Chapter 523: Immortal Fight (Part I) (3500 Monthly Pass Plus Change Monthly Pass)

For so many years, he has not been found on the Internet, and his ID has been changed countless times, many people don't know who he is, in fact, as early as 01 and 02 years, he was the leader in the Sino-US hacker war.

But at this moment, he suddenly felt old, every hacker actually has his own strong personal style, whether it is the firewall he often uses, intrusion programs and other aspects, as long as he often scans a few times, he has a rough idea of who it is.

Although I don't know who the other party is in reality, I can know the ID on the network.

And when he broke through the first layer of firewall in front of him, he felt a kind of amazement, really, many firewall ideas are imaginative, that feeling has not made him for a long time, this is obviously not any hacker he knows.

This should be a young hacker who has just entered this industry for a short time, and it is even possible that he has not systematically learned the knowledge of intrusion and these aspects, because once the system has learned these, many aspects will fall into some limitations and routines.

But the other party has no at all, which means that the other party may be self-taught!

Unexpectedly, such a genius appeared again, Cass thought that in the new century, with the development of technology, there may be no geniuses like Kevin Mitnick in the past.

The field of computer programming will also enter the route of collectivization, programming, and large-scale, just like industrial design.

From the highest personal design, handmade amazing products have gradually become assembly line operations, produced stylized products.

Because the first batch of hackers, the network has just developed, and many things are pondered by themselves, without the guidance of their predecessors, but these programmers who have grown up in the back, they are all carefully studied and studied, when the human brain once this kind of learning, you want to jump out, you can't be a genius!

This is one in front of you! Cass is constantly trying to defend, thinking that he Cass was also a genius back then, it was nothing more than the confrontation between the geniuses of the older generation and the geniuses of the new generation, and the main battlefield of the two had already left the server of that library.

Because although those people there are constantly attacking, but in the case of four supercomputer-assisted calculations, the so-called DDOS attacks of the other party are useless and can be easily solved.

"Jiang Tao, I'll take care of it here." Jiang Yanhai directly stretched out his hand to operate, and directly transferred the battlefield on the server side to a control terminal next to him, and handed it to Jiang Tao.

"Yes!" Jiang Tao was also a little excited, what was Jiang Yanhai doing, of course he knew that this was a person who singled out a dozen top hackers, and he also wanted to participate, but he knew that his skills should be forgotten.

Mainly relying on the firewall and programs written by himself, he estimates that he can't bear one of those hackers by himself.

But if you rely on the firewall written by Jiang Yanhai and the system that has been patched so far, then he can also fight ten at a time! He can't see the source code of these firewalls, but he does!

Anyway, he's a high-level security officer, well, he still has this ability.

In fact, Jiang Yanhai doesn't need Jiang Tao, he can operate it casually, but since someone can use it, why not use it? Do you think you don't get tired of switching keyboards? Being able to save effort is naturally labor-saving, so it's good to concentrate on tracking the one in front of you.

The battle between the two of them has reached another large server, which is the server of a company that rents servers, and the server here houses at least hundreds of company websites, server databases, etc., so the network communication here can be guaranteed.

But in the same way, it is not so simple to defend so many servers, and after Jiang Yanhai made sure that his firewall was not bad, after stepping up the attack on the firewall, he directly detoured.

Quickly looking up the names of the companies that provided rental services from the public information, Jiang Yanhai directly followed the names of the companies to find these companies, and then hacked into the ordinary computers of these companies.

Ordinary computer protection ...... of these companies For Jiang Yanhai, it is like a fictitious thing, and he directly finds the computer of the other party's employee who is responsible for security protection, and the level of such an employee is not too high, so his personal computer will save the account and password.

After getting the account and password, Jiang Yanhai directly launched a formal access and login request to this server directly through the other party's computer.

It is impossible for the other party to completely block such an access login request, so Jiang Yanhai directly logged in to the server openly, and it was also an administrator account, and after logging in, Jiang Yanhai immediately began to invade the entire system with his own program.

It's really easy to take down a server from the inside.

As soon as he entered this server, the anti-tracker had already continued to directly track the other party, and at the same time as the anti-tracker tracking, Jiang Yanhai had quickly launched a large-scale attack and directly began to snatch control of the entire server with the other party.

The battlefield that broke out in an instant was directly used to divert his attention, but in fact, it was the anti-tracking program that really did it, and it had already begun to follow his data stream to find his next broiler.

Cass breathed a sigh of relief, this is one of his large broilers, such a large broiler itself has a good firewall, and it takes time for the other party to attack its own firewall, not to mention that he has set up a second firewall inside the server.

It's just that he just wiped the cold sweat on his forehead here, and before he could pick up the teacup next to him and take a sip of water, a crazy alarm suddenly appeared on his screen!

“oh! SH! IT!”

The sudden attack method made Cass startled in an instant, and he directly exclaimed, directly withdrew his hand to get the water cup, and then started to operate violently.

"How is this possible?! Where did this guy come from? Didn't I already set up a firewall directly? Cass looked incredulous, although he may have lost his skills over the years, but he hasn't fucking dropped so much, has he?

You're going too far, aren't you? How come it was that it only took a minute or two before and after you directly broke into the server, cracked two protective walls, and it seems that his firewall had not been alarmed when it was broken?!

The sweat on Cass's forehead that he had just wiped instantly came out again, because this server was a broiler that he had been using for a long time, so the traces inside were not so easy to erase! 8)