Chapter 11: Troy

Feng Xiaotian thought about it for fifteen minutes, and finally decided to hack into the New York Times website, he felt that he was doing a good deed, and as long as it did not cause damage to the website, there would be no problem.

Now that the decision has been made, Feng Xiaotian began to act, he obtained the execution code of the website through the interface on the website, after analysis, Feng Xiaotian quickly launched the core code of the website, once he has the core code, it is announced that the control of this website has fallen into the hands of Feng Xiaotian, even if it is a manager, without the permission of Feng Xiaotian, will be turned away.

Feng Xiaotian obtained the control permission of the website, and then wrote the embedding code, embedding this virus killer program on the page of the website, so that as long as the person clicked on the website interface, they will be infected as soon as possible, and the virus killer program will automatically enter the other party's computer and start to perform the removal task.

All this was done in secret, barely alarming anyone, except for the young man who had written the virus program, who was triumphantly following his results, but after half an hour, he suddenly found that the number of IP addresses he had obtained had stagnated, and after a while, the number of IPs began to slowly decrease!

This discovery made him a little confused, so he entered the backstage of the New York Times website through the permission he obtained, and he immediately found the trace of Feng Xiaotian.

After a closer look, the young man became angry, only to hear him shout, "This guy is actually destroying my baby virus!" It's too much! ”

After anger, it is natural to fight back, if Feng Xiaotian is allowed to do this, the Trojan virus he spent more than two months writing will be completely ineffective, this is his hard work, how can Feng Xiaotian be destroyed so easily?

The young man was flying with his fingers, executing the administrator's password on the keyboard, he wanted to kick Feng Xiaotian out of this website, but soon, he found that he had failed, no matter how he operated, Feng Xiaotian still stood still, and the young man was a little shocked! Because there is only one explanation for this phenomenon - the person who is against him has obtained the core code of the website!

"Oh buy karma! This...... How is this possible?! ”

Any program has its core code, this code is the core part of the program, and it is also the most valuable and powerful part, such as the operating system on the Fengxiaotian computer, which is the Windows 3.0 version of the operating system, and its core code is firmly in the hands of Microsoft, which is the top secret, except for the relevant personnel of Microsoft itself, no one can obtain this core code, who can do whatever he wants with this operating system if he masters this code!

Of course, it's not so easy to get this code, if Microsoft doesn't tell you, you don't even think about it, which also confirms how difficult it is to get the core code, Feng Xiaotian obtained the core code of the New York Times website by working backwards, which is not difficult in his opinion, but in the eyes of young people, it is quite incredible!

The young man was shocked and then said, "Could it be ...... Could it be that this guy is the one who helped build the website of the New York Times? How else would he have gotten access to the core code? But even so, I'm going to let you know how good I am! ”

Hackers are extremely conceited people, in the eyes of young people, Feng Xiaotian is only because he has the core code, so he can occupy the commanding heights, he himself is not great, the young man wants to teach Feng Xiaotian a lesson, so that Feng Xiaotian knows that the consequences of offending him are extremely serious.

However, he ignored another question: why could Feng Xiaotian make his Trojan virus ineffective in such a short period of time?

The young man took action, he took control of the other computers in his hands, acted in unison, and launched a tsunami-like flood attack on the New York Times website, the principle of the attack is very simple, because it is simple and practical, so most hackers prefer this attack method.

The so-called "flood attack" refers to the same time period, the same target to send a huge information flow attack, if it is a single computer, there is basically no way to face such an attack, because the computer itself will automatically receive all the external information, once the amount of information exceeds the processing capacity of the computer, the computer itself will collapse.

As for the website, it is the same as the computer, but since the website has a server, it has a much greater capacity, but it also has its own upper limit, and once this upper limit is exceeded, the website will also crash.

Now, young people control all their captured computers - within the hackers, these computers are generally called "broilers", or "zombie machines", young people do not hesitate to control the broilers to attack the New York Times website, constantly sending instructions, a moment of effort, so that the processing speed of the website has become sluggish, and after a while, the slowness of the website has become more obvious, Feng Xiaotian has long noticed this, he knows, this is a hacker attacking the website!

At the same time, Lodge of the Cyber Security Center of the United States also discovered this, and the huge data flow on the network was all monitored by the supercomputer here, so he immediately called Professor Vinson, who frowned, stared at the computer screen tightly, and did not speak.

Rocky was a little nervous at the moment, and only heard him say, "Professor, we should act, right?" The New York Times is not to be messed with, and if we allow hackers to attack their website, we are afraid that they will make a big splash about it afterwards, and you know how ugly these journalists are......"

Professor Vincent was still frowning when he heard this, and after a while, he ordered, "Inform the technical team and start moving!" Let them split into two groups, one group that intercepts the data stream and the other that tracks down the hacker's IP address, eh...... This hacker's attack method is a bit like Troy, why did this guy come out again? ”

As the head of the American Cyber Security Center, Professor Vinson is very familiar with the attack methods of some well-known hackers, and the "Troy" he just mentioned is the hacker code name of the young man, because this person prefers to write Trojan horse programs, so people generally call him "Troy".

Professor Vinson gave the order, Rocky immediately issued an order through the network, for a while, the computer masters lurking all over the country began to act, some of them are hackers, but they have been recruited by the state, and now they have joined the American Cyber Security Center, although some people will do some illegal things, but as long as it is within a certain range, the government is acquiescing.