The Strongest Hacker

Chapter 173: Sleepy to send pillow (on)

Chapter 173 Sleeping and Sending Pillows (Part 1)

Because everyone respects the gd, so these smug gimmicks jumped out. When everyone was angry, although everyone was very angry, but all the hackers just posted posts and verbally abused each other. They did not take action. Everyone I think this is something that belongs to the Great God. The Great God naturally has the style of the Great God. At least until the Great God squeaks, everyone is not easy to shoot. ;

"Fuck, the old lady can't stand it. Those few B, the old lady is now shooting. The black **** doesn't know him. I really think that the garbage server is very arrogant." Lan Mo finally couldn't help it, directly in the group Erupted.

"Uh, Lan Mo, calm down, maybe gd is something wrong, can't you come? After all, it's almost two days. Chapter 173: Sleeping and sending pillows (on), as long as he can access the Internet, it should be fine If you know this, you won’t even have a reaction.” Shenyue said, heartily.

Compared with Lan Mo, GD has a deeper understanding of gd. Although he said that he had direct contact with gd only a few times, but GD still pretends to be his own thing, GD still remembers it. During the hacking war, When this guy saw himself, he didn't even have an explanation, which made the GD at that time extremely depressed. If it was not the case that was more urgent at that time, and GD did not have time to ignore gd, I am afraid that GD will start with gd at the first time.

Looking at the chat between Lan Mo and Shenyue killing them in the group, GD suddenly moved his heart. He thought of an idea. Since gd can pretend to be himself, why can't he pretend to be gd? And if gd sees someone pretending to be him, I am afraid it will not be ignored as it is now?

If gd comes out, then GD will have the opportunity to start with him. He wants to see how superb this mysterious man is. To be honest, GD is very dissatisfied with gd in his heart. This has nothing to do with other things. It is simply unconvinced. The people who are engaged in technology are all stubborn. GD naturally It is no exception, although relatively speaking, GD's temper and experience are much smarter than other hackers.

But there are some common points. The original assassin virus, GD has researched anti-virus methods, because there is no way to kill all the assassin viruses spread on the network at one time, and finally fell into the downwind and was mysteriously shipped from the factory. The GD given by gd didn't even dare to admit his identity in front of his apprentice.

He felt that he couldn't afford to lose that person. At that time, GD was bragging with his apprentice, saying that GD would certainly solve the problem. If he hadn't solved it yet, gd would pop up. The second time, it was the same thing. Although the result and the process were different, it was a fact that GD completely fell into the disadvantages in dealing with the Assassin virus.

Therefore, although GD is nothing on the surface, he has been holding a breath in his heart, and now with this opportunity, GD began to wander around. Since you pretended to be me, then I pretend to be you once, let you It’s not too much to be depressed, right?

In the eyes of ordinary people, it seems that GD is helping gd solve problems, but in the circle of hackers, no one will think so, at least unless the strength gap is quite large, otherwise no one will admit that the other party is better than himself, and like It is such a naming challenge. No one will let others do it. This is not only a question of strength, but also a question of honor.

In fact, no matter in which field, as long as the person who is engaged in technology, more or less has this kind of disease. It's like in the field where you are good at, someone calls you by name to question your ability, will you let others do it for you? Even if this person uses your name? Do you know? Maybe others don’t know, but this person in your name knows it.

So, whether it was the last thing Zhang Yang pretended to be the rectification of GD, or this matter, although the two things seem to be doing good things for each other, neither Zhang Yang nor GD will definitely be willing to let others do this. In fact, even if Zhang Yang's current situation is a little special, if he knows, he will never fake his hands. Others have some ways to put aside their suspicions and not need you to do things for me.

After GD's decision, Zhang Yang was still eating in the restaurant and didn't know about it. And GD has already thought about it, even if he pretends to be gd, he is not going to make a good name for him. At least he has to make him depressed.

Thinking of this, GD had the idea to quickly scan the opponent's server. In fact, this is not the first time GD has done this work. This server has scanned at least seven or eight times in this server for more than one day, so I am quite familiar with the performance of this junk server.

Scanning again, the server is still the same, there are not many changes, and the system has not been superbly reinforced. At least in the eyes of GD, it is not difficult to hack into this server, and it will not take much time.

If you want to do it, GD does not have any hesitation. After more than one hour, GD successfully obtained the highest authority of the server, and more importantly, GD did not let the hacker defending this server find it, and got it. Control.

After he got control, hesitated and GD started. Quickly kicked several hackers in the server system out of the server, GD quickly began to write an announcement. Since you want to impersonate gd, you must leave the name of gd, but what is said in this announcement, then it can be GD casually tossed.

If the announcement left by GD makes all hackers outside think that it took gd more than a day to invade this junk server, then when the real gd knows, it will definitely be very depressed. GD had no other idea, just wanted to make gd depressed, even if he found a place for himself.

However, GD is not engaged in foreign affairs, and is not good at word games. Just when GD thought about how to write this announcement, suddenly his computer started crazy alarm. The contemplative GD was immediately taken aback. His hands frantically knocked countless commands on the keyboard and quickly scanned the prompt boxes of various alarms. GD's eyes couldn't help but be black.

"I got a fork." GD feels like crying without tears. LGBD, if GD has time, he will definitely scold it directly, but now GD's nervous tongue even spit out, naturally there is no time to scold . The crazy intrusion prompt of the firewall shows that at least seven or eight masters are tracking his data flow, and he has forcibly cracked several GDs and will soon be tracking down to the most peripheral level of GD.

While continually detonating the honeypots he placed, hindering the tracking efficiency of these people, GD switched to the first level and began to set up strategies quickly. Every hacker level has a perfect defense strategy, which is necessary, because each level must be carefully selected by each hacker, not only its excellent conditions, but also the speed of calculation, etc. not bad.

In general, each hacker's level will not go too much. After all, there are only some famous servers all over the world. Apart from some that are impossible to be used as servers, the rest are not much.

The personal computer can only barely be a springboard server. But at this moment, GD has been unable to think so much. He is ready to lose this level. Fortunately, this outermost level is only the most garbage among the dozens of GD levels. It is a high-tech in the United States. The company's server.

I have to say that although GD is not as advanced as the top virus and firewall technology, but GD's powerful skills almost make up for the shortcomings between the two, especially in the blue area, that is, defense, GD's experience More adequate.

The traps placed in some common springboards in advance caused a lot of trouble for these trackers. Let the other party analyze the GD's IP and track the next one is not so easy. Seeing that it is about to reach the first level, GD Finally, the other side was temporarily thrown away.

However, GD knows that this time will definitely not be too long, because he has no time to clear the system logs in order to get rid of the steady tracking of these masters, the other party can quickly find the login information in them, etc., Then find out his next IP springboard.

Less than two minutes to retract one level, GD only set up a layer of firewall, the other party will directly rush, the huge offensive information makes GD a while, these people are definitely premeditated, they have in their hands It is a super computer with powerful analysis function or very terrible operation speed. Otherwise, it is impossible to crack him to find his next IP in such a short time.

With the first relatively powerful firewall as a barrier, GD finally stabilized the "position" and turned on all its firewall functions. GD quickly began to analyze the IP information of these intrusive data streams using its own computing functions. While tapping various commands on the keyboard quickly, GD quickly began to think in his mind.

GD is not stupid. As the results of the analysis came out, GD quickly guessed the origin of these people. The masters who tracked GD also used the springboard, but it was like the analysis of the military’s staff. In fact, each hacker has his own attack method and tracking method. For example, when Zhang Yang is tracking, he is good at using viruses. Most of his work uses viruses to achieve his goals.

Each hacker has every hacker's method and characteristics, and a brief analysis allows GD's mind to quickly determine the approximate identity of these masters

All of them come from the official. Two of them should be the masters of the Internet Supervision Bureau. GD has no doubt about this, because these two people have tracked GD, and the two sides have played more than one offense and defense war on the Internet, so GD Very familiar with their methods.

However, they may not be so familiar with GD. Like the Cold War between the US and the Soviet Union, GD and these two masters have been "peaceful" with each other for many years, and they have not had direct hands with GD. Coupled with the rapid growth of GD technology over the years, and his style is relatively comprehensive and changeable.

While pretending to be gd, GD also deliberately copied some of the viruses he made into several, in order to maximize the "fake" gd, so these people should not know that they are GD.

However, because of this, GD is quite depressed. He can now be affirmed. In addition to the people who opened the National Security Bureau, the other few should be members of the Japanese Network Information Defense Force, and GD is almost certain, deliberately invaded The hackers of domestic websites should be regarded as a bait."

It's just that GD didn't think so much at first. After all, these hackers are not well-known, but everyone knows that they didn't expect them to be a **** in Japanese politics.

Although GD has temporarily organized a defense line, and the other masters who tracked him are not all the way, and it seems that they are also attacking each other, but relatively speaking, these trackers have maintained a certain calmness with each other, and All work hard to crack the first level of GD. But their battle also won the time for GD to win. After all, as long as they fight each other, then they must consume their computer power.

In this way, the analysis time of GD will increase, while defending the server, while quickly removing all traces of his presence ~www.wuxiahere.com~ only secretly relieved, so that these people even cracked this idea at the moment If you want to track him, it will be a lot more difficult, so that GD will have enough time to defend. Before the next level, GD can definitely get rid of them.

Just when GD sent a breath, his system began to issue further alarms. "Day" GD screamed depressively. This time it was not the masters, but the security personnel of the GD station also discovered the intrusion and started to organize the system.

"By a dejected cry, and then directly activated a computer virus in this server, this virus was also imported by GD in advance. Originally he was used to disguise the fact that he was a gd, but I did not expect it to be true. Used.

The infection of this virus is not strong, almost no infection and concealment and the like are not strong, but it is quite stubborn and its destruction is super strong activated, it will directly destroy the server hard disk in just a few tens of seconds, Clear all the data inside and cause damage to the hardware, it will first clear some key system logs and other recorded data. A! ! ! ;

;

--------------

--------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like