Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume One Chapter 134 Unexpected Results (2)

Previous page        Return to Catalog        Next page

    Chapter 134: Unexpected Results (2)

    When the pointer pointed to 11 o'clock in the evening, Zhang Yang completed writing the software. At this moment, the infection bug modified by Zhang Yang was completely unrecognizable. It was completely different from the infection bug.  Abandoning some of the characteristics of computer viruses, such as active transmission, etc., its size has also changed from a few hundred kb to a behemoth of more than ten meters.

    Of course, a software that weighs more than ten MB is actually not that big. It is just equivalent to the original infection bug, which is already too big.  After writing it, Zhang Yang directly named this anti-virus software that was more like a firewall version 1.0.

    First of all, the function may still need some improvement, but all the ideas that just popped up in Zhang Yang's head have been compiled into it, and there are no other ideas that he wants to add for the time being.

    First of all, Brood does not have many functions. It only has one function, which is anti-virus. After running Brood, it will analyze the system version immediately, confirm what system the user has, and then face all the problems in its memory bank.  All system files have an automatic detection process. Any virus disguised as a system file cannot escape its eyes, because no matter how powerful the computer virus is, no matter how awesome the embedded computer virus is, no matter how you disguise it, you are still different from the original system.  The files are still different.

    Once the mother nest retrieves the virus-infected system file, it will automatically generate an identical system file. The system file generated by the mother nest is exactly the same as the original system file, and then it will use this file to replace the virus-infected system file.  file to ensure that there are no problems with the system, and then the mother nest will directly cut off the infected system file.

    Then package it into the range of a spore it generates. This spore is equivalent to a simple simulation system. It only needs to completely clear this simulation system, just like the disposable tablecloths packed and thrown away in a restaurant.  After dropping it, the table was still new.

    But this step is not simple. The essence of the entire Brood virus is here. Zhang Yang spent more than two hours writing it just for this part. As we all know, many system files cannot be copied, transferred and used.  In the end, Zhang Yang took advantage of some of the characteristics of the infected virus so that the files generated by the mother nest could be replaced smoothly.

    Theoretically, Brood can kill any virus. This is different from other software. Brood does not need to "memorize" the virus characteristics of the huge and complex various viruses, nor does it need a virus database. All it needs is  Various versions of the system on the market are ok, because after any virus enters the system, whether you infect the system or infect the software in the system, it will pass through the system files. As long as you pass through the system files, you cannot escape the virus.  Detection of nests.

    It doesn¡¯t need to know what kind of virus you are or what functions you have, it will directly package you and throw it away!  This is what the mother nest needs to do. As for the virus model and so on, does it matter?

    Moreover, under the action of this unique membrane of the mother nest, because its function is to isolate the connection between the system and the virus, even if your virus is triggered, you have no way to affect the system itself, you only affect  It's just a fake target simulated by the Brood for you, so it's useless no matter how much you explode, no matter how awesome your infection ability is, it's useless.

    After quickly activating the Mother's Nest, Zhang Yang began to test the assassin mutant virus in his server. Soon, the Mother's Nest was installed in just one minute. He tested the system performance and its impact on the system.  The impact is almost minimal, and it only takes up a little system resources when anti-virus.

    Directly opened the assassin virus in the machine, and the prompt box of the brood appeared almost instantly. After clicking the antivirus, the assassin virus outbreak did not appear. The screen only flashed and calmness was restored.  He used his own firewall to start scanning for viruses again. When the results came out, Zhang Yang couldn't help but wave his fist hard!

    Awesome, even if the infection pattern of the assassin virus is not found, the mother nest can kill it directly.  After killing the assassin virus, Zhang Yang activated two viruses he wrote on his computer. After the same operation, in just a few minutes, even the super virus written by Zhang Yang could not escape the detection and detection of the mother nest.  Clear.

    Zhang Yang soon realized that he might have truly created the latest anti-virus method. If all current viruses did not undergo major changes, the Mother Nest would be invincible in a sense.

    If he hands over this anti-virus software to any security company, I am afraid that for a long time, security companies around the world will be in danger of bankruptcy.

    Pulled out QQ and looked at it, and found that Gao Gang was still online. It looked like a safe companyIt¡¯s not easy to do either, so Zhang Yang, the brood anti-virus software, naturally couldn¡¯t throw it to Gao Gang.

    "How's it going?" After thinking about it, Zhang Yang quickly sent a message to Gao Gang.

    "Your Excellency, not long ago, the assassin virus mutated for the third time. However, it is the same as last time. It has not changed much, but the effect of the software you gave us is not very good." Gao Gang said  The message was replied very quickly, and it seemed that he was waiting in front of the company's technical department.

    Zhang Yang was not surprised. Before the pattern of the assassin virus was found, and before the pattern of its own mutation was found, it was impossible to completely kill it.

    Although Zhang Yang now has the Brood anti-virus software, he discovered that the Brood anti-virus software cannot be exposed at all. It is no exaggeration to say that the Brood is now worth at least tens of billions of dollars. It not only represents the current  The improvement of anti-virus technology means that it has created an era.

    ?Looking at the time, there are less than 8 hours left before the time set aside by the hacker. If Satellite 1 cannot analyze the results, then Zhang Yang has no better way.  I checked the progress of Satellite 1 and was still analyzing it, but the analysis speed was naturally much faster than Zhang Yang's server speed.

    "Master! Just now Sina! NetEase! Tencent and other portals have been hacked!" Just when Zhang Yang was checking the progress of satellite analysis, King's message suddenly popped up. Seeing this message, Zhang Yang was stunned for a moment and quickly closed it.  I entered the webpage and directly entered the NetEase address. The webpage opened quickly, but the homepage had been tampered with.

    There is only one sentence above: The war between us!  This sentence is not difficult to understand, but Zhang Yang's heart really jumped. Could it be that the author of the assassin virus took action?  If this is the case, then why did he take action now when the time shown was still 8 hours when the assassin virus broke out?

    There must be a connection between the two. After hesitating for a moment, Zhang Yang took out all his tools. After opening the analysis software, Zhang Yang directly started scanning NetEase's ports. After a few minutes, Zhang Yang couldn't help but smile bitterly.  He made a sound, it was really hard for him to start now. Just by scanning, there were at least dozens of data streams detecting the NetEase port, which meant that there were at least dozens of hackers watching here.

    Zhang Yang was a little dazed. Although he didn't know who was the initiator of this attack, it was definitely not a domestic hacker. It would only be a foreign hacker. And once it involves such a large-scale invasion of domestic websites by foreign hackers, it can easily cause  Hacker war!

    Whether it was the hacker war in 1998 or 2002, Zhang Yang had no chance to participate. However, once such a war between hackers broke out, it would definitely cause immeasurable large-scale indirect economic losses.  More importantly, once the two sides become angry, once it affects the websites of government departments, the damage may be even greater, especially to some important public systems.

    The complete results of the scan quickly appeared in front of Zhang Yang. After careful study, Zhang Yang was sure that even if it was not the author of the assassin virus, it had a lot to do with him, because the other party's intrusion was not hidden at all.  His own body was invaded openly, using a backdoor opened when the assassin virus broke out.

    "Master, all large domestic websites are now under attack, and they seem to have been quickly taken over by the other party. Master, I will give you the address. This is the address of a private chat room we use ourselves. I will download it.  I'm on QQ." King's message was quickly sent over again.

    Zhang Yang was just about to send a message back to King when suddenly his firewall went off like crazy. A virus was following Zhang Yang's data flow and was frantically tracking his information. Zhang Yang was startled, and after taking a closer look, Zhang Yang's expression changed.  changed.  It¡¯s Tencent¡¯s server!

    The entire Tencent QQ server has been planted with Trojan horses. It is spreading rapidly and crazily through QQ. Zhang Yang quickly shut down all his QQ. This kind of tracking is not about stealing QQ accounts, but I am afraid that in  Collect Tencent's user database, and the other party's purpose may be to destroy all Tencent's data.

    However, Zhang Yang didn't even have time to look at the address of the chat room that King just sent. It was obvious that the other party's invasion was definitely not carried out by one person. So many portals were killed almost at the same time. It was impossible for one person to do so.  It can be done, even thanatos can't do it. Even if there is a virus opening the backdoor, the backdoor is not omnipotent. The backdoor only provides a port for intrusion. You still need to do the intrusion yourself, or at least solve it.  Server firewall?

    With so many firewalls, unless one person has three heads and six arms, they may not be enough.  Zhang Yang made the decision almost instantly, this is a hackerOrganization, and there are many people.  Zhang Yang quickly opened the web pages of several portal websites and took a look. All the web pages of the portal websites were in an unavailable state, and more than 80% of the web pages were posted on what Zhang Yang had just seen.  That sentence.
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report