Chapter 145 I don¡¯t know if you have ever played random pressing on the keyboard. Zhou Yang also saw such a funny thing on the Internet. That is, if you press the second row of keyboard letter keys from right to left, the number displayed will be open chrysanthemum, attack and defense are all love. That¡¯s why Zhou Yang used such a row of numbers when applying for an account. It can be considered a prank! ??????????????? Zhou Yang has come to his senses now, and after thinking about it for a while, Zhou Yang did not log out of the forum, but directly opened the backend of the Black Alliance Forum to see what the system messages were. Looking at it, sure enough, the message just prompted was not a system message at all, but someone sent him a site text message. Zhou Yang looked at a few randomly, and they were all very boring information. Zhou Yang directly deleted them all. When he saw two of the messages from the forum administrator, Zhou Yang clicked on them. "Hello, I am King, the moderator of the Chinese Hacker Alliance Forum. Can you add me as a friend to chat?" The other party sent this message several times, all of which are exactly the same. Zhou Yang thought for a while and did not reply for the time being. Instead, he used computer technology to quickly build a firewall and a scanner. The firewall made by Zhou Yang is definitely a very good firewall. Strictly speaking, this is more than just a firewall. When writing this firewall, Zhou Yang was thinking that current firewalls are all passive defenses. Can he combine firewalls with viruses, so that the firewall has the characteristics of viruses, and proactively clears threatening access to his computer? behavior or process. Well, this is a bit of a prank. Viruses are definitely the best choice for sinners, especially in a world where computers are almost integrated into everyone¡¯s lives. Many people know about computer viruses, but few people know what a computer virus is. Computer viruses can quickly spread through computer networks. Reproduce, and through mutation and hybridization, quickly gain certain system control through system loopholes. The perfect virus should first have the ability to reproduce on the network and integrate the ideas and technology of artificial intelligence. At the same time, the perfect virus must also have a distributed structure and a mother-child structure. In other words, when the mother virus is detected, it will release a more destructive or more covert sub-virus program. At the same time, a perfect virus needs to be able to hybridize, mutate, and exchange genetic information with the same mutated virus. Thereby further improving one's own program, making oneself more hidden and more destructive. ¡°The firewall written by Zhou Yang can be said to have the most advantageous aspects for hackers. The most important thing for a hacker is not how sophisticated you are at invading enemies or how powerful you are at writing viruses. The most important thing is that you can hide yourself. Zhou Yang does not think that he is now the most powerful hacker in the world. You must know that there are people outside the world, and who knows how far the most powerful hacker technology in the world has developed. So in order to avoid being discovered by others one day. So Zhou Yang wrote a virus to infect his computer. The virus Zhou Yang deliberately wrote was very overbearing. Whenever it infects a machine, this virus will automatically search for other viruses in the machine. Once found, it will Destroy and kill these viruses first, and then reside in the hard disk. Of course, this is not the most important feature. The most important function is that when a foreign program sneaks into the system, tries to gain control of the system, or tries to release a virus to the computer, this virus will mutate. It will release two sub-viruses. One highly concealed sub-virus will automatically track the intruding data flow, while the other sub-virus is a mutated virus developed by Zhou Yang based on the genetic map of the Ebola virus. The variability of this virus is completely based on the genetic map of the Ebola virus. If others don¡¯t know the mutation rules of this virus. Then he is out of luck. This virus is a straightforward anti-tracking infection. Even if you can find it, you can't kill it. Later, Zhou Yang adapted many functions based on this virus, and slowly this small firewall finally took shape. Soon the peripheral functions of the firewall were basically completed. What remains is the core program of this firewall, the super virus. Strictly speaking, the mother program of this super virus is a shell. It can be classified as a benign virus. Just like human tumors can be malignant or benign, the virus itself is harmless. Even because Zhou Yang used this virus for himself, its loss of system functions has reached a very small level, occupying 20% ??more space than an ordinary firewall.The system resources of ?? are few, so Zhou Yang used the genetic map of the Ebola virus to write the virus on the surface as the mutation law of the virus. But for the highly concealed virus, Zhou Yang The genetic map patterns of HIV were used as mutation patterns. ¡°However, Zhou Yang still doesn¡¯t know if the genetic maps of Ebola virus and HIV virus have been discovered yet, but the basic computer technology transmitted to Zhou Yang¡¯s mind through the lottery system is very impressive for these two viruses. Because of these two viruses, it took Zhou Yang more than two hours to complete the firewall. After completing it, Zhou Yang directly installed the firewall on his computer. The Linux system Zhou Yang installed was downloaded from the Black Alliance Forum. It was written by someone else, but he hadn't had time to change it to his own system. After writing the firewall, Zhou Yang began to write the scanner program. The program of the scanner is very simple. The scanner and the firewall are integrated so that when someone else invades your computer, the scanner will scan it immediately and issue an alarm. Then the firewall will initially intercept it. If the other party wants to forcibly When it is deemed that it has gained control of the system or when it attempts to release a virus to the computer, the two viruses above will be released by Zhouyang's firewall. Zhou Yang quickly programmed the scanner. After installation, Zhou Yang ran the firewall and scanner, and selected the function of searching for viruses. In fact, he let his own virus infect his system first. There is a big difference between the files infected by viruses and the files in the system itself. Even the files disguised by viruses that cannot be found by some anti-virus software are different from the files themselves. It is easy to find which ones in the process of the same virus infection. The file is infected. Theoretically, it¡¯s impossible for Zhou Yang¡¯s virus-searching function to slip through the firewall. Because it was a newly installed system, there were almost no redundant files, and the search progress bar soon came to an end. Zhou Yang was actually just doing a check. When he just created the system, he logged into a black alliance forum, so there could be no virus. The firewall check was completed and no virus was found. Zhou Yang breathed a sigh of relief. After finishing all these, Zhou Yang responded to the forum system message he had received before. After thinking about it, Zhou Yang applied for a QQ account and then sent the account to king. "Damn, the master sent me a message back!" King suddenly screamed in the channel. Originally, King sent those messages based on the principle of preferring to kill by mistake rather than letting go. Unexpectedly, the master actually responded. , when the king shouted, everyone in the channel became excited. People like them would not be so excited when they meet those rich people. The only thing that can make them excited is the god-level figures in this field. "Holy shit." King couldn't help shouting again after seeing Zhou Yang's reply. "What's wrong?" Others were a little curious and asked all kinds of questions. "It's nothing. It turns out that the great master still uses QQ. I'm dizzy." King was a little speechless. It seemed like a chat software full of loopholes. King couldn't figure out how the great master could use QQ. "QQ?" Others in the channel were also a little confused. No one thought that this expert in their eyes would actually use QQ. People like Du Yu disdain to use spam chat tools like Penguin. For hacker communication, friends all have their own chat software, which is not very popular. Familiar hackers usually communicate with each other through email, but there are still very few people who use QQ, at least I have never seen a few of them. Because Penguin is full of loopholes for hackers and it is easy for people to find information, so they use their own chat software when chatting. "High!" Suddenly, Zero slapped his thigh and shouted. "What's wrong?" Everyone was a little confused. Zero couldn't wait to say: "Think about it, people like us disdain to use junk chat tools like QQ, but great people like lkjhgfdsa still use it? Why, junk software has the benefits of junk software? Think about it, this is like the super masters in martial arts novels. Real masters look like ordinary people from the outside. People like us use the chat software we made. Others will know us at a glance. He is a hacker, but no one would have thought that a master like lkjhgfdsa could actually play QQ, so even if someone saw lkjhgfdsa using QQ to talk about something about the hacker world, everyone would think that he was bragging, no. I would think he is a real hacker." With Zero's analysis, a group of people in the channel immediately realized that if Zhou Yang knew that there was a group of hackers here who had triggered such a lot of comments because of his use of QQ, they would probably be narcissistic. The reason why Zhou Yang launched QQ was entirely because he hadn't had time to write it yet.I have my own chat software, so I use Penguin.