Chapter 374: Battle Between Hackers
The development of the Internet in the hot summer also experienced many setbacks. The biggest time was the battle between hackers. This was a battle without gunpowder, and many powerful people appeared.
Hackers are also divided into white hats and black hats.
White hats are a group of computer workers who defend the country. They mainly do defense.
Black hats specialize in some shady activities, such as destroying and stealing network intelligence, and attacking the backend of other companies to seek profits.
At that time, the backend servers used binary algorithms and their security performance was not high, so Lin Bufan asked Lu Jing to build his own defense system from the beginning.
But even good defenses have holes. This is inevitable, just like no one is perfect.
Qi Suya is determined to defeat Mortal Technology, but the disparity in strength is huge. Now that she has lost Fang Ye's support, it is even more impossible to defeat Mortal Technology.
So I thought of finding hackers to attack the backend server of Mortal Technology. As long as the backend server of Mortal Technology crashes, then Mortal Technology will be finished.
If you want to find a hacker, there are three ways. One is to introduce it to someone you know; the other is to find it on the dark web. The so-called dark web means that the Internet is a multi-layered structure. The "surface web" is on the surface of the Internet and can be searched through standard searches.
Engines for access and browsing. What is hidden under the "surface web" is called the "deep web". The content in the deep web cannot be accessed and browsed through regular search engines. The "dark web" is usually considered to be a part of the "deep web"
A subset whose distinctive feature is the use of special encryption technology to deliberately hide relevant Internet information. Darknet is a type of technical means that uses encrypted transmission, P2P peer-to-peer networks, multi-point relay obfuscation, etc. to provide users with anonymous access to Internet information.
The most prominent feature is anonymity. However, the dark web is complex and difficult to find trustworthy hackers.
The last way is to go to the technology network to find a professional Internet technician. Because hackers themselves are technicians.
Qi Suya found a technician who made background programs from the technology network. His online name was Black Desk. He could create background programs and destroy them. This Black Desk once fought against American hackers together with the Black Thunder Hats group.
At that time, the hacker war was very vigorous.
Qi Suya and Black Desk communicated online. Black Desk was still considerate at first, but after Qi Suya offered a reward of 200,000, Black Desk agreed.
Of course, at 9 o'clock in the evening, Black Table attacked the backend server of Mortal Technology. He used a multi-point intensive attack, just like ten thousand bombs bombing the city.
At 9:10, the "Legend" server completely crashed, and hundreds of thousands of players were unable to get online.
Lin Bufan received a call from Liu Chang at home.
"Something happened to the boss. Our "Legend" server was attacked by hackers. Now players can't get online and the number of customer service calls has been overwhelming." Liu Chang is not a defense programmer. He is helpless against hacker attacks.
At this time, Lu Jing was still in the deep sea.
After Lin Bufan hung up the phone, he hurriedly called Lu Jing and asked her to come back overnight.
Lu Jing said that there were no planes to Hangzhou in the evening. Lin Bufan said, I will contact the charter flight immediately. You go to the airport now.
Lin Bufan spent 200,000 to charter a small plane specifically to pick up Lu Jing.
Two hours later, Lu Jing arrived at the company, and she immediately devoted herself to maintenance. With her efforts, the legendary server returned to normal at around 11 p.m.
She also discovered that this hacker wanted to invade the kernel information network and delete all the accounts of legendary players. Fortunately, Lu Jing saved a trick and encrypted three layers of files on the kernel, which is equivalent to adding three locks to the kernel. Ordinary hackers
It's very difficult to break in.
Inside the office.
Lin Bufan had a sullen face. When working on the Internet, what he fears most is being attacked by hackers. Without a strong protection network, the company cannot survive.
"Is this hacker powerful?" Lin Bufan asked calmly.
"Awesome, I have made up for the loopholes, and there should be no problems within a period of time." Lu Jing sweated on her forehead. She frowned and continued, "There are many powerful hackers hidden in the hot summer. I'm afraid I won't be able to deal with them by myself. If I can
Just ask my friend Se Xingtianxia to come over and help."
Se Xingtianxia is a friend that Lu Jing met on the Internet. An incident happened at that time. A real estate developer’s real estate project was unfinished, and the boss donated money and fled. Some people spent their life savings to buy a house, but in the end they couldn’t live in the new house.
In grief, she jumped from the roof of an unfinished building. This incident caused a storm in the city, and both Lu Jing and Se Xingtianxia hated it. They scolded the developer, and finally bet with a meal on who would come first.
Recover the money collected by the boss and return it to those who bought the houses.
Large sums of money must be transferred and transferred again, and then washed through such a process.
To track the whereabouts of the money, you need to compromise the bank's system. This is not just a bank, but also involves overseas banks.
In the end, Se Xing Tianxia traced the money to a bank in Malay, and he compromised the bank's system. Then he transferred all the money and refunded it to the house buyer.
Then he also tracked the boss's location and sent it to the law enforcers. The boss was soon arrested.
But after all, what happened to Lu Jing and Se Xingtianxia was also illegal, but fortunately there were no Internet police in the hot summer at that time, and it was a just matter, and the authorities did not delve into it.
After hearing this story, Lin Bufan looked excited and said, "We must recruit this pervert from the world."
Lu Jing scratched her scalp and said awkwardly: "This guy doesn't like to be bound by work. I have invited him before, but he rejected it."
Lin Bufan crossed his fingers, thought for a while and said, "Everyone has weaknesses. Think carefully about whether there are any weaknesses that you can exploit, such as using a honey trap."
"Boss... are you kidding me? How can I pull off a honey trap? This guy is quite perverted."
"Why did you become so perverted?"
"He...he likes to blackmail beautiful women's computers, and then intercepts her private photos. Anyway, he is a very dirty person. If he comes to the company, all the women in our company will be frightened."
"Throughout the ages, capable people have always had some small flaws."
"Boss, is this still a small flaw?"
"It is normal for young people to have some fantasies about women when they are young." Lin Bufan said eagerly, "We must bring this person into the company. You can first talk about it with an annual salary of 1 million plus a house and car."
"The boss is useless. He is a pervert. He is only interested in the Internet and women. There have been companies that have fired him and offered generous rewards and wanted him to join, but he didn't go. He is free and comfortable alone."
Lin Bufan touched his chin, pondered for a while and said, "Then we can only frame him."
As for Qi Suya, she was only happy for two hours. After discovering that "Legend" was available online again, she contacted Black Desk angrily.
"Hey, did you make a mistake? You were only hacked for two hours? Didn't I ask you to paralyze all their servers?" Qi Suya was furious. She hacked Mortal Technology for 2 hours for 200,000 yuan. This black table is
Are you kidding yourself?
Black Desk was so worried, "Sister, please calm down. It's not that I don't want to be paralyzed, it's because the other party has experts. I attacked their server at a frequency of 30 times per second, but they were all blocked by the defense network. They used
I haven't seen the defense system before, so I need some time to study it carefully before talking about it."
"Okay, I'll give you two days, and you must kill them for me."
Chapter completed!