The Strongest Hacker

Chapter 252 Dry (Part 2)

Chapter 252: Dry (Part 2)

Chapter 252: Dry (Part 2)

It’s just another cloud, after finding out the other party’s real i, Zhang Yang couldn’t help but smile triumphantly, what about iǎ, bro let me know today, what’s the result when a coffee table is filled with cups, bro Turn all those cups into tableware today!

With the progress of the scanner, Zhang Yang soon had a method of intrusion. Although the protection method of this system is quite awesome, for Zhang Yang, intruding it is still very simple. No way, the height is a problem. The world only looks at your height, and doesn’t care whether you stepped on a garbage dump or on the shoulders of giants. Zhang Yang’s current height is no one else’s. Chapter two hundred and fifty-two dry (middle) shoulder to shoulder.

Zhang Yang did not step on the garbage dump, nor did he step on the shoulders of giants, but on time. Who has time stronger? The scanner from a few years later scans such a system. Although the computer master of this system is powerful, he is still a floating cloud in front of Zhang Yang.

While preparing to invade the server, Zhang Yang monitored the financial hacker's actions. When this person just returned to the big server, he was very careful and spent a lot of time for this. Otherwise, Zhang Yang would not have had so much time to track down his real i address.

But now it's all right, this guy can't run even if he wants to run now. After taking a look at what he was doing, Zhang Yang just chased him out after he was kicked out, and didn't put him in the big server. The things were deleted, and now this person started to copy things into the server again, and in the software copied by this person this time, Zhang Yang discovered the mother program of the financial bomb.

Well, it looks like you really want to frame, but baby, you may never imagine that your current frame is completely useless. Whether it's Pan Wenlong or this hacker, I'm afraid they would never have thought that there would be a direct connection between Zhang Yang and Black Eagle, and that Zhang Yang could still talk to Black Eagle. There is a real possibility of tragedy.

After taking a look at what he did, Zhang Yang quickly started hacking into his computer. Zhang Yang had already made preparations for the invasion. When he started to attack, the efficiency was very high. In less than 10 minutes, Zhang Yang successfully broke through his firewall and entered his computer. After carefully checking the computer, it was very good and powerful, and Zhang Yang couldn't help drooling.

The performance of this server is quite awesome. Although it is not as good as a supercomputer, it is about the same as a general iǎ supercomputer. The cost may be at least several million dollars. It seems that these financial hackers are rich. Ah, but the risk is considerable. Many hackers actually use their own technology to make money, but the amount of money these hackers get from the bank is iǎ amount.

A few thousand, or tens of thousands of dollars, like these financial hackers, although it is impossible to act like this time in ICBC, it will cost more than a billion at once, but at least several million will come out every time. After the money has changed hands through the websites of those large international money laundering organizations, although it may be less, for most hackers, the money is still a huge amount.

The financial system doesn't just refer to the banking system, just like many websites like Taobao, or some companies hold activities such as Internet ōu awards, most of which are obtained by these hackers. Although the ōu award activities held by some companies may be tricky, the similar activities held by most companies are still very fair. However, as long as hackers target this kind of fairness, the chances of ordinary netizens wanting ōu are almost zero.

The firewall and system settings in the server are also quite good, and more importantly, when Zhang Yang secretly opened the hard disk of the server, it was filled with a lot of software related to the financial system of the battle, as well as viruses, etc. These are the biggest evidences .

But this person's i showed that he was in Hawaii in the United States. Even if Zhang Yang got the evidence, he only made a wedding dress for the FBI in the end, which was of no benefit to Zhang Yang. American financial hackers, Zhang Yang thought about it carefully. One of the famous IDs is mney, which uses money to create IDs, while the other is a greedy ghost translated from English.

These two guys are absolutely superior in the financial system, could it be one of them? Zhang Yang has only heard about Mney and Greedy Ghost, and he has never fought with these two people in his previous life. He only knows a little about their record, so it is impossible to tell who this guy is from this system.

In this guy's computer hard drive, Zhang Yang quickly found all the information about the financial bomb, as well as how to undo it, etc., but Zhang Yang managed to crack it. Zhang Yang unceremoniously copied all these things back into his computer. Seeing that guy was still "enjoyed" making evidence to frame Zhang Yang, Zhang Yang smiled strangely. Get rid of the server, let this guy move and get out?

While hesitating whether to check the name of this guy from the Hawaiian city system, Zhang Yang didn't listen, but quickly placed traps and viruses in his computer. Just when Zhang Yang was about to directly kill this guy's computer, his eyebrows twitched suddenly, and Zhang Yang suddenly remembered a very important thing, that is, if he found his real i, then he would always follow Zhang Yang's actions The ghost virus should also be found.

But if the ghost virus finds the real i of the other party, there will be a reminder, but Zhang Yang has not received the reminder of the ghost virus so far. Could it be said that this computer is not his own computer, is it still just impossible? After invading this computer, Zhang Yang quickly retrieved the i-address connected to this computer, and confirmed that the last connection to this computer was interrupted, and no new i-address appeared.

Somewhat suspiciously, Zhang Yang stopped his hands, and Zhang Yang quickly switched to the page of the ghost virus. After switching over, Zhang Yang became even more weird. It is the same, but the difference is that at this moment, the ghost virus still has not stopped working, and is still in the search state, that is to say, the analysis of the ghost virus, this server is still his, but now the ghost virus cannot confirm the new i stream , so it is in the search state.

Depend on! Could it be the hell? Zhang Yang was a little unbelievable, and quickly switched back to the front of this server. He searched all the ports again, as well as the computers and i connected to this server. The second new i is connected to this computer?

Could it be that the ghost virus has gone wrong? Zhang Yang frowned, as if this was the only possibility, but Zhang Yang had a feeling in his heart that there must be nothing wrong with the ghost virus, and there must be something he didn't expect. This is the advantage of the program. Although the program is rigid, rigidity has the advantage of rigidity. As long as it thinks that it is not the real i, it will keep searching. But if it is a human, seeing such a situation, it will not continue to track immediately. Confirm that this server is someone else's real i.

Without data flow, without Xini, it is impossible for a person to connect to the network. This is the essence. It is impossible for a person to appear on the Internet for no reason. Unless it is like in a movie, it may happen that there is a pretty awesome artificial intelligence. Otherwise, there will be an i.

Since there is no second i connected to this computer, if this computer is not the real host of the other party, then there will definitely be data streams that I have not discovered.

Depend on! Thinking of this, a flash of light suddenly flashed in Zhang Yang's mind, he thought of a possibility Zhang Yang's eyes lit up, and he immediately searched quickly, mlbgd, if it is true, this guy is really md enough, And using the Cunning Rabbit's Three Caves to describe him doesn't seem to be enough to describe the cunning of this bitch.

Zhang Yang quickly opened his analysis software, he didn't do anything, but quickly started to scan the data size iǎ between the data streams connected to this computer. While scanning and analyzing, Zhang Yang exited from this server, and then quickly returned according to the original path. While returning, he checked the data size of each server except his own data stream one by one. Soon, Zhang Yang found something tricky on the penultimate station where he thought it was this guy's first level.

Except for the data used by Zhang Yang himself, starting from this one, all the data has dropped drastically. Zhang Yang immediately understood that he finally found the real host of this guy! This guy's real host is not the one in Hawaii at all, but the level one that Zhang Yang once regarded as the one that drilled out of it, and continues to move out, is his real host!

It seems a bit confusing, but in fact, for example, if the data flow connecting the computers of this bitch is compared to a wire, then this guy made a part of the wire folded, first in one direction After extending it to a point, that is, the server in Hawaii, it began to pretend to be that server, and then turned back, and then regarded its own server as a black one, and then connected to another one from its own server , and then extend all the way out to do other people's things.

It's as if Zhang Yang used his own computer to hack the school server, then used the school server as a springboard to hack his own computer again, and then used his own computer to hack another one in a row. When Zhang Yang’s computer was traced, because the traced data stream entered Zhang Yang’s computer illegally, this person would think that Zhang Yang’s computer was the one and then continue to trace. When traced to the school server, he found that there was no second If I connect to the school computer, I will take it for granted that the school computer is the server.

But it never occurred to me that this bitch simply overlapped the data flow. Who would have thought that the real target you are looking for has already been hacked by you, and then you have gone too far? Ah! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like