Chapter 145 Zeus, the god of thunder, black gloves

Zhang Qiang once invaded Feiyan, Thunder. Pen | fun | pavilion www. biquge。 info

However, it all failed.

Although this failure actually has little to do with himself.

He just went over and took a look.

However, as a hacker, it's the most basic common sense to never stay in the same place twice.

Because the first time I struck, it was an assassin.

One hit misses, and it is thousands of miles away.

If you go the second time, if you are not particularly sure, you will generally not take the risk.

Even if it's been a long time, who knows if the cyber security over there will be staring at that place.

After all, every supercomputer is a treasure in the field of national computing. They are all valuable and have a significant role.

Even many supercomputers are matched with the results of corresponding satellites or other high-tech products.

Therefore, after Zhang Qiang was greedy for Feiyan and Thunder for a long time, he still didn't have the courage to go over there for a walk.

I used several of the software I developed again.

After that, Zhang Qiang began to look for some relatively new software or anti-virus tools, as well as firewalls and other resources in major forums.

Then, it's time to download it and start cracking it to find out the latest technology that has nothing to interest him.

Not to mention, this walk, Zhang Qiang really found a few geniuses.

Although the subject matter is good, the ideas and creativity are also very good, but after all, it is newly developed and has not yet been perfected.

And in some aspects, even Zhang Qiang is in a fog, he doesn't know much about it, and he doesn't know how to explore.

After following a few posts and people, Zhang Qiang turned them off.

Right now, it's not needed.

The filming of the student promotion chapter has ended, and the rest is the intra-team competition in a week.

A total of six episodes have been edited so far.

Two episodes were broadcast.

And at the request of the audience, the original ten people became twelve, and four mentors, that is, forty-eight people.

Or knock out half of them.

The average income of each episode is 8 people, and the screening is about 15 people, which happens to have a good rhythm.

At present, the four mentors, under the arrangement of Vincent Entertainment, have begun to invite the auxiliary mentors of each team to help the mentors.

This assistant mentor can rely on the mentor's own connections and connections.

With the ratings of the second episode of The Voice exceeding 2 at this moment, I believe that many celebrities will be very interested in coming over to make a cameo and go through the motions.

Because of this, Zhang Qiangcai spent a lot of time preparing for his own things.

……

At 2 o'clock in the middle of the night, I was sent to bed by Zhang Qiang early every day.

And Bai Xilong, Wang Hao, and William, who had been trained by Zhang Qiang for a week, were also asleep at the moment. The process of accumulating technology does not need to be so fortunate.

Moreover, according to the progress of several people, it is estimated that it can be used after a week, so Zhang Qiang was not forced to stay up late with him.

Moreover, what Zhang Qiang wants to do at the moment is not a good thing, and he has not yet thought about which supercomputer to get.

If needed, he will use Huaxia's supercomputer.

When the time comes, it's hard to explain.

You are a person who represents the country, and then hacked into the country's system, no matter how you look at it, you feel that you are tired.

Subsequently, Zhang Qiang began to collect information and data from several supercomputers that he had seen.

Observe the network site, as well as the sending traffic, etc.

It's better to find the kind that is stable and basically unchanging.

Most of that kind of supercomputer is in a state of hang-up, rarely monitored and used, and most of them are immutable, in order to safely maintain the operation of a certain device, or collect data on something.

This kind of thing was planned when the supercomputer was first built.

And if his data keeps jumping, sometimes high and sometimes low, then it is almost certain that there is a high probability that someone is using it, whether it is transmitting something or downloading something.

It's all inevitable that there will be fluctuations.

Then a supercomputer that someone is using is not very easy to use.

After all, people at high levels, from the clues, inexplicable lag, or network latency, etc., can judge whether their system has been messed up or not.

It has been more than an hour, and Zhang Qiang has been observing the fluctuations of several data.

If there are large fluctuations, Zhang Qiang will also wait patiently.

He doesn't believe it, even if it's a time difference, Lao Tzu guards it all day, and he doesn't believe that your computer won't rest, and someone will always use it.

Compared to an hour ago, the fluctuations on several computers have smoothed out. And several, but suddenly began to fluctuate.

These things require some time and patience to observe.

Because even if it is stable or unstable, it may be a trap specially made by some network administrators, just to let people fall into the trap that they have already made.

Obviously, Zhang Qiang's patience is very sufficient.

In the blink of an eye, another few hours had passed.

Seeing that the time had passed four o'clock. Zhang Qiang drank a cup of coffee again, lit a cigarette, took a puff, and then quietly looked at the data and waited for it to burn out.

Hard work pays off.

After spending an afternoon to an evening of observation, Zhang Qiang finally found a few computers and felt that he could start.

The corresponding ones are Zeus, the god of thunder in the United States. The performance is comparable to the thunder, and the operation is slightly higher than the thunder. Reach 80 million times per second!

ED national supercomputer T12 type, alias black glove. , 70 million seconds counted. It is dedicated to the internal use of a large organization.

……

There are a few others, Zhang Qiang is looking for more than 50 million seconds, which is very different from the flying fox.

If you want to hack into these supercomputers, it can be said that there is difficulty, or it can be said that there is no difficulty.

Because even if the systems used by these supercomputers are not familiar to Zhang Qiang, no matter how good the system is, as long as there are loopholes, Zhang Qiang knows a lot about the loopholes that are ignored because there is no breakthrough in technology.

This is all thanks to years of research on memory and knowledge of patching vulnerabilities.

The hard part is whether you can enter smoothly and quietly.

As mentioned earlier, supercomputers only have one chance.

And there are only a few of them that are more than 50 million seconds. If there are too many failures, unless you take a big risk, then, in this life, Zhang Qiang's hacking skills will qualitatively stop before the highest hacker.

Although it has been all night, Zhang Qiang is not sleepy at all.

When it comes to hacking into a computer, in addition to relying on technology, many times it depends on luck.

If a vulnerability is found at one time, the time it takes to hack into a computer will be greatly reduced.

And if you're unlucky, you may not be able to find a single vulnerability after checking your computer hundreds of times.

And Zhang Qiang's first-come, first-come, first-served decision allows him to save a lot of time.

"Come on, let's start with Zeus, and I'll be more domineering than others."

Thinking like this, Zhang Qiang pushed the chair under his buttocks, came to his three-screen computer, connected to the flying fox, and then began to input the site of the gods, and regulated, input a few vulnerabilities that he knew, and began to detect.

The detection time flies by in a flash.

With the huge operation of the flying fox, it is very fast to analyze these things.

Zhang Qiang glanced at the detection in surprise, a screen is green, representing the red of the vulnerability, and there is none, which is a bit interesting.

What I just entered,All of them are vulnerabilities of the win system.。

It seems that Zeus, on the other side, is a system that is specially made with money.

Also, if such a computer uses a popular system, the number of hackers who will be hacked will increase by at least hundreds of times.

Subsequently, Zhang Qiang began to linger and wander around the periphery of the system step by step.

As soon as you encounter a firewall, you slip away.

As a last resort, you must not touch the firewall, this information is not easy to eliminate.

After a long time, Zhang Qiang was surprised to see that more than half an hour had passed, and Zhang Qiang still found nothing.

Nima, this system, no, how can it be so good, compared to the technology after two or three years, it is not worse at all.

It seems that the person who wrote this system is a master, at least, in compilation, firewall, etc., is a master, and has super defense capabilities.

Glaring vulnerabilities. It's basically patched.

And it's very strange that in some subtle loopholes, the honeypot alarm was put down.

If anyone is excited to discover these loopholes and rush in in a hurry, congratulations, you have been arrested.

Thinking of this, Zhang Qiang showed a look of interest.

This person's handwriting should be very outstanding in later generations.

It is impossible to be obscure.

The occasional confrontation between hackers is a must, because there are some tasks that actually involve the remuneration earned, and other things, which belong to the gray field, whether it is good or not, and whether it is bad or not.

And a lot of hacked databases and other things that are copied are not of much use to hackers, unless you get some real identity entry.

This works for a hacker with his own large database.

Other company databases, as long as you don't step into that field, are basically useless.

Therefore, it will be sold to buyers of other companies.

As for what they're used for, that's their business.

Therefore, many hackers, and the network administrators of some companies, as well as the national network administrators, basically have intersections or greetings on the Internet.

There are occasional conflicts.

One look at the technique, one look at the technology, most of it is to understand, what guild should be, or what department who is who.

Even if you don't know the true identity of the other party, where is the technology and strength. Therefore, when the general hacker is running around, if he finds some masters, most of them will announce it, and the network manager of such and such a company listens to it, what is the name.

After that, most of the people who are interested will challenge and learn.

If the defense comes down, congratulations, you will become famous.

As long as it's something you're defending, most of them will give face and don't touch it. After all, when there is no great grudge, it is better not to make enemies.

Don't you see, are all hackers who have caught a lot of super hackers?

What, you say cybersecurity? If you really want to be a master, only in the people. As a hacker, a hacker who yearns for a free spirit, who would consider serving the state.

Except for some of the red customers in the first and second generations, they hope to learn technology to serve the country. Most of the other hackers are alone.

Because two highly skilled hackers are dangerous organizations and premeditated.

;