Urban Super Live
Page 849
Therefore, they deliberately said a false retreat time in advance to confuse the inner ghost, so as to achieve the purpose of retreating first.
Yang Shuhe didn't know until now that the original hacker who attacked Huamin's civilian website was actually someone else.
No wonder, this group of peacock brothers have such strong attack ability.
So far, Yang Shuhe has completely figured it out!
Yang Shuhe was thinking in his heart, but he was dissatisfied with his actions, so he ordered Yang Chi to quickly track the IP of another group of hackers.
While monitoring the whereabouts of these hackers through the Trojan horse designed just now.
Chapter 604
Everyone in this group of hackers is very vigilant. Even if they log in to Ganesha Guardian, they do not use their real IP.
Instead, a lot of springboards are arranged.
Numerous broilers have been transferred.
The least hacker used 89 proxy springboards.
Di Rang, the one with the most number, actually transferred 360 proxy springboards frantically. Every time he exited a springboard, he would patiently modify the log and clean up the leftover traces.
It can be said that the defense has reached the limit, and the caution has reached the extreme.
It's a pity that this group of people met Yang Shuhe with a system, no matter how treacherous they were, it was useless, the Trojan horse had already bit them like maggots.
They have to admit that they are unlucky!
Two minutes later, the Trojan developed by Yang Shuhe successfully found out the real IP address of the second hacker.
Shah Rukh - Real IP Address, is one of the best computer universities.
According to the information in his computer, the other party is a computer graduate student of the School of Science and Technology.
Unexpectedly, behind the scenes, it was actually a hacker.
However, he will pay the price for his actions.
Yang Shuhe indifferently copied the log from Sha Rukh's computer.
The third hacker to be traced was named Salman.
The real IP address is in a high-end apartment in the western state of Gujarat.
Then, the fourth, the fifth, the sixth...
In just two or three minutes, Yang Shuhe's Trojan horse successfully traced 49 hackers.
Only Dirang, Nandina, and Galava were left, still silently cleaning up their respective browsing traces.
If, they know, what they do is futile, and they don't know if they will vomit blood with anger!
Among the hackers who have been traced, they are not limited to Brother Peacock's homeland.
And people in other countries.
There are even two peacock brothers who are studying in China.
It's really self-defeating!
Actually, people dare to make troubles in their own country. Doesn't this mean that there is no place to escape?
Moreover, among this group of hackers, Yang Shuhe also discovered a particularly interesting hacker - Siwani.
A very beautiful stunner.
She looks like a Bollywood star.
Now TCS, Peacock's largest software company (with an output value of 165 billion US dollars), is a network security expert at the headquarters in New Delhi.
But in her computer, Yang Shuhe found a call record between her and a Citigroup IP address.
He suddenly discovered that this Silvani was actually the inner ghost of the guard of Ganesha.
Her real identity is a foreign intelligence officer of Citigroup's intelligence department.
"So you are the real big fish!"
A flash of excitement flashed in Yang Shuhe's eyes, and he hurriedly used Sivani's computer to hack into the Citigroup IP that she was in contact with.
Suddenly, he discovered that the firewall of Citigroup IP was unprecedentedly powerful.
The programs it possesses are much more complicated than ordinary computer systems, and they are also significantly different from the Microsoft systems and fruit systems that are commonly run on the market.
Should be independently developed.
What's even more frightening is that the other party's program seems to have a mind, constantly changing its operating instructions and changing the code trajectory.
As long as there are external strange instructions touching it, it will immediately send out an alarm by itself and carry out anti-tracking.
Yang Shuhe is also using the black technology network that comes with the portable system, and this program that he came into contact with, if he used an ordinary computer, it would have alarmed it long ago!
Yang Shuhe analyzed the code of this program through the portable system, and was shocked to find that this code is like a huge bunker, at least dozens of times larger than the ordinary system.
Such a large system program simply cannot be moved by the memory of an ordinary personal computer.
This should be a supercomputer!
You'll Also Like
-
Trickster Hunter
Chapter 363 4 hours ago -
Expedition to Europe
Chapter 1080 5 hours ago -
The giant corporations that started in Night City
Chapter 385 6 hours ago -
The apocalypse is weird: I am the number one containment object, what's wrong with being a litt
Chapter 612 6 hours ago -
Time and space transaction: Exchange food for the elf princess at the beginning
Chapter 503 6 hours ago -
I, the villain, trained the loser into a dark boss
Chapter 374 9 hours ago -
Multifunctional Sword Cultivation Starts from Taxi
Chapter 23 9 hours ago -
Naruto Live: The Death of Naruto in the Beginning Movie
Chapter 829 10 hours ago -
Anime: Saiyans eat the world of food
Chapter 285 10 hours ago -
Pirates: I plundered entries in the underwater prison!
Chapter 114 10 hours ago