Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume One Chapter 224 Various Vests (2)

Previous page        Return to Catalog        Next page

    Chapter 224 Various Vests (2)

    Of course, even if Zhang Yang suffers a tragedy, it will be nothing more than being kicked out of the system by the other party, and there will be no other losses.  However, Zhang Yang immediately slowed down his defense of the system and began to guard against the person who had just logged in to the system. Although he had complete operating rights to the system, unfortunately, this account was not omnipotent.

    If it is really so invincible, then all servers will not be invaded by hackers. This account is the maintenance account of the system. In other words, it looks like it has all the permissions, but in fact it only has some extra irrelevant ones.  It's just a function. These functions mean that it can make maximum program modifications to the system, but when it comes to managing websites or forums, it is not much different from the super-privileged account that Zhang Yang created for himself.

    "However, because it can modify the hardware, it is absolutely impossible for this account to be opened in important intelligence department server systems or in some companies' important data storage systems.  Even if you clearly know that this account will play a certain role in preventing hacker intrusions, you cannot just hand it over to anyone.

    After all, if a hacker invades the system and wants to copy the data, it will take time and crack the system that manages the data. Our security personnel have plenty of time to operate, but once the account managed is leaked and the problem is eliminated, the data in the server can be left at will.  If the other party copies, some copying restrictions imposed on the hardware will become useless.

    But what Zhang Yang didn¡¯t expect was that a technical staff would know the Xingyang Pharmaceutical server account, unless the important research information was not here or this person had Li Yun¡¯s absolute trust.

    What surprised Zhang Yang was that after this person logged in, he immediately discovered Zhang Yang and the two people who were attacking the system, but he did not take any further action.  In fact, the hacker who attacked the Xingyang Group system must have discovered that someone had alerted the system's alarm measures, but the other party was simply unscrupulous, completely ignoring your existence, and intruding in front of you.

    From this point of view, it looks very much like thanatos, but Zhang Yang knows that this person will definitely not be thanatos.  At this moment, Zhang Yang and this person didn't know what the person outside who was attacking the system was doing, but to Zhang Yang and this person, their actions were absolutely relatively transparent.

    Because both people have the highest authority in the system, Zhang Yang can see what the other party does. Of course, others can definitely see what Zhang Yang does.  After a pause, this person quickly copied a piece of software and started analyzing the system of Xingyang Pharmaceutical. Zhang Yang was a little curious about this technician. Generally speaking, when security personnel see something black, they will be the first to do so.  Time banishes hackers who enter their systems, but this person did not do so now.

    Then there is only one other possibility, and that is that he himself is probably a skilled hacker himself, so that his way of thinking will be different from that of security personnel, and he will not have such a strong feeling about hackers invading his company's system.  Instead, we can analyze the system first, because now even a fool can see that Zhang Yang is helping him defend against the hacker who is attacking the Xingyang Pharmaceutical system from outside.

    After about five or six minutes, this person had obviously conducted a thorough analysis of the system. After fully knowing Zhang Yang's transformation of the system, after a while, this person copied another firewall in front of Zhang Yang.  Come in.  This move immediately made Zhang Yang feel relaxed. Obviously, the other party had silently sent a signal to Zhang Yang, that is, cooperation.

    Otherwise, no security personnel would copy their own firewall into the system in the presence of another hacker, especially since the other hacker also has the highest management authority of the system. After coming to his senses, Zhang Yang  Zhang Yang quickly typed these commands and directly counterattacked the person who attacked the system several times. This was also a signal given by Zhang Yang to the other party to express his agreement with his opinion.

    Xingyang Pharmaceutical's firewall originally had three layers of defense. Zhang Yang did not do his best to defend, so the attacker outside had broken through the first layer of peripheral firewall and began to analyze and crack the second layer of firewall. At the same time, he was still scanning the system for all vulnerabilities.  And ports, but Zhang Yang has technology and knowledge that is six years ahead of the world. Even if Zhang Yang had left it alone when patching the system, the remaining loopholes would not have been found by this person.

    So he could only attack the firewall, and this person was very efficient at invading the firewall. Obviously, when the other party entered the Xingyang Pharmaceutical system before, he had conducted a rigorous analysis of the Xingyang Pharmaceutical firewall and knew about this firewall.  its advantages and disadvantages, and even master part of its code.?Otherwise, the opponent's invasion speed would not be so fast.

    The security personnel of Xingyang Pharmaceutical immediately activated his own firewall in front of Zhang Yang, and placed another layer of firewall inside the firewall of Xingyang Pharmaceutical. When the firewall was completely activated, Zhang Yang was dumbfounded.  Because he also has the highest authority of the system, he can naturally see most of the information and functions of this firewall. However, Zhang Yang was a little confused after seeing all this. Isn't this firewall owned by Guzhu Canmeng?

    The last time Zhang Yang was tracking Mak and the others, during the defense battle of the National Computer Emergency Response Center, Zhang Yang had released a tracking virus. At that time, because the virus was naturally unable to distinguish between friend and foe, it bit everyone, including  Including Guzhu Canmeng, when Guzhu Canmeng called out in the chat room, Zhang Yang used the virus to cancel the tracking of him.

    But during that time, Zhang Yang had also seen Guzhu Canmeng's firewall. Even though Zhang Yang couldn't see most of the functions of this firewall at that time, he could naturally see its working methods and so on. Now when he saw this  Firewall, Zhang Yang immediately thought of it. This kind of firewall, Lone Bamboo Canmeng, naturally cannot be handed over to others for use. So obviously, the person in charge of Xingyang Group's network security is Lone Bamboo Canmeng, whom Zhang Yang had met in god's place.  Dreamed.

    A crisp system prompt of "ding dong" brought Zhang Yang back from his daze. After coming back to his senses, Zhang Yang saw that the sound was the sound of messages being sent between administrators within the Xingyang Pharmaceutical system. Needless to say,  They were all sent by the other party.

    When Zhang Yang opened the message and saw the message from Gu Zhu Canmeng, Zhang Yang felt a pain in his balls.

    "Thank you, buddy. I'm Li Taibai, who are you?" This was the message sent by Guzhu Canmeng. Zhang Yang's face was full of depression. Zhang Yang also knew Li Taibai's ID. He was just a second-hand hacker in China.  At least he is a little hacker on the surface, but I didn¡¯t expect that this guy¡¯s real identity is Lone Bamboo Canmeng. Damn it, everyone is so unrealistic that they are all playing with vests.

    "My name is L." Zhang Yang immediately replied, since you are playing vest, then everyone should play vest. Anyway, Zhang Yang was not prepared to send out the ID of gscsd at all.

    "Have you ever heard of a person named L?" Guzhu Canmeng quickly asked in the chat room. Obviously this guy is hanging on the Internet. Otherwise, not long after Zhang Yang triggered the system alarm, Guzhu Canmeng  Received and responded quickly.

    "L? His ID is just one letter? Is he the hacker who is helping Xingyao Pharmaceutical at the moment?" God was moved in his heart and asked quickly.

    "That's right, do you know him?" Lone Bamboo Canmeng asked in surprise.

    "Of course I do. Do you remember what I just told you? That little guy's ID is L." God said weirdly.

    "No way? I think this L's strength is pretty good, right? Is he the rookie you're talking about? Let me ask you, am I mistaken? If all rookies are this strong, then why are we messing around?" Lone Bamboo  Canmeng shouted depressedly.

    "If these two L's are really the same person, then his talent is indeed quite terrifying. In just one month, he has grown from a rookie to this point. And according to Can Meng, he  It is very likely that he is the person I met on the anubis website. When he asked me questions at that time, most of them were about blue domain knowledge and hardware. Now it seems that his talent is really amazing.  "god said quickly.

    These things are not a secret among them, so god and they have never hidden it from each other.

    "Why don't you just ask and find out? Anyway, many people in the country know your identity as a one-sword style, so it's okay to let l know." Lone Bamboo Canmeng paused and said.

    God hesitated for a moment. He told L last time that he and Yidao Ryu were not the same person, but Guzhu Canmeng was right. Many people knew God's Yidao Ryu ID. If L  If it is really the L he knows, then sooner or later he will get to know the people in these circles, and L will still know the truth by then, so it is better to tell him now.

    Thinking of this, God quickly said: "Okay, let me go and take a look." Zhang Yang naturally didn't know that God had also come over. With Guzhu Canmeng's intervention, that person's strength is estimated to be no more than  Guzhu Canmeng is a little taller, and Zhang Yang has repaired all the systems quite completely, so it is almost impossible for this person to take down the system.
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report