The Strongest Hacker

Chapter 454: Being Followed (Part 2)

Chapter 454: Being Followed (Part 2)

"GOD" Zhang Yang directly entered the ID of GOD. Zhang Yang didn't ask the infected bug to perform simulation calculations immediately. The infected bug just said that the so-called theoretical data is only calculated through network data delay and so on. , to calculate a theoretical location about how far away from this server. Such a location cannot be too accurate, and it is impossible to locate it at most about a city. ;

How many people does a city have? Even a small county has at least 50,000 to 60,000 people, right? Finding one out of 50,000 to 60,000 people who is very good at hiding himself is no different from finding a needle in a haystack. However, it is true that the scope is narrowed, and if there are other means, it can still be found.

Retrieval of Infested Bugs Chapter 454 Being stalked (middle) soon, when the detailed data about GOD was listed on the computer screen, Zhang Yang couldn’t help but be surprised. Suddenly realized that the infected bugs carried more than a hundred of them. What exactly is the information coming back? It is estimated that it is not the system itself, but the various backup databases in it. Only the information in these databases is the real wealth!

Thinking of this Yang is like eating ice cream in the dog days. From the beginning to the end, Zhang Yang doesn't know how long it took Anubis to collect this information, but what Zhang Yang knows is that the people who are under the influence are at a big loss. . I looked at it carefully. . . All the information, the more Zhang Yang looked at it, the more surprised he became, as if. . . There are naturally very few traces left by such people on the Internet.

Even ordinary people wouldn't find out, even Zhang Yang thinks so, if he hadn't researched GOD himself in his previous life, and then he could tell whether it's GOD through his firewall and some broiler software, I'm afraid Zhang Yang wouldn't be able to imagine that it's actually here There can be so much information.

The most prominent analysis above is placed at the top. This is obviously the conclusion drawn by the psychoanalysts in Chapter 454: Being Followed (Middle) Bajue. The original words are as follows: " ...Bi. There is a very obvious legacy of the Chinese red family. According to analysis, there is a 70% possibility that GOD's family is a very prominent family in China. It is not recommended to contact." This is the sentence placed at the top comments.

It was quite shocking to see Zhang Yang. To be honest, Zhang Yang did not expect these people to substantively divide new things into real things just from the Internet. I don't know if the Au family is very prominent and flamboyant, but since the people from Anubis dare to make such a conclusion, it is obviously based on it.

Zhang Yang is very curious. He really wants to see the specific analysis behind. There is a detailed remark behind these conclusions. Most of these evidences are analyzed from the perspective of psychology, but after reading this, Zhang Yang knows that this is definitely the analysis made by a master of psychology.

"...,

What is certain is that GOS is not very old, he is a young man, but judging from the results of several contacts, the other party's conversation is quite orderly, with a calm and calm personality, sees problems to the point, and has a keen sense of politics. This does not conform to the image and psychological characteristics of a hacker who is not in touch with society and likes to live in his own circle and Internet circle. "Seeing this analysis, Zhang Yang thought about the conversations he had with Au, and some ways of looking at the problem, etc. After thinking about it carefully, it turned out to be the case.

Incisive! Zhang Yang nodded, it's not easy! Sure enough, there are all kinds of people in the Anubis organization. With such a character, vision, etc., it is naturally impossible to be born in an ordinary family, let alone a car of pure hackers. someone said. Some personalities can be born, but those are all farts, just look at it and forget it, if you take it seriously, you will be a tiger.

Life is a blank sheet of paper, what kind of experience will make you what kind of person, if you say that a child has never experienced society or seen these things, he can have a keen sense of politics, deal with things calmly and calmly, and look at problems But Yin pointed at the key point, do you believe it yourself? Anyway, Zhang Yang didn't believe it.

Take Zhang Yang himself as an example. He has become much calmer in his life, but he is still far behind some smooth middle-aged people, although he has also experienced a lot. Below is a careful list of dozens of various psychological analyzes. After reading it, Zhang Yang almost believed the above conclusion.

What is bullshit, this is the real bullshit! Zhang Yang sighed, after reading this article, there is no need to read about the habits of GOS collected below, there is definitely a basis for it. Zhang Yang immediately entered the id gscsd out of curiosity, and when the infected worms searched Adam's system, Zhang Yang had already used the id gscsd to start a fight with Anubis.

So there must be information about the id of gacsd in Adam's system. Zhang Yang just entered this id into it, and the speed of infection was faster this time, so he directly retrieved a piece of information for Zhang Yang. When Zhang Yang saw the top analysis of gscsd, Zhang Yang almost fell to the ground.

"Damn it." Zhang Yang almost spat out a mouthful of blood. If others knew Anubis Bi's evaluation of Zhang Yang, they would almost drop their jaws in surprise. The infected bug has captured Adam's system for a long time, that is to say, these data are all comments that the other party has given Zhang Yang a long time ago.

"..., lunatic! Absolute lunatic! From gscsd's behavior style, it can be seen that this person's psychology has been greatly traumatized, and he has a slight depression. Doing things without considering the consequences, most of them are done according to their own preferences..."" This is the top comment, seeing this Zhang Yang almost fell to the ground.

The comment of the lunatic was a bit beyond Zhang Yang's expectations, but Zhang Yang didn't know how the other party analyzed the latter sentence, but it undoubtedly hit Zhang Yang's vital point directly, a huge psychological trauma, I'll go, what kind of psychology? Is the trauma more serious than seeing yourself die once and then come back to life strangely, but living a few years ago?

Don't think that rebirth has no effect on a person's heart. In fact, the effect is very large. The so-called mild depression later on, depression Zhang Yang does have it, but it is not serious, and Zhang Yang slowly let go of it. It's my own knot, so I just rejoice over it.

People are born to live in groups. When you have a secret that you can’t tell anyone and it can only be kept in your heart forever, you will find that it is a thing that can drive people crazy. If you don’t know yourself Mediation words. Seeing this, Zhang Yang felt a little lucky. Fortunately, they did not collect their own information for a long time, so they did not find any useful information. Moreover, with the loss of the Adam system, these databases will naturally be lost. Although the other party can completely re-analyze a Come out, but a lot of things will also be lost in the middle.

I just don't know if the other party has a backup, but now that there is a backup, Zhang Yang doesn't care anymore. With this identity guarantee, it is impossible for Bin' to suspect Zhang Yang. The important thing is that this thing is completely made into a wedding dress for Zhang Yang, anubis planted trees, and Zhang Yang enjoys the shade! Zhang Yang can now completely understand why Anubis went crazy after losing the Adam system.

If it was Zhang Yang, I'm afraid he would go crazy too. As time went by, the surprises that the Infestation System gave Zhang Yang were getting bigger and bigger.

After researching, Zhang Yang thought of his main task. He immediately compared the name of GOD, these servers, and the tracking honeypot. All the information collected in the hands of the infestation was entered into the infestation system. Zhang Yangwan wanted to see if the infestation could simulate and calculate the approximate location.

The calculation process is actually not complicated, and it's not slow at all. Zhang Yang doesn't know how the calculation formula Anubis came up with. After about ten minutes, the infection will have the result. Just seeing this result, Zhang Yang felt a little bit pained.

The answer is very simple, only four words, four words that almost made Zhang Yang die. "Northeast China!" Well, it's simple and concise, but there is basically no difference between the presence and absence of these four words. Damn, how big is Northeast China? The population looks like 100 to 200 million, looking for someone? Find it and die. More importantly, the accuracy of this approximate range is not guaranteed.

However, this faintness proves that the theory of Anubis is correct, at least it can indeed be narrowed down to a certain range. When Zhang Yang was researching the infection bug, the situation on the Internet suddenly changed dramatically. Zhang Yang didn't pay attention at first, but the infection bug reported dozens of ** information one after another.

After quickly switching to the information screen, Zhang Yang's eyes widened instantly. For some unknown reason, the tracking honeypot suddenly captured a large amount of data streams, and instead of capturing data indiscriminately at random as at the beginning, it autonomously followed a data stream and moved forward quickly.

Seeing this, Zhang Yang knows that the tracking of the honeypot has achieved results, and the real target has been tracked. Tracking the honeypot is not the same as the ghost virus. The ghost virus is an autonomous virus. It follows your settings. It is required to track other people safely, and then feed back the latest email during the tracking process, as well as perform IP positioning, simulate cracking the firewall, etc., it is autonomously aggressive.

But this tracking honeypot is a completely different matter. First of all, it is passive. It is like a trap. It can only be triggered when it is placed in a place to be stepped on by the prey, and it does not have the ability to attack others. The ability of the firewall, but its ability to penetrate the firewall is more powerful than the ghost virus, because it will be simulated as a data packet, and it will only passively follow the locked data flow.

It does not feed back the email information of the other party. Even if it does, it is the direction of the other party's data flow attack, instead of reverse tracking like a ghost virus. After chasing an email, it will automatically find a new connection email and then perform anti-tracking. It can't, it can only hide in the other party's data flow, follow the data flow everywhere, and it can only track where the other party goes.

And it will only track in new directions. Maybe this is very vague. For example, everyone knows that data flow is back and forth. For example, when you visit a website, the website will return feedback information to you. , naturally there is data stream feedback to you. For example, if you step on a tracking honeypot in this broiler, and then you go directly to the next broiler, this honeypot will immediately track you to the next honeypot, and when you reach the next honeypot, the returned data flow will also be It is the data flow to the previous broiler, and this tracking honeypot will not continue to track.

So although the concealment of this thing is extremely high, as long as you don't discover the honeypot in advance and then trigger it, the possibility of discovering it again is very small. Although its concealment is extremely high, few people use it, because in fact, it doesn't have much effect on hackers.

Just like Zhang Yang, when he entered the network, he would first connect with the first-level broilers he had caught a long time ago, and these broilers were guaranteed not to have been invaded. Then most of the broilers that invaded were also invaded before, or left a back door. Although this kind of small program can also connect to the network and send some information, all broilers have firewalls. Even if someone chases them, the most they can see is the firewall.

If he wants to track you back, he will be exposed. However, this thing is quite good for monitoring people, but you can only see what the other party is doing through the data, and you can't see anything about what the other party is doing. But this is enough, Zhang Yang's method of connecting to this small program is also different from other hackers, Zhang Yang has an infection bug, and the infection bug can track the location through the data sent by this small program.

According to this post, Zhang Yang can use another broiler to follow directly, so the other party will not find Zhang Yang. But now, this situation is a bit serious. This person does not know how to find the loopholes in the GOSD firewall, or he knocked on the door. He has already broken through several GOSD broilers in a row, and judging from the current speed, I am afraid it is very difficult. Soon to be tracked down. The concave real post.

Can you make a move? Zhang Yang was a little hesitant, especially now that he was following the ratio. Zhang Yang is not sure who the person is, there is a high possibility that it is Anubis, but Zhang Yang has a hunch that it should not be Anubis, and Anubis should not make a random move at this moment, and the intelligence agencies of all countries in the world are quite concerned about it. Tight, Anubis should not be so carefree. Besides, GOD is not gscsd, GOD has debuted for many years, if anubis did it, he would have done it earlier, and he won't wait until now. ! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like