Chapter 124 before action!

So far, the domestic network has formed a new pattern.

The era of the first generation organization and the second generation organization has disappeared, but what we have ushered in is a new foregone conclusion. It is no longer a simple hacker morality or the so-called hacker spirit.

Abide by hacker ethics and carry forward hacker spirit!

But the two are one, and the major organizations in the domestic hacker community are gradually opposed.

Today, the merged HK alliance, with tiger as the general leader, dust, fat cat, lightning, etc., has a total membership of more than 200 W, and its strength is extremely strong.

Free base, the person in charge is Gu Xing, the other person in charge is unknown, and the total member is unknown.

Hell, the general leader, Emperor Shitian, and the three swordsmen of wind, the five gods of wind and fire, the general member 76W.

The merged ant Dynasty has the red guest alliance and the former black-and-white group. The number of members is extremely advantageous. It is dominated by the hand of God and red ants, including the ghost king and the ghost king. The total members are 300W.

There is a hidden trend of tripartite confrontation. The headquarters of HK alliance is located in Beijing, the free base is in Tianjin, the hell is in Shenzhen, and the ant Dynasty is located in Nanjing.

On December 23, this trend has taken shape, and domestic old birds and rookies have speculated that this change may be the final pattern of the domestic hacker community. So far, the domestic hacker trend will be positioned in the future.

However, just after the new pattern was stable, Hualian network security group issued a notice.

The announcement exploded in the hacker world like an atomic bomb.

Announcement: [the group gathered top domestic security experts, whose number reached a peak in the security field. However, the Hualian firewall package newly prepared by the five major domestic security experts was officially launched. So far, in order to verify the new firewall launched by the group, the person in charge Xiaotian decided to welcome hackers to test the density and security of the firewall.]

[test address. IP, XXX. XX. XXX. XX]

This is the announcement on the official website of Hualian network security group. However, there is a registration form under the announcement. It seems that this registration form is prepared with this announcement.

Organization (individual):

Time:

result:

Good guy, it seems that Hualian has great confidence this time, otherwise it will not draw up the following registration form.

However, after the announcement of Hualian, hell, HK alliance, Al Qaeda, Dynasty and other organizations did not respond immediately. Maybe they are all waiting, waiting for the first person.

At the headquarters of HK alliance, the heads of tigers, dust and monkeys were all in the conference room. The tiger sat in the middle, looked around for a week, and then said, "what do you think of the announcement released by Hualian security group?"

"I agree to wait. The purpose of Hualian is unclear, so we don't need to make the first shot!" The dust sitting opposite, stroking his chin with one hand, said slowly.

The monkey and others nodded and agreed, and the tiger said again. "Xiao Tian, how much do you know about this Xiao Tian?"

After these words, dust and others shook their heads, and the tiger guessed. I'm afraid Xiaotian used to be a hacker, but he should have changed his name after specializing in security.

After the discussion, tiger, dust and others quickly came to the office, and then connected to the network to contact fat cat, lightning and others.

The HK alliance did not respond. However, hell, free base and ant dynasty did not.

At 5:00 p.m. on December 23.

In the bedroom, unit 3, Dongming community, Shanghai.

The day after tomorrow will take an all-round attack, so now. Yang Tian and Feng Juan both worked hard to study their own technology in their respective bedrooms.

Two days ago, the wind roll performed its own task to analyze the Pentagon. However, the analysis can only penetrate from the periphery bit by bit. Once found, the consequences are unimaginable. The Pentagon, the symbol of the United States. The strength of its guard can be thought of as strong.

After three days of analysis. The general situation of the Pentagon is roughly scanned, and the network structure in the Pentagon is very complex. Outside is the Ministry of defense, but inside is the headquarters of the Navy, road and air forces, so the network command system of the three services is also in the Pentagon.

It infiltrated into the network of the Ministry of defense from the periphery. However, as soon as it invaded, the wind roll immediately returned. The honeypot and defense system of the Ministry of defense are really complex. If you are not careful, you may be trapped by the other party, so he decided to invade again tonight.

However, at the moment, Yang Tian sits on the rocking chair with his body tilted, his hands dancing rapidly on the keyboard, and the display screen is an authoritarian tool for writing viruses, in which 26 letters cycle in turn.

Child and mother worm, Yang Tian wants to mutate the phagocytic virus this time. Due to the relationship of time, he can only start on the basis of the mutation. The principle of the mutation remains the same this time, and only modify some embedded codes. This local mutation is completely made for Yang Tian's attack data flow.

It is no longer a simple child and mother worm, but embedded in the data stream to devour the virus.

The principle of the last variant is that as long as the subclass worm is combined with the parent worm, it will quickly reproduce a new type of phagocytic virus and phagocytize the system.

However, this time, Yang Tian adopted an anti killing program to embed the phagocytic virus after reproduction, that is, after the combination of mother and son worms, execute the anti killing program, and then reproduce the phagocytic virus.

The anti killing program adopts the tumbler principle, that is, after the phagocytosis virus invades the system, if there is no command and data flow input and output in the system, the phagocytosis virus will not execute the phagocytosis program. However, once there are command and data flow input and output in the system, the phagocytosis virus will copy with the number of command and data flow, so as to phagocytize instantly.

In other words, if the system is invaded by a phagocytic virus, it will only shut down or stop running all programs. On the contrary, if you press a letter or run a file, the phagocytic virus will copy quickly and invade the system kernel to devour it.

Night, hit.

On the TT tool, wind roll, shadow, Arctic king, egg tower and milk tea are all online. At 8 o'clock sharp at night, Yang Tian is in front of the computer, his eyes slightly narrowed and staring at the display screen, with a burning cigarette between his fingers.

"Hee! Finally someone dares to take the lead. An organization has been registered on the official website of Hualian security group!" The attractive sound of milk tea came from the stereo.

Yang Tian and others have heard about the changes that have taken place in China in recent days. Because they are busy with their own affairs, they have not learned more about them.

"It's Firefox!" The Arctic King's tone was a little surprised!

oh Yang Tian raised his deep and thin eyebrows abruptly, and then opened the browser.