Urban Super Live
Page 849
Therefore, they deliberately said a false retreat time in advance to confuse the inner ghost, so as to achieve the purpose of retreating first.
Yang Shuhe didn't know until now that the original hacker who attacked Huamin's civilian website was actually someone else.
No wonder, this group of peacock brothers have such strong attack ability.
So far, Yang Shuhe has completely figured it out!
Yang Shuhe was thinking in his heart, but he was dissatisfied with his actions, so he ordered Yang Chi to quickly track the IP of another group of hackers.
While monitoring the whereabouts of these hackers through the Trojan horse designed just now.
Chapter 604
Everyone in this group of hackers is very vigilant. Even if they log in to Ganesha Guardian, they do not use their real IP.
Instead, a lot of springboards are arranged.
Numerous broilers have been transferred.
The least hacker used 89 proxy springboards.
Di Rang, the one with the most number, actually transferred 360 proxy springboards frantically. Every time he exited a springboard, he would patiently modify the log and clean up the leftover traces.
It can be said that the defense has reached the limit, and the caution has reached the extreme.
It's a pity that this group of people met Yang Shuhe with a system, no matter how treacherous they were, it was useless, the Trojan horse had already bit them like maggots.
They have to admit that they are unlucky!
Two minutes later, the Trojan developed by Yang Shuhe successfully found out the real IP address of the second hacker.
Shah Rukh - Real IP Address, is one of the best computer universities.
According to the information in his computer, the other party is a computer graduate student of the School of Science and Technology.
Unexpectedly, behind the scenes, it was actually a hacker.
However, he will pay the price for his actions.
Yang Shuhe indifferently copied the log from Sha Rukh's computer.
The third hacker to be traced was named Salman.
The real IP address is in a high-end apartment in the western state of Gujarat.
Then, the fourth, the fifth, the sixth...
In just two or three minutes, Yang Shuhe's Trojan horse successfully traced 49 hackers.
Only Dirang, Nandina, and Galava were left, still silently cleaning up their respective browsing traces.
If, they know, what they do is futile, and they don't know if they will vomit blood with anger!
Among the hackers who have been traced, they are not limited to Brother Peacock's homeland.
And people in other countries.
There are even two peacock brothers who are studying in China.
It's really self-defeating!
Actually, people dare to make troubles in their own country. Doesn't this mean that there is no place to escape?
Moreover, among this group of hackers, Yang Shuhe also discovered a particularly interesting hacker - Siwani.
A very beautiful stunner.
She looks like a Bollywood star.
Now TCS, Peacock's largest software company (with an output value of 165 billion US dollars), is a network security expert at the headquarters in New Delhi.
But in her computer, Yang Shuhe found a call record between her and a Citigroup IP address.
He suddenly discovered that this Silvani was actually the inner ghost of the guard of Ganesha.
Her real identity is a foreign intelligence officer of Citigroup's intelligence department.
"So you are the real big fish!"
A flash of excitement flashed in Yang Shuhe's eyes, and he hurriedly used Sivani's computer to hack into the Citigroup IP that she was in contact with.
Suddenly, he discovered that the firewall of Citigroup IP was unprecedentedly powerful.
The programs it possesses are much more complicated than ordinary computer systems, and they are also significantly different from the Microsoft systems and fruit systems that are commonly run on the market.
Should be independently developed.
What's even more frightening is that the other party's program seems to have a mind, constantly changing its operating instructions and changing the code trajectory.
As long as there are external strange instructions touching it, it will immediately send out an alarm by itself and carry out anti-tracking.
Yang Shuhe is also using the black technology network that comes with the portable system, and this program that he came into contact with, if he used an ordinary computer, it would have alarmed it long ago!
Yang Shuhe analyzed the code of this program through the portable system, and was shocked to find that this code is like a huge bunker, at least dozens of times larger than the ordinary system.
Such a large system program simply cannot be moved by the memory of an ordinary personal computer.
This should be a supercomputer!
You'll Also Like
-
Huayu: Are you even sitting up straight? You're going to be the director?
Chapter 161 1 days ago -
Bright Sword: From Northwest Shanxi to Changjin Lake, a Hundred Battles, a Hundred Victories
Chapter 299 1 days ago -
All the heavens, starting with Little Li Flying Dagger
Chapter 301 1 days ago -
I've already reached the maximum level, and you guys are just starting out?
Chapter 225 1 days ago -
In the name of supernatural powers
Chapter 244 1 days ago -
Doomsday America
Chapter 181 1 days ago -
Huangming
Chapter 521 1 days ago -
Huayu: This celebrity doesn't follow the rules.
Chapter 133 1 days ago -
From knock-off old-man's electric vehicles to industrial giant
Chapter 252 1 days ago -
Three Kingdoms: A Million Soldiers Grown from the Fields
Chapter 261 1 days ago