The Strongest Hacker

Chapter 601 Hanging Horse Incident (5)

After returning from the outside, Zhang Yang did not go to the company with Tan Yudie, but went home directly. After Zhang Yang came back, there was already an item of data listed by Xingkong on the computer screen, and Zhang Yang immediately began to look through it. These data are the mission left by Zhang Yang when he left, which is to let Xingkong retrieve recent intrusion incidents and so on.

After reading all the intrusion incidents, Zhang Yang immediately looked at the similarities listed by Starry Sky below based on these intrusion incidents, although many of the similarities are useless at first glance, such as what letters are in the company name Yeah, but Starry Sky is a program after all, so you can't be too demanding. Zhang Yang is already very satisfied with the result.

But that's it, Zhang Yang still found what he needed. Looking at the comparison of Chapter 601, The Horse Hanging Incident (5), Zhang Yang couldn't help breaking out in a cold sweat. This commonality almost covers the recent More than 80% of companies that were compromised within a week! To put it bluntly, it is very simple, that is, these companies are all Asian companies! And 80% of these companies are communication companies!

In other words, these companies are responsible for the mobile communication business of various countries. To put it bluntly, these companies all own satellite base stations! Can contact with these satellites! Seeing this, Zhang Yang felt a little scared. China Mobile and China Unicom must have also been invaded. Zhang Yang can guarantee that the other party did not find any evidence that Xingkong was in contact with those satellites, because now Xingkong uses satellite base stations to contact those satellites no longer through satellite base stations. .

Don't forget, because of the translation software, Xingkong has contracts with most mobile communication service providers in the world to use the other party's network, which provides great convenience for Xingkong to secretly use the other party's network, and these mobile communication service providers There are many giants in the communication industry who have their own commercial satellites, so now the starry sky contacts the satellites in the sky by turning these commercial satellites into chickens.

So even if the other party didn't find out what's wrong with him, Zhang Yang broke out in a cold sweat even though Chapter 601 The horse hanging incident (5) was publicized. It seems that these professional intelligence agencies are really not just doing things, they are professional. , although they didn't lock the target, they were right in the direction they were looking for. All they were looking for were Asian companies. Undoubtedly, the fact that those six satellites were hovering over Asia made the other party have enough doubts up.

Using a satellite as a broiler as a server is naturally impossible to just use the satellite's server resources, which is too good to use. You must know that these satellites are military satellites that guide and defend missiles, and they can do too many things! For example, taking a peek or something is simply all-encompassing!

It's just that when Zhang Yang saw this, Zhang Yang couldn't figure it out. Since he wanted to conduct a sneaky investigation, why did the US side modify the orbits of several other military satellites? Doesn't that make it clear that they told themselves that they had discovered an anomaly in the satellite? Moreover, after modifying the movement trajectories of the other satellites, they did not use the underlying command method to take back the satellites in their hands, and continued to keep these satellites under their own monitoring.

What is this?

Self-deception? Or is it blinding your ears and stealing your bells, blinding your eyes? This is too taken for granted, right? This kind of idiotic approach is something that a person with a slightly normal head would not do, not to mention that the other party is an intelligence department with countless staff members and a national government.

Zhang Yang rubbed his chin vigorously, he still couldn't figure it out, either you don't move the thirteen satellites at all, and investigate secretly by yourself, I can understand that you don't want to startle the snake, or you get all the satellites back, Then track hackers by investigating the use of these satellites. I can understand that you have confidence in your own strength, and you don't want these fake and expensive satellites to end up as scrap iron.

But you are not up and down, not forward or backward, is it too nonsense? Is the CIA or FBI so sure this hacker won't use these satellites? Or to put it simply...Zhang Yang suddenly thought of another possibility. Could it be that the other party did this on purpose? Want to let yourself know that they've found out they've stolen a satellite? Then become vigilant and expose yourself when erasing traces?

This is very possible! Thinking of this, Zhang Yang immediately felt that this explanation was more reliable, the CIA is very powerful in Asia! Even if China is a little weaker, there is no doubt that in other Asian countries, it is possible to call on the power of the network security departments of these countries. Obviously, these people have already decided that they should have used satellite base stations, so it is not impossible for them to use the abnormal situation on the monitoring network to find a way to track themselves.

And this possibility is not small, don't underestimate the amount of resources that the CIA can mobilize, especially when the US military system, even nuclear weapons, and the national strategic missile defense system are threatened by cyber security, the resources that the CIA can mobilize are even more Horror. And judging from the analysis alerts collected by Starry Sky just now that various companies have been compromised, it is obvious that this is the trick of the other party, in other words, the other party is doing it themselves.

To be honest, if these people really hacked the server of the mobile satellite base station that Zhang Yang used to contact the satellite in the first place, and conducted a thorough search, they could really find clues. Zhang Yang didn't clean up that server deliberately, but there are so many satellite base stations in Asia, doing so is undoubtedly looking for a needle in a haystack. They are really trying to startle the snake now, but they dare not startle the snake too much.

A few thoughts passed through his mind, Zhang Yang suddenly laughed a few times triumphantly, NND, okay, you guys are playing tricks, right? I'll play a big game for you, Zhang Yang suddenly thought of another wretched way. Just do it, after thinking about it, Zhang Yang turned off all the messy things on the computer screen without saying a word, and quickly opened the programming program.

Zhang Yang has not programmed for a long time, and he doubts whether his level can keep up, but this is not difficult for Zhang Yang, there is no way, who made Zhang Yang have such a big starry sky in his hand? It is advisable to castrate the iliac shell, the Xin concubine fiber, the heart rock, the meteor barium, and the scorpion. A certain "Jing  ⑶ axillary rough fluttering  cut which mandarin pepper  衿 male penny low hold small! Close rebellion, benzene glaze, strong light, strong light, strong light, strong light, strong light

Don't forget, Xingkong Group also has a network security department, and Xingkong Group also has a photon defense software. Although photon defense is not the main product of Xingkong Group, the photon defense software with a global installed capacity of more than 700 million computers is absolutely It is the most used by individual users to clean up the integrated system, prevent viruses and so on, and has the most security software! none of them!

Because the photon defense software is completely free, although its virus detection and killing ability is very powerful, its defense ability is still slightly different from that of professional antivirus software, but this does not deny the ability of this software to catch viruses! This photon defense software is absolutely top-notch in the world in terms of virus capture and killing capabilities! This is almost the default for companies doing network security around the world.

Although the photon defense software's ability to defend against viruses is not outstanding, its ability to find viruses is very good, and it doesn't work if you don't want to. Although the photon defense software was later in charge of the network security department of the Star Group, it was actually merged with the firewall used by the Star Group itself, but it simplified the functions by a lot.

As for the firewall used by Xingkong Group itself, others regard it as a firewall, but Zhang Yang naturally knows that it is a part of the Xingkong system! With the current reputation of Xingkong Group and the page views of various websites under Xingkong Group, all viruses on the Internet will inevitably be driven to the servers of Xingkong Group, but if these viruses want to invade the system of Xingkong Group, it is simply nonsense.

It can only be done unless Rogay is reborn, or if ANUBIS concentrates on researching and releasing such a virus, it may be possible to do it, because other hackers don't know the existence of such a corrupt system like Starry Sky, so naturally they won't specialize in researching and dealing with it. Detect the Starry Sky Group's servers from the outside, and try to figure out the starry sky system...well...you are a god, you can do it.

And these viruses have no effect in invading the server. As one of the processes that threaten the program system, Xingkong will automatically record the code characteristics of these viruses, and then naturally upgrade its own firewall, and the photon defense software will naturally also have In order to catch and kill these viruses.

Therefore, Zhang Yang asked Starry Sky to search for super viruses that are currently erupting around the world. Naturally, there is no disadvantage. In other words, the virus databases of other security companies may not be as complete as Starry Sky's virus databases. Of course, it is impossible for Zhang Yang to have all kinds of viruses. He is looking for viruses with super high threat levels. Zhang Yang wants to modify a virus. Will you ** after knowing the details.

There is no doubt about Zhang Yang's ability to research and write viruses! Otherwise, there would have been no infection bugs, and no starry sky! Although what Zhang Yang wants to create now is another new virus, but with the analysis reports of various super viruses compiled by countless hackers around the world, and even some viruses have decompiled the source code than Xing Kong, if Zhang Yang wants to modify it again, then It's as easy as drinking water. ! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like