Chapter 425: On the wall (middle)


Chapter four hundred and twenty-five for the wall view (middle)
Chapter four hundred and twenty-five for the wall view (middle)
"Then I will start." After saying hello, Zhang Yang did not hesitate and said directly. He speaks English after being translated by an infected worm, and these people can't hear anything. "Wait.? Xing Xinghuan Huan said that he was satisfied X Su Xieheng?br/>
"Huh?" Zhang Yang gave a strange whisper, "We are not ready to sit here, give us three minutes." The voice said quickly. "No problem." Zhang Yang didn't care, he agreed easily. Anyway, Zhang Yang let go today, he didn't prepare to get the nubi information once, so he couldn't eat hot tofu. If nubi and f are mortal enemies, they need to take a closer look at Chapter 425 (middle) than they are.
In three minutes, it’s not too long, but it’s not too short. During this time, Zhang Yang didn’t wait. He first sorted out his computer to make sure that there was no problem, and then carefully checked the inside of each broiler. Placement of firewalls, honeypots, etc.
There is a group of people in nubi, who knows if someone will sneak in, but they want to get super instructions of the infected system silently, it is almost impossible, want to not pass the infected system It was impossible to discover Zhang Yang’s real i.
Infected insect systems are flooded with several satellites and broilers. At the same time, the entire system is equivalent to the body of infected insects. In the logical thinking library of the infected insect system, there are movements and infections in various parts of his body that are "clear"! The entire system is under the surveillance of infected insects. If there are no instructions, some inexplicable access request will appear, or a program that runs autonomously does not need to be a hacker.
Unless the hacker can directly own the core control password of the infected insect, directly entering the core control password may allow the infected insect to be hacked directly without giving Zhang Yang an alarm. After filtering all the things in Chapter 425 for a wall view (middle), the voice of the person came from the headset: "Okay, you can do gd."
As can be seen from the scanning software and analysis software, these people outside the server have not left, obviously they do not know what kind of back-up to prepare. Zhang Yang thought about it, he was going to do it directly. If such a server wants to sneak in, it is not possible to do it in a while. The time it takes to sneak into such a server may be several days, or even one. Months, or even months.
If you want to achieve your goal quickly, there is only one way to force it in! And it is still the kind of forcible invasion, which is quite a test of the hardware performance of both parties. Although the invaders can have a large number of broilers, there is a network delay in the computing performance between these broilers. If an ordinary hacker just coordinates the computing performance of these broilers, I am afraid that they will be busy and do nothing, but Zhang Yang is different. , Zhang Yang has infected insects.
Although the performance of the infected insect system is only a fraction of the current, but the operation speed of this fraction is enough for the insect to regulate so many broilers, so that their hardware performance can be effectively superimposed to achieve maximum computing efficiency. If he publicizes himself, he can only choose to sneak in. After all, that’s what hackers do. Actually, he doesn’t want to do it brutally. It’s just that you are alone and the other party is a huge server system. These server systems must have countless Safety maintenance personnel.
If you give instructions alone, you will never be faster than so many people. Therefore, most hackers choose to sneak in silently when they invade large servers as broilers. As long as they are discovered by the other party, these hackers will definitely retreat, because after they are found, they want to pick a single server plus The probability of a group of security personnel is infinitely close to zero, unless there is a second combination of publicity and infection.
With the infected insect system, what Zhang Yang wants to do is much simpler. As long as he enters instructions to the infected insect, the huge computing performance of the infected insect will immediately deploy these broilers to make reasonable instructions, which is more than Zhang Yang. It takes countless times to control each broiler by command input. This is the advantage of an intelligent system!
When Zhang Yang entered the instructions to the infected insect, the first thing that appeared was the former infected insect virus. This was one of the virions that the infected insect retained. The difference is that these viruses are now under the control of the infected insect, and even infected. The direction is controlled, and these viruses directly hit the other party's server. Although the concealment of the infected worm virus is quite high, when three or more variants of the infected worm virus try to infect this server, its concealment is almost equivalent to no more.
If the concealment is gone, it does not mean that the threat of being infected with the worm virus has disappeared. In fact, the infected worm virus is transformed into an intelligent system through the infected worm system, and then rewritten after logical analysis operations. After re-mutation, it targets the weak points of the system. The ability to infect is almost doubled.
So when the infected virus began to frantically try to infect the server system and destroy its firewall, the entire network immediately became hot. Viruses are raging here, and the ensuing dd attack is swarming. Although the dd attack is relatively primitive, it is also a direct and effective attack method. Especially when it is using an intelligent system, all kinds of virus bombs, mail bombs and even Zhang Yang have a sense of collapse.
Because this server, whether it is a base or whatever, is located near Loire Fort, when the infestation begins a crazy attack, the Loire Fort network is inevitably affected. While attacking this server, the infestation began to invade several telecommunication servers in Loireburg at the same time through analysis and calculation, and then turned these telecommunication servers into their own chickens.
"...What do you think?" An old voice suddenly rang in a channel that Zhang Yang didn't know about.
"How to say... this guy is getting more and more cruel." Another slightly younger voice sighed slightly, and said quickly, "I can't understand it, how did this guy do this?" Can a massive attack really be done by one person?"
"You mean, gd is like us, is it an organization?" The old voice immediately asked back. "I don't know, we can't be sure now, but if he is a person, then this is too scary. You see, when he can't continue to maintain such a strong dd attack, he still needs to There are so many mail bombs and virus bombs in the data stream, and what do you think he did? There is still time to hack the web server of the web server provider in Loireburg!" The previous voice was full of exclamation.
"You all already know the contradiction that broke out between nubi and gd before, nubi has suffered a dark loss, it seems that nubi has studied for many years, and even the Adam system of several of the old guys, including those of us, has been worked hard by gd , Do you think it will... Adam succeeded in gd's hands?" The old voice raised a sudden possibility.
"Impossible!" "Impossible!!" The other few voices almost invariably spoke these three words. "Blue 1, you are also a person who has studied the Adam system. Do you think that Adam can appear on this planet in this era? I do not deny that it may succeed in the future, but it will definitely not be the present. Adam is too high. Or, its own vision has exceeded the current technological level of the earth. The birth of any technology will produce a process from quantitative change to qualitative change, but now, even quantitative change has not begun, how can there be a sudden jump in technology for decades The system appears?"
"Okay, even if I asked this question in vain, but you haven’t thought about it, how did gd steal the Adam system? You all know the confidentiality of the base where the Adam system is located. How can gd invade and then Stolen the entire system?" The person's rhetorical question silenced the entire channel.
"I'm afraid you have to ask gd for this question, but I don't think gd can answer you. It's not the most critical thing now~EbookFREE.me~ The most important thing is that you are sure whether it is one of the bases of nubi ?" Another voice inserted.
"It is not certain at the moment, but there is a 70% possibility that if this is not one of the bases of nubi, then there is only one possibility. This is a secret base of the French side, but you all know that we have long since With all the data from the French side, there is no military division base here." The old voice replied quickly.
"In this case, then Blue 9 and Blue 10 you two are ready to attack, and the rest of them are all starting to locate." A new voice came out, and everyone immediately agreed, and the channel immediately fell into There was silence. Zhang Yang is actually not busy. Although he is constantly inputting instructions, these instructions are only the corrective instructions that Zhang Yang found after the infected insects did useless work.
But overall, he is not busy. He even has time to think about how these people are going to kill this base. Just when Zhang Yang was thinking about it, suddenly the infected insect issued a rapid alarm sound. Upon hearing this alarm, Zhang Yang couldn't help but yell: "I'm relying!" RO! ! ! ;
;
--------------
--------------
Latest chapter of Ebook The Strongest Hacker Click here