typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

hk955 The capital of the Philippines, the port problem!

. The Philippines is a typical archipelagic country with 7,107 islands and its capital is Manila.

Manila, the capital of the Philippines, is the most developed region in the Philippines. It owns more than half of the industrial enterprises in the Philippines, a quarter of the country's colleges and universities, and the largest port in the Philippines, the Port of Manila.

.

In 2005, the throughput of Manila Port was 1.2 million TEU, ranking 33rd in the world's port throughput. The so-called TEU is an international standard container with a length of twenty feet. It is the port throughput.

An important unit of measurement for volume and ship cargo capacity.

As the most important port in the Philippines, the Philippine government attaches great importance to the development of Manila Port and has invested more than 300 million US dollars in the development of electronic information technology transformation of Manila Port.

As a modern port, how can it handle the huge cargo throughput every year without electronic management?

Electronic information technology provides a very convenient management method for the Manila Port. However, this information management method also provides hackers with convenience for intrusion.

The port management system of the Manila Port is not a closed management system, but is connected to the Internet. After all, the cargo information of the entire Manila Port needs to be displayed to other organizations for review.

Although the port management system of the Manila Port has very strong protection measures, it will not worry about being invaded by ordinary hackers.

But Shi Lei is not an ordinary hacker!

Shi Lei is the world's top hacker and possesses the world's top hacking skills! There are really not many Internet electronic information systems in the world that can completely resist Shi Lei.

Including Li Jian's National Security Agency NSA, if they are left unattended, their defense systems cannot stop Shi Lei's intrusion. Even DARPA's defense system is no match for Shi Lei. Of course, all of this is

It is built on the premise that there is no one to defend. If there are security personnel, under the current hardware conditions of Dream Entertainment, Shi Lei will only dare to play with the FBI. Even the CIA, Shi Lei doesn't like it very much.

Deal with them!

Shi Lei currently likes to deal with the Philippines, and is especially interested in the Philippines' Manila Port. Shi Lei put his hands on the keyboard and entered the port management system of the Manila Port through Server No. 1.

"Yizur, call back the harassment attack on the National Security Bureau of South Vietnam, integrate the resources of the IWN secret network, and prepare to attack the port management system of the Manila port in the Philippines." Shi Lei ordered Yizuer.

Although the National Security Bureau of South Vietnam cut off the electrical attack, it still had some subordinate departments. Following Shi Lei's instructions, Yizuer carried out harassment and attacks on these subordinate departments.

"Yes, Sir, the order will be executed." Yizuer immediately followed Shi Lei's order and began to execute it.



Pengcheng City.

Mr. Ma hung up Shi Lei and was forced to get up from the warm bed of the female secretary. He took his mobile phone and walked into the bathroom. He closed the bathroom door and ensured sound insulation before using his mobile phone to dial the number of Duan Dao, the leader of the Broken Knife Group.

.

After waiting for a while, Broken Knife answered the phone. As a world-class hacker, Broken Knife obviously hadn't slept yet. The Broken Knife Group led by Broken Knife had only twenty-four members in total. They were not a hacker organization in the traditional sense.

It is a hacker organization that specializes in serving Big Penguin.

Therefore, Broken Knife only watched the battle between the hacker circles of Xia Kingdom and the hacker circles of Philippines and South Vietnam. He did not lead Broken Knife Group to participate in the battle.

"Boss, is there an emergency?" Broken Blade asked neatly.

It was already past three o'clock in the morning. If there was no important emergency, it would be impossible for Mahua Teng to find him at this time. Since Mahua Teng is looking for him, it means there is some emergency.

"Duandao, our traffic information management system in Pengcheng has been invaded by the Philippines. Please deal with this matter as soon as possible! Pengcheng is our base camp, we can't lose face!" Mahuateng ordered Duandao.

Although the traffic information management system of Pengcheng City was hacked by the Philippines and has nothing to do with Big Penguin, sometimes, how can people not get stabbed when wandering around in the rivers and lakes? The headquarters of Big Penguin Company is in Pengcheng.

, within the hacker community, Pengcheng is considered by default to be the territory of the Big Penguin. If the Big Penguin cannot even protect its own territory, it will become a joke in the hacker community.

If it just becomes a joke, Mahuateng may not care, but in the hacker world, becoming a joke means that it is weak. Big Penguin is a fat sheep. If it shows signs of weakness, it will suffer countless attacks.

Hackers covet it. Therefore, Mahuateng and Big Penguin cannot become the laughing stock of the hacker world!

"I understand, boss! Leave this matter to us!" Duandao said affirmatively.

Mahuateng was still relatively relieved about Broken Blade. He encouraged him a few words and promised some rewards for Broken Blade and the Broken Blade team before hanging up the phone.



Shuangqing City.

Shi Lei and Yi Zuer are using the excessive computing resources provided by the IWN secret network to scan the port management system of Manila Port in an attempt to find loopholes in the port management system from outside the management system.

Under the integration of Yizuer, the IWN secret network gathered nearly 1,000 tflops. Shi Lei searched outside the Manila Port management system for nearly ten minutes. After still not finding any system vulnerabilities, he directly used the IWN secret network to perform a forced scan.

The efficiency of the IWN secret network is very high. Although the IWN secret network did not scan the system vulnerabilities, Shi Lei used the computing resources of the IWN secret network to hack into the port management system directly from the official cargo inquiry channel of the Manila port.

Within the port management system, Shi Lei did not directly do evil, but was analyzing the operation of the entire port management system. It was not the management operation of the port, but the operation of the data storage of the port management system.

‘Asynchronous data backup system?’ Shi Lei looked at the management system of Manila Port and felt a sense of surprise in his heart. Systems that use asynchronous data backup are generally less likely to be hacked.

This data backup structure is implemented through differential storage systems and disk array groups. The connection between the backup server and the main server is not close. Once the main server is attacked by a hacker, the backup server will independently disconnect from the main server, thus

Keep the data.

If ordinary hackers encounter a system with asynchronous data backup, they will usually choose to give up intrusion, or vent their anger and cause damage in the main system. Shi Lei did not give up or vent his anger, but secretly lurked in the main server.

Shi Lei is waiting for the backup server to perform asynchronous data backup. The asynchronous data backup system will not start working until the data gap between the main server and the backup server reaches the designed critical value.

That will be Shi Lei's opportunity!

The waiting process was undoubtedly very painful. Shi Lei, who had nothing to do, was querying the information inside the database on the main server, and also querying the port management system to see how many hardware facilities it controlled.

Manila Port is the most modern port in the Philippines. It has quite a lot of hardware equipment that can be operated through the port management system. For example, the most common gantry crane in the port is responsible for the land part of the port, dispatching containers and loading them into trucks; or from

On the freight truck, the containers are transported and stored on land at the port.

Corresponding to this is the mast crane, which is responsible for transporting standard containers, or cargo, from ships to land; or lifting them from the port to the ship.

These machines, which originally required human operation, can all be controlled through the port management system at the Manila Port.

Shi Lei tried to crack the hardware operating subsystem of the Manila Port. If the crack was successful, Shi Lei could control the gantry crane, mast crane, or even the command center of the Manila Port.

Shi Lei patiently analyzed the port management system of the Manila Port. Just when he discovered some unusual information, Yizuer suddenly issued a prompt, "Sir, the system has tracked the backup channel of the asynchronous data backup system. Do you want to pursue it?"

"Let me do it myself!" Shi Lei was a little worried about Yi Zuer. Although Shi Lei optimized the black magic software, Yi Zuer really didn't do well in terms of intrusion. At least compared with Shi Lei, the gap was still too obvious.

.

Shi Lei followed the backup channel of the asynchronous data backup system discovered by Yizuer and peeled off the defense system of the backup server layer by layer. A smile appeared on Shi Lei's face. Then he quickly returned to query the abnormal information he had just discovered.

Philippines, Manila port.

As a large port, the Port of Manila operates around the clock, and even at three o'clock in the morning, it is still a busy scene.

Manila in the Philippines and the capital city of Xia are in the same time zone, so there is no time difference. It is now around three o'clock in the morning on June 4th in Xia, which is also the same time in the Philippines.

In the busy Manila port, a port forklift worker has just completed a shipment order and is now processing the second shipment order. The forklift workers at the port are mainly responsible for transporting some small goods into standard containers for convenience.

Next step of transportation.

The forklift worker named Raul Hernan was holding the second freight order. Since the freight orders were received together, when he was processing the first freight order, the second freight order was soaked with sweat.

As a result, part of the shipping information was unclear. Therefore, Raul Hernan had to use the PDA he carried with him to enter the shipping order number and query the specific detailed list.

However, when he entered the shipping order number into the PDA and connected it to the port management system, hoping to query the detailed shipping list, the PDA did not display any data.

At first, Raul Hernan thought the PDA had made an error. He tried several times, but there was still no data. When he entered the order number of the first shipping list and still found no result, Raul.

Only then did Hernan realize that something might have failed in the port management system.

Raul Hernán, who discovered the problem, immediately reported the situation to the Port Authority...

(To be continued. Please search Piaotian Literature, the novel will be better and updated faster!)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next