Since I Was a Special Soldier

Chapter 518: The battlefield that broke out suddenly

Jiang Yanhai was constantly patching the loopholes in this server, while still watching the other party's process. The external scanning was never interrupted. Soon Jiang Yanhai found that several data streams were hovering outside the server. After thinking about it, he simply rescanned. All external computers connected to the server are removed.

After confirming the library's monitoring system, Jiang Yanhai transferred all the materials of the monitoring system back. He was not polite and put this directly on the big screen.

However, there must be a delay in the images transmitted remotely. Jiang Yanhai mainly locked the images in the direction of the server's power supply.

Generally speaking, if they want to track the program, they will not cut off the power of the server. Otherwise, if the power is cut off, it will be even more difficult for them to find other login information for the program, because they do not control the server at the moment. The login information of the server could not be scanned.

After scanning the screen, it was determined that the enemy would not be able to break into the server for a while, Jiang Yanhai began to invade other computers in the rear to act as a broiler.

Jiang Yanhai began to write his own anti-tracking program into an intrusive Trojan horse program based on several common vulnerabilities he found before.

However, its function is not to hack into the server directly and gain system control of the server, but to start scanning for enterprise-level servers with such common vulnerabilities. After determining the target, Jiang Yanhai personally went to do it.

Only scanning enterprise-level servers with these common vulnerabilities is just a simple matter, and the scanning speed is extremely fast.

The first program Jiang Yanhai locked was a server of a US network communication service provider. With his server, it can automatically retrieve all the customer information connected under its name, and the efficiency of intrusion will be higher at that time.

According to the scanned vulnerabilities, Jiang Yanhai directly accessed the network communication server for normal programs. After the server gave a normal feedback response, Jiang Yanhai once again gave an extra-long error data, and the server's system automatically began to recognize it.

With the permission of Jiang Yanhai, the Trojan horse program has spread to the server. In less than 10 minutes, Jiang Yanhai obtained the super administrator authority of the server, and he concealed his account for the first time.

At the same time, after scanning the interactive data between their servers in this server, after carefully checking these files, Jiang Yanhai immediately began to modify the hidden rules of the Trojan horse.

When the modification was completed, he directly hit the enter key.

Jiang Yanhai's screen immediately showed a virtual map of the Trojan horse spreading data. Looking at the Trojan horse program that began to spread in a terrifying pattern on the screen, Jiang Tao couldn't help but swallow.

Although I know this is not in China, is it a bit too much?

However, he did not have the authority to express opinions. At this moment, a dozen or so warning boxes appeared on the library server over there. Looking at these warning boxes, Jiang Yanhai laughed, right?

In particular, one of the attacks started directly from inside the server. After a glance at the firewall, Jiang Yanhai noticed that someone had directly connected a hard disk to the server's read interface.

Useful? ! Jiang Yanhai shut down the external interfaces of all the servers in an instant. If Jiang Yanhai was only manipulating an ordinary computer at this moment, his computer might not be able to respond because there were too many pop-ups of these instantaneous commands.

But what does he control now? A total of four supercomputers! Although the calculation speed of three of them is not very strong in supercomputing, don't forget that there is also the Shenwei Taihu Light, which has been ranked first in the world supercomputing for several years in a row!

These supercomputing speeds are not comparable to ordinary computers at all, so these instructions only need a clone operation, and the same types of warnings can be processed in the same way.

But the outside siege is obviously a master. Although Jiang Yanhai puts the entire system on the pudding, as long as the access port is left, the other party has a solution, because since you maintain the connection with the outside world, it is impossible to interrupt all access ports.

Otherwise, you still maintain a data exchange with the outside world.

...

The voice mode has been directly switched to the double-linked chat group.

"Fu!ck!, male x, tell me the truth, who is this person? This strength can't be without any reputation, and there is a powerful server behind the opponent."

"Sol, I didn't lie to you, I really don't know, this time it was an accident, sh!it!, it was blocked by him again! Shit!"

"No, Sol, do you have any other way? Some of us can't get this server." The x man asked directly.

"I mind if you ask the agents below you to ask if the servers of major companies have been compromised. The other party's computing speed is extremely fast. If he borrows the broiler's computing efficiency, such a peak computing speed, the security personnel of these companies will definitely Found it." Saul was silent for a while and said directly.

"Okay, I see, do I need to allocate some server resources to you?" X man asked again.

"No, get out. You **** just want to figure out who Lao Tzu is. I'm telling you, I am helping you because of your face. I don't like fbi, understand?" Saul cursed again.

"Sol, don't say anything else, you are an American, this engine information is all the design drawings of the most advanced fighter engine in his mother! No matter which country he gets it, it is a great loss to our country! Sol since you live in this country, you enjoy the convenience provided by this country~www.wuxiaspot.com~ You cannot deny that the strength of this country provides you with a lot of conveniences. For example, you have a higher status when you go abroad! You want to lose these statuses!" The x man said seriously instead of joking.

"Shit!" Sol exploded, but after the explosion, he was silent. For a long time, he said: "I'll go find cass."

"Can you invite him?" The x man's tone brought a hint of surprise.

"Try it, x man, you'd better find more server resources by yourself." Sol said simply.

"Understood." The x man replied immediately.

Sol's chat room fell silent directly, but the x man made a few calls directly here.

At this moment, Jiang Yanhai's Trojan horse program has infected a lot, mainly the server of the communication provider, but the Trojan horse program lurked directly after entering it and was not exposed.

He doesn't need these for the time being, but he is prepared.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like