, but for technology sharing, you should be more careful, so as not to be used for evil without your knowledge.
The three views are the same, yes
边栏推荐
猜你喜欢
Go 语言快速入门指南:第四篇 与数据为舞之数组
本周四晚19:00知识赋能第六期第5课丨OpenHarmony WiFi子系统
Toronto Research Chemicals萜烯分析丨反式植物醇
多线程与高并发(五)—— 源码解析 ReentrantLock
go语言的性能基准测试、性能优化测试和性能调优
【HMS core】【FAQ】Analytics Kit、Push Kit典型问题合集3
Toronto Research Chemicals农药检测丨甲硫威
Xilinx FPGA收发器参考时钟设计应用
1001 A+B Format (string processing)
LeetCode 198:打家劫舍
随机推荐
多线程与高并发(五)—— 源码解析 ReentrantLock
WebRTC源码分析 nack详解
「企业架构」什么是Zachman框架?
五菱宏光MINI EV,唯一的缺点就是安全性
pip install fatal error C1083 cannot open include file "io.h" No such file or directory
21天打卡挑战学习MySQL——《MySQL表管理》第二周 第五篇
Flexsim 发生器设置label和颜色
文件包含漏洞复习总结
【测试】黑盒测试用例设计方法
【图像去雾】基于颜色衰减先验的图像去雾附matlab代码
机器人控制器编程实践指导书旧版-实践五 数字舵机(执行器)
Toronto Research Chemicals 对乙酰氧基苯乙酮说明书
Colocate Join :ClickHouse的一种高性能分布式join查询模型
AVFrame related api memory management
自动化测试 RobotFramework安装以及使用教程
【2011】【论文笔记】用THz-TDS观察水树——
成为一个优秀的测试工程师需要具备哪些知识和经验?
pip安装时 fatal error C1083 无法打开包括文件 “io.h” No such file or directory
c语言进阶篇:柔性数组
股票量化交易策略:多因子筛选练习