The Strongest Hacker

Chapter 415: Dark tide surge (2)

Chapter 415 The Dark Wave Surges (2)

As the real-time satellite image began to zoom in, Zhang Yang's eyes narrowed immediately. The place where Xiang Tingwei lives is a villa community. This villa community is not such a high-end villa community, but its location is relatively remote, relatively close to S, but in the direction close to the suburbs.

"Is there a comparable photo of this place?" Zhang Yang thought about it and asked. If Zhang Yang remembered correctly, after getting the No. 1 satellite, Zhang Yang activated the'Satellite' and kept it floating in the sky above the city, and couldn't help taking various photos in the sky. I didn’t think much about it. I just thought that satellites are idle and idle. As for satellite energy, it’s about Zhang Yangyang. Chapter 415. The dark tide surges (2). Will he help the US government save satellite energy? , If you use it, you will use it.

"In the search..., the search is completed, the target is found, and the system's database contains all the photos of the city that have been taken since it was started. Is there a comparative analysis?" Infected insects quickly gave the answer.

"Compare and analyze all the photos about the neighborhood of this community, and list them on the screen." Zhang Yang immediately said affirmatively. The architectural style in a villa community is basically the same, but the villa where Xiang Tingwei lives is obviously not the same as other villas. It should be renovated later, and it is a major renovation, including the outside of the villa. Renovated!

It's your business how you decorate the villa area. As long as you buy the house, even if you take down the original house and rebuild it, it is said that you are decorating. Anyway, as long as you pay the money, how to decorate it is your business. Zhang Yang narrowed his eyes and didn't know what he was thinking, but the movement of the infected insect was not slow at all.

Soon, a folder appeared on Zhang Yang's computer with hundreds of thousands of photos. "Stop!" Zhang Yang had some headaches and had to stop. He forgot that the speed at which the satellites took photos was basically ten seconds. Chapter 415. The dark tide surges (2), which means one day I don’t know how many photos there are about this city. Infected insects made these photos all at once. Although Zhang Yang only looked at these pictures through his notebook, Zhang Yang felt that his notebook was just a bit unbearable. Heavy burden.

Infected insects are not humans after all, and they will execute whatever commands Zhang Yang gives them. "Put it up at a contrasting rate of one per day." Zhang Yang gave the latest instructions. In this case, it would be less than 200 photos per month.

It didn’t take long for Zhang Yang’s words to fall, and almost all the photos in the folder disappeared. The photos that Zhang Yang needed were left. These photos are all treated by the infected insect. The above is only about the scenery near Xiang Tingwei’s villa and then zoomed in according to the shooting date Arranged together.

Such a release is quite obvious. Zhang Yang glanced at it and immediately affirmed that Xiang Tingwei's villa had not only been renovated, but also had a large-scale renovation! Judging from the photos, when the villa was renovated, the construction team even set up isolation belts around the villa to prevent idlers from waiting in, but unfortunately the satellites were taken from the sky, which can be seen from the photos. When the villa was renovated, a large basement was rebuilt under the yard of the villa.

Xiang Tingwei lives in such a big villa, why do he need such a large basement? Zhang Yang touched his chin and looked at several pictures on the computer that lined up several trucks transporting furniture. Zhang Yang narrowed his eyes and tapped his fingers on the table irregularly. Liu Liu Chengyin, did not expect that he accidentally discovered a little secret of the other party.

"Beep beep" The piercing system sound suddenly sounded, and the worm alarm sounded in real time: "The Star Group's mother nest firewall was invaded by a virus, and the virus has been infected with the first protection protocol."

"Well?" With the alert of the infected insect, the computer desktop in front of Zhang Yang has automatically switched to the management page of the mother nest. Looking at the various alarm messages fed back by the mother nest on the management page, a little surprise appeared on Zhang Yang's face. Zhang Yang's hands quickly knocked on the keyboard, and the cold light in his eyes grew stronger.

This is the first virus that can break through the first layer of protection of the mother nest, that is, the first layer of defense against viruses. You must know that the mother nest had no way to break through the infections written by Zhang Yang himself! Quickly checked the progress of this virus infection, Zhang Yang immediately felt relieved. The protective shell of the mother nest has a total of five layers. Except for the innermost layer of the shell that protects the core code, the remaining four The nesting of layers forms a perfect defense mechanism, basically preventing any virus from invading.

But now it seems that there will never be an absolute thing in this world. This virus that has broken through the first protective shell of the mother's nest is already working to destroy the second protective shell, but according to the current progress, it will be more. For a few hours, I am afraid that this virus has no way to break through the second protective shell.

Zhang Yang quickly called up the mother's nest system log. Soon Zhang Yang found what he needed in the system log. Looking at the virus intrusion process recorded in the mother nest system log in detail, Zhang Yang's eyes narrowed immediately. It is clear that this virus was specifically written for the mother nest.

The mother nest was written by Zhang Yang himself. Its defense methods and methods are naturally clear. The mother nest relies on simulating and recording the entire system file, thereby excluding all virus files illegally entering the system, so as to completely remove all viruses, Trojans, and even For illegal purposes.

But it does not have the ability to analyze what kind of virus this virus is, and now the virus that invades the mother nest is quite cleverly written. When infected, it does not go straight to the key files of the system like other viruses. , Because those system critical files are under the monitoring of the mother nest, if you are infected, there is no chance at all. The first file infected by this virus is not the critical file of the system, but the cache file generated after the various programs of the system have used it!

It is also a temporary file that we often say. The so-called temporary file refers to the temporary storage on the computer, so that the system can quickly read this file when the system accesses the same program again, just like the IE temporary file we often say, it is We will download some pictures and other information on the websites that we often log in to your computer. The next time you visit this website, the pictures on these websites and some information will avoid repeated downloads.

It is naturally impossible to simulate the mother nest of such cache files, because these files are frequently deleted and are useless files, so the mother nest will not simulate these files. And after the virus infected these files, it will not copy indiscriminately, but immediately start to simulate these cache files.? 逪飧龌羧羌保嫖嫖招Wandering down admirationRelentless?br/>

Although the mother nest will be detected at this time, because the virus emulates the cache file at this moment, its behavior is no longer illegal in the detection mechanism of the mother nest, and the mother nest will not alarm. After all, Mother Nest is different from other anti-virus software. It does not have a virus database, but only detects some programs that the boat owner illegally runs.

Having figured out the process of the virus infection, Zhang Yang was slightly relieved. Angrily, Zhang Yang was shocked when he first started to report the infection, and even the infected mother could not invade the mother's nest. If someone can write a virus to infect, then the author of this virus is absolutely bullish.

Now it seems that although it is the mother’s nest that has successfully broken through the first protective shell, it is extremely unlikely to succeed. This virus just caught a small loophole in the mother’s nest and made a coincidence. . But by coincidence, this computer virus hacker is definitely a master, because the mother nest written by Zhang Yang, other hackers cannot know the principle of the mother nest, and can only guess the principle of the mother nest through various temptations.

However, this tentative Jinhuan will also be detected and alarmed by the mother nest, but Zhang Yang has not received many threatening alarms from the mother nest recently, that is to say, the other party is definitely a master in the field of virus, and is very experienced. Extremely, through a little trial and error, I probably guessed the hole of the mother nest.

Since the virus was discovered by the mother nest, Zhang Yang was also welcome. After catching the virus with his own analysis software, Zhang Yang directly used the mother nest to kill the virus. After anubis killed the virus, Zhang Yang gave an instruction to the infected insect to start tracing the infection path of the virus, while pondering his chin. With such technical strength, Zhang Yang can think of only one GOD, There are people in anubis.

The GOD virus's attainment is not low~www.wuxiahere.com~ But GOD has no reason to come to the Star Group for trouble. Of course, this is Yang Yang's guess. But the possibility of GOD is very small, and the possibility of anubis is quite large. After pondering for a few minutes, the prompt of the infected bug sounded, and Zhang Yang checked the results of anti-tracking.

Just like what he thought, nothing happened. This is the first to infect cache files. Then the method of slowly infecting the system is actually a very old virus infection method. Most anti-virus software on the market can detect these viruses, but unfortunately, the mother nest was written by Zhang Yang. This ancient detection method is too advanced. Instead, it is gone. It seems that advanced is not all the best.

The infection method is a bit old, but the ancient has the ancient advantage, that is, it is extremely difficult to track where the virus was infected from, because the cache files of a large server have hundreds of millions, and want to analyze and track these files. The source of this is a very complicated job. If the virus hides itself a few times, it is basically impossible to trace it back.

Master! Zhang Yang shook his head, the other party was only a temptation, Zhang Yang could not counterattack at present. ! ! ! ;

;

--------------

--------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like