Gary, a Londoner, was arrested by the FBI in 2003. He once visited the world's powerful technology and telecommunications companies - Nokia, Fujitsu, Motorola and other computer systems, and successively illegally invaded more than 90 computer systems of the U.S. military. In mid-2003, he invaded Citibank and stole 10 million, then transferred the money in his account to Britain, the Netherlands, Germany, Ireland and other places, and was soon arrested by the FBI.

——Gary was sentenced to five years and released on parole at the end of 2008.

Yang Tian narrowed his eyes and stared at the official website of the FBI. After a moment, he moved his mouth and murmured, "this guy is about to come out. I don't know if there is still the power of that year after coming out. The U.S. government is cruel enough. After he got out of prison, he still banned him from contacting the computer for two years." then he stood up, paused and said, "gray, the myth of London, is it still God after coming out?" With a sneer, he walked to the window.

He is just over 20 years old and studying at Shanghai FD University. Although he is a sophomore, he never goes to school more than 10 times. It can be said that the whole school has never seen him except two people know he still exists.

His appearance is not handsome, but at most beautiful. His thin body and a slightly white face are obviously caused by malnutrition. If he doesn't have a flowing broken hair, people suspect that he is a refugee from the northwest.

The arrangement in the bedroom is extremely monotonous. A Simmons big bed occupies most of the space. On the left side of the bed, there is a row of bookshelves with some function theory, mathematics tutorials and English books, but there is no book about computers. However, on the right side of the bed, there are two computers. The black one is for his "work". With a small high-quality chassis and a 26 inch LCD, it looks gorgeous and extraordinary; The white one is used by him for "fishing", which is just an ordinary brand machine.

That black computer can't be bought in the market. Yang Tian specially asked the manufacturer to order it, and its speed is extremely fast. It also cost him nearly 100000 yuan to buy it. He carefully selected the motherboard, hard disk, CPU and so on, and the display is extraordinary. The brightness, response time and color accuracy are much higher than ordinary machines.

"Pa!" Yang Tian stood in front of the window, lit a cigarette, sent it to the corner of his mouth, took a sip, spit it out slowly, waved to open the window and squinted at the lights below. At this time, it was night. At this time, he would look at the night scene of Shanghai. The house he rented was not far from the school. It was the sixth floor of unit 2 of the residential community. Sometimes he wondered whether he liked the noisy night in Shanghai.

After about half an hour, after smoking two cigarettes, he turned and sat in the boss's chair and made a fierce turn. Suddenly, the chair took someone to slide in front of the black computer, moved the mouse, clicked on an anti-virus software, smiled and said, "the Indian Lama has been spreading for two days. I wonder if the security team of Tianxing company has found a solution!" Then he called out the virus execution file from a folder and wanted to test it.

Tianxing company is a well-known software development company in China. Its products include Tianxing anti-virus software, Tianxing assistant and so on. The Indian Lama virus was made up by Yang Tian in a week. He successfully spread it to the Internet two days ago.

Every once in a while over the past two years, he will make up a virus and still put it on the network in order to make money. Tianxing company has received feedback from users. If it can't be solved in a short time, its software will lose its reputation in the industry. However, at this time, Yang Tian will send an anonymous email to Tianxing company, in which is the source code of the virus he spread.

When the Tianxing security team gets the source code, it will immediately decode and analyze it, and finally add patches. Yang Tian will also get a big reward. This is how he has made money in the past two years. Every time the virus attacks the network, Tianxing software will update the patch at the fastest speed, so that users can completely kill the virus as soon as possible, which also makes Tianxing company have a good reputation in the industry. However, what they don't know is that the unknown person who gave them the source code is the manufacturer of the virus.

Yang Tian is like a vampire. He will suck a little blood from Tianxing company every time. This time is no exception. Open the anti-virus software of Tianxing company and want to test it.

"There is a virus, please check and kill!!" The sound of anti-virus software sounded in the stereo.

When Yang Tian heard the sound, the corners of his mouth tilted and he smiled! The smile is evil and treacherous.

"It's worth a week's work. This time it can last for some time!" He shook his head and sighed, paused and said, "life is helpless!!"

Indian Lama is an infectious worm virus, which specially infects exe, PIF and other files in the system. At the same time, it also terminates a large number of anti-virus software processes, and automatically deletes GHO files (system backup files) in the system, and all infected files will be turned into the appearance of an Indian Lama.

"Surely they can't wait!" Yang Tianbian hummed a tune, opened e-mail, and then sent the source code of the Indian Lama to the Tianxing security team.

Within a moment, the other party immediately replied: that's great! Now it's more than 11 o'clock at night. We're still working overtime. If it weren't for you, I'm afraid we'd have to decipher it in two days! I still say that. Tianxing needs talents like you very much. I hope you can consider it.

Yang Tian sneered. He knew that the person who sent this letter was the technical director of Tianxing safety team. He had dealt with him many times and was regarded as a divine friend.

"Remember to type the reward on my card!" Yang Tian quickly typed a few words. His card is a VIP customer applied for in Swiss bank. He is not afraid that the other party will investigate himself through the bank card, not to mention that his card is applied for with other identities, and Swiss bank also keeps VIP customers confidential.

The other party sent another email: I don't understand you. Your programming ability is so strong and your calculation is particularly fine. If you want to come, I can let you sit in my seat!

"Zhi! Zhi! -" Yang Tian glanced and saw that the firewall was sending out bursts of alarms. He hummed softly and said, "shit, I want to check my real IP every time. If I didn't make money from you, I would have bombed you!" After that, regardless of the alarm sent by the firewall, quickly type a few words and send it to the other party. It seemed that I was very relieved of my firewall.

The reason why he didn't pay attention to it was that he had personally tested the density of his firewall before, and there was no way to find the real IP in a short time. The people in zetianxing security team were not professional hackers, and their attack power was not very strong.

"If you don't stop in 30 seconds, the consequences will be the same as a year ago!"

The other party seemed to be very taboo about his words and quickly replied: no! Forget it, don't force you! Monster! Thank you this time!

"Shit!" Yang Tian took a cigarette from the table and lit it. He was about to take a sip, but he heard the dripping sound of the brand machine next to him.

With a twist of Yang tianmeng, the boss slid his chair to the brand machine, squinted and said, "Hey! Which fish took the bait so early today!"

The screen shows the inquiry information of the firewall: there are illegal intruders, pass or block.

This machine is completely used by Yang Tian to entertain himself. The computer is equipped with Win2000 system. There is no IP conversion and meat machine springboard in the middle, but only a firewall.

It took Yang Tian nearly two years to compile the firewall. This firewall contains his countless efforts and sweat, and almost uses all his technology, including countless operations and thousands of blocking programs. After testing and improving and optimizing again and again, it is finally completed and named the Great Wall.

The security and density can be as high as you can imagine. If you want to pass through the firewall, you must experience thousands of obstacles like crossing the Great Wall.

"Great Wall" was installed by Yang Tian on the computer where he worked, while this brand machine is a simplified "Great Wall". Although its security and operation ability can not be compared with the original "Great Wall", it can not be passed by ordinary rookies.

Boring programming language, monotonous 26 letters, even Yang Tian's level may sometimes be unbearable, so he chose to entertain himself.

Squint a smile and click through. Watching others invade his system, he seems to feel very happy. Maybe he misses the time when he used to be a rookie.

When he clicks through, the firewall turns on the green light completely, without any obstruction to the intruder.

Yang Tian smoked a cigarette and squinted at the monitor. His eyes were full of smiles. He opened the log of the firewall and said with a grin: "Hey, he also knows how to use the springboard! There are only three meat machines, too few! In those years, I had to get hundreds of them to dare to invade others!" (usually, we call the machine that has been controlled by hackers as broiler, and use this broiler to invade other servers. Continuous circulation is called springboard!)

At this time, the mouse on the screen has begun to move. It seems that he has come in. Yang Tian said to himself, "be careful, there are mines in my machine!"

Sure enough, the other party came in and directly cleaned up the disks in the system. One moment, he clicked on the file, another moment, he clicked on the application, and finally opened a TXT document, and the mouse stopped moving.

"Hey! I told you there were mines, you have to be careful!" Yang Tian sneered, then stared at the txt document and was stunned.

This is my own downloaded fantasy novel. Shouldn't this guy be

After waiting for three or four minutes, the mouse still doesn't move.

"Shit! Isn't this guy reading a novel?" Yang Tian was a little surprised and muttered to himself.

After waiting for a while, he still didn't see any movement from the other party, which made him even more surprised.

"Hey! It seems that he has a crush on concealment! I'd like to see who is so brave. It's a blasphemy Du!" Then he tapped a few times on the keyboard, then a command prompt window appeared on the screen, and then opened the long prepared remote mine.

Remote mine is a Trojan file. This is made up by Yang Tian using "rebound port original". If the intruder clicks the file, the other machine will be infected immediately, and then a hidden back door will be formed automatically.

Yang Tian can remotely control his machine through this back door. If the other party has a camera, he can see the other party. If the other party has a headset, he can hear the other party talking.

At this time, Yang Tian is connecting the other party's machine.