Chapter 440: Counterattack

What is Fang Luo doing now?

Of course, he's preparing for a sharp counterattack.

He had already arrived at Zhirui Group early and entered the office of the Cyber Security Department, which was working overtime. Xi Zhirui deliberately moved a stool and sat beside Fang Luo, looking intently at Fang Luo's fingers that were rapidly tapping on the keyboard and the gradient computer screen.

The beauty is on the side, and Fang Luo's nature has increased a few points.

Hackers, especially those who make viruses, are people who can't see the light of day. This kind of thing can't be publicized, let alone fanfare, if you really dare to do this, then someone will come to the door the next day to "check the water meter".

Based on Fang Luo's idea, Xi Zhirui also asked Fang Luo to stay in the innermost part of the office of the network department, and no one noticed what he was doing.

The members of the security department outside were depressed and didn't know what to do, but Fang Luo was calm and relaxed, and seemed to be very relaxed.

A good hand can be played at its best.

Hit him by surprise.

Fang Luo in front of the computer was extremely serious, and at this time, he had already controlled the computers that were turned on by the Junnan Group opposite. Fang Luo used his superb computer skills to hunt down the IP addresses of the computers of the Junnan Group that invaded the network network of the Zhirui Group, and then took advantage of this to control the computer through various intrusions, and even the computer of a hacker was completely controlled by him.

But the hacker still doesn't know it.

Fang Luo didn't plan to directly detonate the Panda Burning Incense, but planned to test it, the computers he controlled were the cultures of the Panda Burning Incense Virus, and they were also the first batch of computer infections within the Junnan Group, and they needed to use it to spread and spread. Therefore, in order to seek stability, Fang Luo still had to conduct certain experiments.

Implant the panda incense burning virus.

The first computer, the virus successfully runs automatically, has been infected.

On the second computer, the virus encountered a firewall, breached, and was infected.

The third computer, which controls the computer of a person who is working the night shift in Junnan Group, encounters an anti-virus software that prompts an unknown program and alerts the user. Fang Luo, who controlled the other party's computer, was able to clearly see all the other party's operations on the computer here, and the user immediately checked and killed the virus, but found that it could not be killed, and then he could only click on the quarantine file, and the running program of Panda Burning Incense was next door.

But before the quarantine, the program was actually running with the help of other programs on the computer, and the computer users didn't take these things seriously, thinking that these things were solved, so they rushed to the file and didn't care about it anymore.

But as everyone knows, this computer has actually been infected with a virus.

Fourth, successfully infected.

Fifth, the infection failed. The operating system is inconsistent, and the program runs invalidly.

Sixth, the virus is latent and not infected for the time being.

The seventh station has been infected and has begun to hack into the network of Junnan Group.

Looking at this scene, Fang Luo was relieved, the probability of success in the samples of the experiment was very high, and the high infection rate was a bit terrifying. Except for some fortuitous reasons and computer systems that are not mainstream, most of the rest of the computers are not immune to the invasion of this virus.

At first, I was worried that my virus would be killed by the "killing patch" of this virus database, but the result was that it had no effect, and the Panda Burning Incense virus was unstoppable.

Be mentally prepared.

The big gift is ready.

Fang Luo began to hack into the network and internal websites of the Junnan Group to cast a net, and then helped the Zhirui Group to fill in the gaps in the firewall to resist the hackers' intrusion.

"It's really boring, cat and mouse, this mouse will resist a few times. The lazy blonde hackers yawned as they looked at the 100 percent threshold.

"Hey, hey, that's fine, at least we've earned the money. Another hacker said with a laugh.

"That's it. A Chinese hacker was speaking in English, and suddenly found that his invasion was resisted, and he looked stunned and said, "Why can't you invade?"

As soon as this sentence came out, it immediately surprised the hackers present.

Quickly staring at the computer screen in front of him, he realized that their invasion could not take another half step.

It was as if the protective system, which was as fragile as paper in their eyes, was suddenly equipped with a layer of armor, and their own spear blades could not penetrate at all.

"Interesting. When the blonde hacker saw this, he was so excited that he rubbed his fists and found his fingers on his keyboard.

Suddenly, his computer screen changed, and all the P running icons had changed to a picture of a panda holding three sticks of incense burning.

This made the hacker stunned for a moment.

Immediately after that, the screen of another hacker around him also changed.

Then the third, fourth, and fifth, the computers of all the people present, including the computer screen where Wang Junnan was logging into the website, changed.

"What's going on?" the blonde hacker was stunned.

"There's a virus in the computer. A female hacker said.

Another guy said, "What's going on? Why are we suddenly getting a virus, and all the computers are getting virus at the same time?"

"Impossible. ”

"Wait, could it be the rat we're going to catch back?" said one of the hackers solemnly.

As soon as this sentence came out, it was an earth-shattering shock.

It's not impossible.

After all, the invasion of the Zhirui Group just now was resisted, and then he was poisoned.

By all indications, this is a counterattack.

The other party finally showed his fangs.

At first, I thought that cats and mice would not resist the uninteresting hackers, but at this time, I was stunned when I looked at the picture of the computer running icon turning into a panda holding three sticks of incense and burning it again.

The spread continues.

The computers of some of Zhirui Group's employees who are responsible for working overtime on night shifts were also quickly disrupted.

"What's going on?"

"What's wrong with the computer?"

"I just wrote the copy, what should I do now?"

“”

There was a constant wail in the overtime room.

"What's going on?" Wang Junnan looked at his computer that had also been hacked, and was stunned for a moment, and then his eyes swept over all the hackers present and said angrily.

"The computer is poisoned, and we are cracking it now. ”

"How did you get poisoned?" Chen Tonghe asked with a frown.

"I don't know, we're still investigating. The hacker spoke.

They act as top hackers.

As a top figure in this area.

The computer I control has been invaded by a virus.

It's a great shame. I want to chat with more like-minded people about "{?$article_title?} ", WeChat pays attention to "excellent reading literature", chatting about life, looking for confidants~