The Strongest Hacker

Chapter 389 Iron Pants (Part 1)

Chapter 389 Iron Pants (Part 1)

Chapter 389 Iron Pants (Part 1)

Zhang Yang doesn't know if the people on the black server are nubi people, but judging from the opponent's offensive methods, the strength of this group of people is definitely not low, but fortunately, the opponent has no signs of cooperation for the time being. Each fights. But even so, the efficiency of the opponent's intrusion is very high. Even if the infected insects are helping to defend, the firewall has been greatly improved, and the system's response speed and efficiency are still unable to stop the opponent from advancing.

Looking around, Zhang Yang saw an Internet cafe in the distance, and Zhang Yang immediately ran to the Internet cafe. By the time Zhang Yang ran to the Internet cafe, the peripheral system of the server had already been breached by the other party. Zhang Yang quickly turned on a computer, Chapter 389 Iron Underpants (Part 1) After turning it on, Zhang Yang directly used his mobile phone to give instructions to the infected bug, first find his own i, and let the infected bug directly log in and connect to this computer.

Although the system of the Internet cafe is also an overall system of virtual hard disks, the firewall of this Internet cafe is basically a piece of garbage, and the infected bugs easily entered the internal system of the Internet cafe. With broiler chickens infested with pest control, Zhang Yangsheng himself re-logged into broiler chickens. Quickly logged into the background of the Star Group's server through his backdoor account, Zhang Yang directly began to search the hidden space of the server's hard drive.

Although Zhang Yang didn't set up a great firewall and defense system in the server system, the Star Group's server still has a brood prepared by Zhang Yang in advance. The brood is embedded in the system by Zhang Yang, and it is usually hidden in the hidden partition that Zhang Yang deliberately created independently in the hard disk of the server, and is in a dormant state.

However, although it is in a dormant state, it will automatically record all legal operations of the entire system, as well as the changes of every file in the system, which is equivalent to a system backup, but it is different from the system backup in that the brood does not It is not a complete restoration of the system, but all normal operations of the system are recorded, and at the same time, all illegal operations and accesses are closed.

Quickly found the brood that he had hidden, and Zhang Yang activated the brood directly. After Zhang Yang activated the brood, the entire server system came to a standstill. When the brood restores the system, it will reject all operations, including the highest authority, which means that Zhang Yang can't stop the brood now.

The data in the entire server immediately began to change rapidly. The brood recovery system is different from other recovery systems such as one-key restore. The brood recovery is only the changes made by the system through commands issued through illegal hacking, which is normal. The operation will still be in a normal state, because the mother nest has been recording everything that the system is running, and it is at the bottom level, and there is no way for other people to stop the operation of the mother nest.

Soon the Star Group's server returned to normal, and all the accounts logged into the system were kicked out by the brood.

The only thing left is that Zhang Yang's own account can still remain logged in. After the mother nest finished restoring the system, Zhang Yang immediately copied his scanner to the Star Group's server.

Zhang Yang immediately began to patch the system, and turned on the protection function of the brood to the highest level. Now it is almost impossible for any access to enter Star Group's server illegally. Originally, there were a lot of people paying attention to Star Group and Microsoft's press conference today. When Star Group's server was attacked, most of the hackers who watched the webcast immediately discovered it.

Because of the press conference, Chen Xiaowei and the others used Star Group’s system to transfer part of the data to play on the spot. Someone logged into the server at the venue. When the server was attacked, almost anyone who wasn’t a computer novice could watch it. come out.

So seeing that the hackers were about to invade the Star Group's server, who knew that the situation would change a hundred and eighty degrees in the blink of an eye. Although they don't know who made the move, all the hackers now know that there is definitely someone in the technology department of the Star Group. Even if this expert is not an employee of the Star Group, someone in the Star Group definitely knows it.

Otherwise, when the hacker is about to obtain the highest authority, the other party can easily drive everyone out at once, but why does this style feel so familiar? All hackers have a familiar feeling, especially this kind of straightforward way of driving people away like dumplings, why does it feel like they have seen it somewhere before?

Almost all hackers feel this way, but they can't communicate with each other, so they don't know what other people think. If they feel like this, no one will say it. After driving all these people out, Zhang Yang started to wander around quickly in his head, the exposure of the brood was inevitable.

As long as you are an expert, you can feel it from the firewall rejection. It is exactly the same as the last time Zhang Yang used the id of l to help defend more than 20 websites. It is estimated that hackers will contact l soon. . Thinking of this, Zhang Yang quickly made a decision. Anyway, when he used the ID of l back then, Zhang Yang didn't plan to hide it at all. GD is enough for doing bad things. As for l, hehe.

Zhang Yang thought about it, and immediately wrote a new announcement and posted it on the homepage of Star Group's official website, and put it on top in bold in red. "The Star Group's server was hacked just now. All the staff of the Star Group's technical department here are deeply sorry for the loss caused to our customers. Now that the server has returned to normal, we are confident in protecting the safety of all Star Group users." In this announcement The signature on the lower right corner reads: Star Group Chief Technical Advisor: l!

There are a lot of hackers who are paying attention at the moment. When everyone saw the latest announcement from the Star Group, everyone was stunned for a while, and then couldn't help but uttered in front of the computer: Damn it! l? ! Everyone rubbed their eyes vigorously, and after confirming that they read correctly, everyone was in an uproar again. If the id of this l was mentioned a month or two ago, maybe no one knew it.

But now I dare not say that l is very famous in hacker circles all over the world, but in the hacker circle of China, he is definitely quite awesome, almost on the same level as gd. No one can forget that during the Sino-US hacker war not long ago, more than a dozen government departments were invaded by hackers at the same time. He supported the defense tasks of more than 20 websites by himself, but kept many hackers out of the firewall.

And gd, who is as crazy as l, even hacked the official website servers of the four major intelligence agencies of the United States by himself. That's quite a tacit understanding. Just now everyone saw that Star Group's server suddenly became extremely powerful defense, kicked out all the hackers at once, and felt very familiar. After seeing the id of l, everyone suddenly realized, no wonder it is so familiar Well, isn't this the style of l last time?

It's just an iron underpants, do you want to enter? Then you come, no matter what method you use, anyway, you can't invade, just like the formula in the old man Jin's book, he will be strong by him, the breeze is like a mountain, he will let him be strong, and the bright moon will shine Dajiang, he is self-ruthless, he is self-evil, and I am full of sincerity.

This is completely a true portrayal of l, but no one thought that l was actually an employee of Starry Sky Group. Now that l made this announcement on behalf of Starry Sky Group, and in the lower right corner of the announcement, he specifically named him, Chief Technical Advisor! No wonder the Star Group has shown strong technical strength in previous incidents, and now the Star Group is holding various press conferences with these awesome companies all over the world.

It turns out that the reason is here. At first, everyone felt a little incredible about the cooperation between Microsoft and Star Group, but now that Zhang Yang made this announcement, it explained it instead. There is no other reason, it is because there are masters in the Star Group! Looking at l's defense against this system, you can see that l is definitely an expert in the system, no wonder Microsoft came eagerly to cooperate with an unknown small company.

Paramount will buy Star Group's account, they have masters. People are like this. When no one explains it, they feel that it is weird, unbelievable, and somewhat unacceptable. When something that everyone can accept happens, everyone will immediately affirm that it must be like this of.

If there is a person who can fully know everything about Zhang Yang, seeing Zhang Yang's announcement, he will definitely choke on his own saliva. Cheap, too cheap! Take a look at the announcement, it’s grand and majestic, the entire l is disguised as a good man, an honest man, a just hacker, the incarnation of justice. And his other id, GD, is completely a villain who is doing anything wrong.

With such extreme personalities, who would link them together? If you post a post on the Internet and you are gd, you will probably be scolded by others as the leader. Now Zhang Yang’s two accounts have many fans, but the fan bases of these two accounts are definitely not the same, gd Many fans will scold L as a hypocrite, and shrink back, not a real man, not a real man.

And L's fans would call GD a disaster star, a broom star, whoever meets him will be unlucky, and he is also a super troublemaker, wherever GD goes, there will be countless troubles. In the short few months since GD's debut, how many major events have happened in the Internet world?

Asking the bottom line is inseparable from gd. RO! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like