The Strongest Hacker

Chapter 226 All kinds of insignificance (Part 1)

Chapter 226 All kinds of insignificance (Part 1)

Chapter 226 All kinds of insignificance (Part 1)

Where is the person who killed my Trojan horse just now! Last time you made your Chinese hackers arrogant, this time I will let you know that your Chinese hackers are this... At the end of this sentence, the other party added a middle finger, Later, he continued to make a thumbs down and continued: ...see you on the official website of the Ministry of Public Security.

Zhang Yang's heart moved slightly, his heart was like a mirror, these people rushed back so arrogantly, and made such an announcement that tomorrow is a provocation, obviously to divert everyone's attention, after all, Xing Yangye is not a famous household The website is not a well-known company, nor is it a government department. If it is just for the sake of intrusion, it is unreasonable. Such people are more Hack some household websites, not a common company website that you don't know much about.

And that Trojan horse was even more unnecessary. Zhang Yang didn't find any Trojan horses inside Xingyangye's official website at all. Zhang Yang didn't know if the brood killed similar Trojan horses, but this possibility is very likely. Trojan horses and computer viruses are still there. Not the same.

Although in a broad sense, a Trojan horse can also be called a computer virus, in a narrow sense, a Trojan horse refers to a program that uses computer program leaks or system leaks to invade the system and steal files. It is called a Trojan horse. programs that can be used to perform malicious acts.

Trojan horses do not cause harm to the computer, and are mainly for control. Computer viruses are different, and more damage to the computer system. For example, Zhang Yang’s infection bug is actually more like a Trojan horse. Infectors are classified as computer viruses, because their behavior characteristics such as autonomous infection and concealment are more like computer viruses. They cannot directly control the computer, but only open a post for the computer system.

Therefore, Chapter 226 All kinds of wretchedness (Part 1) In terms of concealment, computer viruses are easier than Trojan horses, and they are more suitable for concealment. It can be said that if there are viruses that are not found by publicity scanners and firewalls, Zhang Yang can believe it, but if there is a Trojan horse that executes malicious programs, Zhang Yang will not believe it.

Then it is obvious that this guy is lying, in order to hide their purpose of trying to meddle in Xing Yangye's new research materials, so that other people will not think about it. For this reason, these people even directly turned their targets to As for the website of the Ministry of Public Security, at present, there is no doubt which is more important, the website of the Ministry of Public Security being hacked or the website of a professional company being hacked.

I'm afraid even gd and the others wouldn't have thought that the real purpose of these people was to steal information, not even Guzhu Canmeng, let alone other people.

The official website of the Ministry of Public Security has been attacked. It seems that there are other people on the other side who are helping, and they are very powerful. Almost not long after the announcement was issued,

Guzhu Canmeng quickly jumped out and said.

Let's help. In any case, we can't be sieved by the other party like the official website of the Japanese Defense Agency. Then we may become the laughing stock of hackers all over the world just like the current Japanese hacker community. GD paused and said Said, but Guzhu Canmeng over there suddenly said a word: That's different, at least this time gd won't come out to make trouble, but stand on our side.

I advise you not to count on GD. GD said again, Zhang Yang didn't say anything, he just listened quietly, he wanted to see what GD had to say about him.

Why? Guzhu Canmeng obviously didn't understand, and asked suspiciously.

You haven't seen it yet? I think that guy GD has a problem with his brain, a typical lunatic. Didn't you find that his behavior is completely different from normal people? That **** doesn't play cards according to routines at all. You don't even know what he's going to do next. For example, last time, he launched such a huge zombie to attack the mainframe of the National Computer Emergency Response Center with dd. Can another person do this? Isn't this clearly asking the national security to trouble him? But That guy just did that. GD said a little speechlessly.

faint! Zhang Yang almost didn't go to jail, and fell off the chair all at once, when did I become a prostitute? What does it mean to behave differently from normal people? It means that I am not a normal person! Damn! Zhang Yang rolled his eyes, gd is a beast, Zhang Yang rolled his eyes, when will he give him another fuck, this guy is too cheap, is he that sexy?

Uh, if you put it this way, I think it is true. Last time this guy made a big fuss in Japan, and even asked the Japanese officials to increase the amount of wanted him from one million dollars to 100 million. Doesn't he know that 100 million U.S. dollars can drive many people crazy, can they do anything for money? Guzhu Canmeng also said speechlessly.

Zhang Yang directly typed a long series of ellipses on the screen and went out. Guzhu Canmeng who saw Zhang Yang's news laughed loudly and did not speak, but GD smiled and said: L, what do you think?

Uh... I think it's okay. Although it is said that GD's behavior is a bit unconventional from the beginning to the end, I think it is based on his strong confidence. It is obvious that he has the confidence not to be discovered by anyone. Zhang Yang choked. After thinking about it for a while, he said in an extremely narcissistic manner.

You're right. That guy GD's technique is really admirable. I'm afraid his strength is higher than mine. Even I wouldn't dare to do that in Japan, and I haven't figured it out until now. How did that guy manage to hack into the official website of the National Computer Emergency Response Center of Japan at such a terrifying speed? Could it be that he has mastered some unknown system leaks. GD also said with emotion.

Stop chatting, you two, just now Black Eagle sent us a message, asking if we can help. Guzhu Canmeng said quickly.

GD paused and said: He also sent it to me, and I told him that we are ready to do something. But speaking of it, Black Hawk is also pitiful, and I think it's almost collapsed during this period of time.

how to do it Guzhu Canmeng laughed twice, and then asked quickly.

The old way, I'll take their back lane, and you and l will help defend, and discuss how to defend with the two of you. GD said directly.

Then the two of us went, but this guy Black Eagle is really iǎ, he didn't even give us a primary authority, and asked us to help. Lone Bamboo Remnant Meng said.

Okay, stop complaining. It's not like you don't know the relationship between us and the Internet Surveillance Bureau. Everyone just turns a blind eye and closes one eye. We are enemies, can you watch these hackers hack the official website of the Ministry of Public Security of our country regardless? gd asked back.

GD and Guzhu Canmeng were talking nonsense there, Zhang Yang was not idle at all, while Zhang Yang went around abroad, and then returned to China to find a few ordinary servers and opened the website of the Ministry of Public Security, while on the other side, Zhang Yang directly connected to the No. 1 and No. 2 satellites, and then went through the mainframe of NASA, and then found a springboard from an American company. Zhang Yang switched back to the page on the l side.

This id Zhang Yang simply made preparations, if he said that the id of gd didn't know about such a big event, that would be too fake, no matter whether gd appeared or not, he had to be prepared first. With two ids, Zhang Yang simply divided the blades of his server into two systems, so that there would be no problem when switching.

This can also be regarded as the advantage of blade servers. Each blade can run a system independently, or it can be combined for collective computing. Just as he was getting ready, Zhang Yang heard Lone Bamboo Remnant Meng calling out to him, ...L, how about your attack? Anyway, there are only three of them, so we just hit them from the side. If possible, directly Track the i address between the two of them, and leave the rest to gd.

Uh, I'm not very good at intrusion, but I'm pretty good at tracking. After thinking for a while, Zhang Yang replied that the infection bug can't be used, so only the ghost virus can make do with it, and gd has always The strength shown is all about intrusion, so forget about the l ID, let's just play tracking.

Okay, then you can try. Gu Zhu Canmeng didn't know much about l, and didn't have too many demands. Besides, the three of them were soy saucers, and it was gd and the police who really made the move. Technical personnel and security personnel of the Department and the Network Supervision Bureau. After Zhang Yang agreed, he quickly began to scan the server ports of the Ministry of Public Security. The webpage of the Ministry of Public Security opened very slowly. As the progress of the scanner progressed, Zhang Yang quickly noticed that the traffic on several ports of the server was quite high. It is obvious that the main attack direction of the other party is these ports.

Originally, as long as this kind of port is closed from the server system, it is fine, but the Ministry of Public Security is also struggling at the moment. These ports are required ports for user access. If they are closed, the official website homepage will be otherwise normal Netizens will not be able to access it. At that time, those ordinary netizens will never know whether the Ministry of Public Security closed the official website itself or was invaded by those hackers.

So even for the sake of face, these ports cannot be closed. This represents an attitude. If you are timid before fighting, doesn't it mean that the Ministry of Public Security has no confidence in defending its website? Even the Ministry of Public Security, which is in charge of public security, cannot guard its official website, so who will guard the Internet security of many ordinary civilians? This is a very real problem, so in any case, before the official website is hacked, it is impossible for the Ministry of Public Security to take the initiative to close the official website. Ah! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like