typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 282: Hacking II

The rare Chinese and foreign hacker war of the century began. The Traditional Chinese Medicine Forum has become a battlefield without smoke. The operation of the forum has been seriously affected. Some users cannot log in at all or are forced offline. Others who are not forced offline cannot open web pages.

Even if you open a web page, there will only be junk pop-ups. Once you open a certain window, there may be more than a dozen junk windows popping up, and they may be junk data packets with huge memory or weird virus phishing Trojan malicious plug-ins... which will make your computer system run slowly.

Or crash directly...

Today's traditional Chinese medicine forum is like a devil entering a village. It can only be described as horrible. It is full of garbled codes, scripts, wmf malicious codes, and the like. There are also a large number of unknown viruses spreading everywhere. Except for the Shen e column, it is still intact, but Xiao Teng has set up a high-level firewall.

And the security defense software was completely destroyed by those virus bomb decoding programs. If it weren't for the domestic angry youths who attacked those foreign hackers, no matter how powerful Xiao Teng's security software was, it would have been difficult to block such a huge attack.

Domestic hackers successfully resisted foreign invaders, and their morale was greatly boosted. They all seemed to have become fighting heroes. Some of them were so excited that they even hummed a ditty...

"I am smiling proudly..." A young man in his twenties from a certain city in China hummed while chewing betel nuts and kept tapping the keyboard with his fingers, expressing an expression of indescribable enjoyment.

"Anyone who stands in my way will die!" The young man discovered a virus that had slipped through the network through his coded detection spirit and started the anti-virus program to kill it.

"What's going on?" The young man found that this time he encountered a hard nut to crack. Not only did he not eliminate the virus, but he was also entangled by it. What surprised the young man was that the virus actually split into one, two, and four.

Four points and eight... What shocked the young man even more was that every virus that split had the same fighting power. Soon the virus infected the young man's anti-virus program and even affected the operation of the computer system...

"Oh my god, what kind of virus is this so powerful?" The young man looked at the screen with sweating profusely.

"Ah, I know it must be the legendary "ybl mutant virus". Could it be the "God of Slaughter" coming? I bet I can't! My system has crashed and it's over..." The young man looked at the black screen that kept flashing on the screen.

His computer system has completely collapsed.

The God of Killing is just a code name. His real name is Richard Drapor, who is recognized as the number one hacker in the world and a hacker wanted by the FBI.

His rise to prominence has been colorful and legendary. In 1990, at the age of fifteen, he successfully controlled all phone lines into the Los Angeles-area KiisFM radio station and won a prize-winning listener's game hosted by the radio station.

At the age of seventeen, he successfully deciphered the "password change" of the Pacific Telephone Company's communication network in Southern California. The boy's naughty nature led him to change the phone numbers and mailing addresses of the company's computer users, especially celebrities, at will, causing the

The company suffered economic losses of US$300,000,

The good times did not last long. The American FBI agents used an advanced "computer network information tracking machine" to capture Richard Drapor. The court only sent Richard Drapor to a juvenile correctional center.

Richard Delapor was soon paroled, but he did not stop. In a short period of time, he entered the networks of five major companies in the United States (), modified the user information in the computers, and estimated his intrusion.

A total of approximately 1.6 billion US dollars in losses were caused...

At the age of nineteen, he successfully invaded the host of the "North American Air Defense Command System". This invasion became a classic in the history of hackers.

In the same year, Richard Delapor illegally invaded the U.S. Air Force, Army, Navy, NASA, and Pentagon multiple times through the arpa network...

At the age of 21, Richard Draper obtained the account numbers and passwords of several large companies through Citibank's wire transfer system and transferred a total of 20 million US dollars to himself in the United States, Finland, the Netherlands, and Israel.

and German accounts.

…………

At the age of twenty-six, Richard Delapor was selected as the cover character of Time magazine. The media called him an omnipotent person who could launch computer warfare at any time. At this time, he was included in the FBI's ten most wanted fugitives.

ranks.

The thirty-six-year-old Richard Delapor is still at large and has been wanted for ten years. Although he has kept a low profile, he is sure to hit the target if he doesn't take action. The ybl variant virus he programmed is even known as a virus.

The king is also a shocking super virus.

Computer viruses, like bacterial viruses, come in all shapes and sizes, with the purpose of invading the host system and infecting the virus. The ybl variant virus has been divided into multiple categories by Delap: offensive viruses, defensive viruses, protective viruses, corrosive viruses, and high-level viruses.

Infectious viruses, pseudo-viruses, detachable viruses, etc., once infected, will erase the hard drive data and the rombios memory in the computer. They are the most destructive viruses to date.

The appearance of Delapor was like a dazzling light that almost obscured all the veteran hackers. The faces of those foreign hackers were first shocked and then excited because now they are all comrades in the same trench who have been restrained by domestic hackers for so long.

There was no progress at all, and the appearance of Delapore undoubtedly gave them a shot in the arm. Although the reward of one billion US dollars was very slim, it was already an honor to win this war.

The ybl variant virus is worthy of being the king of viruses. As soon as it appeared, it was destructive and showed a one-sided trend. Many domestic hackers' computers were infected and caused crashes. Computer motherboards and hard drives with low configurations were directly burned and howled...

But Xiao Teng, who was sitting in the office of the chairman of Longteng Group, had gleaming eyes. He had been waiting for this opportunity for a long time. If he wanted to prove his strength and climb to the top of the Golden Tower, he could only go step by step. There was no shortcut!

However, Xiao Teng had no intention of taking action at this moment. He wanted to see if the super firewall he had just programmed and perfected again could withstand Delap's attack.

And at this moment, black roses suddenly appeared on the display screen, wrapped in those terrifying viruses...

"Black Rose?! It seems like this game is getting more and more interesting." Xiao Teng smiled and then with flying fingers, he extracted the mother body of a ybl variant virus and put it in the sealed space of the firewall to analyze the data of this so-called king of viruses.

.

Xiao Teng programmed and simulated this battle into a morphological form. He simulated the nature of the combat weapons and viruses of several of the most representative people in the hacker world into morphological forms. This morphological program was set on the last layer of the advanced firewall once it was invaded.

When you reach the last layer of the firewall, the firewall will automatically open into a solid fire shield. Hackers like ordinary hackers can't get in at all. Those who can get in are top experts, such as Black Rose who just came in...

Black Rose ranks fifth in the world. His gender is unknown, his age is unknown, and there is no wanted record. His fame is simply because the confidential database of the Singapore Airlines Group was hacked by hackers. Black Rose successfully intercepted it and tracked the intruder's IP address. This intruder is ranked

The world's fifth-ranked hacker was replaced by him, which caused quite a stir at the time. Black Rose has never been seen taking action after that. No one knows how strong Black Rose is, but everyone knows that Black Rose is definitely not only ranked fifth. Now

The reappearance of the Black Rose immediately caused quite a stir...

In the eyes of hackers, what attracts them is always the pinnacle battle between the highest-level hackers, so they wisely withdraw from the battle and become onlookers. Besides, this level of battle is no longer something they can interfere with.

If you're not careful, you may get burned.

In a luxurious office in a certain business building in Singapore, there are two computers on the luxurious desk. A woman with a graceful figure is typing quickly on one of the keyboards. The display screen instantly turns into black roses and enters in a graceful rotation.

A three-dimensional fireproof cover was installed, and then the black rose stretched out and seemed to bloom in a second, directly wrapping the mutant virus and not giving the virus a chance to mutate and split. No matter how hard you struggle, you can't break free from the shackles of the black rose. It seems that there is

The Seed Blood Engine is an advanced stealth tracking program that can disguise and automatically copy each other's viruses and automatic tracking software. She relied on this software to successfully track the intruder of the Singapore Airlines Group. After two years of improvement, this software has been

Towards perfection.

Delapor, who was in front of the computer in Los Angeles, USA, looked at Black Rose who joined the battle and sneered: "Do you think you can stop me with this garbage? You are overestimating your own capabilities!"

After Draup finished speaking, he issued another command program and went out. Soon all the viruses wrapped in the black rose were like bombs and directly exploded the black rose. The entire screen flashed and blacked several times, then returned to normal, and then only saw

Countless split viruses and exploded rose petals. The exploded petals slowly decreased while the number of viruses increased...

The foreign hackers who were watching were very excited and seemed to see the hope of victory, but the domestic hackers were worried. If they hadn't been able to get into the fire shield, they might have been cannon fodder in there to disturb them, because this battle was not just for the God E era.

This national pride has risen to the level of national honor.

Draup did not destroy Black Rose's joy. Instead, he had a confused look on his face. He vaguely felt that something was wrong, but he couldn't explain the details. However, Draap did not take Black Rose to heart. In the face of absolute strength, no conspiracy or trick could be hidden.

Quickly, Delap's hesitation disappeared and he continued to launch the attack. Without the interference of Black Rose, all the viruses rushed towards the firewall. Then Delap issued another command. These viruses began to mutate and then merged with each other to form a new mutant virus.

An advanced virus with deep decoding begins to crack the firewall's encryption program...

Xiao Teng's defense system uses a "tuberculosis defense" program to form a chain structure. The connections between the rings are intricate and complicated by gradient passwords. The way to enter the system is to decrypt!

In three minutes, the time-level virus has scanned the firewall once. As the scanning time and data enter the appropriate gap, it quickly closes the first layer of chain password walls and then begins to decipher the ring password.

The most primitive and standard method of decrypting a program is to change the arrangement of the keys, which is called a master key. This is called a "brute force decryption method" by the computer industry. It uses a program to convert each bit of the password.

Count and arrange to check one by one to find the other party's entry and exit key.

But for ordinary computers to use this method to calculate a standard business rule, a sixty-four-bit encryption program is used. Then it will take at least several years to decades for ordinary computers to decipher such a password.

This requires a large computer capable of billions of operations per second. It can quickly find the correct password key within a few minutes.

Drap is the world's number one hacker. His computer is absolutely top-notch, and his exclusive decryption program is called the "Swallowing Assimilation Equation." Simply put, he uses eight programs to decompose a lengthened password and then combines it into pieces.

Becoming a sixty-four-bit key opens the defense gate very quickly.

Domestic hackers sighed secretly when they saw this situation and thought they had completely lost. Due to their understanding of Delap, he could crack the program password in less than three minutes and drove straight into it. This shows that they still underestimated the abnormality of this level of firewall.

Delap also underestimated this abnormal firewall. After five minutes of cracking, no useful data was obtained. This surprised Delap. He didn't expect that this small website had such a powerful firewall. Could it be him? Delap

Suddenly I thought of a person - Dragon Sigh!

Sure enough, before Delap had time to think about it, a lifelike nine-clawed golden dragon appeared on the screen with a thundering roar...

"Ah, it's Dragon's Lament. No wonder Delap hasn't cracked it yet..."

“The show is coming, the peak battle is coming, we’ll wait and see.

Some people commented that one has the strongest attack in history and the other has the strongest defense in history! Unfortunately, the two of them have never fought against each other. Now that the opportunity has come, everyone is excited and looking forward to the powerful showdown between these two legendary hackers.

dd


This chapter has been completed!
Previous Bookshelf directory Bookmark Next