LATEST UPDATES

Published at 1st of March 2022 07:31:10 PM


Chapter 499

If audio player doesn't work, press Stop then Play button again




For so many years, he has not been found on the Internet, and his ID has been changed countless times. Many people do not know who he is. In fact, as early as 2001 and 2002, he was the leader in the Sino US hacker war.

But at this moment, he suddenly felt old. In fact, every hacker has his own strong personal style. No matter the firewall, intrusion program and other aspects he often uses, he probably knows who he is as long as he often scans them several times.

Although I don't know who the other party is in reality, I can know the ID on the network and so on.

The one in front of him felt amazing when he broke through the first layer of firewall. Really, many firewall ideas are unrestrained. That feeling has left him for a long time. Obviously, it is not any hacker he knows.

This should be a young hacker who has just entered the industry for a short time. He may not even have systematically studied intrusion and these knowledge, because once the system has learned these, many aspects will fall into some limitations and routines.

But the other party doesn't have it at all, which means that the other party may be self-taught!

Such a genius came out unexpectedly. Cass thought that in the new century, with the development of technology, there might be no genius like Kevin Mitnick.

The field of computer programming will also enter the route of collectivization, programming and large-scale, just like industrial design.

From the highest personal design, hand-made amazing products have gradually become programmed products produced by assembly line operation.

Because the first group of hackers, the network has just developed, and many things are pondered by themselves without the guidance of predecessors, but these growing programmers behind them have been carefully studied and studied. Once the human brain has learned this kind of learning, you want to jump out, not genius but not!

This is one! Cass is constantly trying to defend. He thinks Cass is also a genius in those years. It is nothing more than the confrontation between the old generation of talents and the new generation of talents. Their main battlefield has already left the server of the library.

Although those people there are constantly attacking, the so-called DDoS attacks of the other party are useless in the case of four supercomputer assisted operations, which can be solved easily.

"Jiang Tao, I'll leave it to you." Jiang Yanhai directly reached out and operated it. He directly transferred the battlefield on the server to a nearby control terminal and handed it to Jiang Tao.

"Yes!" Jiang Tao is also a little excited. What is Jiang Yanhai doing? Of course he knows that this is a person picking more than a dozen top hackers. He also wants to participate, but he knows that his technology is better than that.

Mainly relying on his own firewall and programs, he estimated that he could not carry others' hackers.

However, if you rely on the firewall written by Jiang Yanhai and the currently repaired system, he can also play ten at a time! Although he can't view the source code of these firewalls, he can use them!

At least he is a senior security officer. Well, he still has this ability.

In fact, Jiang Yanhai doesn't need Jiang Tao. He can operate at will, but since someone can use it, why not? Do you think switching keyboard is not tired? It's easy to save effort. Just focus on tracking the one in front of you.

The battlefield of the two of them has reached another large server, which is the server of a company renting the server. The server here contains at least hundreds of company websites, server databases, etc., so the network communication here can be guaranteed.

But similarly, it is not so simple to defend so many servers, and Jiang Yanhai made a detour after confirming that his firewall is good and stepping up the attack on the firewall.

Quickly find the names of the companies that provide leasing services from the public information. Jiang Yanhai found these companies directly along the company's name, and then invaded the ordinary computers of these companies.

The ordinary computer protection of these companies... For Jiang Yanhai, it's like nothing. He directly finds the computer of the other party's employees responsible for security protection. The level of such employees will not be too high, so his personal computer will save his account and password.

After getting the account and password, Jiang Yanhai directly launched an official access login request to the server through the other party's computer.

Such access and login requests cannot be completely blocked by the other party, so Jiang Yanhai directly logged in to the server and was still an administrator account. After logging in, Jiang Yanhai immediately began to invade the whole system with his own program.

It's really too easy to capture a server from within.

At the first time of entering the server, the anti tracking program has continued to track the other party directly. While tracking by the anti tracking program, Jiang Yanhai has quickly launched a large-scale attack and directly began to seize control of the whole server with the other party.

The instant outbreak of the battlefield was directly used to divert his attention. In fact, what really started was the anti tracking program, which had already begun to find his next broiler along his data stream.

Cass is a little relieved. This is one of his large broilers. The firewall of such a large broiler is good, and it takes time for the other party to attack its own firewall, not to mention that he has set up a second firewall inside the server.

It's just that he just wiped the cold sweat from his forehead. Before he could pick up the next teacup and have a drink, a crazy alarm suddenly came out on his screen!

“oh!SH!IT!”

The sudden attack immediately startled CASS, screamed directly, took back his hand to get the water cup, and then began to operate fiercely.

"How could this be possible?! where did this guy come from? Haven't I set up a firewall directly?" Cass looked incredible. Although he said that his technology may have declined in recent years, it didn't drop so much?

Are you going too far? How come you just broke into the server in a minute or two and cracked two protective walls, and it seems that his firewall didn't alarm when you cracked it?!

The sweat on CASS's just wiped forehead suddenly came out again. Because this server is a broiler he has been using for a long time, the traces in it are not so easy to erase!




Please report us if you find any errors so we can fix it asap!


COMMENTS