The Strongest Hacker

Chapter 159 gscsd and Zhang Yang (Part 1)

Chapter 159 and Zhang Yang (Part 1)

Chapter 159 and Zhang Yang (Part 1)

When Zhang Yang returned to the dormitory, Li Keqing was already waiting in his room. Seeing Zhang Yang coming back, Fang Shaoyun, who was packing up his things, said quickly, "I've seen it. There is no problem with assembling these things. The next step is the grassroots control core. There is no problem with the chip assembly of this kind of remote control car."

The three of them disassembled the bought toys into a pile of parts, and Fang Shaoyun quickly connected the dismantled chips together. It has to be said that Fang Shaoyun, an animal, is about to turn the dormitory into a laboratory, and he has all kinds of tools. "In this way, put these chips together. The program in this chip is responsible for receiving signals and can be remotely controlled. These chips are responsible for self-judgment. You can handle the program yourself. As for how to burn, you and I Come."

After connecting everything, Fang Shaoyun quickly took the chip and walked into Zhang Yang's room. "These chips are the simplest single-chip microcomputers. In theory, the programs in them cannot be changed, but you can just overwrite them directly. You don't require high precision anyway." While explaining to Zhang Yang, Fang Shaoyun connected a serial port cable to Zhang Yang. After receiving the download circuit of the chip, quickly connect the other end to a square box, and the other end is a USB cable.

"That's enough?" Although Zhang Yang has learned a lot of hardware recently, the hardware knowledge is still a bit too advanced for Zhang Yang.

"No problem, you should be able to search for it when you turn it on. I made this box myself. Otherwise, you won't be able to recognize it if you plug it directly into your computer, but the burning speed is a bit slow. As for the appearance, the two of you Make it up on your own, I won't participate." Fang Shaoyun nodded and said.

"Uh, okay. Well, do you know how to do that?" Zhang Yang pointed to the rest of the work, Li Keqing nodded, and said with a smile: "When I was often locked at home by my mother, I liked to dismantle things to play with." , It’s no problem to assemble these things.” Taking the screwdriver and other tools handed over by Fang Shaoyun, Li Keqing quickly began to disassemble these external parts.

"Then I'll write the program." Zhang Yang quickly turned on the computer. In the server that Zhang Yang bought, there are two systems installed, one is the system that Zhang Yang uses himself, and the other is the disguised XP. Because there are enough hard disks in the server, Zhang Yang used half of the high-speed hard disks to install the system. When the computer is started up normally, the system is hidden. Disguising the system is a function of Zhang Yang's own firewall.

At the same time, this firewall has another function, which is similar to the function of clearing user data of the assassin virus. The difference is that the clearing function of Zhang Yang's firewall is more powerful, and it can instantly clear all hard disk data within ten seconds. It cannot be recovered completely, but the damage to the hard disk is particularly large.

This function is actually available on every hacker's computer. If you are not afraid of 10,000, you are afraid of it. As long as you can be called a hacker, you can say that you have done some illegal things. to remove evidence. The difference is that each hacker has different techniques and different methods of clearing evidence.

Like Zhang Yang, it is no exaggeration to say that even if Zhang Yang does not operate this computer, if it falls into the hands of other hackers, nothing abnormal will be found. After the server is turned on, the hidden program starts to run, and it automatically logs in to the XP system. There is no other way to invoke the hidden system except for the command set by Zhang Yang.

Moreover, Zhang Yang imitated the American military system in his own system, and added a hidden judgment setting to all the software and systems used by Zhang Yang, just like the DNA information of any part of a person's body is the same,

And Zhang Yang is the software he uses, and the system has added such a "DNA" that runs through all his programs.

If someone else operates a computer and conducts an illegal search, but there is no corresponding "DNA" match, the hidden program will immediately execute the operation of destroying all data. This function is available in any program that Zhang Yang has used, so Zhang Yang is not afraid of others checking his computer at all.

As for what this "DNA" information is, it can be set up casually. It can be a string of characters, a string of English, or a command, or something else.

It's just a simple programming. Zhang Yang didn't enter the system, but just wrote it under the XP system. When Zhang Yang and Li Keqing were assembling the robot, thousands of miles away, the atmosphere in a room was somewhat dull.

"...This is about all the information we have collected since our debut." After a major in a green military uniform saluted, he put a thick stack of documents on the desk in front of Black Eagle.

This room is not big, about 30 square meters, and there are only three people sitting in the room, one is Black Eagle, and the other is a middle-aged man in his forties, who is also wearing a military uniform , the difference is that he is carrying a golden star on his shoulder.

If someone could retrieve all domestic information, they would find that the major general in front of him did not exist at all.

"It's better for you to tell me, when will I be able to finish it when it's so thick." Hei Ying said helplessly.

"Yes" the major immediately took out the documents in front of Black Eagle after standing at attention with a "snap", and chōu the top one first: "We have searched all the domestic telecommunications, Netcom servers, and All broadband users are matched with the IPs that appear, and after computer analysis and retrieval, we can be sure that I am in China.”

"Domestic? Do you dare to expand the range?" Black Eagle rolled his eyes.

"This is already the largest information we can get in the shortest time. Do you think the Military Intelligence Bureau opened it for your family? This time, it also gave you privileges from above, so it is possible. This information is the entire military intelligence bureau. You should at least listen to the results of the collective analysis of the 378 serving staff members of the bureau before drawing conclusions." The major general rolled his eyes and said calmly.

"Let me listen carefully, can't I listen? I'm not in a hurry." Hei Ying was a little depressed. Strictly speaking, the Military Intelligence Bureau does not exist except in some "internals". The Ministry of National Security is responsible for commanding the entire intelligence department.

But the Military Intelligence Bureau is a bit special. This so-called bureau, no matter what you do, you can never find it in the country, nor can you search for it. For example, the U.S. government and intelligence departments have their own division of labor, (the FBI) ​​is in charge of the interior, (the U.S. Central Intelligence Agency) is in charge of the exterior, and several other departments such as the NSA (National Security Agency) combine the two Big intelligence organizations restrict each other.

The situation in China is different. The Ministry of Public Security assumes most of the similar responsibilities, while the Ministry of State Security is more like a combination with the NSA.

It is no exaggeration to say that the Military Intelligence Bureau is an intelligence organization among the intelligence organizations, and it is directly responsible to the General Staff. The coming large and terrifying staff

The IQs of these combat staff officers are definitely over 140. How much intelligence data does a huge intelligence department have? It is the duty of this staff department to analyze the required information from the terrifying amount of data. Different from the combat staff department under the general staff, the one directly under the general staff is responsible for specifying strategies and tactics. In other words, the staff department is responsible for how to command the army to fight

And this staff department, they don't care about fighting or anything else. What they have to do is analyze intelligence. In terms of intelligence analysis, these people are definitely stronger than anyone else. If people are scattered to work in various public security bureaus across the country, the rate of solving crimes across the country may increase by at least 300%.

What Zhang Yang didn't know was that he had already alarmed arguably the most elite intelligence department in China after entering the black list.

"You continue." The major general waved his hand to signal the major to continue reporting.

The major nodded, and quickly pulled out the second piece of paper, "In the second step, we conducted an all-round analysis of what he did, and finally concluded that his gender should be male, and his biological age must not exceed two years old." Fifteen years old, with slight nationalist tendencies, quite mature in mental age, very calm and comprehensive in thinking about issues."

"Third, we analyzed and retrieved all the incidents that occurred after the emergence, and at the same time analyzed the characteristics of the hacker data filed by the National Security Network Supervision Bureau. During the National Day, that is, the incident of Colonel S huāmén that happened just a few days ago came from this person. hands." Watching the major put the third document on the table, Black Hawk was shocked.

To be honest, although Black Eagle had heard that the Military Intelligence Bureau was abnormal before he declared this order, he never expected that it would be so abnormal. In less than two days, he got so many Information. "How did you come to this conclusion? After all, he was the one who left his name on the Internet at the time, and I asked him personally, and he didn't deny it." Black Hawk asked curiously.

"Comparing behaviors, although hackers are only people on the Internet, they are still human in nature. As long as they are intelligent creatures, they will have their own unique behavioral characteristics. It is useless to pay attention to them. This is due to the nature of intelligent creatures. Instincts in human beings, even single-celled animals have this kind of behavioral characteristics. As long as they analyze these, it is not difficult to draw conclusions. We have demonstrated that the possibility of doing this is more than 89.36%. The possibility of doing it is less than 10%." The major's facial expression did not change at all, as if he was talking about an irrelevant matter.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like