Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume 1 Chapter 453 Being followed (Part 1)

Previous page        Return to Catalog        Next page

    Chapter 453: Being followed (Part 1)

    Chapter 453: Being followed (Part 1)

    Zhang Yang has already moved the server that was placed in the school here. There was no place to put it in the house where he lived last time. Now he has enough space to save the server.  While eating fried dough sticks, Zhang Yang turned on the server. In fact, now Zhang Yang is no longer afraid of others knowing these things. After passing the most dangerous stage in the early stage, for Zhang Yang, the danger is now over.

    l¡¯s identity has been spread, and some key people know it, so it is natural that Zhang Yang¡¯s family has these devices.  As for the ID of gscsd, with the existence of infected bugs, sometimes Zhang Yang can create the illusion that gscsd and l appear in different places at the same time with just one command, and no one can doubt him.

    Not even anubis would have thought of the existence of infectious bugs, let alone others.  The reason why Anubis couldn't think of it is because after so many years of hard work, Anubis knew how difficult it would be to achieve that result. If it were that easy, after spending so much manpower, material and financial resources over the years, Anubis would have done it long ago.  Got it done.

    Even if they were beaten to death, they would not have thought that the Adam System in their mouths would eventually mutate into this way with a virus written by Zhang Yang. This situation is accidental and cannot be repeated at all.  Even if we rebuild the Adam system now and then re-infect it with the virus, the final result may not be like this.

    Sometimes miracles are born from the combination of countless accidents, so if you want to buy a server or a supercomputer in the future, you don¡¯t have to be secretive anymore. Master, I run a computer company. Oh, no, Master, I am a complete  As the technical director of a world-famous computer company, there is nothing wrong with him wanting to buy some servers, right?

    After finishing a fried dough stick, the server started successfully. Zhang Yang took a sip of soy milk, then directly entered the hidden backup system and connected to the infected system.  Zhang Yang quickly retrieved all the information recorded by this tracking strategy from the system log of the infected bug.

    Since the emergence of anubis in this life, Zhang Yang has subconsciously put in various tracking strategies when he was catching broilers. After each placement, all contact information will be placed in the firewall. After the infection system is established, these  Everything was handed over to the infected insects.

    Zhang Yang catches different broilers every time, so until now, Zhang Yang doesn¡¯t know how many honeypots he has placed. Placing honeypots everywhere is very beneficial!  This is like a rookie hunter and an experienced hunter going hunting in the forest. Although the experienced hunter will place traps on the only path of some prey based on his rich experience, this will greatly increase the chance of the veteran hunter getting the prey.

    However, although a rookie hunter does not have as much experience as an experienced hunter, he can place traps everywhere in the forest. An experienced hunter may only be able to catch prey by placing five or six traps, but a rookie hunter can definitely place hundreds of traps.  If you set up a trap, I don't believe you can't catch the prey.

    With anything, once the base is large, there will always be gains, and sometimes, not only will there be gains within your goals, but there may be unexpected gains.  For example, Zhang Yang would rather kill a thousand by mistake than let one go. He now uses a combination of old hunter and rookie hunter methods. He will habitually throw a bunch of honey pots into any broiler he has invaded, and the honey pots will  No information will be exposed, and there is no need to clean these honeypots when exiting the broiler to clean up traces.

    Now Zhang Yang is very sad to find that he seems to have caught an unexpected surprise!  What this guy is looking for is not gscsd, L, or Star Group. He is looking for God. And judging from the information captured so far by this tracking honeypot, this person has obviously found some government information left behind by God online.  and traces, very efficient when looking for them.

    From this search engine, he not only searched for god, but Zhang Yang also found that he searched for some websites commonly used by god and others. For example, the chat room website was also included in the search scope.  In fact, Baidu's functions may be worse than Google's, but it is definitely not as bad as it appears on the surface. The fundamental reason is that Baidu has turned off many functions!

    But these things can also be found in its server. Zhang Yang doesn't know what this person is looking for, but it can be seen from his search method that he seems to have some evidence in his hand, and then searches for these things.  Things will be able to get god's geographical location.

    The tracking honeypot has not tracked the actual location of this person, but Zhang Yang found that the tracking honeypot followed this person's data traffic and seemed to track several god-controlled broilers, especially two of them.The broiler chicken has a very obvious God style.

    Zhang Yang knew God very well in his previous life, so when he saw these software and firewalls, he was instantly sure that these two first-level broilers definitely belonged to God.  "Damn it, who is targeting this guy God? Why are you so careless?" Zhang Yang touched his chin and couldn't help but screamed twice in surprise.

    God¡¯s prowess is clear. There seems to be no news of God being tracked in my past life. But to be honest, with this person¡¯s current search method, God¡¯s real IP address will probably be found soon.  "Is there any way for the infected bug to locate the specific location of the person who invaded these two servers through the current broilers?" Zhang Yang couldn't think of a way, so he tentatively asked the infected bug.

    The function of the infection bug is like a huge reserve library. Because it was not designed by Zhang Yang, Zhang Yang has no idea what functions it has. Although the infection bug is said to have logical analysis capabilities, it is only a program after all, not a person. If  If you don't use these functions, it will not actively "tell" you.  But it would be too unreliable for Zhang Yang to understand all the functions of the infection bug.

    It¡¯s not that there isn¡¯t a detailed catalog explaining the functions of the infection bug. This thing exists, not only does it exist, but it is also very comprehensive. But unfortunately, Zhang Yang once checked it out and was frightened by the millions of catalogs.  .  If you look at it one by one, he is old and has nothing to do anymore.  The people at Anubis are perverts. They probably want to test the Adam system and want to know where the problems are in the Adam system, so they have made detailed records of every small function.

    ¡°If you have studied this system for several years, or more than ten years, that¡¯s fine, but if you are a stranger and suddenly want to understand the functions of this systemwell, the catalog will kill you.  That's why Zhang Yang still has no way of knowing exactly what the infected bugs can do, and can only discover them during use.

    "Theoretical data can be obtained by searching the hacker habit database, passing through the other party's existing broilers, and then performing multiple calculations and analyzes through global triangulation and delayed data transmission of network data." The infection bug quickly gave out  An answer that Zhang Yang didn't even expect.

    "Hackers are used to databases?" Zhang Yang chewed subconsciously. Hackers are humans, not gods.  Theoretically, a perfect hacker should have no common IDs, no common passwords, everything should be random, there should be no frequently visited websites or forums, and he should not expose his identity or be impulsive for anything.  Nothing in reality is substituted into any commonly used network data.

    But is it possible?  Unless this hacker is a machine plus god, otherwise, it is impossible to even think about it.  As long as you are a human being, you will have habits. Even if you pay attention, there will be some habits hidden in your subconscious that you have not discovered.

    And these habits will leave you with clues. Take Zhang Yang as an example, after two lifetimes of rebirth, he will be forty years old in total, right?  But there is still some impulsiveness, there is still some anger, why?  Things within one's bones are sometimes unavoidable. In addition, Zhang Yang was basically an otaku in his previous life and had no experience in society. Where can he mature?

    People¡¯s maturity always comes from struggling in society and experiencing countless setbacks and hardships before they become mature.  Zhang Yang also read some novels in his previous life. A protagonist in his twenties was reborn and returned to more than ten years ago. Then all of a sudden, a young man with a blank head became more thoughtful than a ten-year-old man.  Thoroughness requires sophistication. Isn¡¯t this nonsense?

    Can the maturation process of thought be calculated by time superposition?  Besides, some people have a flamboyant personality and don¡¯t want to change it. Angry youths can be angry youths, and impulsiveness can be impulsive. After 80 years, everyone will die. Could it be that they have been reborn? Can¡¯t they still live like their own names? If they are more flamboyant, it will be  Isn't it tiring to be considerate, tolerant, and to be sure of everything?

    Such a rebirth is a waste of time. Instead, you will live more tiredly than in your previous life.  So when he heard the term infected bug, Zhang Yang was a little stunned, "Does it exist in your database?" Zhang Yang asked tentatively, and Zhang Yang suddenly remembered that with the abnormality of anubis, although the Adam system has not reached what it is now  Although it is infected with bugs, even if the Adam system is in an incomplete state, its analysis capabilities are stronger than ordinary systems. Is there any reason not to use anubis?

    "Please enter the hacker ID that needs to be retrieved." The infected bug did not answer yes or no, but directly gave a sentence. After Zhang Yang was stunned for a moment, his face suddenly filled with ecstasy.  I¡¯ll just say it!  How could those perverts not build something like this?  For anubis, hackers all over the world are basically their enemies. If you want to defeat your enemies, you must know yourself and your enemy. People at anubis must know this.
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report