Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 400: Puppet Network

"..." Jiangxi Wen looked at the familiar code and immediately knew that the other party was prepared. He invaded their computers without Yu Jianju's awareness. Since Yu Shui and Yu Jian divided into two companies under Natural Technology, Jiangxi Wen did not interfere with the business there. He just looked at the planning of the new game, code architecture, etc. Out of his confidence in installing the firewall for the entire company's computers, the company does not have many people. Jiangxi Wen did not hire a full-time network administrator. In fact, Zhang Yijun did not want to hire any network administrator. In this way, the copywriting needs to be kept confidential between computers within the company. At least the current personnel are still very trustworthy. One more person is a little dangerous.

As for the future expansion of the company, the responsibilities of each department and the responsibilities of each employee are different. Naturally, they will be responsible for their own parts. At that time, they will be divided very carefully according to their functions. Naturally, they will keep the parts they are responsible for. Now there is not much manpower, so there is no need to divide them like this.

Who would have thought that there was such a master who came to make trouble. Jiangxi Wen's first reaction might be that Qiu Yong was making trouble again. He invited a more powerful hacker. But he instantly denied this idea. It was impossible that such a coincidence. The person Qiu Yong invited happened to know the relationship between him and KK.

"How is it? You can't think about this." Raymon called in English this time.

The other party's arrogance made Jiangxi Wen's angry instantly. But he calmed down immediately. It was obvious that the other party was doing this to anger him. If a hacker is very murderous, he will never reach the peak. A real master is very calm and can reach a perfect balance in an instant. Jiangxi Wen understood this truth in his previous life. At this moment, he may meet the most powerful hacker opponent in this life. So he must be calm.

"Bastard, scum. You are blackmailing. What is your purpose?" Jiangxiwen tried to make his words appear very anxious and uneasy when he sent them out. This is a way to confuse raymon.

"I really feel sorry. The person who praises kk is so easy to get angry. How to be a real hacker with such a personality? I think you are not a rookie who only knows how to download some hacker programs that are invading and destroying." Raymon once again stimulated Jiangxiwen. Among the hackers, some people are just persistent in using some ready-made attack programs to destroy targets without any purpose. They can indeed succeed in some websites with weak protection. However, this kind of hacker has a very little understanding of the program, but is very interested in attacks and is content. Such people are despised in the eyes of real experts.

Judging from the difficulties encountered by the invasion of Jiangxi Wen machine, raymon certainly knew that Jiangxi Wen was not such a rookie. On the surface, it was a regret. In fact, it was continuing to stimulate his nerves that he thought Jiangxi Wen had been angry.

The psychological tactics seemed to be effective. Jiangxi Wen breathed a little relieved. The other party was not as scary as imagined. "You bastard, a Chinese man, use English all day long. What's the name Rui or De? Mom's. Aren't you afraid that I will call the police? I can sue you for extortion! International hackers like you will be sentenced to severe punishment."

"Oh. If you don't like my English name, you can call me Qianjinzhu. The name given to me by my Chinese friend." Qianjinzhu said it very easily. This tone is still to stimulate Jiangxiwen. The next sentence is not waiting for Jiangxiwen to answer. He suddenly changed back to his original arrogance: "Okay. You must play this game with me. Otherwise, all the codes of your company will be spread throughout the Internet tomorrow. Of course you can call the police. But how many people do you think can find my true identity in this world?"

"Bastard!" Jiang Xiwen typing on the keyboard in anger.

"Goodbye. My friend. I believe you will make a wise choice. At this time tomorrow, I will see you check my IP, enter my machine, and talk to me. The 24-hour limit is enough to stimulate..." As soon as he finished speaking, Qianjinzhu immediately withdrew from Jiangxi Wen's computer.

"The speed is so fast!" Jiangxiwen sighed. Although he was a little overwhelmed, he was not panicked. He did not rush to delete the chat channel established by the other party. Instead, he disconnected the network first. Then he manually began to look for whether the other party had installed any virus monitoring programs in the computer. He did not let go of every software.

The reason why I didn't do this just now is that I was worried that the other party would find out his own strength based on his own operations. The network was now cut off. This huge pendulum could not lurk. If I wanted to monitor it, it would only be possible that the virus program would be left behind.

It took more than an hour to search the entire computer, including every tiny file, all system files, alarm clock programs, games, mine sweepers, music players, etc. As long as Jiangxiwen has invaded other people's computers through such files or programs, he will search carefully on his computer and find nothing.

Jiangxi Wen couldn't figure out the ability of this thousand-jin pendant. He knew nothing about the other party's purpose. Obviously, it was not about destroying Yu Jianju. If that were the case, he would not need to play any game.

It is precisely because of this unknown that Jiangxi Wen is more cautious. He simply completely removed the honeypot system that had been stored for many years. If anything was set up there, it would also be eliminated indiscriminately.

Then Jiangxi Wencai found the stand-alone monitoring antivirus software developed by Huang Zhengfei and Qi Huanchang to find the route for the opponent to invade. Fortunately, this software was not bypassed by the other party. All actions after entering the machine were recorded. Each layer of springboard extending outward was also recorded in detail.

Qianjin Pendant is indeed powerful. It uses a circular invasion method. All springboards are surrounded by a circle. The computer including Jiangxi Wen has also become one of the circles. Obviously, Qianjin Pendant's own computer is also hidden in this circle. Jiangxi Wen used this trick when dealing with KK and Zhao Fei. It was almost a hundred tests. I didn't expect that this Qianjin Pendant also came up with the same method.

Since the other party was found, Jiangxi Wen immediately connected to the Internet and immediately sneaked into his broiler. These are ordinary individual users, scattered around the world. Jiangxi Wen patched their computers and only left a backdoor for himself to enter. He never hindered these computers. He just borrowed them as a springboard when dealing with hackers.

He has a total of twelve broilers. Usually, he has six or seven fixed broilers. Hackers are already very powerful. It would be amazing to control more than ten. Now Jiangxi Wen's twelve broilers are also on the Internet. This makes his ring springboard instantly connect. He then invades a computer in the ring springboard of the Qianjin Pin. The Qianjin Pin obviously has many patches. This IP is an individual user in Australia. The protection is very tight. But after all, it is not Qianjin Pin's own computer. He is not so perverted. He makes all possible loopholes in the other party. After all, a hacker cannot stay on the broiler at all times. The broiler itself will also install and delete some software. As long as there is a new software installation, new vulnerabilities may appear.

Jiangxiwen followed this loophole and entered the broiler looking for a thousand-jin pendant in Australia. He followed the same method and entered the other party’s four springboards in succession. Only the last computer was left. The IP reality is like two of them in the United States. It is so easy to enter in the front. Then it is very likely that this one is Qianjin pendant’s own computer. Jiangxiwen searched in detail. Strange! He still easily found the loophole. He went in and checked the information. It was an American boy’s computer. The configuration was great. He installed four or five games that required high configuration. Three of them were products of Eternal Thunder.

Jiangxi Wen smiled. He was vain and locked his eyebrows again. He didn't want to find the internal information of the six ring springboards of Qianjin Piao so quickly. He wanted to connect these six ring networks into a large ring. Then, at one of the nodes, virtually create a host and pretend to be his own computer. His computer operates the virtual machine at the remote end to form a so-called puppet network.

Then I went to eliminate one computer after another. But now when he easily entered the last one, he found that each one had similar protection and the same way of loopholes. It was like he had entered a complete set, like a mouse spinning around. The cat named Qianjinzhu stared at him and sneered above the maze.

Jiangxi Wen was moving without moving. He stared at the screen in a daze. At this moment, he was in the computer of the American boy who loved to play games. There was a very resource-intensive game running on the computer. The boy was playing very vigorously. But Jiangxi Wen didn't have the heart to watch it. He was just meditating.

"By the way!" A few minutes later, Jiangxi Wen slapped the table. "Pule Network. I can think of it. Of course, Qianjin Piao can also think of it. Maybe one of these machines is a virtual system."

Jiangxiwen felt a sudden feeling. Obviously, the one who was operating and playing games in front of him could not be a virtual machine. Unless he was playing on the virtual machine himself and deliberately tricked me?

Thinking of this, Jiangxi Wen hesitated for a while. However, he immediately gave up the idea. Even if the other party stared at his actions, it would be impossible to operate a virtual system to play games. This technology cannot be realized based on current hardware, software and networks. It was only when Jiangxi Wen was reborn that it was successfully implemented because of the development of hardware.

This is simple. Since you are a virtual machine, you can follow the clues and find the guy behind the puppet.
Chapter completed!
Prev Index    Favorite Next