The Strongest Hacker

Chapter 159: gscsd and Zhang Yang (on)

Chapter 159 and Zhang Yang (Part 1)

   Chapter 159 and Zhang Yang (Part 1)

Zhang Yang returned to the dormitory. Li Keqing was already waiting in his room. Fang Shaoyun, who was packing up after seeing Zhang Yang coming back, said quickly: "I have seen it. There is no problem in assembling these things. The next step is the grassroots control core. Well, as long as the chip of this remote control car is assembled, there will be no problem."

  The three people dismantled the toys they bought into a pile of parts, and Fang Shaoyun quickly received the several chips removed. It must be said that Fang Shaoyun's animal is about to turn the dormitory into a laboratory, and all tools are available. "In this way, put this chip together. The program in this chip is responsible for receiving signals and can be controlled remotely. These chips are responsible for self-judgment. You can handle the program yourself. As for how to burn it, you and me Come."

   After connecting everything, Fang Shaoyun quickly took the chip and walked into Zhang Yang's room. "These chips are the simplest single-chip microcomputers. Theoretically, the program inside cannot be changed, but you can just overwrite it. Anyway, you don’t need to have a high degree." While explaining to Zhang Yang, Fang Shaoyun connected a serial cable After being connected to the download circuit of the chip, the other end was quickly connected to a square box, and the other side was a USB cable.

   "Is this all right?" Although Zhang Yang has learned a lot of hardware recently, the hardware knowledge is still a bit too deep for Zhang Yang.

"No problem, you should be able to search after booting. I made this box by myself, otherwise you can directly identify it on your computer, but you can't recognize it, but the burning speed is slower. As for the appearance, you two I'm going to toss myself, I won't join in." Fang Shaoyun nodded.

"Uh, okay. Will you know Keqing?" Zhang Yang pointed to the rest of his work. Li Keqing nodded and said with a smile: "When I was locked by my mother at home, I like to take things apart. It's no problem to assemble these things." After taking over the tools like the screwdriver that Fang Shaoyun handed over, Li Keqing quickly began to disassemble these external parts.

   "Then I write the program." Zhang Yang quickly opened the computer, and installed two systems in the server that Zhang Yang bought, one is the system that Zhang Yang uses himself, and the other is the fake XP. Because there are enough hard drives in the server, Zhang Yang uses half of the high-speed hard drives to install the system. When the computer is normally started, the system is hidden. The disguise system is a function of Zhang Yang’s own firewall.

At the same time, this firewall also has another function, which is similar to the function of assassin virus to clear user data. The difference is that the publicity firewall's clearing function is more powerful. It can instantly clear all hard disk data in more than ten seconds, and it is It can't be recovered completely, but the damage to the hard disk is particularly great.

This function is actually available on every hacker’s computer. If you are not afraid of 10,000, you may be afraid of it. As long as you can call it a hacker, it can be said that you have done some illegal things. To clear the evidence. The difference is that each hacker's technical strength is different, and the method of removing evidence is different.

  Like Zhang Yang, it is no exaggeration to say that even if Zhang Yang does not make this computer, let it fall into the hands of other hackers and will not find any abnormalities. After the server is turned on, the hidden program starts to run. It automatically logs in the XP system. There is no other way to call the hidden system except for the commands set by Zhang Yang.

Moreover, Zhang Yang emulates the US military system in his own system. For all the software used by Zhang Yang, a hidden decision setting is added to the system, just like the DNA information of any part of a person’s body is the same. It is the software used for him, and such a "DNA" that runs through all his programs is added to the system.

  If someone else makes a computer and performs an illegal search, and there is no corresponding "DNA" match, the hidden program will immediately execute the cào operation to destroy all data. This function is included in any program that Zhang Yang has used, so Zhang Yang is not afraid of others checking his computer.

  As for what the "DNA" information is, then set it up casually, it can be a string of characters, it can be a string of English, or a command, or other.

   is just a simple program, Zhang Yang did not enter the system, just write under the XP system. When Zhang Yang and Li Keqing assembled the robot, thousands of miles away, the atmosphere in a room was a bit dull.

   "...this is about all the information we can gather since our debut." After paying a military salute, a major wearing a green military uniform put a thick stack of documents on the desk in front of Blackhawk.

This room is not large, about 30 square meters. There are only three people sitting in the room, one is a black eagle, and the other is a middle-aged man in his forties. He also wears a military uniform. The difference is that a golden star is carried on his shoulder.

  If someone can retrieve all domestic information, they will find that the major general in front of him does not exist at all.

   "Let's talk to me, when will it be so thick I can finish it." Blackhawk said helplessly.

"Yes" the major "cracked" one, immediately took out the document in front of the Black Eagle, and first chōu out: "We have retrieved all domestic telecommunications, Netcom servers, and right All broadband users are matched with the appearing IP, and after computer analysis and retrieval, we can be sure that I am in China."

   "Domestic? Do you dare to make the scope bigger?" The Black Eagle rolled his eyes.

"This is already the biggest information we can get in the shortest time. Do you think the MIB is for your family? This time, it also gave you privileges, so this is the only possibility. This information is the entire military situation. The results of the collective analysis of the 378 serving staff of the bureau, you have at least listened to the conclusion." The major general rolled his eyes and said lightly.

   "I listen well, can't I still listen? I'm not in a hurry." Black Hawk was a little depressed. Strictly speaking, the MIA does not exist except in certain "insides". The Ministry of National Security is responsible for commanding the entire Ministry of Intelligence.

   But the MIB is a bit special. This so-called bureau, no matter what you do, you can’t find it in the country or search it. For example, the US Department of Political Affairs’ Department of Intelligence has its own division of labor. Within the (US Federal Bureau of Investigation), outside the (US Central Intelligence Agency), and other departments such as the NSA (National Security Agency). Big intelligence organizations restrict each other.

  Different domestic situations, the public security part has performed most of the similar duties, and the Ministry of National Security is more like a combination with NSA.

The MIB can say without exaggeration that it is an intelligence organization in the intelligence organization, which is directly responsible to the General Staff. At the same time, the MIA has the country collecting from major universities and all levels of the country, the military at all levels, all officers, and the society. The huge and terrifying staff

  The IQ of these combat staff is definitely more than 140. How much intelligence information does a huge intelligence department have? It is the duty of this staff to analyze the information needed from the horrible amount of data. Unlike the Chief of Staff of the General Staff, the one directly under the General Staff is responsible for specifying strategies and tactics. In other words, the General Staff is responsible for how to command the army to fight

And this staff, no matter whether they are fighting, or any other thing, all they have to do is analyze intelligence. In terms of intelligence analysis, these people are definitely stronger than anyone. Someone inside the MI has joked that if this staff is People are dispersed to work in various public security bureaus across the country, and the national crime detection rate may increase by at least 300%.

  What Zhang Yang did not know is that he who has entered the black list has been alarmed by the mén, the most intelligent intelligence department in China.

   "You continue." The major general waved his hand to signal the major to continue reporting.

The major nodded his head~www.wuxiahere.com~Quick chōu produced a second piece of paper, "In the second step we conducted a comprehensive analysis of what he did, and finally concluded that his xìng should not be a male xìng, The physical age is definitely not more than 25 years old, there is a slight nationalism tendency, the psychological age is quite mature, and the consideration of the problem is very calm and comprehensive."

"Third, we analyzed and retrieved all the incidents that occurred after the emergence, and at the same time analyzed the characteristics of the hacker data filed by the National Security Network Supervision Bureau. During the National Day, that is, the S huāmén incident that occurred just a few days ago was from this person. Hand." Watching this major put the third piece of information on the table, the Black Eagle was shocked.

To be honest, although before the declaration of this order, Black Hawk had heard that the MI was very abnormal, but Black Hawk did not expect that it would actually be abnormal to this point. In less than two days, he got so much Information. "How did you come to this conclusion? After all, it was named on the Internet at the time, and I personally asked him, and he did not deny it." Blackhawk asked curiously.

"Behavior comparison, although hackers are just people on the Internet, they are still humans in nature. As long as they are intelligent creatures, they will have their own unique behavioral characteristics. It is useless to pay attention to it. This is out of the wisdom of the biological creatures. The instincts in even the single-celled animals have this kind of behavior. As long as we analyze these, it is not difficult to draw conclusions. We have conducted an argument that this thing is possible to do more than 89.36% It is possible to do less than 10%.” The major facial expression did not change at all, as if talking about an irrelevant thing.

  

  

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like