The Strongest Hacker

Chapter 425 Watching from the sidelines (Part 2)

Chapter 425 Watching from the Wall (Part 2)

Chapter 425 Watching from the Wall (Part 2)

"Then I'll start." After greeting, Zhang Yang stopped hesitating and said directly. He was speaking in English translated by the infected worm, and these people couldn't understand anything. "Wait."

"Huh?" Zhang Yang gave a strange grace, "Our side is not ready, give us three minutes." The voice said quickly. "No problem." Zhang Yang didn't care about it, and agreed easily. Anyway, Zhang Yang let go today, and he didn't plan to get nubi's information at once. He couldn't eat hot tofu in a hurry. If nubi and f are mortal enemies, they should be more anxious than themselves.

Three minutes can be said to be long or short. During this time, Zhang Yang has not been waiting all the time. He first tidied up his computer to confirm that there is no problem, and then carefully checked the files in each broiler. Placement of firewalls, honeypots, etc.

There are people in the nubi gang, who knows if someone will sneak in, but if they want to quietly get the super command of the infected worm system, it is almost impossible, if they want to pass the infection It is even more impossible for the worm system to discover Zhang Yang's truth.

The infestation system is filled with several satellites and broilers, and at the same time the whole system is equivalent to the infestation body. In the logical thinking library of the infestation system, it is "clear" what is happening in each part of the body and the infestation is happening! The entire system is under the monitoring of the infected bug. If there is no instruction from it, there will be inexplicable access requests, or the program that runs autonomously will be known as a hacker without even thinking about it.

Unless the hacker can directly own the core control password of the infected worm, it is possible to directly enter the core control password so that the infected worm can be directly hacked without calling the police. After filtering all the things that were watched from the sidelines (middle) in Chapter 425, the voice of this person came from the headset: "Okay, gd, you can do it now."

It can be seen from the scanning software and analysis software that these people outside the server have not left, obviously they don't know what kind of backhand they are preparing. Zhang Yang thought about it, and he was going to do it directly. If such a server wants to sneak into such a server, it cannot be done in a short while. It may take several days to sneak into such a server. months, or even several months.

There is only one way to quickly achieve the goal, forcibly invading! And it's still the kind of destructive forceful invasion, which is quite a test of the hardware performance of both parties. Although the intruder can have a large number of bots, the computing performance between these bots is subject to network delays. If an ordinary hacker just coordinates the computing performance of these bots, he may be too busy to do anything.

But Zhang Yang is different, Zhang Yang has infection bugs.

Although the current performance of the infected system is only a fraction, but the computing speed of this fraction is enough to infect and control so many broilers, so that their hardware performance can be effectively superimposed to achieve maximum computing efficiency. If Zhang Yang invaded by himself, he can only choose to sneak in. After all, that is what hackers do. Security maintenance personnel.

No matter how awesome you are to execute instructions alone, no matter how fast you are, it is impossible to be faster than so many people. Therefore, most hackers choose to infiltrate silently when invading a large server as a broiler. As long as they are discovered by the other party, these hackers will definitely retreat, because after being discovered, they want to single out a server with additional The probability of a group of security personnel is infinitely close to zero, unless there is a second combo of flamboyant and infested bugs.

With the Infector system, it will be much easier for Zhang Yang to perform any operation. He only needs to input instructions to the Infector, and the huge computing performance of the Infector will immediately deploy these broilers to make reasonable instructions. It is countless times faster to control each broiler by Zhang Yang's command input one by one. This is the advantage of an intelligent system!

When Zhang Yang input the command to the infecting worm, the first thing that appeared was the former infecting worm virus, which is one of the virions preserved by the infecting worm. The direction was controlled, and these viruses rushed directly to the other party's server. Although the invisibility of the infecting worm virus is quite high, when several variants of the infecting worm virus try to infect this server one after another, its invisibility is almost gone.

The disappearance of the concealment does not mean that the threat of the infected virus has disappeared. In fact, the infected virus has mutated into an intelligent system through the infected system, and then rewritten after logical analysis and calculation. After the re-mutation, it targets the system's weaknesses Infection ability is almost doubled.

So when the infected virus started frantically trying to infect the server system and destroy its firewall, the entire network immediately became hot. The virus is raging here, and what follows is a swarm of dd attacks. Although the dd attack is relatively primitive, it is also a direct and effective attack method. Especially when it is used by an intelligent system, all kinds of virus bombs, mail bombs, and even Zhang Yang seem to have collapsed.

Because this server, no matter whether it is a base or anything, is located near Fort Loire, when the infected bugs started to attack wildly, the network of Fort Loire was inevitably affected. While attacking this server, the infection bug started to invade several telecommunications servers in Fort Loire at the same time through analysis and calculation, and then turned these telecommunications servers into its own broilers.

"...What do you think?" An old voice suddenly sounded in a channel that Zhang Yang didn't know about.

"How should I put it... This guy is getting more and more brutal." Another slightly younger voice sighed slightly, and said quickly, "I don't understand, how did this guy gd do it? Can a huge attack really be done by one person?"

"You mean, gd is also an organization like us?" the old voice asked immediately. "I don't know, we can't be sure now, but if he is alone, then this is too scary. Look, when he can't help maintaining such a strong dd attack, he still has to fight against these dd attacks." There are so many mail bombs and virus bombs placed in the data stream, and what else did he do? There is still time to hack the web server of the web server provider of Chateau de Loire!" The previous voice was full of wonder.

"You all know the conflict between nubi and gd before. Nubi suffered a dark loss. It seems that nubi has been researching for many years, and even the Adam system that some of us old guys worked hard for was destroyed by gd. , do you think... Adam succeeded in gd's hands?" The old voice raised a sudden possibility.

"Impossible!" "Impossible!!" Several other voices said these three words almost in unison. "Blue 1, you are also a person who has studied the Adam system. Do you think that Adam can appear on this planet in this era? I don't deny that it may be successful in the future, but definitely not now, Adam's is too high , or its own conception has exceeded the current level of science and technology on the earth. The birth of any technology will produce a process from quantitative change to qualitative change, but now, even the quantitative change has not begun, how can there be a leap in technology for decades? The system appeared?"

"Well, I'm asking this question in vain, but have you ever thought about how gd stole the Adam system? You all know the level of secrecy of the base where the Adam system is located, how could gd invade, and then Steal the entire system?" The man's rhetorical question made the entire channel fall silent.

"I'm afraid you have to ask GD this question, but I don't think GD can answer you. It's not the most important thing now. The most important thing is, are you sure that this base is one of Nubi's bases?" Another voice interrupted came in.

"It's not certain at the moment, but there is a 70% possibility that if this is not one of Nubi's bases, then there is only one possibility. This is a secret base of the French side, but you all know that we have already I have obtained all the information from the French side, and there is no military division base here." The old voice replied quickly.

"Since that's the case, the two of you blue 9 and blue 10 are ready to attack, and the rest of you are all starting to locate." A new voice came out, and everyone immediately agreed, and the channel immediately fell into a panic. There was silence. Zhang Yang is actually not busy, although he is constantly inputting instructions, but these instructions are just corrective instructions entered by Zhang Yang after discovering that the infected bugs have done useless work.

But overall, he wasn't busy, and he even had time to think about how these people were going to kill the base. Just when Zhang Yang was thinking wildly, suddenly the infestation worm issued a rapid alarm sound. Hearing the alarm sound, Zhang Yang couldn't help but yelled: "Damn it!" RO! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like