The Strongest Hacker

Chapter 134: Unexpected result (below)

Chapter 134 Result under Accident (Part 2)

Zhang Yang finished writing this software only when the pointer was late. At this moment, the infective insect modified by Zhang Yang was completely unrecognizable, and it was completely different from the infecting insect. Abandoning some of the characteristics of computer viruses, such as active transmission, etc., its large size has also changed from a few hundred B's size to a dozen behemoths.

Of course, more than a dozen software is not really big, it is just equivalent to the original infestation, it is already too big. After writing, Zhang Yang directly named this antivirus software, which is more like a firewall, the mother nest version 1.0.

First of all, it may need some improvement in function, but Zhang Yang’s thoughts of the results of the accident (Chapter 134) just came out of his head. All the ideas have been written into it. For the time being, there are no other ideas. Added it.

First of all, the mother nest does not have many functions, only one function, that is, antivirus. After running the mother nest, it will analyze the system version as soon as possible to confirm what system the user is in, and then check all in its memory. The system files have an automatic detection process, any virus disguised as a system file can not escape its eyes, because no matter how powerful the computer virus, and then the embedded computer virus of the bull fork, no matter how you pretend, you and the original system The files are still different.

Once the mother nest retrieves the system file infected by the virus, it will automatically generate an identical system file. The system file generated by the mother nest is exactly the same as the original system file, and then it will replace the infected file with this file. To ensure that the system does not have any problems, and then the mother nest will directly cut off the infected system file.

Then pack it into the range of a spore that it generates. This spore is equivalent to a simple simulation system. As long as the simulation system is completely removed, it is like the result of the accident in Chapter 134 ( Bottom) The table cloth once thrown away in the restaurant is the same. After throwing away, the table is still new.

However, this step is not simple. The jīng marrow of the entire mother nest virus is here. Zhang Yangguang wrote it for this part for more than two hours. It is well known that many system files cannot be copied, transferred, and used. In the end, Zhang Yang still used a part of the infected virus to allow the files generated by the mother nest to be successfully replaced.

In theory, the mother nest can kill any virus. Unlike other software, the mother nest does not need to "memorize" the virus characteristics of a large number of complex viruses, nor does it require a virus library. All it needs is Various versions of the system on the market are just fine, because after any virus enters the system, no matter you infect the system or the software in the system, it will pass through the system files. As long as you pass the system files, you will not be able to escape from the mother nest. Of detection.

It doesn't need to know what virus you are, what function you have, it will package you directly, throw it away. This is what the mother nest needs to do, as for what virus type or the like, does it matter?

Moreover, under the effect of this unique membrane of the mother nest, because its role is to isolate the connection between the system and the virus, so even if your virus is triggered, you have no way to affect the system itself, you only affect However, it is a fake target simulated by the mother nest, so you are useless in any way, and your infection ability is useless.

After quickly activating the mother nest, Zhang Yang began to test the assassin mutation virus in his server. Soon, the mother nest was installed in only one minute, and the system performance was tested. The impact is almost insignificant, and only takes up a little of system resources during antivirus.

The assassin virus inside the machine was directly opened, and the prompt box of the mother nest popped up almost instantly. After the antivirus was ordered, the scene of the assassin virus outbreak did not appear. Just a flicker on the screen restored the calm. I started to scan the virus again with my firewall. When the result came out, Zhang Yang couldn't help but waved his fist fiercely

Niu Fork, even if no assassin virus infection pattern is found, the mother nest can kill it directly. After killing the assassin virus, Zhang Yang lived the two viruses he wrote on his computer. The same work. After a few minutes, even the super virus written by Zhang Yang could not escape the detection of the mother nest. And clear.

Zhang Yang soon realized that he might have truly created a new anti-virus method. If all the current viruses do not undergo major changes, the mother nest is now invincible in a sense.

If he gave this anti-virus software to any security company, I am afraid that for a long time, security companies all over the world would face the risk of bankruptcy.

Pulling out QQ and looking at it, I found that Gao Gang is still online, and it seems that security companies are not easy to do. The mother nest anti-virus software Zhang Yang is naturally impossible to throw to Gao Gang.

"How is it?" After thinking for a while, Zhang Yang quickly sent a message to Gao Gang.

"Your Excellency, just a short while ago, the Assassin virus made the third mutation, but like last time, it has not changed much, but the effect of the software you gave us is not too good." Gao Gang's The news responded quickly, and he seemed to be in front of the company's technical department.

Zhang Yang had no accidents. Before finding the law of assassin's virus and wanting to kill its own mutation law, it is impossible to kill it completely.

Although Zhang Yang now has the mother nest anti-virus software, Zhang Yang found that the mother nest anti-virus software cannot be exposed at all. It is no exaggeration to say that the mother nest is now worth at least tens of billions of dollars, which not only represents the current The improvement of anti-virus technology means that it has created an era.

Looking at the time, there are less than eight hours before the time set aside by the hacker. If there is no way to analyze the results on the No. 1 satellite, there is no better way for Zhang Yang. I checked the progress of the No. 1 satellite, and the analysis is still being carried out, but the analysis speed is naturally much faster than the speed of Zhang Yang's server.

"Great God has just hacked websites such as New NetEase Tencent and others". When Zhang Yang checked the progress of the satellite analysis, the news of ing suddenly jumped out. Seeing this news, Zhang Yang froze for a moment, quickly turned off the webpage, and directly Entered NetEase's address, the webpage opened quickly, but the homepage has been tampered with.

There is only one sentence above: the sentence that belongs to the war between us is not difficult to understand, but Zhang Yang's heart really jumped, is the author of the Assassin virus shot? If this is the case, why is there still 8 hours when the assassin virus broke out, and he shot now?

There is definitely a connection between the two. After hesitating, Zhang Yang took out his tools. After opening the analysis software, Zhang Yang began to scan the NetEase port directly. After a few minutes, Zhang Yang couldn’t help but smile. With a bang, he is really not good to start now. Just scanning out, there are at least dozens of data streams in the detection of NetEase port, which means that at least dozens of hackers are staring here.

Zhang Yang was somewhat stunned. Although he didn’t know who initiated the attack, he would definitely not be a domestic hacker, so it was only foreign, and once this kind of foreign hacker involved in a large-scale invasion of the country, it was easy to cause hackers. War

No matter whether it was the hacking war of 1998 or 2002, Zhang Yang did not have the opportunity to participate, but once this kind of war between hackers broke out, the incalculable will definitely cause large-scale indirect economic losses. More importantly, once the anger of both parties has risen, once the websites of the bō and political fǔ ministries, the losses may be greater, especially in some important public systems.

The complete result of the scan quickly appeared in front of Zhang Yang. After careful study, Zhang Yang was sure that even if it was not the hand of the author of the assassin virus, then it has a lot to do with him, because the other party’s invasion did not hide at all. His body, but was invaded by the Zheng Zhengda, using the one after the assassin virus opened when it broke out

"Great God, all large domestic websites are now under attack, and... it seems that they have been quickly controlled by the other party. Great God gave you the address, this is the address of a chat room we used ourselves, I I'm off QQ." The news of ing came quickly again.

Zhang Yang was just about to send a message back to ing. Suddenly his firewall madly launched an alarm. A virus was tracing his information frantically along Zhang Yang’s data flow. Zhang Yang was taken aback and read it carefully. Zhang Yang’s face è Just changed. Is Tencent's server

The entire Tencent's QQ server has been trojaned in. UU reading www.uukanshu.com is now spreading through QQ quickly and madly. Zhang Yang quickly turned off all his own QQ. This kind of tracking is not to steal the QQ number. I am afraid that I am collecting Tencent’s user database, and the other party’s purpose is probably to destroy all of Tencent’s data.

However, the address of the chat room just sent by Zhang Yang did not have time to see. Obviously, the other party's invasion was definitely not a person in action. So many websites were killed by people at the same time, and it is impossible for a person. Even if it does not work, even if there is a virus after it is turned on, but it is not a panacea. It only provides an intrusion port. The intrusion work needs to be done by yourself, at least to solve the server. Firewall?

With so many firewalls, unless one person has three heads and six arms, I am afraid that three heads and six arms are not enough. Zhang Yang made the decision almost instantaneously. This is a hacker organization with a lot of staff. Zhang Yang quickly opened the pages of several homepages and looked at them. All the homepages of the homepages were in an unusable state, and more than 80% of the webpages were put on what Zhangyang had just started to see. That sentence. ! ! ! </p>;

;

--------------

--------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like