Chapter 141: Catch "treacherous" (on)
-
The Strongest Hacker
- Gu Dashi
- 1931 characters
- 2021-03-02 09:09:59
Chapter 141 Catching
jiān
(Part 1)
Compared with other ministries in various countries, the ministries responsible for cyber security are actually very depressed. As for the Internet, the real masters are always in the private sector. Civil servants in other ministries don’t know how many people want to squeeze in each year. The network technology is the opposite.
Only a very small part is entrapped by the Ministry of the State, and the rest is large domestic high-tech enterprises, while the truly powerful group of people is hidden in the private sector. These people are often subject to various restrictions in reality, so they yearn for freedom, and the Internet provides this platform, so they will not join these strict disciplines at all.
The Ministry of State's effective treatment of human beings in Chapter 141 is not its treatment, but its rights. But those who engage in technology are not strong about rights. They admire those who are more skillful, and these talents are more admired by them.
If it is because of money or something, some large companies are more powerful than these ministries. Therefore, the network security departments of all zf are more tragic, but the entire country uses these talents for network, plus their own training, so the masters in the country can’t be ignored, and there are so many master hackers on the network, you don’t know which one is Work for the country.
After the Black Eagle left, GD quickly said in the chat room: "gd should be in touch with those iǎ guys in the Black League Forum. I will talk to them and just kicked gd out, don't let him have anything Other thoughts.? 渌 Said that the knocking of the Phoenix stool was done, and the chasing wren α boat spring ?br/>
When GD went to find the gang of people, Zhang Yang couldn't help but go offline. He was too sleepy. When he just invaded, jīng was very excited, but everything was over now, and the gang was like The turtle shrunk like a shrunken head, and I don’t know where I went. I didn’t even notice the provocative announcement by Zhang Yangfa in the 141st chapter of the Japanese language that caught the
treacherous
(Part 1) defense department. Very depressed.
This group of grandchildren ran away after the mess, and leaned. Although Zhang Yang just didn't track down these people, Zhang Yang has probably guessed that these hackers should be in an organization, just like the GD circle, and they may not be a country. I am afraid they are all around the world.
Zhang Yang wanted to get angry and had nowhere to go. Just when he was in the car of the website of the Defense Agency, Zhang Yang was completely out of control and completely killed the entire database server of the Japanese Defense Agency! Only then did I get a sigh of relief. At this time, the official website of the Defense Agency just posted an ordinary announcement saying that it had just been attacked by a hacker and was maintaining the website at the moment.
After sleeping, Zhang Yang scolded, and then they were ready to go by them. Just preparing to shut down the computer, Zhang Yang suddenly noticed a new message in the lower right corner. Zhang Yang froze for a moment. His mailbox did not contact anyone. This mailbox was only used to feed back the tracking information of the virus.
Once the email comes back, it means that a tracking virus has tracked the target and sent the information of the target back, but all the targets that Zhang Yang used to track have been removed? And Zhang Yang will completely remove the tracking virus. Why is there an email feedback coming back now?
Zhang Yang opened the mailbox quickly, and when he saw the information sent back, Zhang Yang's face became unusually weird! Accidents are definitely accidents of accidents! It is not the tracking virus that sends the email back, but the infestation! Quickly and seriously looked at one side of the message, Zhang Yang by the way understood why infectious insects sent this email back!
The assassin-killing virus was adapted based on the infecting insects. When Zhang Yang lived the infecting insects completely, the two exchanged the source code on the network, which gave the infecting insects a part of the ability to track the assassin virus. Self-mutation! And the group of people just used the assassin virus. They used the assassin virus just like Zhang Yang used the infecting worm. After the assassin virus opened, it achieved the purpose of rapid invasion.
Needless to say, there is obviously an assassin virus in the places where these people pass. The virus that kills the assassin virus publicizes itself and deletes it. It will clear itself after 2 hours, but there is no time for the infected insects, so I have this The functional infestation virus bite up immediately following the assassin virus.
It is estimated that this person was also unlucky. When he stepped back, after getting rid of Zhang Yang’s tracking, he didn’t realize that there was a virus that could follow another virus mō, plus the mutated infection virus and the tracking virus are not big. In the same way, he analyzes the virus for tracking, not tracking the data stream. In this way, its horrible concealment is fully realized.
In the end, various coincidences made the tracking virus placed by Zhang Yangzhuo not work, but this infection of the worm virus gave Zhang Yang a big surprise! This typical intentional planting does not send, and the heartless willows are shaded. Zhang Yang almost did not move the wind.
", if you can't play like this in the future, people will be shocked." He said to himself, the sleepy worm also ran away, Zhang Yang was excited again, and carefully checked the detailed records sent back. Zhang Yang sighed with emotion. This group of animals, really, Zhang Yang thought that his springboard was enough, but there were more springboards for his grandchildren!
This T is simply a springboard emperor. Judging from the records of the infected insects, this grandson’s springboard has turned around the world. What about the United States, Europe, South America, and even Africa? The destination is to make Zhang Yang face strange, , this grandson is actually in H city! Just at home! Tracing here, Zhang Yang knew that this must be the real IP of the other party.
After thinking for a while, Zhang Yang quickly wrote commands for the infected insects. In addition to the information of this target, other infected insects Zhang Yang let them self-delete. Although Zhang Yang does not know if anyone has found the existence of the infected insects at present, but iǎxin In the first place, the ability to infect is even more terrifying than the Assassin’s virus. I am afraid that such a virus will cause large-scale panic around the world. In the event of an economic crisis or the like, it will be tragic.
After writing the command, the number of infected insects displayed on the computer decreased rapidly. Within a few minutes, all the infected insect viruses circulating on the network had been self-deleted, leaving only the trace to the enemy. Virus, this infective worm has infected the other party's computer. This person is obviously very confident in their own technology, and did not check it carefully at all. Otherwise, the covert of the worm is better, and it is still easy to be discovered when entering the other party's computer.
Once the infected bug lurks inside the other party's computer, it is a bit difficult to find it. After thinking for a while, Zhang Yang felt that it was still hot to take a look at the other party's computer. Just after such a series of battles, the jīng power of both sides is a huge loss, especially these offensive people, in the early stage, so many springboards have been engaged in the world, they consume jīng force than Zhang Yang More.
Immediately after the end, Zhang Yang was almost tired and fell asleep directly. It is conceivable that these people’s jīng force is gone. Don’t think that invading other people’s computers will not consume jīng force. In fact, although only the hands are striking the keyboard The command seems not to consume physical energy seriously, but when invading, whether it is publicity or any hacker, the brain is running at a high speed and is highly concentrated. This state takes a long time and consumes jīng energy. Very huge.
Not to mention, the physical qualities of many otakus are relatively worse than ordinary people. Want to quietly invade the computer used by the master, which is more difficult than hacking the servers of some companies! After all, the server is open for business, numerous network accesses, and various requests make it a lot of leaks and personal use is different.
Reconnected with various springboards, and finally Zhang Yang even logged in to the No. 1 satellite through the mobile satellite base station, and then drilled out from the NASA, went to the United States to circle around, and only then began to crack this computer. With the infection as an internal response, Zhang Yang got a rough picture of the computer in just one scan.
It is not completely correct to say that the computer is completely server-level, and it is even more astounding than Zhang Yang's cheaper server. When you see this computer, Zhang Yang knows that this person is probably not rich. Such a good server, if purchased in reality, at least about one million, and it is still US dollars!
After a scan of the entire computer, Zhang Yang felt that some dogs bite the hedgehog and couldn’t help it. The grandson’s computer used the linu system, and there were also leaks, but this T was no different from a hedgehog. The entire system was Numerous honeypots are placed in areas prone to problems. These honeypots have no way to go roundabout, but they will immediately send out an alarm once they invade.
Although there is an infected bug, this person is very dangerous~EbookFREE.me~ There is a hidden iǎ program inside his system. What special role does this iǎ program have, but once it is illegal for the computer Access, or the amount of data traffic flowing out of the computer is so large that it will immediately raise an alarm.
grass! It took a long time before Zhang Yang could not help but scream, how should Zhang Yang feel so difficult for the first time to silently invade a personal computer, it seems that he is still too much to watch the heroes of the world. Because the other party is not using the computer at all, and no junk programs are running on the computer, normal network traffic is pitiful.
And this network traffic monitoring program, once the upper and lower traffic exceeds 5B per second, an alarm will be issued immediately. After thinking for a long time, Zhang Yang kept his eyes on the mother nest. To prevent this program from sending an alarm, the mother nest is a good choice. The membrane function of the mother nest can give this program an illusion, cheating the program, as long as Zhang Yang entered the computer , The rest is easy to say.
The problem is that although the size of the mother’s nest is not large, there are also about 14 big, with a transmission speed of 5B per second. When will it be transmitted to the year and month, once it is dawn, it will be discovered by the other party. ! ! ! ;
;
--------------
--------------