The Strongest Hacker

Chapter 681 Acquisition of McAfee (4)

Six hundred and eighty first chapter acquisition of McAfee (4)

Looking at the command box that has already been entered, Zhang Yang hesitated for a moment, but still typed it. Since he is ready to serve as the chairman of the Star Group today, at least in the next three to four years, many of the steps of the Star Group will be correct. It is very important that Zhang Yang must maximize his own advantages. ;

As Zhang Yang hit the Enter key, the computer screen in front of him immediately began to refresh quickly. Facing the system of the starry sky, Zhang Yang knew that the conventional system was not very effective. brute force cracking, but Xingkong is quite good at handling dd attacks, but Zhang Yang is not prepared to use dd attacks to solve all problems at all, this thing is basically used as a cover.

Although the data center established by Ggle in Europe cannot match Xingkong in terms of overall hardware performance, don't forget that Xingkong is responsible for many systems, and in order to prevent accidents A part of performance space is reserved, so the hardware performance that Xingkong can use is about the same as the processing power of Gggle's data center.

The main task of ggle's data center is that the little ants in ggle, which are flooded in the network, download the above text, pictures, etc. from various websites around the world day and night, and then store them in their own data center to build a search engine. u's request is not very good, just cheap publicity.

The policy of all people being soldiers created by the gd gang is quite useful. At least many servers that Zhang Yang thought of in advance can no longer be used, and they were hacked by the gd gang in advance, although they are not going to use this gang What are the servers for, but I have to say that as long as Zhang Yang invades these servers, I am afraid that a bunch of hackers will soon be dragged in.

Even without these hackers, let Zhang Yang concentrate on dealing with Xingkong, without using his own authority, Zhang Yang can't guarantee 100% that he can hack into Xingkong's system, let alone Chapter 681 Acquiring McAfee (4) Don't say that there are a lot of hackers behind, and more importantly, the strength of these hackers is really not bad.

"Fuck, these beasts." Looking at the dd attacks that quickly decreased on the computer screen, Zhang Yang knew that gd and the others had made a move. Undoubtedly, these animals used shielding hardware. In this way, the data that Xingkong needs to process will be greatly increased reduce.

Zhang Yang was a little depressed, nnd knew that he would not have made such a mess with the hardware equipment of the Star Group, and now he didn't know if it was self-inflicted. But fortunately, this DD attack on Zhang Yang was actually used to tell everyone that brother is coming. It is impossible to rely on it to win. You must know that there are countless hackers and so on who are paying attention to the Star Group all over the world.

What Zhang Yang expected was not wrong at all. The combination of Star Group and GD is too eye-catching.

Not to mention hackers, most of the ordinary people in the world who know what a hacker is already know about it, but what they don't know is when it happened, and these people don't know how to use computers to check Star Group Whether their network has been attacked by hackers, they don't know this at all, so these interested people almost all go online and guard in front of their computers.

The media in European and American countries are really crazy. They can make any program for the ratings. Knowing that everyone is interested in this matter, many media in the United States and Europe have actually hired many security personnel from large security companies, or Some computer experts come to guard the computer. As long as there is a situation, these media can understand the emergency live broadcast, and use this method to attract attention.

The time Zhang Yang chose to attack was at night, and it was morning in European and American countries. Less than ten minutes after Star Group was attacked by dd, large media such as Europe and the United States directly launched professional webcast videos. Only after you go abroad to understand for yourself can you understand how corrupt these media are.

Zhang Yang knew about these things a long time ago, but this was right in his arms, the bigger the influence of this incident, the better. Seeing that my dd attack has been easily resolved by the starry sky, although it is still going on, but the impact it can cause is negligible, I believe that gd and their attention are no longer on this, but if your attention is not here Above, hey, don't blame me then.

Zhang Yang himself has not fully understood all the performances of Xingkong. It is impossible for everyone in the technology department of Xingkong Group to know Xingkong better than Zhang Yang. Maybe they have a better understanding of Xingkong's specific functions, computing power, etc. than Zhang Yang. But no one knows Xingkong's weakness better than Zhang Yang, the highest authority holder.

Xingkong has unparalleled logical thinking and analysis ability, but this kind of analysis ability is not invincible. Although Xingkong looks very human-like at certain times, it is only human-like after all. It is still a program, not a human being, so in the process of Some judgments and analysis still have to abide by the rules of the procedure.

After the dd attack for a while, Zhang Yang directly added a virus specially written by Zhang Yang to the starry sky in the bombardment stream of the dd attack. In fact, this virus is not harmful, and its function is very simple. This virus is mainly Facing the intelligent analysis program like the starry sky, the program always has the rules of the program, such as logical thinking judgment, it is a program, so the most fundamental rule of the program is to pursue the correctness of things, unlike humans who can't figure it out, or It is the obfuscation of questions that have no answer at all.

But the program will not, they will only perform simulation analysis operations, so as to achieve the correct answer! This is what we often foresee. The system makes an error in judgment, enters an infinite loop, and enters an unsolvable loop that causes u to overload, the system as a whole crashes, and then crashes.

Xingkong also belongs to the ranks of logical thinking analysis programs, so this judgment is still useful for Xingkong, but such a virus is not easy to write. The problem of endless loop, how can you make the other party's programs and systems "analyze" according to your settings.

If you don't have enough understanding of this system, it is impossible for you to come up with such a program. It is no exaggeration to say that the only person in the world who can do this is Zhang Yang, because Zhang Yang only understands what the weakness of Xingkong is. place. But this can't completely collapse the starry sky, but it's no problem to increase the u operation law of the starry sky.

What Zhang Yang has to do now is to attract GD's attention in other ways, because this small virus seems to easily put Xingkong into a state of high-load computing, but if there are security programmers monitoring it, then it is easy to be discovered. What Zhang Yang has to do now is to attract the attention of gd and the others.

As for whether Zhang Yang can do this, gd and the others are the most convincing. Don't forget, the starry sky evolved from the infected bug, and the infected bug was written by Zhang Yang. No system is perfect. , there is no loophole at all, including Xingkong is no exception.

These vulnerabilities are not fatal, but enough to break through several layers of firewalls.

"Damn! This came from here, hurry up! Zimo, stop his data flow, I will set up obstacles for him, gd is really a beast, how does he know that there is a calculation loophole in Xingkong?" at the moment in Xingkong Group In the security department, the entire security department has fallen into a weird and frenzied state.

This is like a battlefield, or this is another battlefield. In the comfortable hall, it can be seen that dozens of security personnel such as GD and Zi Mo all have their own seats, and everyone's seat is separate. Separated, the entire hall formed individual circular nests like honeycombs.

This is because there are at least ten different display screens and their individual operating systems around each person, and the swivel chair in the center allows you to turn to the next direction immediately after you finish your work. Personal computers often have multitasking operations, but how many systems does Xingkong take care of? And how many simulation systems are under these systems, and how many official websites are under control, if it’s just one screen, it’s impossible to use at all, and you can’t switch to the latest screen at any time. After authorization, a similar scale can be formed around his desk, but you can never see it normally.

Zhang Yang's study can be said to be one of the most technologically advanced parts of the entire villa. At this moment, there are a total of 22 display screens in front of Zi Mo showing different contents. There are a total of eleven keyboards and mice on the prototype table in front of her. The slender fingers kept beating on the keyboard, and Zi Mo stared at a display screen in front of him. The analysis data on it showed that the speed of the other party breaking through the firewall was constantly accelerating.

Zi Mo is already trying his best to create trouble for the other party, but obviously this kind of work is futile. The other party has a more powerful analysis tool in his hand, and can find the key points between the firewall data in an instant! If the firewall is compared to the magical formation in Chinese mythology, these key points are where the needle's eye breaks through the operation of the formation.

They must exist, and at the same time they are constantly changing. The principle of a firewall is actually similar to this. To crack a firewall, you have to penetrate these data layers. Most hackers will use software analysis and judgment, but using a software When analyzing a firewall database, the latest analysis data will be continuously refreshed on the screen. How you can find this key point in the vast analysis stream depends on the level of the individual.

"I can't stop it! He will break through the first layer of firewall in thirty seconds at most. How is the barrier setting on your side?" After making the last effort, Zi Mo shouted loudly.

"Okay, Zi Mo, you can withdraw, you are now in charge of Mutton's side, he is under a lot of pressure." GD's urgent voice sounded. The only thing that could be heard in the huge room was crackling and various keyboard sounds. Except for the occasional yelling, I was so nervous that I couldn't even speak.

The Internet is a battlefield without gunpowder. Zhang Yang is not at all relaxed at this moment. He even feels that his hands are a little cramped. If he hadn't made enough preparations in advance, he might be exhausted to death. It was only at this time that Zhang Yang discovered how powerful the starry sky is!

Many orders that require him to perform a lot of steps only need to issue an order to the starry sky, but now the situation is basically under control, although Zhang Yang's attack is very difficult now, the main reason is that Zhang Yang still underestimated GD's strength , especially with Xingkong's assistance, even though Zhang Yang knew about Xingkong's many loopholes, he still fell into a hard fight with GD and their supplements.

Moreover, many of the loopholes that could have been exploited would not have much effect at all under the auxiliary defense of GD and the others. "These brats are pretty cool." Zhang Yang couldn't help but whistled, and the offensive and defensive battle between the two sides had been close to an hour since Zhang Yang typed the first code.

During this hour, Zhang Yang had almost zero rest time, and his hands were typing codes on the keyboard almost non-stop. I really missed Xingkong's assistance! Zhang Yang couldn't help but sigh with emotion, but he can still stop now, at least the intensity Zhang Yang saw was not enough.

But from the perspective of the outside world at this moment, the battle between the two sides is already the largest online battle that has erupted on the Internet in recent years! At this moment, more than 80% of the hackers in the world are watching this battle. Many hackers are shocked to find out that the strength of gd all the time is definitely not fake, but they have never thought that the Star Group's network The security defense force is actually so great.

Not only hackers, but the security teams under the intelligence agencies of many countries around the world are evaluating the network security level of Star Group.

"It's amazing! Gd deserves to be GD! The attack announced in this way was actually done by GD alone! You can't believe that this was done by one person, well, don't look at me, let me tell you, You don't understand either, but what you need to know is that I'm sure that gd is definitely not an organization as advertised outside, but a person. You can see it from the attack methods and codes he keeps changing. In terms of organization, it is impossible to be so orderly without making any mistakes!"

These words were directly shouted by a well-known security expert hired by nn in front of the live broadcast of the Internet TV! The host next to her was blushing with excitement. He was only in his thirties and had a thin body. He didn't know how to answer the conversation. All fell into a state of frenzy.

If it wasn't for the viewers watching the video right now, they would not like those slick explanations. Although the security expert didn't yell out any technical content, they could understand them, so they were very excited to watch. RO! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like