The Strongest Hacker

Chapter 415 Undercurrent Surge (2)

Chapter 415 Undercurrent surging (2)

As the real-time satellite images continued to zoom in, Zhang Yang's eyes immediately narrowed. The place where Xiang Tingwei lives is a villa complex. This villa complex does not belong to such a high-end villa complex, but its location is relatively remote, relatively close to S University, but in the direction close to the suburbs.

"Are there any comparable photos of this place?" Zhang Yang asked after thinking about it. If Zhang Yang remembers correctly, after getting the No. 1 satellite, Zhang Yang activated the No. 'satellite, letting it float over the city, and kept taking various photos over the city. At that time, Zhang Yang I didn't think too much about it, but I just thought that the satellite was idle, and as for the satellite energy, it's nothing to do with publicity. Chapter 415: Undercurrents surge (2). He won't help the US government save satellite energy , When it wears out, it wears out.

"Searching..., the search is complete, the target is found, and the system's database contains all the photos of the city taken since it was started. Do you want to conduct a comparative analysis?" The Infector quickly gave an answer.

"Comparative analysis of all the photos about the 'nearby part of this community', and list them on the screen." Zhang Yang immediately said affirmatively. The architectural styles in a villa complex are basically the same, but the villa where Xiang Tingwei lives is obviously different from other villas. It should have been renovated later, and it was a major renovation, including the outside of the villa. Made renovations!

How you decorate the villa area is up to you. As long as you buy the house, even if you tear down the original house and rebuild it, the developer will have no objection if you say you are doing the renovation. Anyway, as long as you pay the money, how to decorate it is your business. Zhang Yang squinted his eyes and didn't know what he was thinking, but the movement of the infected bug was not slow at all.

Soon a folder appeared on Zhang Yang's computer, containing hundreds of thousands of photos. "Stop!" Zhang Yang had some headaches and had to stop. He forgot that the speed of taking pictures by satellite is basically ten seconds. I don’t know how many photos there are about this city, and the infected worms got all these photos out at once. Although Zhang Yang only checked these pictures through his notebook, Zhang Yang felt that his notebook was a bit unbearable just now. Heavy burden.

After all, the infected worm is not a human being, and it will execute whatever instructions Zhang Yang gives it. "Put them up according to the comparison speed of one picture per day." Zhang Yang issued the latest instruction. In this case, calculated based on the time of the month, there are less than 200 photos.

Not long after Zhang Yang’s voice fell, almost all the photos in the folder disappeared, leaving only the photos that Zhang Yang needed. These photos were processed by infected insects, and the above were only about the scenery near Xiang Tingwei’s villa, and then zoomed in according to the shooting date. Arrange and put together.

It's pretty obvious when you put it this way,

Zhang Yang glanced at it and immediately affirmed that Xiang Tingwei's villa had not only been renovated, but had also undergone large-scale renovations! Judging from the photos, when the villa was being renovated, the construction team even set up isolation zones around the villa to prevent idlers from waiting in, but it is a pity that the satellite was taken from the sky. When the villa was renovated, a large basement was rebuilt under the yard of the villa.

Xiang Tingwei lives in such a big villa, why does he need such a big basement? Zhang Yang rubbed his chin, and looked at the photos on the computer that happened to be lined up with several trucks delivering furniture. Zhang Yang squinted his eyes and tapped his fingers on the table irregularly. Liuliu Chengyin, I didn't expect that I accidentally discovered a little secret of the other party.

"Beep beep" the piercing system prompt sounded suddenly, and the alarm sounded by the infected bug sounded in real time: "The nest firewall of the Starry Sky Group has been invaded by a virus, and the virus has infected the first layer of protection protocol."

"Huh?" Following the alert of the infestation bug, the computer desktop in front of Zhang Yang had automatically switched to the management page of the brood. Looking at the various alarm messages fed back by the brood on the management page, a hint of surprise appeared on Zhang Yang's face. Zhang Yang's hands quickly tapped on the keyboard, and the cold light in his eyes became more and more intense.

This is the first virus that can break through the first-layer protection protocol of the brood, that is, the first layer of defense shell. You know, the brood couldn't even break through the infection bug that Zhang Yang wrote himself! Quickly checked the progress of this virus infection, Zhang Yang immediately felt relieved. The protective shell of the brood has five layers in total, except for the innermost layer that protects the core code. Layers are nested with each other to form a perfect defense mechanism, which basically prevents any virus intrusion.

But now it seems that there will never be absolute things in this world. This virus that has broken through the first layer of protective shell of the mother nest is already trying to destroy the second layer of protective shell. After a few hours, I am afraid that the virus will not be able to break through the second protective shell.

Zhang Yang quickly called up the system log of the brood, and soon Zhang Yang found what he needed in the system log, looking at the virus invasion process recorded in detail in the system log of the brood, Zhang Yang's eyes immediately narrowed , it is obvious that this virus is specially written for the brood.

The brood is written by Zhang Yang himself, and its defense methods and methods are naturally clear to Zhang Yang. The brood relies on simulating and recording the entire system files, thereby eliminating all virus files that illegally enter the system, so as to completely remove all viruses, Trojans, and even The purpose of illegal *** operation.

But it doesn't have the ability to analyze what kind of virus this virus is, and now the virus that invades the mother nest is also very cleverly written. When it infects, it doesn't go straight to the key files of the system like other viruses , because those key system files are under the monitoring of the brood, there is no chance of you being infected at all. The first file that this virus infects is not the key file of the system, but the cache file generated after the various programs of the system have been used!

That is what we often call temporary files. The so-called temporary files refer to short-term storage on the computer, so that the system can quickly read this file when accessing the same program again, just like what we often call IE temporary files. It will download some pictures and other information on the websites that we often log in to your computer. When you visit this website next time, the pictures on these websites and some information will avoid repeated downloads.

It is naturally impossible to simulate such a cache file brood, because these files are often deleted and are useless files, so the brood will not simulate these files. And after this virus infects these files, it will not copy randomly, but immediately start to simulate these cache files. 耪飧裧护独独益流浩恶食?br /\u003e

Although the brood will detect at this time, but because the virus simulates the cache file at this moment, its behavior is no longer illegal in the detection mechanism of the brood, and the brood will not call the police. After all, Brood is different from other anti-virus software. It does not have a virus database, but only detects some programs that the boat owner runs illegally.

After figuring out the process of this virus infection, Zhang Yang felt a little relieved. Qi, Zhang Yang was taken aback when the infestation bugs first reported to the police. Even the infestation insects could not invade the brood. If someone can write a virus to infect, then the author of this virus is absolutely awesome.

Now it seems that although it has successfully broken through the first layer of protective shell of the brood, the possibility of it succeeding is extremely small. This virus just caught a small loophole in the brood, and it was just a trick . However, it’s a coincidence that the hacker of this computer virus is definitely a master, because Zhang Yang wrote the brood, other hackers can’t know the principle of the brood, and can only guess the principle of the brood through various temptations.

But this kind of tentative love will also be detected by the brood and call the police, but Zhang Yang has not received many threatening alarms from the brood recently, that is to say, the other party is definitely a master in the field of viruses, and the experienced one Extremely, after a few trials, he probably guessed the loopholes in the brood.

Now that the virus was discovered by the brood, Zhang Yang is not polite. After capturing the virus with his own analysis software, Zhang Yang directly used the brood to kill the virus. After Anubis killed the virus, Zhang Yang gave the infected worm an order to start tracing the infection path of the virus, while rubbing his chin to ponder. With such technical strength, Zhang Yang can only think of one GOD, And the people inside the anubis.

GOD's attainments in viruses are not low, but there is no reason for GOD to trouble Starry Sky Corporation, of course, this is Zhang Yang's guess. But the possibility of GOD is very small, and the possibility of anubis is quite high. After pondering for a few minutes, the notification of the infection worm sounded, and Zhang Yang checked the results of the anti-tracking.

It was about the same as he thought, with no results. This first infects cache files. Then the method of slowly infecting the system is actually a very old way of virus infection. Most of the antivirus software on the market can detect these viruses, but it is a pity that the brood was too advanced written by Zhang Yang. This ancient detection method Instead, it's gone. It seems advanced is not always the best.

The infection method is a bit old, but the old has the advantage of being old, that is, it is extremely difficult to track where the virus is infected, because a large server has millions of cache files, and it is necessary to analyze and track these files The source of the virus is a very complicated thing. If the virus conceals itself a few times, it is basically impossible to track it back.

Master! Zhang Yang shook his head, the other party was just probing, and Zhang Yang had no way to fight back at present. ! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like