Urban Denon

Chapter 132 Protecting Broilers

After Xiao Yihan invaded the hardware forum server just now, he found that the firewall written by that mak is much more advanced than the firewall on his own and the perfect server. The most important thing is that the counterattack function of the firewall is too powerful. The counterattack program has never seen it before, and it is estimated that my real address has been checked by the firewall at this moment.

This is like saying why people who smoke second-hand smoke suffer more damage than people who smoke directly. The main reason is that people who smoke regularly have antibodies in their bodies, while people who have never smoked have no antibodies in their bodies. So he will be hurt more severely. Mak's firewall is because it has never seen a system like Xiao Yihan's Tianlong system, so it can't break through Xiao Yihan's system.

Xiao Yihan is a person who is good at learning. He has become accustomed to using other people's strengths to make up for his own shortcomings, and adding some programs written by himself to make his own programs more perfect.

At this time, Xiao Yihan saw that the mak hadn't gone online yet, so he carefully analyzed the firewall installed on that server by mak, and then improved his own firewall, installing a counter-attack tracking function on his firewall.In this way, if other hackers want to hack into your computer, if they are poor, not only can they not hack into your computer, but your firewall can also collect some information about the other party's computer and lock the other party's ip address, so that if Xiao Yihan goes online , you can easily find the other party through the information fed back by the firewall. Of course, this can only be said of those relatively low-level hackers. It is not a problem to erase the traces of the origin.Never leave a trace, this is what all top hackers must get used to.

When mobilizing bots to attack the server just now, Xiao Yihan felt that he had too few bots. Since he browsed various websites or forums on the Internet for so long, Xiao Yihan once saw a legend that a hacker owned at least [-] bots. According to the troop organization, the broilers currently owned by Xiao Yihan are just at the level of a regiment. For better hacking activities in the future, it seems that he has to form an army organization no matter what, Xiao Yihan thought to himself.

But at present, due to the mediocre performance of my laptop, even if so many broilers are caught, the effect of remote control may not be as good as that of only controlling a thousand broilers.

Xiao Yihan improved the shortcomings of his Tianlong system again by attacking the perfect server and the server of the hardware forum network.What Xiao Yihan changed this time is to prepare for the capture of a large number of broilers in the future. After Xiao Yihan's improvement, now after the Tianlong system successfully invades a computer, it will control this computer and make it a botnet under control. one of the members.

Naturally, this kind of control cannot be achieved for no reason, but requires a special Trojan horse program to achieve it.These Trojan horse programs are like expeditionary troops sent by a powerful empire. They have been stationed on these invaded computers for a long time, monitoring these computers at any time, and constantly sending the updates of this computer back to the host computer. The order issued by oneself is ready to go out at any time.They each have independent operational capabilities, but at the same time they are under the unified command of a powerful centralized center, that is, the Tianlong system.

In normal times, they will automatically find the safest place on the computer and hide them. When the anti-virus program starts, they will automatically detect that they are in a safe state and continue to migrate to a safe place.After the anti-virus software has killed that area, they will run back silently.

When encountering advanced, smarter antivirus software, or simply manual operations by humans, so that this migratory military service law cannot be deceived, these programs will start their chameleon programs, and will automatically change themselves into a system. required due process.

The exact nature of this due process will vary according to the circumstances at the time.

When the chameleon's tricks still don't work, it will send a distress signal to the network.After receiving this signal, the mainframe of the Tianlong system will immediately organize a large number of zombie computers on the network to attack the computer that is being disinfected, so as to prevent it from successfully disinfecting the virus, and give the Trojan horse programs residing in the mainland the evasion and transformation. time.

When all these methods fail or all prerequisites are lost, the Trojan horse program will record all the methods used by the anti-virus in the air, and send them back to the host for inspiration, and then turn into a suicide Program, when committing suicide, the entire computer will also be paralyzed.

That way, the anti-virus guy won't be able to get a sample of the virus.

This is the ability of the virus to stealth and transform. Broilers that have reached their own will not be replaced by others.

Collection at three o'clock

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like