The Strongest Hacker

Chapter 453: Being Followed (Part 1)

Zhang Yang has already moved the server in the school here. There was no place to put it in the house where he lived last time. Now there is enough space to prevent the server. While eating fried dough sticks, Zhang Yang turned on the server. In fact, Zhang Yang is no longer afraid of being known by others. After passing the most dangerous stage in the early stage, for Zhang Yang, the danger has passed. This identity has been spread out, and some key people know it, so it is naturally excusable that Zhang Yang has these devices in his home.

As for the ID of taming GSD. , with the existence of infected bugs, sometimes Zhang Yang can create the illusion of taming GSD and appearing in different places at the same time with just one command. No one can doubt that he is being followed (up) head up.

Even ANUBIS couldn't think of the existence of infestation bugs, let alone others. The reason why AXANUBIS did not expect it is because after so many years of hard work, ANUBIS knew how difficult it would be to achieve such a result. It worked out.

Even if they were killed, they would never have imagined that the Adam system in their mouths would eventually mutate like a virus written by Zhang Yang. This situation is accidental and cannot be repeated. Even if the Adam system is rebuilt now, and then the entire infection virus is re-entered, the final result may not be like this.

Sometimes miracles are born from the combination of countless accidents, so if Zhang Yang wants to buy a server or a supercomputer in the future, he doesn’t have to hide it anymore. Master, I run a computer company. As the technical director of a world-renowned computer company, it's not unreasonable to buy some servers, right?

After eating a deep-fried dough stick, the server started up successfully, Zhang Yang took a sip of soy milk, and then went straight to the hidden backup system and connected to the bug-infested system. Zhang Yang quickly called up all the information recorded by this tracking strategy from the system log of the infected bug.

Since the appearance of ANUBIS in this life, when Zhang Yang was catching broilers everywhere, he subconsciously put in various tracking strategies. After each placement, all contact information will be placed in the firewall. After the system is infected with bugs, these The things are all handed over to the infestation insects.

Zhang Yang catches different broilers every time." So now, Zhang Yang doesn't know how many honey pots he has placed out. Putting honey pots everywhere is very beneficial! It's like a rookie hunter and an old hunter going into the forest Hunting, although old hunters will place traps on the only way of some prey based on their rich experience, so that the chances of old hunters getting prey will be greatly increased.

However, although the rookie hunter does not have the rich experience of the old hunter, he can place traps everywhere in the forest. The old hunter may only place five or six traps to catch the prey, but the rookie hunter can place hundreds of traps.

I set traps everywhere, and I don't believe that I can't catch the game.

Anything, once the base is large, there will always be gains, and sometimes, not only will there be gains within your goal, there may be unexpected gains. For example, Zhang Yang would rather kill a thousand by mistake than let one go. He is now combining the methods of an old hunter and a rookie hunter. Whenever he has invaded broilers, he will habitually throw a bunch of honey pots into it, and the honey pots will be gone again. No information will be exposed, and there is no need to clean up these honeypots when exiting the broiler to clean up traces.

Now Zhang Yang found out to his pain that he seemed to have caught a surprise! This guy is not looking for GSD, nor is it "not Star Group, he is looking for O." And judging from the information captured by this stalking honeypot so far, this person obviously found GOD. Some government and traces left over from the Internet are very efficient when looking for them.

From this search engine, he not only searched for GOD, but Zhang Yang also found that he searched for some of the websites that GOD and they commonly use, such as the humble chat room and the website are also included in the search scope. In fact, Baidu's functions may be worse than those of Google, but it is definitely not as bad as it appears on the surface. The fundamental reason is that Baidu has turned off many functions!

But these things can also be found in its server. Zhang Yang doesn't know what this person is looking for, but from his search method, he seems to have some evidence in his hand, and then search for these Something like being able to get GOD's geographic location.

The tracking honeypot has not yet traced the real location of this person, but Zhang Yang found that the data flow of the tracking honeypot following this person seems to have tracked several GOD-controlled broilers, especially two of the first-level broilers with obvious GOD style of.

Zhang Yang knew GOD very well in his previous life. , So when he saw these software and firewalls, he was instantly sure that these two first-level broilers were definitely GOD. "Damn it, GODBO. Who is this guy watching? Why is he so careless.

Zhang Yang touched his chin and couldn't help but yelled twice in surprise.

It is clear that GOD's strength is publicized. There seems to be no news of GOD being tracked in the memory of the previous life, but to be honest, with the current search method of this person, it is estimated that the real IPIP of GOD will be found soon. . "Is there a way for the infected bug to locate the specific location of the people who invaded these two servers through the current broilers?" Zhang Yang couldn't think of a way, so he tentatively asked the infected bug.

The function of the infector is like a huge reserve, because it was not designed by Zhang Yang, so Zhang Yang doesn't know what functions it has. Although the infector has the ability to analyze logic, it is just a program after all, not a person. If you don't use these functions, it will not actively "tell" you. But it would be unreliable for Zhang Yang to understand all the functions of the infection bug.

The function of infecting bugs is not without a detailed catalog. There is such a thing, not only there, but also very comprehensive, but it is a pity that Zhang Yang once checked it out and was shocked by the millions of catalogs. . If you look at them one by one, he is old, so don't do anything. The people at ANUBIS are just idiots, probably to test the Adam system, and want to know what is wrong with the Adam system, so they have made a detailed record of any small function.

If you have studied this system for several years, or more than ten years, that’s all. But if you are a stranger who suddenly asks you to understand the functions of this system...well, the catalog can kill you. That's why Zhang Yang still can't know what kind of infection bug can be made, and can only find it in use.

"Theoretical data can be obtained by searching the hacker habit database, passing through the other party's existing broilers, and then through global triangulation and delayed data transmission of network data, and performing multiple calculations and analysis." Infector quickly gave An [answer] that Zhang Yang didn't expect.

"Hackers are used to databases?" Zhang Yang pondered subconsciously. Hackers are humans, not gods. In theory, a perfect hacker should have no common ID. , no common passwords, everything must be random, no frequent websites, frequent forums, will not reveal your identity, will not be impulsive because of anything, and will not substitute reality in any commonly used network data anything.

But... is it possible? Unless the hacker is a machine plus a god, otherwise, it is impossible to even think about it. As long as you are human, you will have habits. Even if you pay attention, there will be some habits hidden in your subconscious that you have not discovered yourself.

And these habits will leave you with clues. Take Zhang Yang as an example, if you are reborn in two lifetimes, add up to forty years old, right? But still a little impulsive, still a little angry, why? The things in his bones are sometimes unavoidable, and Zhang Yang was basically an otaku in his previous life, and he had no experience in society, so where would he mature?

The maturity of a person is always a struggle in society, experiencing countless setbacks and sufferings, and then becoming mature. Zhang Yang has also read some novels in his previous life. Once a protagonist in his twenties was reborn, he returned to Feng a few years ago, and then all of a sudden, the young man became more thoughtful than a ten-year-old man. , you have to be seasoned, isn't this nonsense?

Can the maturation process of thought be calculated by superposition of time? Besides, some people have a flamboyant personality and don’t want to change it, let’s be an angry youth, let’s be impulsive, let’s be impulsive, everyone will die after 80 years, can’t they live again like their own name, be a little more flamboyant, instead You have to be considerate everywhere, be patient everywhere, be foolproof everywhere, are you tired?

This kind of rebirth is going to be a bird, but I am more tired than my previous life. So when he heard the term Infector said, Zhang Yang was a little dazed, "Do you have it in your database?" Now it is infected with worms, but even if the Adam system is in an incomplete state, its analysis ability is stronger than the general system, there is no reason why Anubis should not use it?

"Please enter the hacker id that needs to be retrieved..." Infector didn't answer yes or no, but directly gave a sentence. After Zhang Yang was stunned for a moment, his face was full of ecstasy. I'll just say it! How could those **** not build something like this? For anubis, hackers all over the world are basically their enemies. If they want to defeat their enemies, the people of anubis must know the truth of knowing themselves and their enemies. ! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like