Reborn Ace Hack
Chapter 485
In the monitoring window of the ring logic lock master control program, information is constantly scrolling, showing that someone is sending data packets to the ring logic lock node. This kind of data packet is very special and can even fool the ring logic lock monitoring program.
Only some node information was displayed in the monitoring window, and no alarm sounded. Fortunately, Xiao Yuan knew that someone would be tracking him at this time, so he did not minimize the monitoring window, so he could detect someone in time.
track.
The ring logic lock monitoring rules set by Xiao Yuan are very strict, so almost no conventional anti-tracing detection packets will be missed by the monitoring program. Therefore, it is rare that someone is testing the logic lock node, but the monitoring program does not alarm.
Meet, and an old friend Xiao Yuan met through the Internet in his previous life was able to do exactly this.
Therefore, when Xiao Yuan found that the monitoring program only displayed information but did not call the police, he thought of his old friend. After carefully observing the information fed back by the monitoring program, he could already make a preliminary conclusion that the person sitting across from the network was
Yes, it should be his old friend.
Since we are old friends, we should go and say hello. Xiao Yuan opened the command terminal of the ring logic lock master control program and entered several commands. With a crisp enter sound, the command was sent out. After the command was issued,
After going out, the other end's information was displayed in the monitoring window: The logical lock strategy is being adjusted.
"Haha, old friend, let me give you a little surprise first." Looking at this message, Xiao Yuan laughed, as if he saw the expression of his old friend on the other side of the network.
Beep, beep, beep, beep, beep, beep, beep, beep, beep, beep, beep, beep, beep, beep beep, beep beep beep, beep beep beep, beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep beep.
He stopped tracking him, and instead focused his attention on fly007's attack again. This matter was more serious than teasing an old friend.
It is important for friends to come here, because in addition to protecting fly007 from attacking him, he is also conducting anti-tracking on fly007. He wants to use this opportunity to pull them out from behind the network and see who they are. They are trying to pick out
What is the purpose of the East-West hacker war? Is it different from what he imagined?
…………
"Well, what's going on?" After Frank got the secondary analysis results, he sent the analysis results to an anti-tracking software he wrote himself, and then ran it, but was prompted that the strategy prediction was invalid. Ker was so cautious,
How is it possible that my anti-tracking can be recognized?"
Frank's brows shrank, and for the first time he felt a bit tricky, because he was very confident in his anti-tracking technology. The detection data package he used was his own creation, and he could not only sneak into it all kinds of things he wanted.
code, and it is extremely camouflaged. There are almost no network monitoring programs or firewalls in the world that can recognize it. But now chn_honker has adjusted the anti-tracking strategy in time. This is very likely that the other party has used it to
The detection packet just sent was identified.
"Maybe it's for other reasons. Let me try again. Since I can find your setting strategy for the first time, I can find your setting strategy for the second time."
He must be the only one who knows where ker is.
So he once again ran the software that Brian and the others had seen when they first entered the computer room. To be cautious, he modified the previously set data packets and then started the second detection.
…………
Fly007's attack this time was much sharper than the previous ones, and the method was also much sharper than before. Xiao Yuan no longer dared to be as absent-minded as before, but cheered up, and from time to time according to the settings
The protection software on the White House server feeds back information, sends some commands, and adjusts the protection strategy.
If it were just to deal with fly007's attack, Xiao Yuan would be very relaxed, but at this moment he is doing multiple tasks. In addition to dealing with fly007's attack, he also has to deal with the three technical directors of the White House who are trying to regain administrator rights.
With all kinds of efforts, in addition to these two protections, he is also anti-tracking fly007, and is also paying attention to his old friend's anti-tracking process against him. The combination of these things makes him a little busy.
Of course I was busy, but I didn't get distracted at all.
Tracking fly007 is not an easy task. Like him, fly007 also used springboard technology when they invaded the White House Station, and their springboard settings also have very superb skills and anti-tracking capabilities. If you want to take them
It is also not easy to find out from behind the network. At this time, he has only cracked five layers of the springboard set by fly007, and is still far away from finding fly007's real address.
At this time, Xiao Yuan noticed that the analysis information of his old friend in the monitoring window of the ring logic lock began to leak out again. Apparently his old friend had recognized that he had adjusted the springboard strategy and was re-detecting and analyzing the strategy he set.
.
"How about giving another surprise to an old friend? Adjust the strategy again. It's a bit repetitive?" Xiao Yuan looked at the scrolling messages in the window and was thinking about how to give a gift to an old friend.
Beep beep, there was a beep, and a black window popped up, covering most of the monitoring window of the ring logic lock. The information above showed that fly007 had cracked another springboard, and now it has six levels.
"Haha, the six-layer springboard is just enough for a single ring logic lock. If fly007 and the others also master the ring logic lock, I'm afraid I won't be able to crack the six-layer out so quickly."
"Six layers, circular logic lock, six layers, circular logic lock..." Xiao Yuan chanted twice, his eyes suddenly lit up, he laughed, and started to operate on the computer.
Twenty minutes later, Xiao Yuan leaned back on the comfortable seat in the guest room and looked at the programs running simultaneously in several information windows on the computer. He smiled and felt that his idea was too creative. He was very pleased with himself for a while.
stand up.
"Old friend, I know that your anti-tracking ability is much stronger than mine. A circular logic lock should not be able to stop you, so I give you a big gift. I hope you like it, but don't let me down!" Ker changed.
springboard strategy information, conducted data analysis on it, and obtained a configuration file. This configuration file was input
After entering the anti-tracking software, he felt a little uneasy at the moment, because he didn't know whether the other party's last adjustment of strategy was because they discovered him. If so, then the possibility of discovering him this time would be very high, and once the other party
After discovering that he will definitely adjust his strategy again, then his efforts may fail again.
Bang, with a crisp enter sound, the anti-tracking software started running again. Frank stared intently at the tracking information window on the computer screen, looking at the information that kept scrolling in the window. The warning that the strategy prediction failed did not appear.
, it ran like this for nearly twenty minutes, and a green message appeared on the phone.
On the brain screen, it shows that the anti-tracking software has broken through the first level of protection logic and entered the second level of protection logic. Further strategic analysis is needed. Ker, it seems that you were really lucky last time. I see you going to
Where are you running!" When Frank saw this message, he slapped his thigh fiercely and shouted excitedly.
You'll Also Like
-
Douluo: I teach and educate people at Tianshui College!
Chapter 180 3 hours ago -
Elves: Starting from Different Color Lalulas
Chapter 383 3 hours ago -
After forcibly taking the blood of the sick and delicate prince to continue his life
Chapter 290 3 hours ago -
Douluo: Tang San is my brother
Chapter 366 3 hours ago -
Doupa: More sons, more blessings, I build the strongest family
Chapter 362 3 hours ago -
People are in Douluo, but they are struck by lightning at the beginning
Chapter 103 3 hours ago -
Fighting from the opportunity of gifting
Chapter 379 3 hours ago -
I'm in Konoha, I want to be Hokage
Chapter 217 3 hours ago -
When Huo Yuhao traveled through Douluo
Chapter 160 3 hours ago -
Douluo: My nanny is Bibi Dong
Chapter 259 3 hours ago