The follow -up expert of the International Intelligence Bureau of the Provincial Foreign Affairs of Volsan State Foreign Affairs, after chasing the server of the hacker alliance, immediately paused and obviously regarded Shi Lei as the core member of the hacker alliance. Shi Lei's marriage was very successful!
Tracking experts only pause for a moment, contact colleagues who specialize in jing invasion and attack, and assist the server of the attack on the hacker alliance together
The Ri news of Vosan State, as well as Yomiuri News, is controlled in the internal voice channel of the hacker alliance in the two tri groups of the hacker alliance. The black knife said with a smile: "Brothers, we can pant
After a tone, the grandson of the International Intelligence Bureau of the Foreign Affairs Provincial Provincial Provincial Provincial Provincial Provincial Provincial Provincial Provincial Provincial Provincial Bureau was led by the great god of Lucifer, but I didn't know if Lucifer could eventually escape! "
The second leader of the alliance, at the same time, also said: "Boss, he should be able to escape the tracking easily from Lucifer's strength!"
Black Panther agreed: "The second brother is right, Lucifel's strength is too powerful! The defense power of the NK official website page is actually a layer of white paper that was broken by him.
There is no way! "
"Boss, it's not good!" The black gun suddenly said, "Boss, our server was attacked, and it was suspected to be the grandson of the International Intelligence Bureau of the Foreign Provincial Provincial Provincial Provincial Provincial Provincial Provincial Provincial Provincial Provincial Provincial Intelligence Bureau!"
"What!" The Black Sword exclaimed, "What's going on! We didn't provoke the International Intelligence Bureau of the Provincial Provincial Provincial Provincial Provincial Provincial Provincial Department of Foreign Affairs at all, and did they track Luchel?"
There is a bad feeling in the heart of Black Panther, "Boss, do you say it will be Lucifer, and you have given us a misfortune to us?"
The black gun shouted: "Boss, second brother, black hand, back to defense together! Our group is about to stop!"
"Everyone returns to defense! Damn Lucifer!" The black knife snorted a core member of the hacker alliance, and immediately gave up his task, took his own meat chicken, and returned to the server of the hacker alliance to return to defense back to defense.
A black wolf's heart twisted, a kind of thing named hatred, slowly breeding in his heart, and a anger roar in his heart: Lucifer, you again! I must catch you, I must retaliate against you,
The International Intelligence Bureau of Foreign Affairs, through NK TV, released an emergency news photo meeting. They only announced one news that hackers who invaded the NK National Television Station were suspected to be the current followers of the core members of the hacker alliance.
Server, once they break through the server of the hacker alliance, then everything will be white
Sitting in front of the No. 1 server, Shi Lei watched the hacking alliance and the International Intelligence Bureau of the Ministry of Foreign Affairs of Volsan State Foreign Event. With a hacker alliance's internal server, he would fight for you to live!
The strength of the International Intelligence Bureau of the Provincial Provincial Foreign Affairs of Volsan State only shows at most one -tenth. The hacker alliance can also earn Shi Lei for the time being. He has more important goals.
After the completion of the task of planting the marriage and marriage, Shi Lei began to perform the third step plan to invade Canon!
In this Xia Guo hacker, the most fundamental fuse is Canon. If the Grandine Puchuro Ichiro did not expose Shi Lei, Shi Lei would not stir up the online war on the back.
Although the losses of Vossen have been very heavy, Shi Lei did not satisfy the Canon as a fuse, and he did not suffer any damage. This is simply ironic!
Shi Lei connected to the super computer Yan, as well as the first -class meat chicken of Aipo Trusted Company. Two powerful meat chickens xing can integrate and sneak down to Canon
Shi Lei's goal is Canon's technical information, especially the optical equipment, and the technical information of digital cameras. Although Shi Lei does not like Vosan's ghost.
Status
If you can invade the Canon Company and obtain the technical information of the R & D department of Canon, it will develop!
The main computer of the R & D department of Canon is also a super computer, and it is very advanced to calculate the xing.
Such a powerful super computer is very difficult to invade even if Shi Lei's hand controls the ninth supercomputers in the world, it is very difficult!
The high -tech confidential technology industry, the telecommunications industry, and the financial industry. The reason why these huge oligarchs like supercomputers are because of the supercomputer safety!
Shi Lei controls the supercomputer swallow and hovers on the official website of Canon Company. He did not immediately invade the internal to find a most appropriate time, looking for the empty gear of the safety defense of Canon
From the official website of Canon Company, Shi Lei carefully entered the server of the Personnel Department of Canon Company, looking for the personnel information of the R & D department in the server of the personnel department
Before hackers invade, they need to be fully prepared so that they will not be able to deal with emergencies.
In these studies, the corresponding research materials are stored, but the main computer of the research and development department of Canon Corporation also stores R & D materials. However, the main computer of the R & D department is very closely guarded by the main computer of the R & D department.
So simple!
Shi Lei searched the information of the R & D department in the Personnel Department, and then a smile of Xia Guo was exposed in the corner of his mouth. The solid defense often collapsed from the inside!
Canon's foreign defense is indeed very powerful, and it can even be said that perverts are definitely not the kind of paper defense of NK TV's official website!
Unfortunately, such a powerful defense system also has a weakness, that is, insufficient internal defense! Shi Lei found the Canon headquarters in the server of the personnel department.
From the internal security defense system, after intercepting the accounts and passwords of the senior researchers, I did not know that the defense system of the Canon Company was unknowingly, and entered the internal system of the R & D department.
The internal system of the R & D department of Canon Company, according to the authority of the senior researchers mobilized by Shi Lei, could not obtain information information other than their research, but Shi Lei is a hacker.
Shi Lei secretly bypassed the system certification, used the vulnerability authorized by the system, secretly weighted the authority of senior researchers, and temporarily allowed senior researchers to read the information of other research projects
The computing capacity of super computer swallows exceeds the supercomputers of the R & D department, and the two parties fiercely confront them. The system -authorized vulnerability is under the protection of super computer swallows.
Shi Lei quickly entered the code on the keyboard. In the R & D department, the research on optical technology, as well as the technical conditions of the digital camera, eliminated a large number of technologies such as the medical equipment of the photocopier fax machine, leaving only Shi Lei
Digital camera technology optical technology required
Even if only optical technology and digital camera technology are left, the file data data statistics from the system exceed 200GB!
Canon's supercomputers have closely limited the flow of data. Although Shi Lei can easily view these materials with the help of supercomputer swallows, there is no way to take away because of the supercomputers of Canon Company.
Will issue a jing newspaper!
Shi Lei looked at more than 200GB of data. All these materials were Jinshan Silver Mine. If you do n’t move away, Shi Lei is definitely unwilling to enter Baoshan but return empty -handed?
However, the supercomputer of Canon Company has strict data flow restrictions. This restriction is derived from hardware devices. If you want to pause it through software, it will only cause a jing report!
Shi Lei scratched his head. Even at this moment, even if he gave him the superpowers that he never forgotten, you would take several months to read more than 200GB of data! Not to mention that there is no ability to forget, and how can I have time to give him?
Remember?
"What should I do!" Shi Lei looked at the computer screen and said to himself
Suddenly, Shi Lei thought of a story, the story about a child deceiving, the story spread very widely in Xia Guo, telling the story of the wolf!
Shi Lei decided to use the story of the wolf, and tentatively tested the internal security department of Canon Company's internal security department.
Send out
The internal security department of Canon Company immediately discovered the supercomputer of the R & D department, and was transmitting data outward. They immediately acted and tightly monitoring the super computer, but found that there was no data at all.
The high -profile Canon internal security department, unwilling to investigate the entire supercomputer, but did not find any problems, and finally gave up helplessly.
After they gave up, Shi Lei increased the volume of the virtual data packet, raised it to 10GB of shoes and then transmitted data again to the outside.
The huge data flow allows the Canon internal security department to issue a crazy Jing report. The hardware newspaper of traffic monitoring is a jing system. It counts the large shoes with a full amount of data.
There is no abnormality in the ministry's supercomputer, there is no loss of internal data, and there is no trace of copying
After the internal security department of Canon Company, after a little relaxation, Shi Lei once again increased the volume of the virtual data packet to 100GB, and established a random transmission data
The hardware newspaper of traffic monitoring jing, Canon's internal security department, once again thoroughly investigated the supercomputer of the R & D department, and the research data data in the supercomputer.
How can the internal security department of Canon Corporation find out the problem?
After more than ten times, the internal security department of the Canon Company was also bored. When the traffic monitoring hardware issued a newspaper, they did not even check the inspection.