home

search

Chapter 40: Surround, Pursue, Block and Intercept

  Chapter 40: Surround and Annihilate

  Since he had already found a feasible way, Feng Xiaotian naturally wouldn't wait stupidly, and he immediately took action.

  Compared to this supercomputer, dealing with other computers on the local area network is much easier. Feng Xiaotian casually selected a computer and began trying to control it. His method was quite simple: he directly exploited vulnerabilities in the computer's operating system as a breakthrough point and modified the computer's executable program.

  The computer's operating system was an enhanced version of Windows 3.0, which is commonly referred to as the upgraded version. Although the upgraded version of Windows 3.0 had fixed many system vulnerabilities, it was impossible to fix all of them completely. Feng Xiaotian mastered this system with as many as 13 loopholes, and after a slight attempt, he verified that one of the loopholes he discovered still existed. Then, through this loophole, he secretly infiltrated the computer's core program.

  Just as he was about to modify the core program of this computer, something unexpected happened: he was suddenly kicked out of the computer. What's going on?

  Feng Xiaotian hadn't even figured out the problem when he was attacked by two more data streams, and suddenly he thoroughly understood: Oh, so there's a master guarding this place.

  Those two data streams were Satan and Angel, who discovered Feng Xiaotian's intention and immediately followed him. When Feng Xiaotian infiltrated the computer, they preemptively modified the computer's program and kicked Feng Xiaotian out of the computer. The two then launched an attack on Feng Xiaotian.

  Facing the attack of two data streams, Feng Xiaotian did not panic at all. When he participated in the hacker competition, he had used countless jumpers, making it difficult for others to track his real IP address. After Satan and Angel launched the attack, Feng Xiaotian even had time to change his IP address again, and changed it three times in a row.

  Feng Xiaotian did this for a reason. When you want to attack a target on the Internet, you first need to find it. How do you find it? The answer lies in IP. IP is actually where the target is located. Any individual or group on the network has an IP address, which is an unchangeable situation. Feng Xiaotian changed his own address three times in a row, causing the opponent's attack to fall through instantly. Then he began to lurk and quietly observe the two data streams, wanting to see how these two people would find him.

  Feng Xiaotian had a playful tone, but Satan and the angel were slightly surprised. Of course, they only showed a slight surprise for a moment before taking action. They began tracking Feng Xiaotian's whereabouts through the remaining traces on the internet. After just a few seconds, the two found Feng Xiaotian again. This time, they didn't underestimate him. They worked together, with one person blocking from behind and the other running to intercept Feng Xiaotian from the front.

  Three people are now in the local area network. If you want to stay in the local area network, you must stay somewhere. This place may be a webpage or a computer. Feng Xiaotian's hiding place is a computer. Seeing that the other party found himself so easily, Feng Xiaotian was not surprised at all. He could do it too. The data on the internet won't lie. When you pass by somewhere, you will definitely leave residual data traces. Just now, Feng Xiaotian did not disguise or clear these data traces, and the other party was able to find him. Feng Xiaotian didn't feel unexpected at all.

  However, the other party's formation made him a bit serious. The two data streams were stuck in this computer's data output port and data input port respectively. What do they want to do? Shut the door and beat the dog? Hehe, let's play with you!

  Feng Xiao Tian also had a competitive heart, seeing the opponent's actions, he became somewhat impatient. He felt that the opponent was underestimating him - Do you think blocking the road will catch me? Is it that simple? I'm not escaping yet, aren't you trying to catch me? Then I'll come and catch you instead!

  What is meant by "grabbing" here refers to finding the other party's true IP. Once the true IP is exposed, it also means that your real address in the real world will be exposed. Feng Xiaotian now wants to find the true addresses of the two - just like he found Troy's true address some time ago.

  Feng Xiaotian has started to take action, his first target is the person blocking his way. As he launches an attack, both sides immediately erupt into a full-scale conflict. It's clear that the opponent was also well-prepared, facing Feng Xiaotian's attack without flinching. The two engage in a fierce and brutal battle on this small computer.

  At the same time, NORAD was holding an emergency meeting, presided over by General LeMay, who asked with a serious face: "Who can tell me what's going on with the alarm that just sounded?"

  "General, the alert was issued by the supercomputer," replied James, head of security. "A hacker just sent an access request to the computer, and according to our protocol, any unfamiliar ID that sends a data stream to it will trigger an immediate alarm."

  General Leiche had thought the earlier alarm was due to a massive missile entering US airspace, but upon hearing James' words, his suspended heart slightly fell. However, he immediately thought of something and uncertainly said: "Another hacker? James, is this hacker the same person who previously invaded my personal computer?"

  "Although there is no clear evidence, I think there should be a connection between the two, and it's not ruled out that they are the same person."

  Lai Che furrowed his brow and said: "What is the Public Security Department's plan for handling this matter?"

  Leiche didn't panic, he thought that relying solely on a hacker to break through the "Fortress" computer was simply a fantasy. Now what needed to be considered was how to catch this hacker. James naturally understood Leiche's meaning and only heard him say: "General, I have withdrawn some of the personnel participating in the 'Sky Curtain' plan. They have taken action against this hacker and believe that results will come out soon."

  Leych nodded at this and asked: "James, what's the situation with 'Sky Curtain' plan? Have we regained control of the server?"

  Laike Commander is still very concerned about this matter, after all, the loss of the server has a direct relationship with him. If he hadn't put the server password on his personal computer, hackers wouldn't have succeeded.

  Laike thought of this and felt a little indignant: damn hackers! After the matter is settled, I will definitely submit a bill to Congress to increase the FBI's crackdown on them!

Recommended Popular Novels