The Strongest Hacker

Chapter 141 Catch the

Chapter 141 Catch "jiān" (Part 1)

Compared with other ministries in various countries, the ministries in charge of network security are actually very depressed. The real masters of the network are always in the private sector. Civil servants in other ministries, every year, do not know how many people want to squeeze in, but in In the case of network technology, it is just the opposite.

Only a small part is recruited by the Ministry of the country, and the rest are various large-scale high-tech enterprises in the country, and a group of people with real strength are hidden among the people. These people are often subject to various constraints in reality, so they yearn for freedom more, and the Internet provides this platform, so they will not join these strictly disciplined departments at all.

The Ministry of State is Powerful to People Chapter 141 What catches "rapists" (Part 1) is not its treatment, but its rights. Those who engage in technology are not very strong about rights. What they admire more are those who are more skilled, and they admire these talents more.

If it is because of money or other, some large companies are more powerful than these ministries. Therefore, the network security departments of various zfs are quite tragic, but the entire country uses these talents to network and trains them by itself, so the experts in the country should not be underestimated, and there are so many expert hackers on the Internet, you don't know which one is work for the country.

After the black eagle left, GD quickly said in the chat room: "Gd should have contact with those iǎ guys on the Black League Forum, I'll go and tell them, I just kicked GD out, don't let him have anything Other ideas?

When GD was looking for their group of people, Zhang Yang couldn't help but go offline. He was too sleepy. When he just invaded, he was in high spirits, but now everything is over, and those people are also like Shrunken like a tortoise, he didn't know where he went, he didn't even pay attention to the provocative announcement that Zhang Yang made in Japan's Chapter 141 Catch "Craft" (Part 1) Defense Department, let Zhang Yang Very depressed.

These grandchildren ran away after messing with them, shit. Although Zhang Yang didn't track down these people just now, Zhang Yang has roughly guessed that these hackers should be in an organization, just like GD's iǎ circle, and they may not be from the same country, I'm afraid there are all over the world.

When Zhang Yang wanted to vent his anger, he had no place to vent his anger. When he was getting in the car from the website of the Defense Agency, Zhang Yang became so angry that he simply killed the entire database server of the Japanese Defense Agency! Only then did he breathe a sigh of relief. At this moment, the official website of the Defense Agency just posted an ordinary announcement, saying that it had just been attacked by hackers, and the website was being maintained at the moment.

Sleeping, Zhang Yang scolded, and then he was ready to let them go, the enemy is in the dark, and Zhang Yang has no good way. Just when he was about to turn off the computer, Zhang Yang suddenly found a reminder of a new email in the lower right corner. Zhang Yang was stunned for a moment. He didn't contact anyone with his email. This email was only used to feed back the tracking information of the virus.

Once an email comes back, it means that a tracking virus has tracked the target and sent back the target's information, but all the targets that Zhang Yang used to track have been lost, right? Moreover, Zhang Yang completely eliminated the tracking virus. Why is there an email feedback now?

Zhang Yang quickly opened the mailbox, and when he saw the message sent back, Zhang Yang's face became extremely weird! An accident, definitely an accident among accidents! What is sent back is not a tracking virus, but an infection bug! After reading the message quickly and carefully, Zhang Yang understood why an infected bug sent this email back by the way!

The Assassin-killing virus was adapted from the infected worm. When Zhang Yang fully activated the infected worm, the two exchanged source codes on the Internet, which gave the infected worm a part of the ability to track the assassin virus. Self mutation! And the group of people just now used the assassin virus, they used the assassin virus just like Zhang Yang used the infection bug, through the opening of the assassin virus, they achieved the purpose of rapid invasion.

Needless to say, there are obviously assassin viruses everywhere these people pass by. The virus that specializes in killing assassin viruses is self-deleting, and it will clear itself after 2 iǎ hours, but there is no time in the infection bug. So the infected bug virus with this function immediately bit down on the assassin virus.

Probably this person was also unlucky. When he retreated, after getting rid of Zhang Yang's tracking, he didn't realize that there was still a virus that could follow another virus to come up, and the mutated infection virus was not much bigger than the tracking virus. Similarly, he analyzes the virus for tracking, not the data flow, so that its terrifying concealment is fully displayed.

In the end, due to various coincidences, the tracking virus specially placed by Zhang Yang did not work, but the infection virus gave Zhang Yang a big surprise! This is a typical example of intentional planting but no growth, and unintentional willows and willows. Zhang Yang's ōu wind almost didn't move.

"*, can you stop playing like this in the future, and make people's iǎ darlings startled." After talking to himself, the sleepy bug also ran away, Zhang Yang became excited again, and carefully checked the detailed records sent back , Zhang Yang let out a sigh of emotion, this group of animals, the real ****, Zhang Yang thought he had enough springboards, but these grandsons actually had more springboards!

This T is simply a springboard king. Judging from the records of infestation, this grandson’s springboard has actually traveled around the world, including the United States, Europe, South America, and even Africa, and in the end it The destination made Zhang Yang feel weird, *, this grandson is actually in H City! Just in the country! After tracing this far, Zhang Yang knew that this must be the other party's real IP.

After thinking about it, Zhang Yang quickly wrote an order for the infected bugs. Except for the information about this target, the other infected bugs Zhang Yang asked them to delete themselves. First of all, the infection ability is more terrifying than the assassin virus. Such a virus may cause a large-scale panic all over the world. If it triggers an economic crisis or the like, it will be a tragedy.

After writing the command, the number of infected worms displayed on the computer decreased rapidly. In just ten minutes, all the infected worms circulating on the Internet have been self-deleted, leaving only this tracked enemy. Virus, this infection has already infected the other party's computer. This person is obviously very confident in their own technology, and didn't check it carefully at all. Otherwise, no matter how well the infestation is concealed, it is still easy to be discovered when entering the other party's computer.

And once the infected bug lurked inside the other party's computer, it was a bit difficult to find it. After thinking about it, Zhang Yang felt that it was better to sneak into the other party's computer while it was still hot. After such a series of battles just now, it will be a huge loss of energy for both sides, especially for these offensive people. In the early stage, they have engaged in so many springboards all over the world. More.

Just after the end, Zhang Yang was almost so tired that he fell asleep directly. It is conceivable that these people's energy is exhausted. Don't think that hacking other people's computers will not consume energy. The command does not seem to consume a lot of energy, but during the intrusion, whether it is Zhang Yang or any hacker, the brain is running at high speed and in a state of high concentration. If this state lasts for a long time, it will consume energy. very huge.

Not to mention, the physical fitness of many otaku is relatively poorer than that of ordinary people. It is more difficult to hack into the computers used by experts silently than hacking into the servers of some companies! After all, the server is open for business, many network accesses, and various requests make it have a lot of loopholes, but personal use is different.

After re-connecting various springboards, Zhang Yang even logged into the No. 1 satellite through the mobile satellite base station, and then got out of NASA, went around the United States, and then started to crack the computer. With the infected bug as internal response, Zhang Yang got the general situation of the computer with just one scan.

It is not entirely correct to say that it is a computer, it is completely at the server level, and it is even faster than Zhang Yang's cheap server. When he saw this computer, Zhang Yang knew that this person might not be ordinary rich. If such a server with excellent performance is purchased in reality, it will cost at least one million dollars, and it is still US dollars!

After a scan of the entire computer, Zhang Yang felt like a dog biting a hedgehog, and couldn't figure out what to say. This grandson's computer uses the linu system, and there are some leaks, but this T is no different from a hedgehog. The whole system is always There are countless honeypots placed in places where problems are likely to occur. These honeypots have no way to detour, but once they invade, they will immediately send out an alarm.

Although he was opened by an infection bug, this person is very sinister. There is a hidden iǎ program in his system. This iǎ program has no special function, but once there is illegal access to the computer, or in the computer If the outbound data flow is so large, it will immediately launch an alarm.

Grass! After a long time, Zhang Yang couldn't help but yelled, how could this T be? This is the first time Zhang Yang felt that it was so difficult to hack into a personal computer quietly. It seemed that he was still too iǎ looking at the heroes of the world. Because the other party is not using the computer at all, and there are no junk programs running in the computer, so the normal network traffic is pitifully small.

And this network traffic monitoring program will immediately send out an alarm once the up and down traffic exceeds 5B per second. After thinking for a long time, Zhang Yang fixed his eyes on the brood, wanting to prevent this program from sending alarms, the brood is a good choice, the membrane function of the brood can give this program a false appearance, to deceive the program, as long as Zhang Yang enters the computer , the rest is easy to say.

The problem is that although the size of the mother's nest is not big, it is about 14 big iǎ, with a transmission speed of 5B per second. When it is transmitted, it will be discovered by the other party once it is dawn. ! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like