Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 501 Hacker Attack and Defense

A fashionable girl, holding a stack of books in her hands, was walking in a hurry, crossing the tree-lined road, heading straight to the teaching building, tall and tall Pakistani boy riding a bicycle, making a clattering sound, and some people were sitting in the back seat with a smiling girl.∈↗

This scene is very similar to that of domestic universities. Seeing these, Mhamad seemed to recall his university life. Although the life in the military academy was boring, it also had a lot of fun. For example, every weekend, you can go to the medical university next door to see the girls there.

Later, Mhamad had a girlfriend, and now he can still clearly remember that she looks eighty-slightly similar to Bai Xue.

Pakistan is now in contact with the West and its social atmosphere has become very civilized. Mhamad likes this and gradually fades those traditions and makes Pakistan a modern country.

"There is the School of Computer and Information Engineering there." The accompanying Minister of Education said that the construction of this university is a key project of the Ministry of Education. He has also been here several times and is familiar with the distribution here.

"Let's go, take a look." Mhamad said, leading everyone toward the teaching building.

In later generations, it was generally called the Computer Academy. It was not until many years later that it joined the information engineering. Only computers could not perform all functions. Only by combining them with the network and becoming a computer network can it perform its due functions.

Therefore, after the establishment of the computer industry in Pakistan, it attaches great importance to the Internet. The computer systems of all universities in Pakistan are connected to the Internet, with the backbone network of universities as the core, and a wide range of networks are established. Therefore, learning computer knowledge requires learning network knowledge.

It was time for class, and Mhamad pushed open the back door of a classroom, walked in gently, and sat behind the desk.

There were about a hundred students in front of them listening to the lectures of the teachers above. They were so attentive that they did not notice that many people came to listen to the lectures behind them.

Mhamad looked at the lecturer in front and was stunned. Isn’t this Kevin Mitnik?

When I went to Grumman Company, Mhamad relied on this genius hacker to get the fire control source code of the Tomcat fighter from Grumman Company, which played a very important role in imitating the flat-screen gap radar. Later, Mhamad just asked Pakistan's intelligence departments to pay close attention to the genius hacker. When necessary, he brought him to Pakistan, but he did not expect that he had arrived?

"Everyone is welcome to take my course, the name of the course is called network offensive and defense." Kevin said: "Computer network is a great invention. When connecting all computers together through the network, it can promote the progress of our entire era. There is no longer a need for telegrams, phone calls, or emails on the Internet. When we hold a meeting, we can also conduct video conferences through the Internet. The Internet is popularized in the army. The president's orders can quickly reach grassroots troops through the network system. The police want criminals. They can quickly spread throughout the country through the Internet. However, the network is not very secure. For example, on the Internet, there is such a person who specializes in invading other people's computer systems, called hackers. What we are learning now is hackers' offensive and defense technology."

"Teacher, are you a hacker?" asked a student.

"Yes." Kevin said complacently.

"Then can you demonstrate it to us?" the student continued.

"Okay." Kevin said: "Now, I'll demonstrate to you how to hack a computer."

After saying that, Kevin sat down. There was a computer used for teaching in the classroom, and a projector was also projected onto the large screen in front of the classroom.

Students who are close to the window pull up the curtains next to them, making the screen clearer.

In fact, projectors have been available for a long time. If we were to talk about the founding, it would be an ancient shadow puppet, even the prototype of the projector. Modern projectors started in the 1950s and used CRT technology, just like TVs, with a very large size and high price. Pakistan attaches great importance to education, so it invested huge amounts of money to equip universities with such advanced equipment.

At this time, the lines of letters on it were constantly jumping. It was less than the 1990s and there was no graphical operation interface at all. They were all the simplest Dos systems.

Time passed by little by little, and when Principal Adil pushed open the door and came to Mhamad, the characters jumping on the screen suddenly stopped.

"Let's see what's on this computer," Kevin said, skillfully typing a dir command.

Suddenly, a lot of documents jumped out, and Kevin read: "Government work report, annual fiscal summary of the Free Government, and Kara Mine Area's output increase report. Everyone, what we are invading now is the office computer of the Free Government of Afghanistan!"

These files are indeed in the computers of the Afghan Free Government! In order to facilitate the office of the Afghan Free Government, Pakistan has provided a batch of computers and has also laid a network, which has been installed to Jalalabad. I really didn't expect that it would be invaded by Kevin in front of me now!

Fortunately, Pakistan's military network is separate from civilians, otherwise, there would be no secret of Pakistan's military!

"I'm sorry, President." Adil felt his forehead and immediately broke out in cold sweat: "This lecturer was invited by us recently."

If the Afghan government's computer system is invaded, if any secret is leaked, it will probably become a wanted criminal!

"Ba, bha, bha." Mhamad took the lead in applauding.

All the students clapped and some turned their heads and looked at the people who came in at some point behind them. Why did they look so familiar?

"President Mhamad!" A girl screamed. She recognized that the person who came was the president of Pakistan!

Mhamad smiled and greeted Kevin in front of him. The two had a relationship.

"He was rescued from the United States this year." After getting contacted with the intelligence system, Mhamad heard his assistant report to him.

Kevin Mitnik, the most famous hacker in history, was not idle at all. He followed Mhamad to Grumman and invaded the system there. Kevin felt very satisfied. Later, he successfully broke into the "North American Air Protection Command System" and turned his target to other websites, such as the communication network system of the famous "Pacific Telephone Company" in the United States, and even the FBI's network system.

After entering the FBI, Kevin browsed the information and found that the FBI was investigating a hacker. He was shocked at the time. This "hacker" was himself. So Kevin finally knew that the FBI had no choice but to do anything about it. He was even more excited. The fragile network system was the target of his attack! He could find endless fun! In a short time, he invaded the network of five major American companies one after another, and destroyed the network systems, causing huge losses to these companies. As a result, this year, the FBI arrest was finally recruited. Pakistani intelligence personnel rescued Kevin before the FBI police arrived and received Pakistan.

Now, in a conference room at the university, Mhamad warmly welcomed Kevin's arrival.

"Kevin, you are very welcome to Pakistan." Mhamad said: "We had a very pleasant cooperation in the United States at the beginning, and now we can finally cooperate again."

Kevin looked at Mhamad in front of him. Although he was a hacker, it did not mean that he did not understand the world situation. The person in front of him was simply a person who had created miracles many times. This was also the reason why Kevin came here from the distant United States. He felt that only by coming here could he better realize his ambitions.

"I'm very happy, too," Kevin said. "Otherwise, I'll be in the FBI prison now. However, when I come here, I can only teach students, not actually operate, and there is no meaning."

Kevin's lifelong interests were all invading. If he couldn't become a hacker, his life would be very boring. This is also the reason why he came here to teach students about network invasion. He could only find a sense of satisfaction from the students' admiration, especially the hot eyes of some female students, which made him very comfortable.

"Kevin, you can invade any network in Pakistan," Mhamad said. "I won't send you an arrest warrant, but there is one thing you can only invade, not destroy, and after the invasion, you need to tell the other party that there is a loophole in the computer and find out how to fill it."

What Mhamad said is naturally the task of information security experts. Many information security experts have been hackers.

Pakistan's computer network is of course also fragile. In later generations, cyber attack and defense will also be a form of war. Therefore, Mhamad allowed Kevin to do this, test various networks in Pakistan, and find vulnerabilities while filling them.

In this way, Pakistan's network is more robust than the United States.

"Okay, then I'm not polite." Kevin said: "I promise you that you only invade, not destroy, and you also need to find a solution."

"At the same time, you are welcome to continue teaching here to teach students' offensive and defensive knowledge." Mhamad said: "We need more people to learn cybersecurity."
Chapter completed!
Prev Index    Favorite Next