Chapter 252: Dry (Medium)

Chapter 252 Stem (Medium)

Chapter 252 Stem (Medium)

No matter how yíndàng is also a floating cloud, after finding the other party's real IP, Zhang Yang couldn't help but smile proudly, xiǎo look, brother let me know today, what is the result when a coffee table is full of cups, brother will let these cups all become tableware today!

With the progress of the scanner, Zhang Yang soon had a way to invade, although the protection means of this system are quite good, but for Zhang Yang, it is still very simple to invade it. No way, the height problem, the world will only look at the height you are at, and it doesn't care if you step on the garbage heap or on the shoulders of giants.

Zhang Yang didn't step on the garbage heap, nor did he step on the shoulders of giants, but stepped on time. Who has time to be stronger? From a scanner a few years later, scanning such a system, although the owner of this system is very powerful, but in front of Zhang Yang, he is still a floating cloud.

While preparing to hack this server, Zhang Yang monitored the actions of this financial hacker again. When this person just returned to the big server, he was very anxious, and he had a lot of time for this, otherwise, Zhang Yang wouldn't have had so much time to track down his real IP address.

But now it's okay, this guy can't run if he wants to, and after a glance at what he's doing, Zhang Yang just kicked him out, he just followed him, and didn't delete his things in the big server, and now this person has started to copy things into the server again, and in the software copied by this person, Zhang Yang found the parent program of the financial bomb.

Okay, it looks like you really want to plant it, but baby, you may never think that your current planting is completely useless. Whether it is Pan Wenlong or this hacker, I am afraid that he would never have thought that there would be a direct connection between Zhang Yang and Black Hawk, and Zhang Yang could still say something to Black Hawk, otherwise, Zhang Yang would really be tragic today.

After taking a look at what he was doing, Zhang Yang quickly began to hack into his computer. Zhang Yang had already prepared for the invasion, and when he started to do it, the efficiency was very high, that is, in less than 10 minutes or so, Zhang Yang successfully broke through his firewall and entered his computer. Carefully checked the computer, it was very good, very powerful, Zhang Yang couldn't help but drool.

The xìng of this server can be quite bullish, although it is not as good as a supercomputer, but it is about the same as the general xiǎo supercomputer, and the cost is probably at least millions of dollars, it seems that these guys who engage in financial hacking are rich, but this risk is also quite considerable, many hackers actually use their own technology to make money, but the amount of money these hackers have from the bank is xiǎo number.

Thousands, or tens of thousands, like these financial hackers, although it is impossible to act like this time in ICBC, a billion at once, but at least nòng out of millions each time, tens of millions or so, these money after the website of those large international money laundering organizations, although there may be a small part, but for most hackers, this money is still a huge amount.

The financial system doesn't just refer to the banking system, just like a lot of websites like Taobao, or some companies have events like the online chōu awards, most of them are in the hands of these hackers. Although some companies may hold chōu award events, most companies hold similar events very fairly, but as long as this fairness is targeted by hackers, the chance of ordinary netizens wanting chōu is almost zero.

The firewall in the server, the system settings are also quite good, and more importantly, when Zhang Yang secretly opened the hard disk of this server, it was full of a lot of software about the financial system, as well as viruses, etc., which are the biggest evidence.

But this person's IP shows that it is in Hawaii, USA, and even if Zhang Yang gets these evidence, he only made a wedding dress for the FBI in the end, which is not good for Zhang Yang. American financial hackers, Zhang Yang thought about it carefully, the famous ID is money, which is directly used to ID money, and the other is a greedy ghost translated from English.

These two guys are absolutely superhuman in terms of talent in the financial system, could it be one of these two? Zhang Yang has only heard of money and greedy ghosts, and he has never fought with these two people in his previous life, but he only knows a little of their achievements, so he can't tell who this guy is from this system.

In this guy's computer hard drive, Zhang Yang quickly discovered all the information about the financial bomb, as well as the method of disarming it, etc., but Zhang Yang of the province cracked it. Zhang Yang unceremoniously copied all these things back to his computer, and saw that the guy was still "happy to do this" as evidence to frame Zhang Yang, Zhang Yang smiled strangely, do you want to kill his server directly, and let this guy move quickly?

While hesitating whether to check what this guy was called from the Hawaii city system, Zhang Yang didn't listen, but quickly placed traps and viruses in his computer. Just when Zhang Yang was about to directly kill this guy's computer, his eyebrows suddenly jumped, and Zhang Yang suddenly remembered a crucial thing, that is, if he found his real IP, then the ghost virus that had been following Zhang Yang's actions should also be discovered.

But if the ghost virus finds the real IP of the other party, there will be a prompt, but so far Zhang Yang has not received a hint from the ghost virus. Could it be that this computer is not his own computer yet, but is still just ròujī? Unlikely, right? After invading this computer, Zhang Yang quickly retrieved the IP address of the computer connection, and confirmed that the last connection of this computer was interrupted, and no new IP address appeared.

Somewhat suspicious, he stopped the action in his hand, Zhang Yang quickly switched to the page of the ghost virus, after switching over, Zhang Yang was even more weird, the ghost virus did also find the front of this server, and the IP found was the same as the IP confirmed by Zhang Yang, but the difference is that the ghost virus at this moment still did not stop working, and it was still in a state of searching, that is to say, the analysis of the ghost virus, this server is still his ròujī, but now the ghost virus cannot confirm the new IP stream, that's why it's in a state of searching.

Depend on! What the hell is it? Zhang Yang was a little incredulous, and quickly switched back to the front of this server, he searched all the ports again, as well as the computers and IPs connected to this server, yes, only the Ròujī that followed Mō all the way, and there was no second new IP to connect to this computer?

Could it be that the ghost virus went wrong? Zhang Yang's brows furrowed, it seemed that this was the only possibility, but Zhang Yang had a feeling in his heart that the ghost virus should not be wrong, and there must be something he didn't expect. This is the advantage of the program, although the program is rigid, but rigidity has the advantage of rigidity, only it feels that it is not a real IP and will keep searching, but if it is a person, seeing such a situation, it will not continue to track it all of a sudden, and it will be confirmed that this server is someone's real IP.

Without data streaming, without a new IP, it is impossible for a person to connect to the network. This is the essence, a person can't appear on the Internet for no reason, unless it's like a movie, there is a rather bullish artificial intelligence that may appear like this, otherwise, there will inevitably be an IP.

Since there is no second IP connection to this computer, if this computer is not the real host of the other party, then there will definitely be data streams that you don't notice.

Depend on! Thinking of this, a bright light flashed in Zhang Yang's mind, he thought of a possibility, Zhang Yang's eyes lit up, and he immediately searched quickly, mlbgd, if it is true, this guy is really enough to describe the cunning of this slut.

Zhang Yang quickly opened his analysis software, he didn't do anything, but quickly began to scan the data between the data streams connected to this computer. While scanning and analyzing, Zhang Yang exited from this server, and then quickly returned the same way, while returning, one by one, checking the data of each ròujī in addition to its own data flow action. Soon, in the penultimate place, where Zhang Yang thought it was the guy's first-level ròujī, he found the cat.

Except for the data used by Zhang Yang itself, starting from this ròujī, all the data was greatly reduced xiǎo, and Zhang Yang immediately understood that he had finally found the real host of this guy! This guy's real host is not the host in Hawaii at all, but this first-level ròujī that was once regarded as ròujī by Zhang Yang, and then drilled out of it and continued to go out is his real host!

It seems to be a bit mushy, but in fact, for example, if the data flow of this slut connecting to various computers is compared to a line, then this guy makes a part of this line discount, first extends in one direction, extends to a point, that is, the Hawaiian server, and then begins to disguise that server, and then folds back, and then blackens his own server as a ròujī, and then connects another one from his own server. And then go all the way out and do someone else's business.

It's like Zhang Yang hacked the school server with his own computer, and then used the school server as a springboard to hack his computer again, and then hacked another ròujī with his own computer, so that when others tracked it over, they tracked Zhang Yang's computer, because the data flow from the tracking was illegally entered Zhang Yang's computer, this person would think that Zhang Yang's computer was ròujī, and then continue to track down, when it was traced to the school server, When he found that there was no second IP connection to the school computer, he would take it for granted that the school computer was the server.

But I wouldn't have thought that this slut had just overlapped the data streams, who would have thought that the real target you were looking for had actually been hacked by you, and then you had gone over it?