Chapter 180 "Uh, surprise, I didn't know these were you, but you guys should check it out." Zhou Yang said quickly in the channel. The concealment of tracking viruses is actually similar to that of infected bugs, but because it actively tracks other people's data flows, it cannot avoid analysis, and the possibility of its discovery is greatly increased. As long as you are very careful and check it several times, you should All can be found. The hacker war is going on in full swing, and in the lobby of the Cybersecurity Bureau of the Ministry of Security, an old man has been paying attention to this battle. Yes, the reason why the US emperor chose to have a hacker war at this time is because of China An exercise is being conducted in Bohaiwan. This exercise is for the US imperialism. Let's take a look at the influence of the US imperialism in China's neighboring countries. This is also one of the reasons why the US imperialist government organizes hackers to attack the domestic Internet. Of course, there are also a group of experts who are attacking servers on the intranet. If the servers on the military intranet are breached, the losses will be huge. However, the Department of Network Security and other departments dare not shut down the servers on the military intranet. , because whether it is closed or compromised, the commanders who are conducting military exercises will not be able to use the data on any server, and the military exercise must be destroyed. Moreover, the lives of officers and soldiers at sea may be in danger, and the country's losses may be thousands of soldiers' lives and trillions of dollars. Seeing the Chinese defense retreating more and more, the old man who had experienced big scenes for a long time frowned tightly, and the director of network security who accompanied him turned pale. This time, his position as director I'm just afraid it's over. "Is there any way for me to resist the other party's attack?" After thinking for a while, the old man looked at the director of the Cyber ??Security Bureau who was standing next to him. The director of the Network Security Bureau quickly replied: "Yes, we can now contact the masters of national hackers to help us defend ourselves. As far as we know, a master has recently appeared among domestic hackers. The super virus that the U.S. Empire previously released into our country has Bai was eliminated by this master in three days. According to our estimation, his strength ranks among the top five in the world. " "In that case, contact him quickly. Since he is from our country, he will definitely help him. Busy." The old man said without hesitation. No matter what, nothing can happen to the server of the military intranet, otherwise China will be embarrassed. ¡°This matter has not been announced before because the experts from the Cybersecurity Bureau felt that they could withstand the other party¡¯s attacks. But I didn¡¯t expect that the US imperialism would organize so many people to attack the military intranet server. So now, the old man has to seek help from experts in society. "In addition, let the comrades of the Security Bureau find some hacker masters to help. The number should not be too many, but they must be masters." The old man added. The director agreed and quickly went to do it. "If you delay for one more minute now, the server of the military intranet will be in more danger." But Zhou Yang didn¡¯t know all this. At this time, Zhou Yang was tracking. Just when the Smurfs and the others were checking their tails, four of the eleven data streams tracked by Zhou Yang discovered the tracking virus almost at the same time. Zhou Yang followed one of them without hesitation. It is easy for someone to get rid of the tracking virus, but it is not so easy for Zhou Yang to keep up with him, because Zhou Yang has already experimented with these people's honey pots and various traps. His firewall can completely block these things. So Zhou Yang is now like the legendary Changshan Zhao Zilong, running rampant on the Internet, and the infection bug spread through the telecommunications server has infected almost all the computers that are powered on in the country. Although most of the users in the north are Netcom, Telecom There is a conversion server between China Netcom and China Netcom, and there is no way to stop the crazy infection of infection bugs. You must know that a fully activated infection bug has an extremely terrifying ability to spread. It is not like an assassin virus. After hanging on a website, only people who click on this website will be infected. After infecting a computer, the infection bug will automatically split and then spread through any data flow flowing out of the computer. These data streams can be emails, files you send to others, or after detecting a new IP address. It will automatically replicate and spread. Virus technology that far exceeds the current technology makes the infection ability of the infected bugs simply described as abnormal. Although the data flow tracked by Zhou Yang has many broilers in the country, these broilers are all covered by Zhou Yang's infection. With the backdoor opened by the infected bugs, Zhou Yang invaded his broiler chickens without any effort. This man frantically dropped all kinds of traps, but Zhou Yang simply ignored them. Each broiler chicken was directly attacked by Zhou Yang, but this man simply ignored it. Can't get rid of ZhouYang's pursuit. In just a few minutes, this man lost more than ten broiler chickens. These ten broiler chickens were spread all over the country. Finally, the eleventh broiler chicken left the country and jumped to the Japanese country. However, the Japanese country was not immune at the moment and was infected with the insect. The spread of viruses has no national boundaries. Even the transfer servers of submarine optical cables have been completely covered by Zhou Yang's virus. Therefore, although the infection in Japan is not as scary as in China, it has already been infected to a considerable extent. It is impossible for all of the more than 10 million computers to be domestic. Soon, Zhou Yang who was following was blocked by a powerful firewall. Zhou Yang quickly searched for the IP, and his eyes immediately lit up. It should be the opponent's first-class broiler. I didn't know that such a first-class broiler existed. Several of these guys had similar ideas to Zhou Yang, and used the server of the Japanese National Defense Agency. I tried checking and found that there are also infected bugs in the servers of the National Defense Agency. However, this kind of large server is different from ordinary broilers in that its firewall and preventive measures often have several layers. Even if there is a backdoor, you can hack it. After entering the system, there are technicians waiting inside. But even so, Zhou Yang did not hesitate and started to crack into the system through the backdoor. Just halfway through, Zhou Yang was directly discovered by the firewall and blocked and kicked out. "Damn, this beast is so ruthless." Zhou Yang couldn't help but cursed. The security strength of the firewall suddenly increased. It was obvious that the other party directly alerted the security personnel of the Defense Department. ??MLGBD, after hesitating for a moment, Zhou Yang didn¡¯t say anything, and directly used the same trick he just used to attack the National Computer Emergency Response Center, a DDOS attack! Although DDOS attacks are the attack methods of barbarians, they are just like those who practice martial arts with natural supernatural powers. When the power reaches a certain level, the skills no longer work. At this time, it is perfect to use DDOS attacks. There are more than 15 million zombie computers, many of which are large servers. Although there is a delay through submarine optical cables, such a large and huge data flow is used by the Defense Agency server at once. when. The server of the Japanese National Defense Agency immediately looked like an Alzheimer's patient who had been hit by a slowing technique. The reaction speed was extremely slow. Zhou Yang took the opportunity to directly get into the server of the National Defense Agency. As soon as he entered the server, Zhou Yang discovered that the response speed of these technicians was good, and a backup server had been prepared there. There are almost no secrets in the hacker circle, especially such large-scale intrusions are easy to detect, so Zhou Yang almost tracked the hacker to the perimeter of the defense agency's server, and most of the domestic hackers immediately knew about it. . Including GOD and the others, although the domestic hackers didn't know which master took action, they were all screaming with excitement while sitting in front of the computer. What is awesome? This is awesome. If you don¡¯t take action, it will be a blockbuster. The hackers who were making trouble in the country just now were driven out almost instantly, and they were even chased to other people¡¯s territory. Since these hackers are organized, they must be quite familiar with each other, so Zhou Yang is not afraid of others slipping away, as long as he catches this one. Under Zhou Yang's instant DDOS attack, it was impossible for the other party to clear all the traces and there was no time. If he was not afraid of exposing his position, then he would never take advantage of this opportunity to leave, but would instead help the Defense Department. of security personnel guarding the server. Only in this way will he have the opportunity to remove all traces of him from the Defense Agency server. Otherwise, it will be useless even if he leaves now. With the traces of invasion he left behind, Zhou Yang could easily follow the clues and touch them. Zhou Yang was doing something special here. Many hackers who followed Zhou Yang to Japan immediately set their sights on other websites in Japan. Although they still paid attention to this place, none of these hackers came to participate. Everyone had a tacit agreement not to do so. Preventing the master from taking action is just like in a costume TV series, when the hero takes action and the little people next to him can only watch. After entering the server of the Defense Agency, Zhou Yang instantly activated the hidden ability of the infected virus here. After the infected virus infects other computers, it will automatically destroy other viruses in this computer, destroy the firewall inside the system, and delete Data, etc., but Zhou Yang only used infection bugs in China to find these people, so he turned off all functions related to destruction. But here, it is not necessary. Zhou Yang has never had a good impression of this country, or in other words, Zhou Yang has no favorable impression of any other country. In this world, it is true that whenever his own country becomes stronger, other countries The country is all bullshit. Countless history has proved that there are only interests between countries, and there can be no alliance or friendly relations. Even if the two sides are allies one second and have enough interests the next second, it is possible to directly throw a declaration of war into the country. on your face. ?PS: At the beginning of the month, please vote for me! ! ! You should have a monthly vote at the beginning of the month. If you can, be sure to vote for this book! ! ! Sickle is grateful!