Vol 2 Chapter 681: Acquired McAfee (4)


Chapter 681 Acquisition of McAfee (4)
Looking at the command box that has been lost, Zhang Yang hesitated and knocked on it. Today, since he is ready to serve as the chairman of the Starry Sky Group, at least for the next three to four years, I am afraid that many steps of the Starry Sky Group will play. Very important, Zhang Yang must expand his advantages to the maximum. ;
As Zhang Yang hit the Enter key, the computer screen in front of him immediately began to refresh the screen quickly. Facing the starry sky system, Zhang Yang knew that the conventional system was not very useful. Zhang Yang now uses dd attack, which is often said Brute force cracking, but starry sky is quite awkward to deal with the dd attack, but Zhang Yang is not prepared to use the dd attack to solve all problems, this thing is simply used to cover.
Although Chapter 681 acquired McAfee (4), but the data center set up by ggle in Europe cannot match the starry sky in terms of overall hardware performance, but don’t forget that there are many starry sky responsible systems, plus to prevent accidents Part of the performance space is reserved, so the hardware performance that Starry Sky can use is similar to the processing capacity of ggle's data center.
The main task of ggle's data center is that ggle is full of small ants in the network to download the above text, pictures, etc. from various websites around the world day after day, and then stored in its own data center, so as to build a search engine, so it is u's requirements are not very good, it's just cheaper.
The policy of all the soldiers made by the GD farms is still quite useful. At least many of the servers that Zhang Yang thought about in advance cannot be used. They were hacked by the GD farms in advance, although they are not ready to use this gang. What the servers do, but I have to say that as long as Zhang Yang invades these servers, I am afraid that a group of hackers will soon be brought back.
Even without these hackers, let Zhang Yang concentrate on dealing with the starry sky. Without using his own permissions, Zhang Yang would not dare to guarantee that he can 100% hack into the starry sky system. Chapter 681 acquires McAfee (4) Not to mention that there are a lot of hackers behind, and more importantly, the strength of these hackers is really not bad.
"Dry, this bunch of beasts." Looking at the dd attacks that quickly diminished on the computer screen, Zhang Yang knew that gd they had started. Undoubtedly, this group of animals used shielding hardware. In this way, the data that the starry sky needs to deal with is huge. cut back.
Zhang Yang was a little depressed. Nnd knew long ago that he hadn't made the hardware equipment of the Starry Group like this. Now I don't know whether it is self-reliance or not. Fortunately, this dd attack on Zhang Yang is actually used to tell everyone that brother is here. It is impossible to win by virtue of it. It is impossible to know how many hackers all over the world who are concerned about the Starry Sky Group at the moment.
Zhang Yang didn't expect anything wrong. The combination of Star Group and gd is too eye-catching, let alone a hacker. Most ordinary people in the world who know what hackers are already know about it, but They don’t know when it happened, and these people will not use the computer to see if the Star Group’s network has been hacked. They don’t understand it at all, so almost all the interested people stay in front of the computer. .
The media in the European and American countries are really, they can make any program for the sake of rating, knowing that everyone is interested in this matter, many media such as the United States and Europe actually hired many security personnel of large security companies, or some computers Experts come to guard the computer, as long as there is a situation, these media can understand the emergency live broadcast, and this way to attract attention.
Zhang Yang chose to attack in the evening. At this time, the European and American countries happened to be in the morning. When the Star Group was attacked by dd, less than ten minutes later, large media such as Europe and the United States directly opened professional live webcasts. Only after you have gone abroad to learn about it, you will understand how much these media are.
Zhang Yang has known these things for a long time, but this is in his heart. The greater the influence of this incident, the better. Seeing that your dd attack has been easily resolved by the starry sky, although it is still going on, the impact it can cause has been minimal. I believe gd their attention is no longer here, but if your attention is not here Above, hey, don’t blame me.
All the performances of Starry Sky are not fully understood by Zhang Yang himself. It is impossible for everyone in the technical department of the entire Starry Group to understand the starry sky better than Zhang Yang. Perhaps they have a better understanding of some specific functions and computing capabilities of Starry Sky than Zhang Yang. But no one in Starry Sky's weaknesses is more clear than Zhang Yang, the highest authority owner.
Starry sky has unparalleled logical thinking analysis ability, but this analytical ability is not invincible. Although starry sky looks very humanoid at some times, it is only humanoid after all, it is still a program, not a human, so it is in progress. Some judgment and analysis still need to follow the rules of the procedure.
After the dd attack for a while, Zhang Yang directly added a virus specially written for the starry sky by Zhang Yang in the bombardment stream of the dd attack. In fact, this virus is not harmful, and its role is very simple. This virus is mainly Facing the intelligent analysis program such as the starry sky, the program always has the rules of the program, such as logical thinking and judgment, it is a program, so the most current rule of the program is to pursue the correctness of things, unlike human beings who can’t understand one, or It is a question that has no answer at all.
But the program does not, they will only perform simulation analysis operations in order to achieve the correct answer! This is what we often foresee. The system determines that an error has occurred, enters an infinite loop, enters an unsolved loop, which causes u to overload, the system crashes as a whole, and then crashes.
Starry sky also belongs to the ranks of logical thinking analysis programs, so this judgment is still useful for starry sky, but such viruses are not easy to write. First of all, you have to face a problem. The one you set makes the other party’s logical thinking analysis judgment fall into The problem of infinite loop, how can you make the other party's program and system "analyze" according to what you set.
If you don’t have enough knowledge about this system, it is impossible for you to come up with such a program. It is no exaggeration to say that only Zhang Yang can do this in the world, because Zhang Yang only understands the weakness of the starry sky. local. But this does not completely collapse the starry sky, but it is no problem to increase the u-law of the starry sky.
Now what Zhang Yang has to do is to attract gd's attention in other ways, because this small virus seems to make it easy for Starry Sky to enter the state of high-load computing, but if there are security programmers monitoring, then it is easy to find. Now what Zhang Yang wants to do is to attract the attention of the gang and their people.
As for whether Zhang Yang can do this, gd is the most convincing. Don’t forget that Starry Sky was originally evolved from infected insects, and the infected insects were written by Zhang Yang. No system is perfect. There are no holes at all, including the starry sky.
These loopholes are not fatal, but breaking through several layers of firewalls is enough.
"I rely on this! This is coming from here, quickly! Zimo, blocking his data flow, I set him a barrier, gd is really a beast, how can he know that there is a loophole in the starry sky here?" At the moment in the starry sky group Inside the security department, the entire security department is in a weird and fanatical state.
Here is like a battlefield, or it is originally another battlefield. In the comfortable hall, you can see the gd, dozens of security personnel such as Zimo all have their own positions, and each seat is separate. Separately, the entire hall forms a single round nest like a honeycomb.
This is because there are at least ten different display screens and their separate operating systems around each person. The central swivel chair allows you to turn to the next direction immediately after finishing. Personal computers often run multi-tasks, but how many systems is Starry Sky responsible for? And how many simulation systems are under these systems, and how many official websites are in charge, if it is just a screen, it is simply not available, and you can’t switch to the latest screen at any time. After authorization, a scale similar to this can be formed around his desk, but you usually can't see it.
Zhang Yang's study can be said to be one of the most technologically advanced parts of the entire villa. At the moment, Zi Mo has a total of 22 display screens showing different contents. A total of eleven keyboards and mice were displayed on the prototype table in front of her. Slender fingers jumped on the keyboard, and Zi Mo stared at a display screen in front of him. The analysis data above showed that the speed of the other party's breakthrough through the firewall was constantly accelerating.
Zimo has been trying to cause trouble to the other party, but obviously this work is in vain. The other party has a more powerful analysis tool and can find the key points between the firewall data in an instant! If the firewall is likened to the miraculous formation in Chinese mythology, these key points are the pinpoints of breaking formation between formation operations.
They are inevitable, and they are constantly changing. The principle of firewall is actually similar to this. If you want to crack a firewall, you have to penetrate these data layers. Most hackers will use software analysis to judge, but use a software Analyzing a firewall database, the latest analysis data will be constantly refreshed on the screen. In the vast analysis flow, how can you find this key point, then it depends on the level of the individual.
"I can't stop it! He will break through the first firewall in at least thirty seconds. What about the obstacles on your side?" Zi Mo shouted loudly after making his last effort.
"Yeah, you can withdraw Zimo. You are now in charge of the lamb. He is under a lot of pressure." gd's rapid voice rang. All you can hear in the big room is the crackling sounds of striking the keyboard. Except for the occasional yelling, you can't even speak even nervously.
The Internet is a battlefield without smoke. At the moment, Zhang Yang is not easy at all. He even feels that his hands are a little cramped. If he is not prepared enough in advance, I am afraid that he can be exhausted. At this time, Zhang Yang discovered how powerful the starry sky is!
Many instructions that require him to perform many steps only need to give a command to the starry sky, but now the situation has basically been controlled, although Zhang Yang is now attacking very difficult, mainly Zhang Yang still underestimated their power, especially It is under the assistance of the starry sky. Even though Zhang Yang knows many vulnerabilities in the starry sky, he still lives into a hard fight under the supplement of gd.
And many of the loopholes that could have been exploited have little effect under gd's auxiliary defense. "This bunch of stupid guys are pretty bullish." Zhang Yang couldn't help but whistle. It was nearly an hour since Zhang Yang hit the first code.
In this hour, Zhang Yang can rest almost zero. His hands are almost non-stop typing code on the keyboard, I really miss the help of the starry sky! Zhang Yang couldn't help but sigh with emotion, but he can still stop now, at least the intensity that Zhang Yang sees is not enough.
But at the moment it seems to the outside world that the war between the two sides is already the largest cyber-attack battle on the Internet in recent years! At this moment, almost 80% of the hackers in the world are watching this dragon fight. Many hackers were shocked to find out that the strength of the gd performance has never been false, but they never thought that the Star Group’s network The security defense force is so great.
Not only hackers, but also the security teams under the intelligence agencies of many countries around the world are evaluating the network security level of the Star Group~EbookFREE.me~ It's too bullish! gd is worthy of being gd! The attack thus announced was actually made by gd alone! You can’t believe that this is actually done, okay, don’t look at me, I tell you, you don’t understand, but what you need to know is, I’m sure that gd is definitely not an organization that is advertised outside. It’s a person, and you can see from these attack methods and codes that he can’t change. If it is an organization, it can’t be so orderly without making a mistake! "
These words were directly shouted by a famous security expert hired by nn in front of the live video of the network TV! The host next to me looked at this flushed face excitedly, but in his thirties, the thin man did not know how to answer the call at all. She had never hosted such a live broadcast. From the beginning to the end, this guest All fell into a state of fanaticism.
If not for the viewers watching the video at the moment, they will eat this set. They don’t like the narration of the text. Although the security expert didn’t call out any technical content, they can understand it, so they are also very excited. RO! ! ! ;
;
--------------
--------------
Latest chapter of Ebook The Strongest Hacker Click here