Chapter 142: After the time entered the new millennium, with the development of the domestic Internet, the threshold for accessing the Internet began to lower, and the threshold for hackers also lowered. The emergence of a group of fool-like hacking tools represented by Dugu Swordsman, even more This group began to spread, and the word hacker continued to appear in the media, creating a lot of hype. Hackers in this period are called the third generation of hackers. They no longer focus on technology, but rely more on ready-made tools. The mess of personnel also makes this group start to become impetuous. The second Sino-US hacker war gave this manic group a blow. Chinese hackers failed to continue their glory in this war. This war became to a large extent a patriotic show in the media. After the war, with the reflection on the hacker spirit and the influence of the hacker spirit, the Chinese hacker group continued to differentiate, and more schools emerged. Even groups in the same camp will further differentiate deeply. The "Green Corps" came from the same division and split into the "Green League" of Yanjing and the "Green League" of Jianghai. It is precisely because of this extreme differentiation that the era of the hacker alliance has gone forever, and has been replaced by scattered small groups. This has resulted in the subsequent Chinese hacker group never having a dominant situation, and it has also never appeared again. Leading figures with strong appeal like Xu Rongsheng and the Chinese Eagles. Zhou Yang has always been very interested in mysterious hackers. Just like Chinese people are curious about legendary martial arts masters, people who play computers are also very curious about awesome hackers. I¡¯m curious about what the life of hackers is like. After sorting out the knowledge in his mind, Zhou Yang turned on his computer. Zhou Yang's computer is a high-configuration computer and runs very fast. After turning on the computer, Zhou Yang directly searched for the word Hacker Alliance on Du Niang. Hundreds of thousands of search information were displayed on Du Niang. Zhou Yang clicked on the first website called China Hacker Alliance and opened the website. The first sentence is to let the world listen to the voice of China. National dignity is above all else. This makes Zhou Yang very fond of this website. In Zhou Yang¡¯s view, any hacker should carry out hacking operations without harming the interests of the country and society. Otherwise, everyone will attack this website and attack that website. Then wouldn¡¯t this society be in chaos? Zhou Yang entered and started browsing, but what was pinned to the top of the website was a message about a virus on the website. The title is "Shocked, hackers use some websites to spread Trojans". It probably means that various rumors have often appeared on the Internet recently, and some underground hacker groups have taken the opportunity to hype up the matter and attract the attention of netizens. Hackers have hacked some web pages that reported this incident and created a large number of Web pages with related topics. Using search engine optimization technology to display these Trojan-affiliated web pages at the forefront of search results, a large number of Internet users are unknowingly infected with Trojan viruses, which seriously threatens the security of users' accounts and virtual property. Wolf Den would like to remind all wolf friends: Cherish life and stay away from door incidents! " Below the post, there are more than ten web addresses with Trojan horses attached. Zhou Yang was a little surprised. Several websites he used to visit were in it. Because news like this happens online every day, all kinds of Scandals or something, so Zhou Yang didn't care which website he looked at. He didn't expect that these websites had viruses. It was obvious that someone was deliberately spreading the Trojan horse and seeking benefits. The anger surged upward. I didn¡¯t expect that today¡¯s hackers would use this kind of news to make money. Damn it, they would actually install Trojans on the website. Don¡¯t you want to install Trojans? I will help you now. Zhou Yang thought in his mind. First, he checked whether his computer was really infected with virus Trojans, and then after completely killing the detected virus Trojans, Zhou Yang began to use the computer power he had just acquired to check the IP addresses one by one according to the URL published at the bottom of the post. Then just link it and shut down everything! " Shutting down is definitely a trivial matter for Zhou Yang's hacking skills. A dozen servers were shut down in less than three minutes in total. But after he finished, Zhou Yang still didn't give up. He returned to the search engine and searched for those photos and closed them one by one like crazy. Zhou Yang's crazy shutdown behavior soon caused an uproar. Some large community and news websites were legitimate after all. Their servers shut down inexplicably. It was not a power outage or a downtime under high load. It must be checked. Fan's. After checking, it was found that there was no hardware failure, no virus infection, no firewall alarm, no abnormality in the intrusion detection system, and no display in the log. Everything was normal! But as long as the server is restarted, it will automatically shut down again soon. Isn't this weird? Could it be that the server will shut down on its own? After several times like this, the network administrators have no choice but to turn to professionals with better skills to check. Some call the hardware provider and ask them to send maintenance personnel; some call the website technicians. Check the server for problems; some call a professional security company to see if there is a hacker intrusion. Anyway, they have tried every trick they can think of. There are dozens of servers shut down by Zhou Yang, some of which are large portal communities. When the news from these servers was gradually compiled together, some people felt that something was wrong. Such a large-scale centralized shutdown of servers was definitely not an accident. As soon as the person who came to check "bobo" came, he quickly concluded that there was nothing wrong with the hardware, the server system was running normally, and there were no traces of hacker intrusion or poisoning. However, the problem still exists. As long as the server is connected to the network, it will automatically shut down soon. The Hacker Alliance has always been a well-informed place, and someone posted this strange thing on the forum for everyone to analyze what happened. A group of senior people researched and discussed on the Hacker Alliance and considered various possibilities, but soon received a reply from the poster, all of which were invalid. Black Noble, a senior member of the Hacker Alliance, is also paying attention to this matter. He has personally experienced this kind of shutdown event without any sign, so seeing the experts on the forum repeatedly coming to no conclusion, he gradually became suspicious of the alliance. Went to the boss's place. "What's the reason?" The black noble is very puzzled. The boss has such advanced technology, but he goes crazy to shut down other people's machines. There must be a reason. The black noble put on Greenleaf's vest and ran into the post to interfere: "I think hacker intrusion is more likely. The other party only shuts down the computer but does not destroy it. It is very likely that they are forcing one party to compromise. I After taking a closer look, I found that the servers where the shutdown occurred were all websites and forums where gossip news was concentrated. I thought it was most likely that these websites reported something that made the intruder fearful or disgusting. I suggest starting from here. Let¡¯s check it out!¡± Ordinarily, Green Grass¡¯s analysis makes some sense, but he was soon besieged by many masters. He was also unlucky. Those masters couldn¡¯t think of any effective method anyway. It¡¯s annoying. They were almost bored to death. When he appeared, he attracted everyone's energy: "With this effort, the hacker will delete the content himself. Why bother letting others guess? Do you think this is It¡¯s hide-and-seek!¡± ¡°The logical reasoning is not rigorous at all. Hackers have to leave traces!¡± ¡°If you don¡¯t understand, stop messing around here. It¡¯s just adding chaos!¡± I felt a little dizzy, thinking that I must have not come up with a good name for my new vest. Green grass is just a small piece of grass, otherwise just a random fart on the forum would attract a group of mad dogs to bite me. He was a little frustrated, so he simply ignored these people and ran to send a forum message to his boss: "Boss, what do you think of this shutdown incident?" On the other side, several underground hacker groups were also in chaos. The trap was set, everything went smoothly, and the server was kicked out of the pot. The problem was that we still didn¡¯t know who the opponent was. In order to snatch profits, these organizations are constantly at odds with each other. At first, they all thought it was their opponents. They picked up the guys and prepared to take revenge, but they found out that they were brothers in trouble. No one ran away, and the servers were all killed. Knocked. ?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????? Everyone couldn¡¯t figure out what was going on. Someone was going to attack their own organization, or there was a more powerful organization that wanted to enter this industry and give the big guys a showdown first! These underground hacker organizations are also full of experts, with eye-witnesses all over the place. Otherwise, they would have been knocked out by network supervisors long ago. Although they only knocked out a few peripheral servers this time, it didn't hurt their muscles or bones, but it was so silent and silent. Someone had formatted the server in the living room, and I still felt a chill running down my spine when I thought about it. For real hacker masters, there are no secrets in this circle. No, soon someone came to the Black Nobles. Some were in security support, and some were in the underground hacking industry. The information was summarized in the two places. The black noble knew that his guess was somewhat relevant. He sent a message to the guy in the hacker industry: "Have you done anything in the past two days?" "Nothing, just like before, when you encounter news that may be popular, you will hype it up." "Damn, no. That's right. Could it be that some expert did this because he got into the website and was unhappy with the virus in his computer? " "It's impossible, the master's machine has this and that kind of thing?Firewall, it is impossible for our virus Trojans to enter the master's computer. "The boss said. "Then it can only be restored to 48 hours ago. If it is still shut down, there is an expert who is unhappy. "Green grass said.