The Strongest Hacker

Chapter 226: All kinds of frivolous (Part 1)

Chapter 226 Various Mischiefs (Part 1)

Chapter 226 Various Mischiefs (Part 1)

"The person who just killed my Trojan! Let you Chinese hackers arrogant last time, this time let you know that your Chinese hackers are this..." At the end of this sentence, the other party added a middle finger, Afterwards, he continued to make a downward thumb and continued: "... see you on the official website of the Ministry of Public Security."

Zhang Yang's heart moved slightly, and his heart was like a mirror. These people rushed back so arrogantly, and issued such a provocative announcement tomorrow. Obviously, it is diverting everyone's attention. After all, Xingyang is not a famous household. The website is not a well-known company, nor is it a political fǔ department. If it is only a simple and intrusive (part 1) in Chapter 226, this is not in line with common sense. Such people are more Invaded some household websites, instead of an ordinary company website that is not well-known.

And that Trojan is even more unpredictable. Zhang Yang did not find any Trojan inside the official website of Xingyang. It is not clear whether the mother nest killed a similar Trojan. Zhang Yang is not clear, but this may be very difficult. Trojans and computer viruses still have Not the same.

Although in a broad sense, a Trojan can also be called a type of computer virus, but in a narrow sense, a Trojan refers to a program that uses computer programs or system leaks to invade the system and steal files. It is called a Trojan, and it has a concealed spontaneous nature. Of programs that can be used to perform malicious acts.

Trojans do not cause harm to computers, and are mostly controlled, but computer viruses are different, and more damage to computer systems. For example, Zhang Yang’s infections are actually more like Trojans. Of course, the reason Infected insects are classified as computer viruses, because their behaviors such as autonomous infection and concealment are more like computer viruses. They can't directly control the computer, but just open the computer system.

Therefore, in Chapter 226, all kinds of vulgarity (part 1) are simple. In terms of concealment, computer viruses are easier than Trojans and more suitable for concealment. It can be said that if there are undiscovered viruses in the publicity scanners and firewalls, Zhang Yang can believe it, but if there is a Trojan horse that executes a malicious program that is not found, Zhang Yang does not believe it.

So obviously this guy is lying, in order to hide the purpose of their attempt to infiltrate Xingyangye’s new research materials, so that other people will not think about this aspect. For this reason, these people even turned their goals directly. The website of the Ministry of Public Security, as far as the website of the Ministry of Public Security is hacked and the website of an industry company are hacked, it is undoubtedly more important.

I am afraid that even if they are gd, they will not think that the real purpose of these people is to steal information, not even Gu Zhu’s residual dream, let alone other people.

"The official website of the Ministry of Public Security has been attacked. The other party seems to be helping others, and their strength is very strong." Almost immediately after the announcement, Gu Zhu's residual dream jumped out quickly.

"Let's help. In any case, we can't be screened by the other party like the official website of the Japanese Defense Agency, then we may be like the current Japanese hacker world and become a joke for hackers around the world." gd paused. He said that the dream of Guzhu over there suddenly came out: "That's not the same. At least this time gd will not come out and be on our side."

"I advise you not to expect gd's good." gd came out again, Zhang Yang did not speak, he just listened quietly, he wanted to see what gd said about him.

"Why?" Gu Zhu's residual dream apparently didn't quite understand it, and asked suspiciously.

"You haven't seen it yet? I think that the gd guy has a pure head problem, a typical lunatic, did you find that his behavior is not the same as the normal person? That one doesn't follow the routine to play cards, you all I don’t know what he dare to do next. For example, last time, he launched such a huge zombie to use dd to attack the mainframe of the National Computer Emergency Response Center. Can someone else do this? Isn’t it clear that Guo’an will trouble him? But that guy That's it." gd said a little speechless.

gosh! Zhang Yang almost didn't go to jail. When I fell off the chair, when did I become? What does it mean to behave differently than normal people? It means that I am not a normal person! Fuck! Zhang Yang rolled his eyes, gd this beast, Zhang Yang rolled his eyes, when did he yīn him again, this guy is too cheap, do you have that?

"Uh, if you say that, I think it's also true. Last time this guy was violent in Japan, he also actively asked the Japanese official to increase the amount of wanted him from one million dollars to one hundred million. Doesn't he know 100 million? Dollars can drive many people crazy, can they do anything for money?" Gu Zhu's residual dream also said speechlessly.

Zhang Yang played a long series of ellipsis on the screen and went out. The lonely bamboo dream that saw Zhang Yang's news laughed aloud and did not speak. Instead, gd said with a smile: "l, what is your opinion?"

"Uh... I think it's okay. Although God's behavior is a bit different from beginning to end, but I think that is based on his strong confidence. Obviously he has confidence that no one will be found." Zhang Yang choked. For a moment, he considered it, and then said extremely narcissistically.

"You are right, the skill of the gd guy is indeed admirable. I'm afraid his strength is higher than mine. Even I dare not do that in Japan, and I haven't even thought about it until now. How did the guy invade the official website of Japan's National Computer Emergency Response Center at such a horrible speed? Did he have some unknown system leaks?" gd also said with emotion.

"Don't talk about the two of you first. Blackhawk just sent us a message and asked if we can help." Gu Zhu Can Meng said quickly.

Gd paused and said: "He also sent me, I have told him that we are ready to start. But speaking of Black Eagle is also pitiful, this time is estimated to almost collapse."

How to do it "Gu Zhu Can Meng laughed twice, then asked quickly.

"The old way, I will copy their backs, you and l both of you will help defend, how to defend you two to discuss." gd said directly.

Then the two of us went, but the Black Hawk was really angry. He didn't even give us the first level of authority, and asked us to help. "Gu Zhu's dream is still there."

"Okay, don’t complain. You don’t know the relationship between us and the network supervision bureau. Everyone closes one eye and closes the other. It’s done. We are the enemy, can you just watch these hackers hack our official website of the Ministry of Public Security?" gd asked rhetorically.

GD and Gu Zhu’s residual dreams were nonsense there, but Zhang Yang was not idle at all. On the one hand, Zhang Yang went around in a foreign country, and then returned to the country to find some ordinary servers. When the website of the Ministry of Public Security was opened, on the other side, Zhang Yang directly connected to No. 1 and No. 2 satellites, and then passed through the main body of NASA, and found a springboard for an American company. Zhang Yang switched back to the page on this side.

This id publicity is also simply prepared. If such an important thing is that the id of gd is not known, it is too fake. No matter whether gd appears or not, it is still prepared first. With two IDs, Zhang Yang simply divided the blade of his server into two systems, so that the switch would not be possible.

This is also an advantage of blade servers. Each blade can run a single system, or it can be combined for collective computing. As soon as he was ready, Zhang Yang heard Gu Zhu's residual dream greet himself, "...l, how are you attacking? Anyway, they only have three people, and the two of us just need to pound them from the side, if you can, directly Keep track of the i address between them, and give the remaining work to gd."

"Uh, I'm not very good at intrusion, but I'm still pretty good in tracking." After thinking about it, Zhang Yang replied that the infecting bug can't be used, then only the ghost virus can use it, and gd has been The strengths shown are all in the area of ​​invasion, even if the id is l, just play tracking.

"OK, then you try to come." Guzhu Mengmeng did not understand l and did not have too many demands. Besides, the three of them said soy sauce in vain, UU read www. The real shot by uukanshu.com is gd, as well as technicians and security personnel from the Ministry of Public Security and the Network Supervision Bureau. After Zhang Yang agreed, he quickly started scanning the server ports of the Ministry of Public Security. The web page of the Ministry of Public Security is now opening very slowly. As the scanner progresses, Zhang Yang quickly notices that the traffic on several ports of the server is equivalent Big, obviously the other party's main attack direction is these ports.

Originally, this kind of port can be closed as long as it is closed from the server system, but the Ministry of Public Security has some pains to say at the moment. These ports are necessary ports for users to access. If it is turned off, then the official website homepage is other ordinary Internet users will no longer be able to access it. At that time, ordinary netizens will never know whether the Ministry of Public Security shut down the official website itself, or whether they were invaded by the hackers.

So even for the sake of face, you can't turn off these ports. This represents an attitude. If you are timid before the war, does it mean that the Ministry of Public Security has no confidence in keeping its website? Even the Ministry of Public Security, which is responsible for public safety, cannot keep its official website, so who will protect the network security of many ordinary civilians? This is a very real problem, so in any case, before the official website is hacked, the Ministry of Public Security cannot actively close the official website. A! ! ! </p>;

;

--------------

--------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like