The Strongest Hacker

Chapter 173 Drowsy and Get a Pillow (Part 1)

Chapter 173 Sleepy Pillow (Part 1)

Because everyone respects gd, when these few triumphant iǎ shrimp jumped out and swaggered around, although everyone was very angry, all the hackers just posted posts and insulted each other, and did not take any action. I think that this is something that belongs to the great god, and the great god should naturally have the demeanor of the great god, at least until the great god speaks, it is difficult for everyone to make a move. ;

"Damn, I can't take it anymore, those B, my mother will take action now, the black **** mother doesn't even know him, I really think that garbage server is awesome." Lan Mo finally couldn't help it, directly in The crowd erupted.

"Uh, Lan Mo, calm down, maybe gd is busy and can't come? After all, it's almost two days' time to send pillows (on), as long as he can surf the Internet, he should be fine. If you know about this, you won't even have a reaction." Shenyue Killer said cautiously.

Compared with Lan Mo and the others, GD has a deeper understanding of gd. Although he has only had direct contact with gd a few times, GD still remembers the fact that gd pretended to be himself, and during the hacker war, When this guy saw him, he didn't even have an explanation, which made GD very depressed at that time. If the situation was not urgent and GD didn't have time to pay attention to GD, I'm afraid GD would attack GD immediately.

Seeing Lan Mo and Shenyue killing them chatting in the group, GD suddenly felt moved. He thought of an idea, since GD can pretend to be himself, why can't he pretend to be GD? And if gd sees someone pretending to be him, I'm afraid he won't ignore it like he is now, right?

If gd comes out, then gd will have a chance to attack him. He wants to see how superb this mysterious person is. To be honest, GD is very dissatisfied with GD in his heart, it has nothing to do with other things, it's just pure dissatisfaction. It is no exception, although relatively speaking, GD's temper and experience are much better than other hackers.

But there are still some commonalities. For the original assassin virus, GD has already developed an anti-virus method, because there is no way to kill all the assassin viruses spreading on the Internet at once, and finally fell into a disadvantage, and was mysteriously released from the factory. GD who has been compared to GD doesn't even dare to admit his identity in front of his iǎ apprentice.

He felt that he couldn't afford to lose that person. At that time, GD was bragging to his iǎ apprentice, saying that GD would definitely solve the problem, but before he could solve it, GD appeared. And the second time, it was the same thing. Although the result and process were different, it was a fact that GD was completely at a disadvantage in dealing with the assassin virus.

Therefore, although GD is nothing on the surface, he has been suffocating in his heart, and now he has this opportunity,

GD started to wander around, thinking, since you pretended to be me at the beginning, then I pretend to be you once now, to make you depressed, isn't it too much?

It seems that in the eyes of ordinary people, it seems that GD is helping GD solve troubles, but in the circle of hackers, no one would think so, at least unless the strength gap is quite large, otherwise no one would admit that the other party is better than themselves, and like It is this kind of name-calling challenge, and no one will let others do it for you. This is not only a question of strength, but also a question of honor.

In fact, no matter what field you are in, as long as you are a technical person, you will have this disease more or less. It's like in the field you are good at, if someone names and questions your ability, will you let others do it for you? Even if this person uses your name? Do you know? Maybe other people don't know it, but this person in your name knows it.

Therefore, whether it is the last time Zhang Yang pretended to be GD, or this matter, although the two things seem to be doing good things for each other, neither Zhang Yang nor GD will be willing to let others do this. Even if Zhang Yang's current situation is a bit special, if he knew it, he would never do it to others. Zhang Yang has a lot of ways to put aside his suspicions, and don't need others to do things for me.

After GD made the decision, Zhang Yang was still eating in the restaurant and didn't know about it. And GD has already figured it out, even if he pretends to be GD, he doesn't plan to make a good name for it, at least he has to make him depressed first.

Thinking of this, GD had an idea, and quickly scanned the opponent's server. In fact, this is not the first time GD has done this work. This server has been scanned at least seven or eight times during this day, so I also have a good understanding of the performance of this garbage server.

Scanned again, the server is still the same, there is not much change, and the system has not been superbly reinforced, at least in the eyes of GD, it is not difficult to hack into this server, and it does not take much time.

Just do what you want, GD didn't have any hesitation, about an hour later, GD successfully obtained the highest authority of the server, and more importantly, GD got it without letting the hackers guarding the server discover it. of control.

After taking control, he hesitated for a while, and GD made the move. Quickly kicked all the hackers in the server system out of the server, and GD quickly began to write an announcement. Since he wanted to impersonate GD, he must leave the name of GD, but what is said in this announcement, it can be GD toss casually.

If the announcement left by GD makes all the outside hackers think that it took more than a day for GD to invade this junk server, then the real GD will definitely be extremely depressed when he finds out. GD didn't have any other ideas, he just wanted to make GD depressed, even if it was to find a place for himself.

But GD is not a diplomat, and he is not good at word games. Just when GD was thinking about how to write this announcement, his computer suddenly started to alarm crazily. GD, who was in deep thought, was startled immediately. He frantically typed countless commands on the keyboard with both hands, and quickly scanned the prompt boxes of various alarms. GD's eyes couldn't help but blacken.

"I got a fork" GD felt like crying without tears, LGD, if GD had time, he would definitely scold him directly, but now GD is so nervous that he almost sticks out his tongue, so naturally he has no time to scold . The crazy intrusion prompts from the firewall showed that at least seven or eight masters were tracking his data flow, and they had forcibly cracked several GDs and were about to trace them to the outermost level of GDs.

While constantly detonating the honeypots he had placed, hindering the tracking efficiency of these people, GD switched to the first level and began to quickly set up strategies. Every level of hacker has a perfect defense strategy, which is necessary, because each level must be carefully selected by each hacker, not only its conditions are excellent, but also the calculation speed and so on must be excellent. not bad.

Generally speaking, the first level of each hacker will not go anywhere. After all, there are only a few famous servers in the world. Apart from some that cannot be used as servers, there are not many left.

And a personal computer can barely be used as a springboard server. But at this moment, GD can't think about it so much. He is ready to lose this level. Fortunately, this outermost level is just the most rubbish one among the dozen or so levels of GD. It is a high-tech company in the United States. The company's server.

I have to say that although GD is not as advanced as advertised in terms of top virus and firewall technology, GD's strong foundation almost makes up for the shortcomings between the two, especially in the blue domain, that is, defense. GD's experience more sufficient.

The traps placed in some ordinary springboards in advance caused a lot of trouble for these trackers. Let the other party analyze GD's IP, and it will not be so easy to track the next one. When it is about to reach the first level, GD Finally, he temporarily got rid of the other party.

But GD knows that this time will never be too long, because in order to get rid of the steady pursuit of these experts, he has no time to clear the system logs inside, and the other party can quickly find the login information and so on. Then find out his next IP springboard.

It took less than two minutes to retract the first level. GD only set up a layer of firewall, and the opponent rushed in directly. The huge attack information made GD stunned. These people definitely came premeditated. A supercomputer with powerful analysis functions or a terrifying computing speed, otherwise, it would be impossible to crack his and find his next IP in such a short time.

With the first relatively powerful firewall as a barrier, GD finally stabilized its "position", turned on all its firewall functions, and quickly began to use its own computing functions to analyze the IP information of these intruding data streams. While typing various commands on the keyboard quickly, GD quickly began to think in his mind.

GD is not stupid. After the analysis results came out, GD quickly guessed the origins of these people, and the masters who tracked GD also used the springboard, but just like the analysis of the staff of the Military Intelligence Bureau, In fact, every hacker has his own attack methods and tracking methods. For example, Zhang Yang is good at using viruses when tracking, and most of his work uses viruses to achieve his goals.

Every hacker has every hacker's means and characteristics, and a brief analysis allowed GD to quickly determine the approximate identities of these masters

All from the official, two of them should be the two masters of the Internet Surveillance Bureau, GD has no doubts about this, because these two people have tracked GD before, and the two sides have played offensive and defensive battles on the Internet more than once, so GD familiar with their methods.

But they may not be so familiar with GD, just like the Cold War between the US and the Soviet Union, GD and these two masters have been "peaceful" with each other for many years, and they have never had a direct fight with GD, In addition, GD's technology has grown rapidly over the years, and his style is relatively comprehensive and changeable.

When pretending to be GD, GD also deliberately copied some viruses made by himself into a few, in order to "pretend" GD to the maximum, so these people should not know that they are GD.

However, because of this, GD is quite depressed. He is now certain that, except for the people who founded the National Security Bureau, the others should be members of the Japanese Network Information Defense Force, and GD is almost certain that they intentionally invaded Those few hackers on domestic websites should be regarded as a bait."

It's just that GD didn't think about it that much at the beginning. After all, although these hackers are not well-known, everyone knows them. They didn't expect them to be pawns in the hands of the Japanese government.

Although GD has temporarily organized a defense line, and the opponent's several masters who tracked him are not all the way, and they seem to be attacking each other, but relatively speaking, these trackers have maintained a certain calmness among each other, and They are all working hard to crack the first level of GD. However, their fight also bought time for GD, after all, as long as they fight each other, it is bound to consume their computer power.

In this way, the analysis time for GD will be prolonged. While defending the server, he quickly cleared all the traces of his presence, and GD secretly heaved a sigh of relief. In this way, even if these people have cracked this machine at this moment and want to track him, The difficulty will also be much higher, so that GD will have enough time to defend, and GD will definitely be able to get rid of them before the next level.

Just as GD breathed a sigh of relief, his system started sending out further alarms. "Day" GD let out a depressed cry, this time it wasn't those experts, but GD's own security personnel also discovered the intrusion and started to tidy up the system.

"I let out a depressed cry, and then directly activated a computer virus in this server. This virus was also installed by GD in advance. Originally, he used it to pretend that he was GD, but he didn't expect it to be true. used.

The infection of this virus is not strong, it hardly infects and the concealment is not strong, but it is quite stubborn and its super destructive power is activated, it will directly destroy the hard disk of the server in just a few tens of seconds, Clear all the data in it and cause damage to the hardware. It will give priority to clearing some key system logs and other recorded data. Ah! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like