The best way to deal with this is to change a new account. It is better to log in as little as possible with the Joker account.

"Crackle!"

Su Yang tapped the keyboard and cleared the traces left on the Red Hacker Base again.

Even the group he joined earlier was withdrawn, including several springboards (zombie chickens).

Don't underestimate your opponent, and don't take chances.

Thinking about 10 million US dollars, Su Yang wanted to report himself.

OK.

All traces of the Joker account on the Red Hacker Base have been cleared.

The last hidden danger has been blocked.

Again, the first rule of Su Yang's hacker code is to ensure his own safety.

"Ding ding ding!"

The computer sounded a series of alarms again.

This time it was different, someone triggered the trap in the botnet network.

Su Yang suddenly became alert.

The prey was hooked.

He wanted to see which unlucky guy stepped into the trap.

In Nagoya, a small rental house was filled with smoke.

A young man with dyed yellow hair, a cigarette in his mouth, quickly tapped on the keyboard, and stared at the computer screen intently.

Lines of code were displayed on the screen:

"IP: 20.13.15.30 (Seoul)

Win xp

..."

This is a botnet located in Seoul, and it is also the seventh botnet tracked by Mishima.

The yellow-haired man is called Mishima, a Japanese hacker, who is now tracking the clown.

"Ding!"

A message popped up in the lower right corner of the computer.

Mishima clicked on the message and entered a chat group:

"A zombie was found, with an IP address of 30.112.15.64."

"I found an IP of 33.200.11.32 here."

"This bastard has too many zombies. If we check them one by one, how long will it take to find him?"

"Is there no other way?"

...

In this group, there are a total of 160 members belonging to a hacker group called "Sakuragi".

Mishima closed the chat window and continued to track the next zombie.

The target this time has an IP address of 114.120.1.188, located in Hong Kong, Dragon Country.

This IP... Mishima narrowed his eyes, he suspected that it was most likely the real IP of the Joker.

After taking a deep puff of the cigarette, Mishima quickly typed on the keyboard with both hands.

"Beep, beep!"

Suddenly, the computer issued a series of piercing alarms.

Mishima was caught off guard and startled.

"Ah!"

Then, Mishima screamed in pain and panicked. The cigarette butt in his hand burned his hand.

Ignoring the pain, Mishima quickly shook off the cigarette butt and quickly tapped the keyboard with both hands.

"Bang!"

The ashtray next to him fell to the ground in a panic and shattered.

Mishima ignored it at all. All his attention was focused on the computer screen.

"Asshole!"

Mishima screamed.

I saw countless small windows popping up on the computer screen, one, two, four, eight... until they covered the entire screen.

The computer crashed.

"Asshole!" Mishima screamed again, suddenly picked up the keyboard and smashed it hard on the desktop.

He thought he was about to catch the "clown", but he didn't expect that he would fall into the trap set by the other party.

As soon as he entered, a virus package was triggered. Thousands of viruses broke out at the same time, like a flood that broke through the dam, instantly destroying his computer CPU.

Ordinary computers simply cannot withstand such a fierce attack.

"Asshole! Asshole! Asshole!" Mishima was furious and slapped the desktop with the keyboard to vent his anger.

After venting, he sat down again and moved to another computer next to him.

Connected to the Internet cable, logged into the chat group, and quickly sent a message: "I'm dead! IP address 114.120.1.188 has a trap, everyone be careful!"

"I'm also dead! IP address 220.30.12.50 has a trap!"

"IP address 180.13.45.64 also has a trap, I'm dead!"

"I'm dead too! The bastard Joker buried countless virus codes in the chicken!"

...

In just two or three minutes, almost everyone in the group was infected with the virus, and the computers crashed.

Only the group administrator Ito survived.

Ito, Mishima

Ten years old, wearing a pair of glasses, a graduate student at Osaka University.

At this time, he was in the school's computer room.

"Crackle..."

His hands were typing quickly on the keyboard, and his forehead was covered with sweat.

Just now, he almost got a virus.

Fortunately, he was in the school's computer room, using an IBM supercomputer.

The clown buried a virus package in multiple broilers, and once triggered, thousands of viruses would be released at the same time.

The concentrated outbreak of so many viruses is so powerful that it can instantly destroy the CPU of an ordinary computer like a flood that breaks through a dam.

Only large servers can withstand such attacks.

Even so, Ito was scared out of his wits.

He privately called the school's supercomputer. If the server crashed, he would be in trouble.

"Do you want to continue?"

Ito hesitated.

He was worried that the server in the computer room would be blown up.

The other party was definitely a top master.

However, it is precisely because he is a master that it is more challenging.

Ito wiped the sweat from his forehead and continued to track the clown's trail.

This time, he was more cautious.

"Hehe!"

Su Yang looked at the computer screen with a sly smile on his lips.

On the broiler monitoring program, more than a hundred IPs have disappeared at this moment, leaving only a few, still struggling tenaciously.

One of the IP addresses is from Kyoto University.

The log shows that this is an IBM server.

The other party relied on the powerful performance of the server to withstand the virus attack.

"Ding!"

The alarm sounded again.

Another broiler trap was triggered.

Su Yang took a look and this time it was a broiler in Manila.

"Another wave of unlucky people took the bait." Su Yang laughed.

Well... wait a minute, the virus package on the broiler was not triggered.

"What's going on?"

Su Yang carefully checked the log and found that the other party had bypassed the trap.

Then, he found that the other party was very fast in breaking through the broiler.

Within a few minutes, he tracked down a broiler.

In just over ten minutes, the other party broke through dozens of his broilers.

Master!

Definitely a top master!

Su Yang's expression became serious.

Finally met a master.

Very good, the stronger the opponent, the more excited Su Yang.

The opponent was too weak, but he could not arouse his interest.

"Come on! Let me see who is coming." Su Yang's eyes flashed with excitement.

Open the scanning tool, start the firewall, and then call up an intrusion analysis tool to analyze the other party's attack methods.

Half an hour later, the answer was found.

It turned out that the other party took advantage of a vulnerability in the Windows XP system upgrade program.

No wonder he was able to bypass the trap he set.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like