The Strongest Hacker

Chapter 134 The Unexpected Result (Part 2)

Chapter 134 The Unexpected Result (Part 2)

When the pointer pointed to a later date, Zhang Yang finished writing the software. At this moment, the infected bug modified by Zhang Yang has completely changed beyond recognition. It is completely different from the infected bug. Abandoning some of the characteristics of computer viruses, such as active transmission, etc., its size has also changed from a size of a few hundred B to a behemoth of more than a dozen.

Of course, the dozen or so pieces of software are actually not that big, they are just equivalent to the original infection bugs, which are already too big. After writing, Zhang Yang directly named this anti-virus software, which was more like a firewall, Brood 1.0.

First of all, the function may still need some improvement, but Zhang Yang just popped up in his head the ideas of Chapter 134: The Result of the Accident (Part 2), all of which have been written into it, and there are no other ideas for the time being. added it.

First of all, the brood does not have too many functions, only one function, which is anti-virus. After running the brood, it will analyze the system version for the first time, confirm what system the user is, and then face all All system files have an automatic detection process, and any virus disguised as a system file cannot escape its eyes, because no matter how powerful a computer virus is, no matter how powerful an embedded computer virus is, no matter how you disguise it, you will not be as good as the original system file. The files are still different.

Once the brood retrieves the virus-infected system file, it will automatically generate an identical system file. The system file generated by the brood is exactly the same as the original system file, and then it will use this file to replace the virus-infected file. file, so as to ensure that there is no problem with the system, and then the brood will directly cut off the infected system file.

Then pack it into the scope of a spore it generates. This spore is equivalent to a simple simulation system. It only needs to completely clear the simulation system, just like the result of the accident in Chapter 134 ( Bottom) The tablecloth was packed and thrown away in the restaurant. After throwing it away, the table was still new.

But this step is not easy, the essence of the entire brood virus is here, Zhang Yang spent more than two hours writing it just for this part, as we all know that many system files cannot be copied, transferred and used Yes, in the end Zhang Yang still used a part of the infected virus to allow the files generated by the brood to be replaced smoothly.

Theoretically, Brood can kill any virus. This is different from other software. Brood does not need to "memorize" the virus characteristics of the huge and complex viruses, nor does it need a virus database. All it needs is There are various versions of the system on the market, because after any virus enters the system, no matter whether you infect the system or the software in the system, it will pass through the system files. As long as you pass through the system files, you will not be able to escape from the nest detection.

It does not need to know what kind of virus you are, what functions you have, it will directly package you,

Throwing away is what the brood needs to do. Does it matter what type of virus it is?

Moreover, under the action of this unique membrane of the brood, because its function is to isolate the connection between the system and the virus, even if your virus is triggered, you have no way to affect the system itself at all, you only affect It's just a fake target simulated by the brood, so it's useless how you explode, and your infection ability is useless.

After quickly activating the brood, Zhang Yang began to test the mutant assassin virus in his server. Soon, the brood was installed in just one minute, and he tested the system performance. The impact is almost negligible, and only a little system resources will be taken up during antivirus.

The Assassin virus in the machine was directly opened, and the prompt box of the brood popped up almost instantly. After clicking on the antivirus, the outbreak of the Assassin virus did not appear. Only a flicker of the screen restored calm. Using his own firewall to start scanning for viruses again, when the results came out, Zhang Yang couldn't help but waved his fist fiercely.

Niucha, even if the infection pattern of the assassin virus is not found, the brood can kill it directly. After killing the assassin virus, Zhang Yang activated the two viruses he wrote in his computer. After the same operation, after just a few minutes, even the super virus Zhang Yang wrote could not escape the detection of the nest. and clear.

Zhang Yang soon realized that he might have really created a new anti-virus method. If all the current viruses did not undergo major changes, the brood would be invincible in a sense.

If he handed over this anti-virus software to any security company, I am afraid that security companies all over the world will face the danger of bankruptcy for a long time.

Pulled out QQ to look, found that Gao Gang is still online, it seems that security companies are not easy to do, naturally it is impossible to throw the brood anti-virus software publicity to Gao Gang.

"How is it?" After thinking for a while, Zhang Yang quickly sent a message to Gao Gang.

"Your Excellency, not long ago, the assassin virus mutated for the third time, but like last time, it hasn't changed much, but the effect of the software you gave us is not very good." Gao Gang said The message was replied quickly, and it seemed that he was standing in front of the company's technical department.

Zhang Yang was not surprised. It was impossible to completely kill the Assassin Virus before finding out the law of the Assassin Virus and trying to kill its own mutation law.

Although Zhang Yang now has Brood Antivirus software, Zhang Yang found that the Brood Antivirus software cannot be exposed at all. It is no exaggeration to say that Brood is now worth at least tens of billions of dollars. It not only represents the current The improvement of antivirus technology represents that it has created an era.

Looking at the time, it is less than 8 hours away from the time reserved by the hacker. If the No. 1 satellite can't analyze the results, then Zhang Yang has no better way. I checked the progress of the No. 1 satellite, and the analysis is still in progress, but the analysis speed is naturally much faster than Zhang Yang's server speed.

"Great God, NetEase, Tencent and other household websites were hacked just now." When Zhang Yang was checking the progress of the satellite analysis, the news of ing suddenly popped up. Seeing this news, Zhang Yang froze for a moment, quickly closed the webpage, and directly After entering Netease's address, the webpage opened quickly, but the homepage had been tampered with.

There is only one sentence above: The sentence "belongs to the war between us" is not difficult to understand, but Zhang Yang's heart really jumped. Could it be that the author of the assassin virus made a move? If this is the case, then why did he take action now when the time displayed was still 8 iǎ hours when the assassin virus broke out?

There must be a connection between the two. After hesitating for a while, Zhang Yang took out all his tools. After opening the analysis software, Zhang Yang directly began to scan the NetEase port. After a few minutes, Zhang Yang couldn't help but smile bitterly. With a sigh, it is really difficult for him to start now. Just by scanning, there are at least dozens of data streams detecting the NetEase port, which means that there are at least dozens of hackers staring at this place.

Zhang Yang was a little dazed. Although he didn't know who the initiator of this attack was, it was definitely not a domestic hacker, so only foreign hackers were involved. Once it involves such a large-scale invasion of the country by foreign hackers, it will easily cause hackers to attack. war

Regardless of whether it was the hacker war in 1998 or 2002, Zhang Yang had no chance to participate, but once this kind of war among hackers broke out, it would definitely cause incalculable large-scale indirect economic losses. More importantly, once the anger between the two parties rises, once the website of the Ministry of Government is affected, the damage may be even greater, especially some important public systems.

The complete result of the scan soon appeared in front of Zhang Yang. After careful study, Zhang Yang was sure that even if it wasn't the author of the assassin virus, it had a lot to do with him, because the other party's intrusion was not hidden at all. His body shape was invaded openly and aboveboard, using a back-end that was released by the assassin virus when it broke out.

"Master, all the large domestic websites are under attack now, and... it seems that they have been controlled by the other party very quickly. The address is given to you by the master. This is the address of a īxia chat room we use ourselves. I I've downloaded QQ." ing's message came quickly again.

Zhang Yang was just about to send back a message to ing, when suddenly his firewall frantically issued an alarm, and a virus was frantically tracking his information along Zhang Yang's data stream, Zhang Yang was taken aback, and after a careful look, Zhang Yang's face è changed. Is Tencent's server

The entire QQ server of Tencent has been planted with a Trojan horse. At the moment, it is spreading rapidly and crazily through QQ. Zhang Yang quickly shut down all his QQs. Collect Tencent's user database, and the other party's purpose may be to destroy all Tencent's data.

However, Zhang Yang didn't have time to read the address of the chat room sent by ing just now. It is obvious that the other party's intrusion was definitely not done by one person. So many websites were killed almost at the same time, it is impossible for one person Even if you can do it, even if there is a virus, it is not a panacea, it just provides an intrusion port, and you need to do the intrusion work yourself, at least to solve the server Firewall, right?

With so many firewalls, unless one person has three heads and six arms, I am afraid that three heads and six arms will not be enough. Zhang Yang made his decision almost instantly. This is a hacker organization with a lot of people. Zhang Yang quickly opened the webpages of several household websites and took a look. All the webpages of the household websites were in an unavailable state, and more than 80% of the webpages were put on the webpages that Zhang Yang had just seen at the beginning. That sentence. ! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like