home

search

Chapter 11 Troy

  Chapter 11 Troy

  Feng Xiaotian thought for fifteen minutes and finally decided to invade the New York Times website. He felt that he was doing a good deed, as long as he didn't cause any damage to the website, there wouldn't be any problem.

  Now that the decision had been made, Feng Xiaotian began to take action. Through the interface on the website, he obtained the execution code of the website. After analysis, Feng Xiaotian quickly deduced the core code of the website. Once in possession of the core code, it meant that control of the website had fallen into his hands. Even if the administrators tried to access the site without Feng Xiaotian's permission, they would be refused entry.

  Feng Xiaotian gained control of the website and then wrote embedded code, embedding the virus-killing program into the website's pages. As a result, anyone who clicked on the website interface would be infected immediately, and the virus-killing program would automatically enter the other party's computer to start executing the clearing task.

  All this was done secretly, with hardly anyone noticing, the only exception being the young man who had written the virus program, who was originally gloating over his own achievement, but half an hour later, he suddenly found that the number of IP addresses he obtained had stagnated, and after a while, the number of IPs actually started to decrease slowly!

  This discovery left him somewhat bewildered, so he entered the backend of The New York Times website through his own acquired permissions, and then he immediately discovered Feng Xiaotian's trail.

  After careful observation, the young man became enraged and shouted loudly: "This guy is actually eliminating my precious virus! This is too much!"

  After anger comes counterattack. If Feng Xiaotian is allowed to continue like this, the wooden horse virus he spent more than two months writing will be completely useless. This is his masterpiece, how can it be destroyed so easily?

  The young man's fingers flew across the keyboard as he executed the administrator commands, trying to kick Feng Xiaotian off the website. However, it wasn't long before he realized he had failed - no matter what he did, Feng Xiaotian remained unmoved. This left the young man somewhat shocked! Because this phenomenon only had one explanation - the person opposing him had already obtained the website's core code!

  "Oh my god! How...how is this possible?!"

  Every program has its core code, this code is the most central part of the program, and it's also the most valuable and powerful part. For example, the operating system on Feng Xiaotian's computer is Windows 3.0, and its core code is firmly in Microsoft's hands. This is top secret, and except for relevant personnel within Microsoft, no one else can obtain this core code. Whoever grasps this code will be able to do whatever they want with this operating system!

  Of course, getting this code is not that easy. If Microsoft doesn't tell you, don't even think about it. This also proves the difficulty of obtaining core code. Feng Xiaotian obtained the core code of The New York Times website through reverse engineering, which he thought was not difficult at all, but for young people, it's quite unimaginable!

  The young man, still in shock, continued to say: "Could it be... could this guy be the one who helped The New York Times build their website? Otherwise, how could he have obtained the core code? But even so, I'm going to let you know my prowess!"

  Hackers are extremely arrogant people. In the eyes of young people, Feng Xiaotian is only because he has the core code, so he can occupy a commanding height. He himself is not great, and young people want to teach Feng Xiaotian a lesson, let him know that offending him will have very serious consequences.

  However, he overlooked another issue: why did Feng Xiaotian's Trojan horse virus lose its effectiveness in such a short period of time?

  Young people began to take action, controlling other computers in their hands, taking unified action, and launching a torrential attack on the New York Times website. The principle of this attack is very simple, because it is simple and practical, so most hackers prefer this type of attack.

  The so-called "flood attack" refers to the act of sending a large amount of information flow to the same target within the same time period. If it is a single computer, facing such an attack is basically helpless, because the computer itself will automatically receive all external information. Once the amount of information exceeds the computer's processing capacity, the computer itself will collapse.

  As for websites, it's the same principle as computers. However, since websites have servers, their capacity to withstand is much greater, but they also have their own limits. Once this limit is exceeded, the website will also collapse.

  Now, the young man controlled all the captured computers - in the hacker community, these computers are generally called "meat chickens" or "zombie machines". The young man unhesitatingly manipulated the meat chickens to attack the New York Times website, constantly sending commands. In a short while, the website's processing speed became slow, and after another while, the slowness of the website became even more apparent. Feng Xiaotian had long since discovered this point, he knew that this was a hacker attacking the website!

  At the same time, Lujie from the US Network Security Center also discovered this point. The massive data flow on the Internet was all monitored by the supercomputer here. He immediately found Professor Wensen, who frowned and stared intently at the computer screen without saying a word.

  "Professor, shouldn't we take action now? The New York Times is not to be trifled with. If we let the hackers attack their website and do nothing about it, they'll probably make a big deal out of it afterwards. You know how harsh those reporters can be..."

  Professor Vincent still frowned after hearing this, and after a while, he instructed: "Notify the technical group to start acting! Let them be divided into two groups, one is responsible for intercepting data flow, and the other is responsible for tracking the hacker's IP address. Hmm... The attack method of this hacker seems to be like Trojan. How did this guy come out again?"

  Professor Vincent, as the head of the US Cyber Security Center, is familiar with the hacking methods of some well-known hackers. The "Trojan" he mentioned earlier is the hacker handle of that young man, who likes to write Trojan horses and is generally referred to as "Trojan".

  Professor Vincent gave the order, and Rocky immediately sent out instructions through the network. At that time, computer experts lurking all over the country began to take action. Some of them were hackers, but they had been won over by the state and joined the US Network Security Center. Although some people still engaged in illegal activities, as long as they were within a certain range, the government turned a blind eye.

Recommended Popular Novels