Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume One Chapter 389 Iron Pants (Part 1)

Previous page        Return to Catalog        Next page

    Chapter 389: Iron Pants (Part 1)

    Chapter 389 Iron Pants (Part 1)

    Zhang Yang doesn't know if the people who are currently hacking the server are from anubis, but judging from the opponent's offensive methods, the strength of this group of people is definitely not low, but fortunately, the opponent has no signs of cooperation for the time being. It looks like  Everyone fights.  But even so, the efficiency of the opponent's invasion is very high. Even if the infected bugs are now helping to defend, which greatly improves the response speed and efficiency of the firewall and system, it still cannot stop the opponent's progress.

    Looking around, Zhang Yang saw an Internet cafe in the distance, and Zhang Yang immediately ran towards the Internet cafe.  By the time Zhang Yang ran to the Internet cafe, the server's peripheral system had been breached by the other party.  Zhang Yang quickly turned on a computer. After turning it on, Zhang Yang directly used his mobile phone to give instructions to the infected bug. He first found his own IP and asked the infected bug to log in and connect to the computer directly.

    Although the system of the Internet cafe is also an overall system with a virtual hard disk, the firewall of this Internet cafe is simply garbage, and the infected bugs can easily enter the internal system of the Internet cafe.  With the infected broilers under control, Zhang Yang saved himself and started to use broilers again.  Zhang Yang quickly logged into the Starry Sky Group's server backend through his backdoor account, and Zhang Yang directly started searching for the hidden space on the server's hard drive.

    Although Zhang Yang did not set up a very good firewall and defense system in this server's system, the Starry Sky Group's server still has a mother nest prepared by Zhang Yang in advance.  The mother nest is embedded inside the system by Zhang Yang. It is usually hidden in the hidden partition specially separated by Zhang Yang on the server hard disk and is in a dormant state.

    However, although it is in a dormant state, it will automatically record all legal operations of the entire system, as well as changes in every file in the system, which is equivalent to a system backup. However, it is not the same as a system backup in that the mother nest is not completely  Instead of comprehensively restoring the system, it records all normal operations of the system and closes all illegal operations and access.

    Quickly finding his hidden mother nest, Zhang Yang directly activated the mother nest. When Zhang Yang activated the mother nest, the entire server system suddenly came to a standstill. At the same time, all operating rights of the entire system immediately changed hands. In the mother nest  When the system is restored, all operations, including the highest authority, will be denied, which means that now Zhang Yang cannot operate the Brood to stop it.

    The data in the entire server immediately began to change rapidly. The Brood Recovery System is different from other restoration systems such as one-click restore. The Brood Restoration only restores the changes made to the system by commands issued through illegal operations. Normal operations  It will still be in a normal state, because the mother nest has been recording everything the system is running, and it is under the bottom command, and there is no way for anyone else to stop the operation of the mother nest.

    Soon the Starry Sky Group's server returned to normal, and all the accounts that logged into the system were kicked out by the Brood. Only Zhang Yang's own account could still be logged in.  After the Brood completed the system recovery, Zhang Yang immediately copied his scanner to the Starry Sky Group's server.

    Zhang Yang immediately started to patch the system and turned on the protection function of the brood to the highest level.  Now it is almost impossible for any access to illegally enter the Starry Sky Group's server.  Originally, many people paid attention to the Star Group and Microsoft press conference today. When Star Group's servers were attacked, most of the hackers who watched the live broadcast discovered it immediately.

    Because Chen Xiaowei and the others held a press conference and needed to use Star Group's system to retrieve part of the data for live broadcast, there were people logging into the server at the venue. When the server was attacked, almost anyone who was not a computer novice could watch it.  come out.

    So when hackers were about to invade the Starry Sky Group's servers, who knew it would take a turn, and the situation would change 180 degrees almost in the blink of an eye.  Although they don't know who did it, all hackers now understand that there is definitely an expert in the Starry Sky Group's technical department. Even if this expert is not an employee of the Starry Sky Group, then there is definitely someone in the Starry Sky Group who knows him.

    Otherwise, if the hacker is about to gain the highest authority, the other party can easily kick everyone out at once. But why does this style feel so familiar?  All the hackers have a familiar feeling, especially this kind of hacker who drives people away like dumplings. It feels like they have seen it before somewhere.

    Nearly all hackers feel this way, but we can¡¯t communicate, so we don¡¯t know what other people think. If they feel this way, no one speaks out.  After driving these people out, Zhang Yang's head began to spin rapidly, and the exposure of the nest was inevitable.

    As long as you are an expert, you will be able to detect the rejection from the firewall.It can be felt that the system is exactly the same as the last time Zhang Yang used l's ID to help defend more than 20 websites. It is estimated that a hacker will contact l soon.  Thinking of this, Zhang Yang made a quick decision in his heart. Anyway, when he used the ID of l, Zhang Yang had no intention of hiding it. Gscsd was enough to do bad things. As for l, hehe.

    Zhang Yang thought for a while, and immediately wrote a new announcement and posted it on the homepage of the Star Group's official website, with bold red letters at the top.  "The Starry Sky Group's server has just been hacked. All the staff of the Starry Sky Group's technical department are deeply sorry for the losses caused to our customers. Now that the server has returned to normal, we are confident in protecting the security of all Starry Sky Group users." In this announcement  The signature in the lower right corner reads: Chief Technical Advisor of Star Group: l!

    There are many hackers paying attention at the moment. When everyone saw the latest announcement released by Starry Sky Group, everyone was stunned for a while, and then they couldn't help but shouted in front of the computer: Damn it!  l?  !  Everyone rubbed their eyes vigorously to confirm that they had seen correctly, and then everyone was in an uproar again.  If we said it a month or two ago, no one might know the ID of l.

    But now I dare not say that l is very famous in the hacker circles around the world, but it is definitely quite awesome in the Chinese hacker circle, almost on par with gscsd.  No one can forget that in the recent hacker war between China and the United States, more than a dozen government departments were invaded by hackers at the same time. When they were about to be succeeded by the other side, a hacker using lid appeared almost out of thin air.  He single-handedly supported the defense tasks of more than 20 websites, and kept many hackers out of the firewall.

    The equally crazy gscsd even single-handedly hacked the official website servers of the four major U.S. intelligence agencies. This contradiction was called the "Second General of the Chinese hacker community" by countless Chinese hackers on the Internet.  That's quite a tacit understanding.  Just now, everyone saw that the Starry Sky Group's server suddenly became extremely powerful in defense, and all the hackers were kicked out at once. They all felt unusually familiar. When they saw the ID "l", everyone suddenly realized, no wonder it is so familiar.  Well, isn't this L's style last time?

    It's just a iron pants, do you want to enter?  Then come on, no matter what method you use, you can't invade anyway, just like the mantra in Mr. Jin's book, let him be strong, the breeze will blow over mountains and hills, he will let him do whatever he wants, and the bright moon will shine  Dajiang, he is cruel to himself, he is evil to himself, but I am full of energy.

    This is completely a true portrayal of L, but no one thought that L was actually an employee of Xingkong Group.  Now since l issued this announcement on behalf of Star Group, and his identity was specifically listed in the lower right corner of the announcement, Chief Technical Advisor!  No wonder Starry Sky Group has shown strong technical strength in previous incidents, and now Starry Sky Group is holding various press conferences with these very powerful companies around the world.

    It turns out that the reason is here. Everyone originally felt a little incredible about the cooperation between Microsoft and Star Group. Now Zhang Yang¡¯s announcement has explained this matter.  There is no other reason than that there are experts within the Starry Sky Group!  Looking at l's defense against this system, you can see that l is definitely an expert in the system. No wonder Microsoft eagerly came to cooperate with a little-known company.

    Paramount will buy Star Group¡¯s account, they have experts.  People are like this. When no one has an explanation, they feel that something is weird, incredible, and somewhat unacceptable. When something appears that everyone can accept, everyone will immediately be sure that this must be like this.  of.

    If there is a person who knows everything about Zhang Yang, he will probably choke on his own saliva when he sees Zhang Yang¡¯s announcement.  Shit, so shitty!  Look at this announcement, it's so high-sounding, and it's like pretending to be a good old man, an honest man, a righteous hacker, the embodiment of justice.  And his other ID, gscsd, is a completely random villain.

    With such extreme personalities, who would connect them together?  If you go online and post a post now, l is gscsd, and you will probably be scolded by others. Now Zhang Yang¡¯s two accounts have many fans, but the fan bases of these two accounts are definitely not the same.  Fans of gscsd will call l a hypocrite, and they will shrink back, not a real man, not a real man.

    "L's fans will scold gscsd as a disaster star, a broom star, whoever encounters it will be unlucky, and he is also a super troublemaker. Wherever gscsd goes, there will be countless troubles.  In just a few months since gscsd debuted, how many major things have happened in the Internet world?

    ?????????????????????????????????????????????????????????????????????????????
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report