The Strongest Hacker

Chapter 224 Various Vests (Part 2)

Chapter 224 Various Vests (2)

Chapter 224 Various Vests (2)

Of course, even if Zhang Yang had a tragedy, he would just be kicked out of the system by the opponent, and there would be no other loss. However, Zhang Yang immediately slowed down his defense against the system, and began to guard against the person who had just logged in to the system. Although he had full access to the system, it was a pity that this account was not omnipotent.

If it is really so invincible, then all the servers will not be hacked. This account is the maintenance account of the system, that is to say, it seems to have all the permissions, but in fact it is just a few more irrelevant ones. It’s just functions, and these functions refer to it. Chapter 224 Various vests (middle) can modify the system to the greatest extent, but when managing websites, or forums, it has nothing to do with publicity. There is not much difference in the creation of super-privileged accounts.

However, because it can modify the hardware, it is absolutely impossible to open this account in the important server system of the Ministry of Intelligence, or in the important data storage system of some companies. Even if it is clear that this account will play a certain role in defending against hackers, it is impossible to give it to anyone casually.

After all, if a hacker invades the system and wants to copy data, it will take time and crack the data management system, and our own security personnel have plenty of time to do it, but once the managed account is leaked and the problem is eliminated, the data in the server can be taken care of. If it is copied by the other party, some copy ** imposed on the hardware, etc. will become useless.

But what Zhang Yang didn't expect was that a technician would know about Xingyangye's server account, unless those important research materials were not here or this person had gained Li Yun's absolute trust.

What surprised Zhang Yang was Chapter 224: Various vests (middle). After this person logged in, he immediately found Zhang Yang and the two people who were attacking the system, but he did not take any further action. In fact, the hacker who attacked Xingyang Group's system must have also discovered that someone has alarmed the system's alarm measures, but the other party is simply unscrupulous, completely ignoring your existence, and intruding in front of you.

From this point of view, the style is very similar, but Zhang Yang knows that this person will definitely not be at this moment, except for what the person attacking the system outside Zhang Yang and this person do not know, but for Zhang Yang and this person In other words, the actions of the two of them are absolutely relatively transparent.

Because both of them have the highest authority of the system, Zhang Yang can see what the other party does, and of course, others can also see what Zhang Yang does. After pausing for a while, this person quickly copied a piece of software and began to analyze Xingyangye's system. Zhang Yang was a little curious about this technician. Generally speaking, when security personnel see black,

He would definitely expel the hackers who entered his system as soon as possible, but now this person has not done so.

Then there is only another possibility, that is, he himself is probably a powerful hacker, so that his way of thinking will be different from that of security personnel, and he will not have such a strong feeling about hackers invading his company's system. Instead, you can analyze the system first, because even a fool can see that Zhang Yang is helping him defend against the hacker who attacked Xing Yangye's system outside.

After about five or six minutes, this person obviously had conducted a thorough analysis of the system. After fully knowing Zhang Yang's transformation of the system, after a while, this person copied another firewall in front of Zhang Yang. Come in. This action immediately made Zhang Yang feel relieved. Obviously, the other party had silently sent a signal to Zhang Yang, that is, cooperation.

Otherwise, no security personnel would copy their own firewall to the system in the presence of another hacker, especially if the other hacker also has the highest management authority of the system. After typing these commands quickly, he directly counterattacked the person who attacked the system several times. This was also a signal for Zhang Yang to agree with him.

Xingyangye's firewall originally had three layers of defense, but Zhang Yang didn't try his best to defend it, so the attacker outside had already broken through the first layer of peripheral firewall, and began to analyze and crack the second layer of firewall, while scanning all the leaks and ports of the system. However, Zhang Yang has the technology and knowledge that is six years ahead of the world. Even if Zhang Yang keeps his hand when repairing the system, the remaining leaks cannot be found by this person.

So he can only start on the firewall, and this person's intrusion into the firewall is quite efficient. Obviously, when the other party entered the Xingyangye system before, he had conducted a rigorous analysis of the Xingyangye's firewall and knew the advantages of this firewall. And flaws, and even master a part of its code, otherwise, the other party's intrusion speed cannot be so fast.

The security personnel of Xingyangye immediately activated his own firewall in front of Zhang Yang, and installed another layer of firewall inside the firewall of Xingyangye. When the firewall was fully activated, Zhang Yang was dumbfounded. Because he also has the highest authority of the system, he can naturally see most of the information and functions of this firewall, but he is a little confused after seeing these publicity. Isn't this firewall a lonely bamboo dream?

The last time when Zhang Yang tracked m and the others, during the defense of the National Computer Emergency Response Center, Zhang Yang once released a tracking virus. At that time, because the virus was naturally impossible to distinguish between the enemy and us, everyone was bitten. Including Lonely Bamboo Canmeng, when Lonely Bamboo Canmeng called out in the chat room, Zhang Yang canceled his follow-up as a virus.

But during that time, Zhang Yang had already seen the firewall of Lonely Bamboo Remnant Dream. Even though Zhang Yang couldn't see most of the functions of this firewall at that time, he could see its working method and so on at a glance. Firewall, Zhang Yang immediately remembered that it is impossible for this kind of firewall to be handed over to others. Obviously, the person in charge of Xingyang Group's network security is the lonely bamboo that Zhang Yang had seen in gd. Dreamed.

Ding dong a crisp system prompt pulled Zhang Yang back from his daze. After recovering, Zhang Yang saw that this voice was the voice of messages sent between administrators in Xingyangye's system. It was sent by the other party.

When Zhang Yang opened the message, he saw the message from Guzhu Canmeng, and Zhang Yang felt a pain in the ass.

Thank you buddy, I'm Li Taibai, who are you? This is a message sent by Guzhu Canmeng, Zhang Yang's face is full of depression, Zhang Yang also knows the ID of Li Taibai, he is just a second-hand hacker in China, At least he is an iǎ hacker on the surface, but he didn't expect that this guy's true self is actually Guzhu Canmeng. Damn, everyone is too unreal, and they all play vests.

My name is L. Zhang Yang replied immediately, since you play vest, then everyone should play vest, anyway, Zhang Yang is not going to send out the ID of gd at all.

Have you ever heard of a guy named L? Guzhu Canmeng quickly asked in the chat room. Obviously, this guy was posted on the Internet, otherwise, not long after Zhang Yang triggered the system alarm, Gu Zhu Canmeng would have died. Received and responded quickly.

L? His id is only one letter? Is that the hacker who is helping Xingyaoye at the moment? GD asked quickly with his heart moving.

That's right, you know him? Guzhu Canmeng asked in surprise.

Of course I do, remember what I just told you? That iǎ guy's ID is l. GD said strangely.

No way? I think this L's strength is pretty good, isn't it? Is it the rookie in your mouth? I wonder if I made a mistake. If the rookie has this strength, then what are we doing? Lonely Zhu Canmeng is depressed shouted.

If these two ls are really the same person, then his talent is indeed quite terrifying. In just one month, he has grown from a rookie to what he is today. And according to Canmeng you said, he It is very likely that it is the l I met on the nubi website. When he asked me questions, most of them were about blue domain knowledge and hardware. Now it seems that his talent is really amazing. Gd said quickly.

These things are not a secret among the few of them, so GD and the others have never hidden each other.

Why don't you just ask and you'll know? Anyway, many people in China already know about your status as a swordsman, so it's okay to let l know. Guzhu Canmeng said after a pause.

GD hesitated for a moment, last time he told l that he was not the same person as Yidaoliu, but Guzhu Canmeng was right, many people knew the id of gd's Yidaoliu, if this l If it is really the l he knows, then sooner or later he will know the people in these circles, and l will still know the truth at that time, why not tell him now.

Thinking of this, gd quickly said, Okay, then I'll go and have a look. Zhang Yang naturally didn't know that gd had already come over, and with Lone Bamboo Remnant Meng's hand, that person's strength is estimated to be A little higher than Lonely Bamboo Canmeng, and Zhang Yang has already repaired all the systems quite completely, so it is almost impossible for this person to take down the system. Ah! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like