The Strongest Hacker

Chapter 224: Various vests (medium)

Chapter 224 Various Vests (Part 2)

Chapter 224 Various Vests (Part 2)

Of course, even if the tragedy is publicized, it is nothing more than being kicked out of the system by the other party, and there is no other loss. However, Zhang Yang slowed down the defense of the system for the first time, and began to guard against the person who had just logged in to the system. Although he had full access to the system, it is a pity that this account is not a panacea.

If it is really invincible, then all servers will not be hacked. This account is the maintenance account of the system, that is to say, it seems to have all the permissions, but in fact it is just a little extra. Functions only, these functions refer to chapter 224 of various vests (middle) that can make the most program modifications to the system, but in managing websites, or forums and the like, it follows Zhang Yang to himself There is not much difference in the establishment of super permission account.

However, because it can modify the hardware, it is absolutely impossible to open this account in the server system of the important intelligence department or in the important data storage system of some companies. Even if it is clear that this account will play a role in preventing hacking, it is impossible to give it to anyone.

After all, hacking into the system, if you want to copy the data, you still need time, and crack the management data system, and your security personnel have some time to do, but once the account managed by the account leaks and except for problems, then the data in the server is any Copying by the other party, some of the copying added to the hardware, etc. will become useless.

But what Zhang Yang did not expect was that the account of Xingyangye's server would actually be known to the technical staff, unless those important research materials were not here or this person was absolutely trusted by Li Yun.

What surprised Zhang Yang was the various vests in Chapter 224 (middle). After this person landed in, he immediately discovered Zhang Yang and the two people who were attacking the system, but he did not take any further action. In fact, the hacker who attacked the Xingyang Group system must have also found someone alarming the system's alarm measures, but the other party was simply unscrupulous, completely ignoring your existence, and invaded in front of the face.

From this point of view, it's a very similar style, but Zhang Yang knows that this person will definitely not be this time, except for what the person attacking the system is doing. Zhang Yang and this person don't know, but for Zhang Yang and this person That said, the actions of the two of them are absolutely relatively transparent.

Because both people have the highest authority in the system, Zhang Yang can see what the other party did. Of course, what Zhang Yang did can certainly be seen. After a pause, this person quickly copied in a piece of software and started to analyze Xingyang's system. Zhang Yang was a little curious about this technical staff. Generally speaking, security personnel will definitely be the first when they see the black Evicted a hacker who entered his system, but now this person has not done so.

Then there is only another possibility, that is, he may also be a superb hacker himself, so that his way of thinking is not the same as that of security personnel, and he does not feel too strong about hackers invading his company’s system. Instead, you can analyze the system first, because at this moment the fool can also see that Zhang Yang is helping him defend the hacker who is attacking the Xingyang industry system outside.

After about five or six minutes, this person apparently had a thorough analysis of the system. After fully aware of Zhang Yang’s transformation of the system, a while later, this person copied a firewall in front of Zhang Yang. Come in. This move made Zhang Yang feel relieved immediately. Obviously, the other party had sent a signal to Zhang Yang silently, that is cooperation.

Otherwise, no security personnel will copy their own firewall into the system when another hacker is present, especially if another hacker also has the highest management authority of the system. Quickly tapped these commands and directly counterattacked the person who attacked the system several times. This was also a signal that Zhang Yang gave the other party to agree with him.

Xingyangye’s firewall originally had three layers of defense. Zhang Yang did not do his best to defend, so the attacker outside had broken through the first layer of peripheral firewall and began to analyze and crack the second layer of firewall while still scanning all leaks and ports of the system However, Zhang Yang has the technology and insight to lead the world for six years. Even if Zhang Yang left his hand when repairing the system, the remaining leaks are not something that this person can find.

Therefore, he can only start on the firewall, and the efficiency of this person invading the firewall is quite high. Obviously, when the other party entered the Xingyang industry system before, he took a rigorous analysis of the Xingyang industry firewall and knew the advantages of this firewall. And the shortcomings, and even part of its code, otherwise, the other party's invasion speed may not be so fast.

The security personnel of Xingyangye immediately lived his own firewall in front of Zhang Yang. A layer of firewall was placed inside Xingyangye’s firewall. When the firewall was completely lived, Zhang Yang was dumbfounded. Because he also has the highest authority of the system, he can naturally see most of the information and functions of this firewall, but it is a bit confusing to see these publicity. Isn't this firewall a lonely dream?

Last time it was when Zhang Yang tracked a few of them. In the defense battle of the National Computer Emergency Response Center, Zhang Yang once released a tracking virus. At that time, because the virus was naturally impossible to distinguish between the enemy and the enemy, everyone was bitten. Including Gu Zhu's residual dream, when Gu Zhu's residual dream was called out in the chat room, Zhang Yang made a virus to cancel his tracking.

However, during that time, Zhang Yang also saw the firewall of Guzhu's residual dream. Even though Zhang Yang couldn't see most of the functions of this firewall at that time, his working methods and so on were naturally obvious at a glance. Zhang Yang immediately thought of the firewall. This kind of firewall lonely bamboo dream can't be used by others. So obviously, the person in charge of the network security of Xingyang Group is the lone bamboo residue that Zhang Yang has seen in gd. Dreamed.

"Dingdong" a clear system prompt sound pulled Zhang Yang back from the daze, and after recovering, Zhang Yang saw that this voice was the sound of sending messages between the administrators inside the Xingyang industry system. It was sent by the other party.

Opening the news, Zhang Yang saw the message from Gu Zhu's residual dream, and Zhang Yang felt a pain.

"Thank you guys, this is Li Taibai, are you?" This is the message from Gu Zhu Can Meng. Zhang Yang is full of depression. Li Taibai, the id Zhang Yang, also knows that it is just a second-hand hacker in China. At least it was a hacker on the surface, but I didn't expect that this guy's deity was actually a lonely bamboo dream. I rely on it. Everyone is so unreal that they are playing with vests.

"My name is l." Zhang Yang replied immediately. Since you are playing in a vest, then everyone is good at playing a vest. Anyway, Zhang Yang is not even prepared to send out the gd id.

"Have you heard of a man named L?" Gu Zhu's residual dream asked quickly in the chat room. Obviously this guy was hanging on the Internet, otherwise, it would not be long before Zhang Yang triggered the system alarm. Received and responded quickly.

"L? His id is just a letter? Is that the hacker who is helping Xingyao Ye at the moment?" gd asked quickly.

"Yes, do you know?" Gu Zhu Can Meng asked in surprise.

"Of course I know, remember what I just told you? The id of that iǎ guy is l." gd said oddly.

"No? I think the strength of this l is quite good? Is it a rookie in your mouth? I went there, did you make a mistake, if the rookies are all of this strength, then what are we doing? Shouted.

"If the two people are really the same person, then his talent is indeed quite scary. In just one month, he has grown from a rookie to the present level, and according to the dream you said, he It is probably the one I knew on the nubi website. When he asked me questions at that time, most of them asked about the blue domain knowledge, as well as the hardware. Now it seems that his talent is really amazing. "Gd said quickly~www.wuxiahere.com~ these things are not a secret between them, so gd never concealed each other.

"Or do you know if you ask directly? Anyway, your identity is a lot of people in the country, and many people in the country know it. Let L know that it's okay." Guzhu Can Meng said with a pause.

GD hesitated for a while. Last time, he and l said that he was not the same person as Yidaoliu, but Gu Zhu's residual dream was right. Many people in the GDid of GDzizhi knew that if this l It was really the words he knew, then sooner or later he would know the people in these circles, and then l would still know the truth, so it would be better to tell him now.

Thinking of the gd here, he said quickly: "Okay, let me go and see." Zhang Yang naturally didn't know that gd had also come over. With the hand of the lonely bamboo dream, the strength of that person is estimated to be It is a little higher than Guzhu's residual dream, and Zhang Yang has repaired all the systems quite completely, so this person is almost impossible to win the system. A! ! ! ;

;

--------------

--------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like