typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK1391 Hacker's war is never far away!

Then, then

The evening is approaching 8 o'clock.

According to Shi Lei's instructions, Tao Wenxian entered the internal network of the FBI Federal Investigation Bureau.

Shi Lei did not follow the internal network of the FBI Federal Investigation Bureau. Instead, while taking advantage of the CIA Central Intelligence Bureau to support the FBI Federal Investigation Bureau, he killed it!

For the CIA Central Intelligence Bureau, Shi Lei knows more about the network security force of the CIA Central Intelligence Bureau. When acting, there is generally an action notice.

This action notification usually explains the reasons for the action and the goal of the action. Of course, this action notification belongs to the automatic delete information, and it will be automatically deleted by the read or preset storage time.

Shi Lei is preparing to invade the internal network of the CIA Central Intelligence Bureau, so as to restore relevant notification information in the data server of the CIA Central Intelligence Bureau.

As for whether you can succeed, Shi Lei does not know for the time being.

After all, the notification system data server of the CIA Central Intelligence Bureau, in addition to the close defense strategies, the storage medium they use is not an ordinary mechanical hard drive.

Under normal circumstances, the data information enters the memory temporarily, and then writes into the storage medium. But the notification system of the CIA Central Intelligence Bureau needs to process a lot of data every day, and it needs to be highly confidential. Therefore, the CIA Central Intelligence Bureau uses it.

NANDSSD storage technology.

This storage technology far exceeds the read and write speed of mechanical hard disk storage technology. It is the next generation of storage technology and is widely used in the future.

Compared with HDD mechanical hard disk technology, NANDSSD has a lot of advantages, but for Shi Lei, in the current situation, this technology seems extremely cheating.

Because Shi Lei wants to restore data, read the notification information of the CIA Central Intelligence Bureau. The technology of restoring data is very convenient to put on the HDD mechanical hard disk. Even if the data was data ten years ago, it is possible to read it.

But NANDSSD technology is different, the theory of storing data is different!

If you want to recover data from the NANDSSD hard disk, this is very difficult. Only when Shi Lei has hoped, the notification system data server of the CIA Central Intelligence Bureau has not yet performed the operation of data cleaning, can the relevant data information be obtained.

Otherwise, it is really unlikely to restore deleted data from the NANDSSD hard disk.

Shi Lei ordered Yidu Er to immediately invade the internal network of the CIA Central Intelligence Bureau after completing the computing resources. Instead, he was looking for a better way of invasion.

"Clothing, grab a CIA Central Intelligence Bureau to invade the dreamer's online payment system, and use the meat chicken server." Shi Lei thought of a good way.

If you follow Shi Lei's previous habits. He likes to start directly from the official website of the CIA Central Intelligence Bureau, forcibly invade from the official website to break the defense of the internal network.

This method may seem stupid, so it seems that it is very easy to be discovered. In fact, it is not. As long as you disguise it, the security experts of the CIA Central Intelligence Bureau will only think that this invasion is an unknown little hacker's test.

It will not attract attention.

Although the method of direct invasion is very stable, Shi Lei does not want to do that. Because, the way to invade the way is the greatest. And once it is recognized, the security expert of the CIA Central Intelligence Bureau will definitely track it, which will cause more troublesome anti -anti -anti -countermeasures.

Tracking the problem.

Therefore, Shi Lei chose a more hidden anti -tracking plan and directly from the Bermock Server of the Central Intelligence Bureau of the CIA, along the invasion route of the CIA Central Intelligence Bureau. In reverse tracking, enter the CIA Central Intelligence Bureau to send an invasive computer.

This solution is more concealed, but also more dangerous!

Because the final source of invasion is definitely the security experts of the CIA Central Intelligence Bureau, and the computer is operating the computer. The dreamer who invades the Dream Entertainment Company Online Payment System.

Experts found.

Or it should not be said to be a security expert of the CIA Central Intelligence Bureau!

Because, like the mysterious temporary workers in Xia Kingdom, this group of people do not have the establishment of the CIA CIA and have no identity records.

Even if Shi Lei accurately tracks their location information, there is no way to put them on the hat of the employees of the CIA Central Intelligence Bureau.

So in the face of these guys who are temporary workers, Shi Lei really only has hard touch, not preserving relevant evidence, and it is so enthusiastic.

In accordance with Shi Lei's instructions, Yidu quickly grasped an unimportant chicken server. There were not many data flows for this pheasant server to transfer. Shi Lei tracked the data flow smoothly and traced the roots on the backstream.

After about two minutes, Shi Lei did not cause the other party's alertness and directly killed the other party's computer, and then used the other party's computer as a springboard, and naturally entered the internal network of the CIA Central Intelligence Bureau.

In the internal network of the CIA Central Intelligence Bureau, Shi Lei scanned the notification information, but since the CIA Central Intelligence Bureau dares to issue so boldly publish notification information, it will also explain the reasons and goals in detail to prove that they are very confident in the notification system.

Shi Lei didn't find any notification information!

Fortunately, Shi Lei did not expect to get the information directly at the beginning. He entered a string of code on the keyboard with both hands. Yiyi Er immediately scanned the data server of the CIA Central Intelligence Bureau notification system.

This special data server does use the NANDSSD hard disk storage technology. In just a few seconds, given the excellent performance of the NANDSSD hard disk, Yiduer has scanned the whole.

However, no remaining information of the notification information is still not found!

Shi Lei scanned it once, and did not find any relevant information. In this way, it should be the data server of the notification system, so that nandssd executes the Secure.erase command, that is, the security removal command.

This command is a special command for the NANDSSD hard disk. It can clean the data residue of SSD very cleanly. It will not be used as an ordinary HDD mechanical hard disk. Even the data ten years ago can be retained.

Shi Lei frowned and looked at the information displayed by the No. 1 server screen. If the information could not be obtained from the notification system of the CIA Central Intelligence Bureau, is it only on the bright side and the CIA Central Intelligence Bureau tore the face?

This is what Shi Lei is unwilling!

‘By the way, there is this method!’ Shi Lei suddenly thought of a way, not a way for the NANDSSD hard disk, but a way of thinking.

As a peak of the world's peak, it not only needs excellent technology, but also requires a quick mind. Since the information server cannot be obtained from the notification system data server of the CIA Central Intelligence Bureau, why not accept the notification and the computer of the relevant security personnel

What about the required information?

Shi Lei smiled back to the previously connected to the meat chicken server. The computer's computer. In the 2008 era, although NANDSSD technology has matured and put into use, the cost is still high. Generally, the computer is not installed.

This security expert still uses an ordinary mechanical hard drive. This is not the cost of not being able to bear the NANDSSD hard disk, but it is completely unnecessary.

The notification information issued by the CIA Central Intelligence Bureau, if staying in the internal system of the CIA Central Intelligence Bureau, and being intercepted by the hacker, it is indeed a big news.

But this message was flowing outside and nothing was there!

Can you still prove the crime of the CIA Central Intelligence Bureau because of a piece of information? That is just funny! If there is such a simple thing, Shi Lei can forge a hundred related information every day to slander the CIA Central Intelligence Bureau.

Although he found clues and also confirmed the feasibility, Shi Lei suppressed his excitement and carefully scanned the security expert's computer.

Because this computer has been used by security experts, once there is an abnormal point or a security trap set by the other party, Shi Lei will announce the failure of the action.

An ordinary HDD mechanical hard disk has a big disadvantage, that is, whether it is reading or writing data, the hard disk light will be constantly on.

Shi Lei first needs to hack into the computer's motherboard bios system, change the programs fixed inside the bios system, so that the hard disk lights will be constantly on when reading and writing.

This is not a simple job!

It would be too simple if it was just to turn off the hard disk light. But this security expert is using a computer. If the hard disk light is no longer on and he is writing or reading data himself, isn't it clear that there is something wrong?

Shi Lei carefully modified the information of the BIOS system. It took about ten minutes. Finally, the procedure for controlling the hard disk lights was finally changed.

"Let me see, what's the reason!" Shi Lei scanned the computer's hard disk of security experts. Because of the alertness of safety experts, the scanning speed was very slow.

After waiting for almost half an hour, Yifuer finally scanned, resumed the information that was deleted today, and at the same time, the keywords of "Dream Entertainment", "Xia Guo", "Mirui Technology ', etc., matched and deleted deleted

information.

After less than half a minute of screening, Yi Zuer displayed a piece of information in the virtual transparent screen of the lip lens information processor.

Shi Lei finally knows why the CIA Central Intelligence Bureau bite the dream entertainment online payment system!

'According to the latest information, the dream entertainment company's dream online payment system will provide convenient money laundering services for some criminals in our country. This information comes from the well -known hacker Raphael, which is more credible.

Invader the dreamer's online payment system, confirm the source of each transaction funding and related trader information. '

Shi Lei's expression for a moment, Raphael?

Then, then


This chapter has been completed!
Previous Bookshelf directory Bookmark Next