Chapter 688: One Shot!
The little hacker has already labeled this guy who suddenly appeared to chat with him. Pen | fun | pavilion www. biquge。 info
But being able to enter this chat room already shows the strength of the other party, and at that moment he replied with contempt: "We all know that if a punch can have a ton of strength, then this person can ignore any technical attack in the world, but can anyone do this?"
The little hacker is a female voice, and although she is skeptical, she still seems to sound good.
The stranger's voice came out even later this time, a full half minute later: "Well, that's the reason. However, if a person knows a lot about prison intelligence, it is not difficult to steal a prisoner out, as if it is ...... now."
The little hacker, who was a little impatient, suddenly found that the icon of the protection program he designed was not quite right, and when he looked closely, the icon that was supposed to be a guardian angel turned out to be a somewhat shoddy panda image with simple lines.
This panda image will still move, I saw it holding three incense sticks in its hand, and it was constantly worshipping, just like a ......
It's like offering incense to the dead during a sacrifice!
This image is full of the feeling of electronic mapping, the color is neither black nor white, and it seems that people do not feel the cuteness of the panda at all, but have a feeling of viral discomfort......
Under such a bad feeling, the little hacker felt that his computer protection ability was directly destroyed from the inside, and other programs were not attacked in the slightest, and in a short moment, he saw the fleeting monitoring display on his desktop.
That's a hint that several files have been copied away!
The file is very small, each file, is only a few b to tens of K in size, the little hacker remembers, it was the first time he observed a hacker war in Da Mao's house, and inadvertently captured a program fragment, I haven't been able to understand it, and I have stored it in my hard drive for a year or two.
And just after the file was copied and taken away, the icon of the protection program was clearly displayed, and he was attacked from the inside!
Her mouth opened wider and wider, and she couldn't believe her eyes, and in this moment, all the icons on her desktop had fallen, and they were all the icons of the panda burning incense.
In this chaos, I don't know how many of the virus databases I use as a test on weekdays have been taken away by the other party, and how many backdoors have been left by the other party's viruses on my computer!
According to the usual practice, my computer will probably burn down the motherboard in three or two seconds, but to her surprise, when her virus database and other related computer data were taken away, the panda icon on the desktop disappeared in an instant, and the system returned to normal!
"Who are you!" the little hacker felt a thrill as he remembered the strange words of the stranger just now.
"Just call me ft! I didn't expect that I couldn't find the virus database of more than ten gods, but I found the result in you, what a surprising surprise. Hehe, if you want to be a hacker, you have to learn from the red guest first, little girl, and then improve your skills!"
Shocking, but already guessing the name, the little hacker's face was cloudy, and when he heard Lin Mu's last words, he showed a trace of fear.
She could feel that although Lin Mu had hacked into his computer, he had no malicious intent, just to search for something.
The battle between hackers,I have always hated to involve the government,Although I was found by the other party to seize all the information,But there is no fear that the other party will hand over their information to any government,Because there is no benefit in that,And has always been spurned by the hacker circle,This is the bottom line of a hacker。
"It seems that the master is right to let me learn the red guest technique first, this time the other party left his hand to let me go, what about next time......"
Red customers refer to those masters who do not invade other people's computers, but focus on computer protection methods and stand up when the country suffers losses, and the relationship between hackers is spear and shield.
……
Lin Mu looked at the prompt on the monitor with satisfaction, laughing, and didn't even care that he was defeated in the battle with Adam.
"It seems that my guess is correct, Adam, a long-established master, has participated in so many hacker wars, there must be many fragments of the program designed by himself that have fallen into the hands of other hackers, these fragments are just like a note in the eyes of others, but if you can collect all the information, then you can roughly guess Adam's thinking, offensive and defensive habits, and other important information......"
"Previously, I spent a lot of time searching for the information of various hackers in North America, editing the panda incense variant virus that invaded their computers, and then sending these disguised viruses to their computers through the data chaos during the two successive invasions of TV stations. Now, it's time for the harvest!"
From those hacker computers, Lin Mu got not only Adam's technical fragments, but also countless hackers' own technology and identity information, these temporarily useless information, he put it in a virtual disk, monitored by two protection means, and three or four viruses that have never appeared in this world, to ensure that nothing goes wrong.
As for the fragments of Adam's technology, he quickly scanned the information inside, focusing on the changes in the core of the virus.
"I only have three minutes! After three minutes, if I can't take advantage of that moment of data chaos to achieve my goal, then I won't be able to get the biggest victory this time......
Lin Mu looked at him, and after setting up automatic protection, he began to use the Panda Burning Incense Virus as the mother to edit a sub-virus against Adam.
In the silence of the office, there is only the sound of keyboard tapping almost uninterrupted!
……
On the other side, after taking a sip of wine, Adam, who looked even more excited, suddenly felt that something was wrong.
"How can the data suddenly drop to about 70 in the past one or two minutes? They already have the ability to watch the game, how can it be ...... Could it be this FT?"
Able to run rampant in North America, he has not yet been caught by the government, Adam is also a careful and cautious person, slowed down the attack at the moment, checked his computer comprehensively, and found that there was no problem, and still cautiously step by step.
He even sent a group of viruses to the hackers around him, and found that they were just observing, but not collecting data as they used to do.
Time passed minute by minute, and on the TV station page, the "Heavenly Demon Map" became more and more crumbling, and after more than ten seconds, it was enough to be completely destroyed by Adam!
"These guys have learned smartly, and they know that they can't collect hacker fragments that are beyond their own celebrity level, and they always feel that something is wrong......
In such a strange situation, Lin Mu's protection procedures on the other side have completely collapsed, and the data has begun to retreat from North America, Adam doubts in his heart, but he does not hesitate in his hands, and he drives straight forward, and the aggression is like fire.
At this moment, in the special voice program that he usually hid, a beautiful female voice suddenly came.
"Master, I was wrong, I was just hacked into my computer by FT, you can teach me the Red Guest technique!" (To be continued.) )