Chapter 3 and Chapter 25 Comparing Yourself and Yourself (I)

GD's shot was expected by everyone, but the position of the shot was unexpected by everyone. And the ferocity of the offense made the hackers who watched GD's shot embarrassed, which is a formation tossed out by one person? Are you sure this is not an organization?

The attack mode of the infected insect is not the same as that of ordinary hackers, and it should be said that the infected insect only makes the optimal choice to achieve the purpose, and does not care which way is more bullish. Because Zhang Yang gave it a part of the right to choose independently, the infect instantly assigned all the targets to the servers of the four official websites at the same time, and it was the first to use it. Help C attack, after all, for people,...... To attack you have to command numerous broilers and enter commands.

However, for computers, especially now, although the performance of infected insects cannot be maximized, this part of the performance alone is enough to use. In use. While helping C attack a computer, the infected insect also threw a large number of virus bombs directly at several other official websites, which contained various variants of computer viruses, including sub-viruses derived from the infected worm itself.

When the infected insect attacks, its database records the reactions of the other system's and the firewall at the same time, and then performs centralized calculations to analyze more effective and feasible methods. The infected worm runs according to the program, but the hackers watching the battle are full of cold sweat, if it weren't for the fact that these attacks all came from the same mail, these people would think that this is a tight organization, not a movement made by one person.

Such a huge attack flow, although it is impossible to pose much threat to the firewall, but around the case, the technical personnel responsible for the maintenance of the official website server of the three major intelligence departments were immediately a little scrambling, and all kinds of instructions kept popping up in front of the computer screen, once the operation was a little slow, maybe this instruction would lead to the collapse of the entire system and the firewall.

Naturally, the technicians of such an intelligence organization cannot just be beaten passively, but the simultaneous attack of the infected insects has made the technicians of several major intelligence organizations temporarily unable to carry out counter-tracking, and they can only withstand the ravages of the infected insects at present. The U.S. network is in turmoil, and the domestic network is also not calm.

Zhang Yang was also staring at the computer screen with a nervous face at the moment, because all the resources of the infected insect had been mobilized to attack, and Zhang Yang couldn't use the infected insect here, so he could only defend it himself. But fortunately, there is a brood in hand, and almost all the attacks of the other party have been stopped by Zhang Yang.

The faces of many hackers watching the battle at home and abroad were extremely weird, and everyone looked at their computer screens in amazement, watching the official website of the Ministry of Foreign Affairs under such a terrifying attack flow of the other party, but it was still guarded as solid as an iron bucket.

Where did this L come from?! Everyone's minds were almost full of shock and this thought! It's so weird.,There used to be a gd that popped up all of a sudden.,Now there's an L.,Does it mean that the master of this world is so worthless? Let's take a look at what these two people have done, one person is single-handedly carrying the three major intelligence organizations of the United States, plus a technician from the official website of the Ministry of Defense, although it is said that the technical personnel in charge of these four official websites are not the real elite of the other party at all, but around the so, who dares to jump out of the world who can do this?

No! There are still a few people with similar GD strength, but there are not so blatant, upright and black. The power of the three major intelligence services of the United States combined is even a little chilling for many hackers, but the axis. That's it! One

Seeing this scene, the Chinese hackers all began to tremble with excitement, since the GD gods have already set their sights on the three major intelligence departments, then we can't be soft, right? The intelligence department is gone, but there are many websites of various government departments, and these black groups immediately pounced on them like a pack of wolves.

And this pervert in China is to carry the attack of a rigorous and well-coordinated many hacker masters with his own strength, and the defense is still impregnable, at least for now, it seems that the attackers have no way to invade the official website of the Ministry of Foreign Affairs even one step! The hacker who was ready to stay in the country to help was also dumbfounded, and he was fascinated, when would he be like the great god in front of him, just like the legendary Changshan Zhao Zilong, killing in and out of the enemy group!

It can also resist the enemy thousands of miles away, and turn the enemy's attack into invisible, which is too good. These hackers sat in front of the computer and their faces were red with excitement, but Zhang Yang's face was extremely serious, and he didn't have time to get excited.

His scanner has been keeping an eye on the other side's several data streams.

If these people are really ghost troops, then once they can't attack for a long time, they will definitely divide part of their forces to hack other government websites, and the honeypots arranged in several telecommunications network nodes have sent back messages, showing that many American hackers have also entered the country.

You don't have to think about it to know that you are attracted by the infected worm, the infected worm is attacking over there, the American hackers have different ideas from these domestic hackers, and some of the domestic hackers will come to help defend, but the American hackers don't even think about it, so they just rush to attack.

How boring is defense, how fun is it for everyone to mess around? So these American hackers came to do it in a hurry as soon as they discussed it, so we are also the boss, right? Just like the United States claims to be the boss in the world, American hackers also have a sense of superiority, and they all think that their technology is the best in the world, while China, in their eyes, is just a country that was a computer blind spot a few years ago.

In fact, if it's just defending a website, Zhang Yang doesn't have much to do, after all, the self-living defense function of the brood can already be an unreserved defense system. Even the infected worms have no way to deal with the brood, and even if these hackers are awesome, they are at most at the same level as the infected, and there is still nothing they can do about the brood.

And what to say about the brood, if the brood is used for complete defense, it is actually very perverted, even if it is a garbage system that does not fix the loopholes, after installing the brood, it is like you stripped a beautiful woman, but you find that the beauty is not wearing anything else, but underneath is wearing a super awesome alloy pants, you can just look and touch, can flirt, but you can't do anything.

I don't know if it's because of GD, after these American hackers came to China, they didn't attack those portals that hackers usually flock to, and the target was also the domestic government website. But Zhang Yang is now mainly monitoring the traffic on the network.

Just now, the official websites of the Ministry of Public Security and the State Council resumed normal access, but these American hackers immediately targeted these two websites, and as soon as these hackers made a move, Zhang Yang immediately knew that these two websites were not good and were about to be lost, so after Zhang Yang paused, he didn't even hesitate, and directly took advantage of the loopholes in the systems of these two websites to directly hack into these two websites, and then copied two broods into the servers of these two websites.

At the same time, the mother nest is turned on the centralized control mode, the so-called centralized control mode is actually like the ant population, the queen ant can control all the ants, and then each ant is a separate doppelganger, showing a kind of collective wisdom. The centralized control mode of the brood is similar to this.

In fact, the function of each doppelganger of these broods is the same, but when it is centrally controlled, Zhang Yang issues an instruction, and the subsystems of these brood will receive, and then they will exchange information with each other, such as Zhang Yang issued an instruction to the brood clone A to refuse all illegal access requests. Once B and C find that they have the same illegal access request as the mother nest A, the mother nest B and c will immediately automatically reject it, without giving the instruction again.

These two were attacked, and the hackers who were watching the battle outside naturally saw it, but before they could react, they found that some American hackers who had made progress were kicked out again, and these domestic hackers also tried to scan it, and after scanning, they found that these two websites and the website of the Ministry of Foreign Affairs have become exactly the same, one iron bucket, and even the way of refusal and defense are exactly the same.

Needless to say, it must have been L who shot. Before the domestic hackers began to be surprised, the mysterious American hackers also found out about it, and in their opinion, since this mysterious L clone went to hack the other two websites. Then the defense of the website of the Ministry of Foreign Affairs should not be so tight, and these mysterious American hackers immediately returned to the front of the website of the Ministry of Foreign Affairs again and stepped up the intrusion into the website of the Ministry of Foreign Affairs.

However, the result of the invasion surprised them all a little, and their invasion had any result, and the opponent's defense was still leaky. Is it possible to defend several websites at the same time, and the other party can still achieve such a terrifying defense? Although they knew that the defense was certainly not operated by one person, it must have also installed a new type of firewall.

But even with a firewall, some instructions need to be operated by humans, and it is impossible for the firewall to monitor all actions against the system. Then it is inevitable that some of them will be distracted to control, but at this moment, the opponent has no problem defending the three websites?

After the mysterious hackers paused the attack, they immediately began to divide their troops, but they did not go to the officials of the Ministry of Security and the State Council, but began to hack several other departments, such as the National Development and Reform Commission, as well as the official websites of the Ministry of Education, that is, all the websites of the government were the targets of their invasion.

Their reactions are fast, but their reactions are not slow either. The systems of the above servers use the same system, and this system has been modified by the Institute of Computer Science of the Chinese Academy of Sciences, because these systems are very unified, so Zhang Yang can use the same system vulnerability when hacking into each system.

But the firewalls of these systems are installed differently, whether these are mysterious hackers or hackers from the United States to fight soy sauce, they still need to analyze the system before they can choose the way to attack, but Zhang Yang does not use it. What Zhang Yang has to do is that when they attack a target, Zhang Yang directly hacks the target in advance, and then copies his mother set into it, and then directly adds this mother nest to the centralized control mode, and then the gang.

Soon, the opponent's targets were all over more than 20 government websites, and even some of the government websites that played soy sauce were attacked, but they were still useless, and each website was still defended like an iron bucket. At this moment, the whole network is completely crazy. This.... Who are they?

Could it be that the Martians have invaded? Otherwise, it would be perverted enough to appear a provish, and an equally perverted L suddenly appeared? Many people's heads are a little unbright, what is this situation?! Among the people who have no bright heads at the moment is Black Hawk.

Black Eagle smiled bitterly and looked at several large screens in the hall of hundreds of square meters, this is the data center of the National Computer Emergency Center, and all the personnel of Black Hawk's entire sub-bureau have been mobilized here, because of this inexplicable Sino-US hacker war.

It has been more than two hours since the two sides appeared and now the white heat, but at this moment, the scene is indeed extremely weird. After all, everyone knows that when these three official websites of the world's largest intelligence organizations are breached, it means that other websites of the US government are like virgins, which will be broken by GD.

And the domestic ...... "The situation in China is even more weird, several documents in the hands of the Black Hawk make the Black Hawk cry and laugh, the situation in the country is just the opposite, at the moment there are already a lot of American hackers gathered in the country, but they are like touching a thick iron plate, no matter how you poke it, you can't poke it.

To be honest, this L is perverted enough, and Black Hawk doesn't have a good way to do it now, L is pretty awesome, but the problem is, (it's so awesome, it's so awesome that all the Internet elites in several departments such as National Security and Gonglu Security that Black Hawk have nothing to do.)

It is also true that there were originally so many maintenance personnel, staff, and technicians of the websites of government departments and departments, which were not a small number, but at this moment, L accepted all their work, and they are now like those hackers on the periphery who watch the excitement, and they have become onlookers who do not know the truth. If you like this work, you are welcome to vote for recommendation, monthly pass, your support is my biggest motivation. )