Chapter 453: Being tracked (on)


Zhang Yang has moved the server placed in the school here. The house where he lived last time has no place to put it. Now there is enough space to prevent this server. While eating fritters, Zhang Yang opened the server. In fact, Zhang Yang is no longer afraid of others knowing these things. After passing the most dangerous stage of the initial stage, the danger for Zhang Yang has passed. This identity has already been spread out, and some key people know it, so it is natural to have these devices in Zhang Yang's family.
As for the ID that trains GSD. With the presence of infected insects, sometimes Zhang Yang can create the illusion of tame GSD and appear in different places at the same time with only one command. No one can doubt that he is being tracked in Chapter 453 (Up) head up.
Even ANUBIS couldn't think of the existence of infected insects, and nobody would even think of it. The reason why AXANUBIS can’t think of it is because after so many years of efforts, ANUBIS knows how difficult it is to achieve that kind of result. If it is so easy, it has paid so much human, material and financial resources in these years. I figured it out.
They wouldn’t even think of killing them. The Adam system in their mouth and the virus that Zhang Yang wrote would have the final mutation. This situation is accidental, and it belongs to something that is not repeatable. Even if I re-create the Adam system now and then re-infect the whole virus, the final result may not be like this.
Sometimes the miracle was born under the combination of countless accidents, so Zhang Yang would like to buy what server in the future, so there is no need to cover up the supercomputer. Young Master, I am a computer company, oh, no, young Master, I am a full The technical director of a world-famous computer company, there is nothing wrong with buying a server, right?
After eating a fritter, the server was successfully started. Zhang Yang took a sip of soy milk, and then was directly tracked (Chapter 453) into the hidden standby system, which was connected to the Infected Insect System. Zhang Yang quickly called up all the information recorded by this tracking strategy from the system log of the infected insect.
Since the appearance of ANUBIS in this life, when Zhang Yang caught broilers around, he subconsciously placed various tracking strategies. After each placement, all contact methods will be placed in the firewall, and after the infection system is in place, these Everything is handed over to the treatment of infectious insects.
Zhang Yang catches different broilers every time." So now, Zhang Yang doesn't know how many honeypots he puts out. Putting honeypots everywhere is very beneficial! It is like a rookie hunter and an old hunter into the forest. Hunting, although the old hunter will put traps on the way that some prey must pass according to rich experience, so the chance of the old hunter getting the prey is greatly increased.
However, although the rookie hunter does not have the rich experience of the old hunter, he can place traps everywhere in the forest. The old hunter may place five or six traps to catch the prey, but the rookie hunter can place hundreds of them. I am everywhere. Putting a trap, I don't believe that I can't catch prey.
Anything, once the base is large, there will always be gains, and sometimes, not only the gains within your goals, but also unexpected gains. For example, Zhang Yang would rather kill a thousand by mistake instead of letting go of one. He is now a combination of old hunter and rookie hunter methods. Any broiler he has invaded will habitually throw a bunch of honey pots into it, and the honey pot again No information will be exposed, and you will not need to clean these honeypots when you exit the broiler to clean the traces.
Now Zhang Yang finds it painfully, he seems to have caught an unexpected joy! This guy is not looking for GSD, nor is it "not even the Starry Sky Group, he is looking for O." And from the information currently captured by this chasing honeypot, this person obviously found GOD. Some governments and traces left on the Internet are very efficient in finding them.
From this search engine, he not only searched for GOD, but Zhang Yang also found that he searched for some of GOD's commonly used websites, such as a chat room to the website is also in the search scope. In fact, Baidu's function may be worse than that of Google, but it is definitely not as bad as it appears on the surface. The fundamental reason is that Baidu has turned off many functions!
But these things can be found in its server. Zhang Yang does not know what this person is looking for, but from his search method, he seems to have some evidence in his hand, and then search for these Things can get the geographic location of GOD.
Tracking the honeypot has not tracked the actual location of this person, but Zhang Yang found that tracking the data flow of the honeypot and this person seems to track several GOD controlled broilers, especially two of them have obvious GOD. style of.
Zhang Yang knew GOD very much in his last life. So, when he saw these software and firewall, he was instantly sure that these two first-class broilers were definitely GOD. "I depend, GODBO. Who is this guy staring at? Why are you so careless?
Zhang Yang touched his chin and couldn't help but screamed in surprise.
The strength of GOD is clear. It seems that there is no news that GOD has been tracked in the memory of previous life, but to be honest, with the current search method of this person, it is estimated that the real IPIP of GOD will be found soon. . "Infected insects through these current broilers, is there a way to locate the specific location of people who invaded the two servers?" Zhang Yang could not think of a way, hesitantly asked the infected insect.
The function of the Infected Insect is like a huge reserve, because it is not designed by Zhang Yang, so Zhang Yang does not know what functions it has. Although the Infected Insect has logic analysis capabilities, it is only a program, not a person. If you do not use these functions, it will not actively "tell" you. But if Zhang Yang was asked to understand the full function of the infected insect, it would be too unreliable.
The function of infecting insects is not without a detailed description of the catalog, this thing is there, not only there, but also very comprehensive, but it is a pity that Zhang Yang was scared by millions of catalogs once he read it out . If you look at it one by one, he is old and don't do anything. The group of ANUBIS is one. It is estimated to test the Adam system and want to know what is wrong with the Adam system, so they have made detailed records of any small functions.
If you have studied this system for several years, or just ten years, it is enough, but if you are a stranger and suddenly want you to understand the function of this system... well, then the directory can see you dead. So this led to Zhang Yang still not knowing exactly what the infecting insect can do, and only found it in use.
"You can retrieve the hacker habit database, pass the other party's existing broiler, and then use the global triangular positioning and delayed transmission of network data to perform multiple calculations and analysis to obtain theoretical data." Infected insects quickly gave out A case of "Answer" that Zhang Yang did not expect.
"Hackers are used to databases?" Zhang Yang chewed subconsciously. Hackers are humans, not gods. In theory, a perfect hacker should have no common ID. , No common passwords, everything must be random, no frequent websites, frequent forums, will not reveal their identity, will not be impulsive because of anything, will not be substituted into reality in any commonly used network data anything.
But... is it possible? Unless this hacker is a machine plus a god, otherwise, it is impossible to think about it. As long as it is a person, there will be habits, even if you pay attention, there will be some habits hidden in your subconscious, which you have not discovered.
And these habits will leave you with clues. Take Zhang Yang as an example. Reborn in two lifetimes, add up to the forty-year-old? But still a little impulsive, still a little angry, why? The things in the bone are sometimes inevitable. In addition, Zhang Yang's previous life was basically an otaku. He has not been experienced in society. Where does he go to mature?
The maturity of man is always in the society, after experiencing countless setbacks and sufferings, and then become mature. Zhang Yang has also seen some novels in his life. A 20-year-old protagonist was reborn and returned to Feng a few years ago. Then all of a sudden, young people have become more stunned than 10-year-old old men. , You must be old-fashioned, isn't this nonsense?
Can the maturity of thought be calculated using time superposition? Anyway~EbookFREE.me~ Some characters don’t want to change it. If you are angry, you can be angry or impulsive. Everyone will die after 80 years. Isn’t it possible to live like your own name? The same, to be more publicized, but to be thoughtful everywhere, tolerate everywhere, foolproof, tired?
This kind of rebirth is going to be a dry bird, but it is more tiring to live than in my previous life. So when he heard the term said by the infecting insect, Zhang Yang was a little stunned, "Is there in your database?" Zhang Yang tentatively asked, Zhang Yang suddenly remembered to anubis, although the Adam system did not reach the current infection Worms, but even if the Adam system is in an incomplete state, its analytical ability is stronger than the general system, anubis makes no sense not to use it?
"Please enter the hacker id to be retrieved." Infected insects did not answer whether there was or not, but directly gave a sentence. After Zhang Yang froze for a moment, his face was ecstatic. I will say it! How could the gang not build such a thing? For anubis, hackers all over the world are basically their enemies. People who want to defeat their enemies know their own and know each other. Anubis people must know. ! ! ! ;
;
--------------
--------------
Latest chapter of Ebook The Strongest Hacker Click here