"boss!"
"boss!"
Xinyu said to his employees: You see what I said, right? Sure enough, it came. The hut immediately said: It's still the boss who knows everything.
The secretary came over and said to Xinyu: Boss! In the reception room of the lobby, a young man who could be 30 or 40 years old said he would come to you, and he also said that you would definitely give him a good position.
Xinyu smiled and said: If you go back now and tell him that our company is not short of people, and that I don't appreciate his style, please leave immediately. If you are finished, I will call the police and arrest him.
The secretary nodded and went back to reply. All the employees in the room didn't understand what was going on. The boss's behavior today is not like the previous style.
Xinyu looked at every employee present and said: You must be telling me what's wrong, right? Isn't it my usual style
Then I will tell you that if every hacker is proud to attack the company and threaten me with a little bit, he still wants to enter the company. Do you think I will accept it
Then what do I want you to do? Can't I feed you in vain? What are you doing? I think some of you here are old people who are fighting with me, some are personally invited by me, and some are recruited by me.
But I don't want to be threatened. Have you all forgotten what you do? If you don’t settle down and return to your posts immediately, don’t we have to wait for him to come and treat us again
All the elites in the conference hall immediately stood up and ran back to their jobs at the fastest speed, with their eyes fixed on the screen immediately, and the monitoring equipment was testing each and every process at the fastest speed. With the program, one day, two days, three days, and one week passed without incident. Just when everyone forgot about it, on the ninth day when the company was about to get off work, all computers were paralyzed again, and all screens At the same moment, the black screen was black. Three minutes after the black screen, fourteen characters appeared on all the screens.
"It is your loss if you don't use me, and you will regret it."
Xinyu and the employees used have seen these fourteen characters, and Xinyu looked at everyone and said: It is time for my elites to test you now. I will look at you.
But one thing that all Internet elites are puzzled by is that the viruses in each computer are different, which can be said to be diverse.
Xinyu and his four capable men also admire the hacker's ability to make every computer suffer a different virus on a server. This is obviously a master of masters, a god-level one. Master.
Xinyu looked at his four subordinates and said: It's up to you. Now is the time for my elites to show off all your housekeeping skills. Don't let me die and I am disappointed.
Miaomiao in front of the computer was already sweating profusely, and the others were not much better. Suddenly, his heart language jumped high and laughed: Hahaha! I checked his IP and his name. All the employees stood up.
Xinyu said with a smile: Mom didn't expect this guy to be across from us, and we all will give him a Trojan horse. What kind of Trojan horse do you think we should launch
Miao Miao said with a smile: Boss! I think we will give him a third area we only studied, the Aisihui virus Trojan.
The "Ai Sihui" virus Trojan horse is a kind of necrosis that can kill the host and keyboard, and at the same time, it also tells that the broadband will not be connected to the IP address for 48 hours. To put it bluntly, this IP address will never work well in the future.
If you don't accept this Trojan, it won't work. It will automatically run on your computer, even if you shut down or unplug all power sources, it will still run. Its predecessor was the burning Trojan of Lanpinger.
Xinyu said: Sun Tzu said in the art of war, knowing oneself and the enemy, a hundred battles will never end. In order to effectively prevent hackers from intruding and destroying our computers, it is obviously not enough to install a firewall passively.
We should also understand some common hacking techniques, take different measures for different methods, and be targeted, so this time we will tell him to retreat through difficulties. Now we will also be a hacker and educate him to know what is. be attacked.
Seeing that Miao Miao and all the elites started to install Trojan horse viruses, the first program was: There is a software called smbcrack circulating on the Internet that uses ipc$ to crack account passwords.
If your password is not high and simple, it is easy to crack. Quite a few people set the administrator's password to 123, 2003, or no password at all.
Use the command netusexxx.xxx.xxx.xxxipc$ "password"/user: "user name" to establish an ipc$ connection with certain permissions. Use copytrojan.exexxx.xxx.xxx.xxxadmin$ to copy the client side of the Trojan horse program to the system directory.
Use nettimexxx.xxx.xxx.xxx command to check the time of the other party's operating system, and then use at202.xxx.xxx.xxx12: 00trojan.exe to run trojan.exe at the specified time.
After Miao Miao finished this, the hut began to use a new program for cyber attacks: I saw the hut and the blue screen Er Qu Bin began to use a powerful new program for cyber attacks. This should start from the beginning. In the early days of the virus attack, Computer users often have to interact with media infected with active viruses to be attacked by viruses. These old attack techniques often succeed through the negligence of end users.
For example, a user opens a malicious attachment, or accepts a malformed ActiveX control or a toxic SecureSocketsLayer (SSL) security certificate, thereby infecting his computer and network.
But now, end users can be caught by hackers without doing anything wrong. And this "new era cyber attack".
A network attack weapon generated by several scripting languages including VBScript, javascript and ActiveX, which can record standard Web protocols such as HTTP.
These attacks infect web servers by executing a series of mobile code scripts and spread to users who access these servers. Visitors to these sites unknowingly downloaded the Scob worm virus, thus participating in the spread of this virus.
This is a very complex attack, and none of the traditional security products can detect it, let alone counterattack it.
For example, a virus that pretends that VBScript is running is aimed at Microsoft's IIS server, and it can add a malicious javascript to the web page on the victim's Web server.
The four of them took a total of twelve hours from the beginning to the end. It can be said that the virus was very successful. Everyone opened a bottle of champagne and was very happy.
And in front of the computer on the other side, this so-called god-level figure was sweating profusely. It was not enough to kill the virus. Finally, his computer started to catch fire, the power supply began to short-circuit, and the broadband connection began to fail.