Urban Super Live
Page 849
Therefore, they deliberately said a false retreat time in advance to confuse the inner ghost, so as to achieve the purpose of retreating first.
Yang Shuhe didn't know until now that the original hacker who attacked Huamin's civilian website was actually someone else.
No wonder, this group of peacock brothers have such strong attack ability.
So far, Yang Shuhe has completely figured it out!
Yang Shuhe was thinking in his heart, but he was dissatisfied with his actions, so he ordered Yang Chi to quickly track the IP of another group of hackers.
While monitoring the whereabouts of these hackers through the Trojan horse designed just now.
Chapter 604
Everyone in this group of hackers is very vigilant. Even if they log in to Ganesha Guardian, they do not use their real IP.
Instead, a lot of springboards are arranged.
Numerous broilers have been transferred.
The least hacker used 89 proxy springboards.
Di Rang, the one with the most number, actually transferred 360 proxy springboards frantically. Every time he exited a springboard, he would patiently modify the log and clean up the leftover traces.
It can be said that the defense has reached the limit, and the caution has reached the extreme.
It's a pity that this group of people met Yang Shuhe with a system, no matter how treacherous they were, it was useless, the Trojan horse had already bit them like maggots.
They have to admit that they are unlucky!
Two minutes later, the Trojan developed by Yang Shuhe successfully found out the real IP address of the second hacker.
Shah Rukh - Real IP Address, is one of the best computer universities.
According to the information in his computer, the other party is a computer graduate student of the School of Science and Technology.
Unexpectedly, behind the scenes, it was actually a hacker.
However, he will pay the price for his actions.
Yang Shuhe indifferently copied the log from Sha Rukh's computer.
The third hacker to be traced was named Salman.
The real IP address is in a high-end apartment in the western state of Gujarat.
Then, the fourth, the fifth, the sixth...
In just two to three minutes, Yang Shuhe's Trojan successfully tracked down 3 hackers.
Only Dirang, Nandina, and Galava were left, still silently cleaning up their respective browsing traces.
If, they know, what they do is futile, and they don't know if they will vomit blood with anger!
Among the hackers who have been traced, they are not limited to Brother Peacock's homeland.
And people in other countries.
There are even two peacock brothers who are studying in China.
It's really self-defeating!
Actually, people dare to make troubles in their own country. Doesn't this mean that there is no place to escape?
Moreover, among this group of hackers, Yang Shuhe also discovered a particularly interesting hacker - Siwani.
A very beautiful stunner.
She looks like a Bollywood star.
Now TCS, Peacock's largest software company (with an output value of 165 billion US dollars), is a network security expert at the headquarters in New Delhi.
But in her computer, Yang Shuhe found a call record between her and a Citigroup IP address.
He suddenly discovered that this Silvani was actually the inner ghost of the guard of Ganesha.
Her real identity is a foreign intelligence officer of Citigroup's intelligence department.
"So you are the real big fish!"
A flash of excitement flashed in Yang Shuhe's eyes, and he hurriedly used Sivani's computer to hack into the Citigroup IP that she was in contact with.
Suddenly, he discovered that the firewall of Citigroup IP was unprecedentedly powerful.
The programs it possesses are much more complicated than ordinary computer systems, and they are also significantly different from the Microsoft systems and fruit systems that are commonly run on the market.
Should be independently developed.
What's even more frightening is that the other party's program seems to have a mind, constantly changing its operating instructions and changing the code trajectory.
As long as there are external strange instructions touching it, it will immediately send out an alarm by itself and carry out anti-tracking.
Yang Shuhe is also using the black technology network that comes with the portable system, and this program that he came into contact with, if he used an ordinary computer, it would have alarmed it long ago!
Yang Shuhe analyzed the code of this program through the portable system, and was shocked to find that this code is like a huge bunker, at least dozens of times larger than the ordinary system.
Such a large system program simply cannot be moved by the memory of an ordinary personal computer.
This should be a supercomputer!
You'll Also Like
-
Plunder life and carve out an invincible path
Chapter 413 3 hours ago -
Star Dome Railway: I am developing a Star Dome Railway mobile game in my company
Chapter 333 3 hours ago -
Unlimited learning of spiritual powers, I will suppress the end of the world
Chapter 214 3 hours ago -
I'm shooting anime in another world
Chapter 324 13 hours ago -
Great Sword Master
Chapter 1901 13 hours ago -
The hidden demon king, the empress brought her child to ask for responsibility
Chapter 675 13 hours ago -
Being too ferocious because of caution
Chapter 873 13 hours ago -
Mysterious World Tour
Chapter 510 13 hours ago -
Reborn Wild Boar: What's wrong with eating a few single people?
Chapter 138 13 hours ago -
Lurking in Konoha, part-time Hokage
Chapter 149 13 hours ago