Since I Was a Special Soldier

Chapter 521: Fairy Fight (Part 1)

For so many years, he has not been discovered on the Internet, and his id has been changed countless times. Many people don’t know who he is. In fact, he was in the Sino-US hacking war in 2001 and 2002. Is the leader among them.

But at this moment he suddenly felt old, every hacker actually has his own strong personal style, whether it is the firewall he often uses, intrusion programs, etc., as long as he often scans several times, he probably knows who it is. .

Although I don't know who the other party is in reality, the id and so on on the network can all be known.

And when the man in front of him broke through the first firewall, he felt a surprise. Really, a lot of firewall ideas are wild and unreliable, and that feeling has been gone for a long time. This is obviously not him. Any hacker you know.

This should be a young hacker who has just entered the industry for a short time, and may not even have systematically learned about intrusions and these aspects, because once they have learned these systematically, many aspects will fall into some limitations and routines.

But the other party does not have it at all, which means that the other party may be self-taught!

This kind of genius did not expect another one to appear. Cass thought that with the development of technology in the new century, there may be no more geniuses like Kevin Mitnick before.

The field of computer programming will also enter the grouping, stylization, and large-scale route, just like industrial design.

From the highest personal design, hand-made stunning products have gradually become assembly-line operations, produced stylized products.

Because the first batch of hackers have just developed the Internet, and many things were studied by themselves without the guidance of predecessors, but the programmers who grew up in the latter were all carefully studied and researched. Once your brain has done this kind of learning, if you want to jump out, you are not a genius and you can't!

This is the one in front of me! Cass is constantly working hard to defend. I think Cass was also a genius back then. It was nothing more than the confrontation between the genius of the old generation and the genius of the new generation. The main battlefield of the two had already left the library server.

Because although those people there are constantly attacking, in the case of four supercomputer-assisted calculations, the so-called ddos ​​attacks of the other party are useless and can be solved easily.

"Jiang Tao, the handling here is up to you." Jiang Yanhai directly stretched out his hand to operate it, and directly transferred the battlefield on the server side to a control terminal next to it, and handed it to Jiang Tao.

"Yes!" Jiang Tao is also a little excited. What Jiang Yanhai is doing, of course he knows that this is a single person singles out more than a dozen top hackers, and he wants to participate, but he knows that his skills should be forgotten.

Mainly relying on the firewall and programs written by himself, he estimated that he could not bear the hackers alone.

But if you rely on the firewall written by Jiang Yanhai and the system that has been patched so far, he can also hit ten! Although he cannot view the source code of these firewalls, he will use it!

Anyway, he can be regarded as a senior security officer, well, this ability is still there.

In fact, Jiang Yanhai doesn't use Jiang Tao, he can do it whatever he wants, but since someone can use it, why not use it? Do you think it’s not tiring to switch keyboards? Being able to save effort is naturally saving effort, just focus on tracking this one in front of you.

The battlefield of the two of them has reached another large server. This is a server of a company that rents a server. The server here contains at least hundreds of company websites, server databases, etc., so network communication here can be guaranteed. .

But in the same way, it is not that simple to defend so many servers, and after Jiang Yanhai made sure that his firewall was not bad, after stepping up the attack on the firewall, he took a detour.

He quickly found the names of the companies that this company provides leasing services from public information. Jiang Yanhai found these companies directly following the company names, and then invaded the ordinary computers of these companies.

The ordinary computer protection of these companies... To Jiang Yanhai, it is just like nothing. He directly finds the computer of the other party's employee responsible for security protection. The level of such employees will not be too high, so his personal computer will save the account and password.

After obtaining the account and password, Jiang Yanhai directly initiated an official login request to the server through the other party's computer.

Such access and login requests cannot be completely blocked by the other party, so Jiang Yanhai directly logged in to the server, and he was still an administrator account. After logging in, Jiang Yanhai immediately began to use his own program to invade the entire system.

For a server to be compromised from the inside, it is really too simple.

The first time he entered this server, the anti-tracking program had continued to track the other party directly, and while the anti-tracking program was tracking, Jiang Yanhai had quickly launched a large-scale attack, directly starting to grab control of the entire server with the other party.

The battlefield that broke out in an instant was directly used to divert his attention. In fact, the anti-tracking program was actually used, and he had already begun to follow his data stream to find his next broiler.

Cass breathed a sigh of relief. This is one of his large broilers. The firewall of such a large broiler is good, and it takes time for the other party to attack its own firewall~www.wuxiaspot.com~ not to mention that he is inside the server Also set up a second firewall.

It's just that he just wiped the cold sweat coming out of his forehead, and before he took a sip of water from the tea cup next to him, a crazy siren suddenly appeared on his screen!

"Oh! sh! it!"

The sudden attack method made Cass startled in an instant, he screamed directly, and directly retracted his hand to take the water cup, and then suddenly began to operate.

"How is this possible?! Where did this guy come from? Haven't I set up the firewall directly?" Cass looked incredible, although he may have fallen in technology over the years, but **** It hasn't dropped so much, has it?

You are too much, right? Why did you just break into the server in just one or two minutes and cracked two protective walls, and it seemed that his firewall hadn't alarmed when it was cracked? !

The sweat on Cass's forehead just wiped out instantly, because this server is a broiler he has used for a long time, so the traces inside can't be wiped out so easily!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like