Urban Super Live
Page 849
Therefore, they deliberately said a false retreat time in advance to confuse the inner ghost, so as to achieve the purpose of retreating first.
Yang Shuhe didn't know until now that the original hacker who attacked Huamin's civilian website was actually someone else.
No wonder, this group of peacock brothers have such strong attack ability.
So far, Yang Shuhe has completely figured it out!
Yang Shuhe was thinking in his heart, but he was dissatisfied with his actions, so he ordered Yang Chi to quickly track the IP of another group of hackers.
While monitoring the whereabouts of these hackers through the Trojan horse designed just now.
Chapter 604
Everyone in this group of hackers is very vigilant. Even if they log in to Ganesha Guardian, they do not use their real IP.
Instead, a lot of springboards are arranged.
Numerous broilers have been transferred.
The least hacker used 89 proxy springboards.
Di Rang, the one with the most number, actually transferred 360 proxy springboards frantically. Every time he exited a springboard, he would patiently modify the log and clean up the leftover traces.
It can be said that the defense has reached the limit, and the caution has reached the extreme.
It's a pity that this group of people met Yang Shuhe with a system, no matter how treacherous they were, it was useless, the Trojan horse had already bit them like maggots.
They have to admit that they are unlucky!
Two minutes later, the Trojan developed by Yang Shuhe successfully found out the real IP address of the second hacker.
Shah Rukh - Real IP Address, is one of the best computer universities.
According to the information in his computer, the other party is a computer graduate student of the School of Science and Technology.
Unexpectedly, behind the scenes, it was actually a hacker.
However, he will pay the price for his actions.
Yang Shuhe indifferently copied the log from Sha Rukh's computer.
The third hacker to be traced was named Salman.
The real IP address is in a high-end apartment in the western state of Gujarat.
Then, the fourth, the fifth, the sixth...
In just two or three minutes, Yang Shuhe's Trojan horse successfully traced 49 hackers.
Only Dirang, Nandina, and Galava were left, still silently cleaning up their respective browsing traces.
If, they know, what they do is futile, and they don't know if they will vomit blood with anger!
Among the hackers who have been traced, they are not limited to Brother Peacock's homeland.
And people in other countries.
There are even two peacock brothers who are studying in China.
It's really self-defeating!
Actually, people dare to make troubles in their own country. Doesn't this mean that there is no place to escape?
Moreover, among this group of hackers, Yang Shuhe also discovered a particularly interesting hacker - Siwani.
A very beautiful stunner.
She looks like a Bollywood star.
Now TCS, Peacock's largest software company (with an output value of 165 billion US dollars), is a network security expert at the headquarters in New Delhi.
But in her computer, Yang Shuhe found a call record between her and a Citigroup IP address.
He suddenly discovered that this Silvani was actually the inner ghost of the guard of Ganesha.
Her real identity is a foreign intelligence officer of Citigroup's intelligence department.
"So you are the real big fish!"
A flash of excitement flashed in Yang Shuhe's eyes, and he hurriedly used Sivani's computer to hack into the Citigroup IP that she was in contact with.
Suddenly, he discovered that the firewall of Citigroup IP was unprecedentedly powerful.
The programs it possesses are much more complicated than ordinary computer systems, and they are also significantly different from the Microsoft systems and fruit systems that are commonly run on the market.
Should be independently developed.
What's even more frightening is that the other party's program seems to have a mind, constantly changing its operating instructions and changing the code trajectory.
As long as there are external strange instructions touching it, it will immediately send out an alarm by itself and carry out anti-tracking.
Yang Shuhe is also using the black technology network that comes with the portable system, and this program that he came into contact with, if he used an ordinary computer, it would have alarmed it long ago!
Yang Shuhe analyzed the code of this program through the portable system, and was shocked to find that this code is like a huge bunker, at least dozens of times larger than the ordinary system.
Such a large system program simply cannot be moved by the memory of an ordinary personal computer.
This should be a supercomputer!
You'll Also Like
-
Shrouding the Heavens: The Ruthless Heavenly Emperor
Chapter 168 5 hours ago -
Becoming the Supreme Will starting from Hunter x Hunter
Chapter 144 5 hours ago -
A magical journey that begins at Hogwarts
Chapter 549 5 hours ago -
Pokémon: My Greninja can fly with Thunder God.
Chapter 344 5 hours ago -
American comic book red Superman
Chapter 167 5 hours ago -
One Piece: Inheriting the Shendu Template, I Summon Demons
Chapter 197 5 hours ago -
Pirate: This Marine has two Rinnegan.
Chapter 322 5 hours ago -
Honkai Impact: Star Railway: I'm really not a Star God!
Chapter 123 5 hours ago -
Even if you succeed in jobless reincarnation and time magic, you must live life to the fullest.
Chapter 733 5 hours ago -
Tokyo: Simulation Begins with the Big Sister Next Door
Chapter 256 5 hours ago