typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK159 Premeditated Second Cyber ??War

.Faced with Li Kunning's inquiry, Li Chai fell into deep thought and he was unable to make a decision for a moment.

Seeing that Li Kuai was not moving, Li Kunning once again raised a major condition.

"Xiao Li, if you come to the Department of Mechanical and Electronic Engineering, our department's laboratory can be open to you. In addition, you can also set up a research project for fuel remote control helicopters, and you personally serve as the team leader of this project!"

Li Chai's breathing stagnated. After this condition came out, he could no longer refuse!

"Professor Li, are you serious?"

Li Kunning nodded, "But, Xiao Li, your graduate supervisor can only choose me!"

After a morning of discussion, Li Kunning's skills had been recognized by Li Chai. He nodded: "Professor Li, I agree to transfer to the department!"

Li Kunning laughed: "Okay, okay! Let's go through the department transfer procedures today! By the way, my daughter is your class teacher? In this way, the procedures issued are also very simple!"

Shi Lei was relieved for Li Chai. This was Li Chai's opportunity. With Li Chai's level, his future achievements will definitely not be low.

After lunch, Li Zhiyue was asked by her father Li Kunning to conduct various procedures together. Even Li Zi was taken all the way, and Shi Lei returned to Jingyayuan with resentment.

In Room 2003 of Jingyayuan, Shi Lei first uncovered the behavior dynamic capture program of server No. 1, connected to the public server of Shuangqing University, logged into the school’s campus forum, and took a look at the gossip news in the school.

My college career was so boring, and all kinds of gossip on the forum were all boring and nonsense!

Shi Lei browsed the campus forum. After this period of descent, his legend has disappeared in the forum, and he has been forgotten by the world!

The recent hot topic of campus forum is the campus midday radio program. Zhu Dan from the Department of News and Radio reorganized the program and achieved unexpected success.

The campus midday radio program basically invites one more well-known figure in the school, not limited to students, but even teachers. For example, Dean Ji Mingyi of the Computer Department broadcasts the program in the afternoon.

After watching the campus forum for a while, there was nothing Shi Lei was interested in. Shi Lei used Shuangqing University public server as a springboard to open the homepage of the Hacker Alliance to view the latest news of the Hacker Alliance.

The Hacker Alliance is the weather vane of the Xia Kingdom hacking community. Their movements represent the movements of the Xia Kingdom hacking community to a certain extent.

Shi Lei logged into the Hacker Alliance forum with the ID of Black Stone. He just logged into the forum and a series of prompt sounds appeared. Shi Lei opened the information system and found that he had been promoted from an official member to an internal member. In other words, he had entered the Hacker Alliance and had more or less a say in the Hacker Alliance.

The registered members of the Hacker Alliance originally exceeded 150,000. After the last big fuss in Tokyo, the country of Wasang, the registered members almost doubled to 300,000! The official members did not increase much, but there were still more than 33,000. One more internal membership was Shi Lei!

Although there are so many registered members and official members of the Hacker Alliance, their internal members are only 461, which is even included Shi Lei's Black Stone Vest.

Judging from the number of internal members, we can also know that internal members have much greater authority than official members.

As an internal member, Shi Lei openly entered the internal forum of the Hacker Alliance without having to log in secretly like before.

There is an online member exchange area for the internal forum. Shi Lei has just entered the internal forum. Several online internal members sent a welcome message to express his welcome to join.

Shi Lei responded politely and said modestly that he was a newcomer and hoped that these seniors would take care of him.

One of the internal members named Heiji posted a hacker alliance website on the public screen and sent an inquiry: Our alliance is about to attack the WoSang Kingdom again, can you have time for all brothers?

The Hacker Alliance achieved great success in the last invasion operation. Not only did it make a name for itself, but it was a real benefit to double its registered membership. Although the Hacker Alliance is a pan-alliance non-profit organization, with ten core members in the internal control of the entire alliance, it does not mean that it is not profitable!

In fact, the hacker alliance has a lot of revenue!

For example, the number of visits brought by popularity has caused some advertisers to come to the Hacker Alliance and put some advertisements on the Hacker Alliance website.

Some cybersecurity companies, inviting hacker alliances to test their new products, or system vulnerabilities, also need to pay a considerable fee. There are also some hidden channel benefits that allow the ten core members of the hacker alliance to make a lot of money!

It was precisely because of the promotion of interests and the last time the enemy invaded the country of WoSang, for some reason, the other party's hackers did not resist at first, and later the resistance was very small. Therefore, the core layer of the hacker alliance was preparing to launch a second cyber war against the country of WoSang.

Shi Lei opened the web page to view it, and it was indeed a preparation notice. This notice can only be seen by internal members. Official members and registered members do not have permission to view it. Registered members are basically cannon fodder. Before the battle, the alliance will unify the attack tools and let them take the tools and win by quantity.

As for official members, they have independent offensive capabilities, but their technical strength is uneven. The alliance provides shelter servers to make trouble at will.

The real backbone of the Hacker Alliance is internal members!

After reading the news, Shi Lei secretly exclaimed in his heart, what is the hacker alliance going to do? Do they want to provoke a cyber war between the two countries?

In fact, the reason for the Hacker Alliance's move is Shi Lei!

Shi Lei used Lucifer's vest to play in Vosan and humiliated the holy land of Yasukuni Shrine, which made NHK TV station miserable. Then he went to the International Intelligence Bureau of the Ministry of Foreign Affairs and they followed Shi Lei in an attempt to capture Shi Lei.

However, Shi Lei was extremely cunning and had a very strong technical strength. He led a group of JFS tracking experts and eventually blamed the hacker alliance.

The hacker alliance suffered an unpredictable disaster and fought with the experts of JFS and finally almost repelled the experts of JFS. Or the experts of JFS also knew that they took the initiative to withdraw after being teased by Shi Lei!

After being beaten by the JFS experts, the big guys of the Hacker Alliance were very unhappy, so they decided to start the Second War and teach the guys from the WoSang country a lesson!

This time, the Hacker Alliance not only plans to take action on its own when attacking the WoSang Kingdom. There are three second-generation hacking organizations, and the Hacker Alliance is the most active, representing the hacking world of the Xia Kingdom. There are also two other names: the Dark Night Dynasty and the Great Xia Alliance.

These two hacker organizations are interested in learning from the first generation of hacker organizations, and hide it and are not exposed in front of others at all. Although these two second generation hacker organizations did not appear much, their strength is very strong, and they are just a short-term difference compared to the hacker alliance!

This time, the Hacker Alliance sent an invitation to the Dark Night Dynasty and the Daxia Alliance, asking them to take action together to deal with the hacker world of the Wosang Kingdom.

In the hacking industry of Xia Kingdom, the individual quality is not as good as that of WoSang Kingdom, but the overall strength and quantity are higher than that of WoSang Kingdom. The population advantage of Xia Kingdom is here, and WoSang Kingdom cannot compare!

If three second-generation hacker organizations take action together, it will definitely hit the civilian Internet of WoSang Kingdom and cause great trouble!

Unfortunately, the Dark Night Dynasty and the Daxia Alliance seemed to be determined to move closer to the first generation of hacker organizations, and they were all focused on hiding and cultivating, and did not agree to the invitation of the hacker alliance.

The Hacker Alliance naturally refused to give up. Since the second-generation hacker organization does not participate, it can invite the most active third-generation hacker organization. Although the technical strength of the third-generation hacker organization is somewhat weak, their number is large, and there are also many younger generations with amazing technology.

The Hacker Alliance contacted the four strongest among the third-generation hacking organizations, namely the Prosperous Dynasty, the Shadow Assassin, the Furious Tribe and the Black Phantom. After receiving the invitation from the Hacker Alliance, these four third-generation hacking organizations agreed to join the action without thinking.

In the early days of the last time in the Vosang Cyber ​​War, they were also the protagonists of the war and gained some benefits. This time, the hacker alliance was ahead, so how could they not follow them to make a fortune?

Representatives of the four third-generation hacking organizations informed members of the official website of the internal forum of their official website. Not only that, these four third-generation hacking organizations also brought together hackers with hackers who are good at their relationship with them, as well as other small and medium-sized third-generation hacking organizations, forming a huge hacking lineup. It is also because of this that the news that the Hacker Alliance was preparing for the second cyber war spread wildly!

Shi Lei, with a different vest, hacked into the internal page on the official websites of various hacker organizations, and checked the plans for the second invasion of the WoSang Kingdom network.

If this plan is really implemented, WoSangguo will be in great trouble!

Of course, this is a hacker based in the country of WoSang. Like the last time, he did not resist in the early stage and did not resist in the later stage. If they tried their best to defend themselves from the beginning, then there would probably be disasters at different levels on the Internet of both sides!

Shi Lei was not concerned about the question of whether he was a disaster or not, but was considering what benefits he could get in this war.

The Hacker Alliance, as well as the four third-generation hacker organizations, can gain enough reputation from this war and take their organization to a step further. This is their driving force for starting the war.

Some lonely masters joined this war, perhaps because they wanted to become famous, perhaps because they wanted to satisfy their desire to destroy, or perhaps because they wanted to steal some information.

Shi Lei secretly considered what benefits could he get from such a great opportunity to take advantage of the troubled waters?

Maybe he can


This chapter has been completed!
Previous Bookshelf directory Bookmark Next