()ps: Please subscribe to support "Hacker". It is in a critical period and I really need genuine subscription support!
.
Shi Lei and the International Intelligence Bureau of the Ministry of Foreign Affairs are currently in a situation of equal straits and there is basically no information on possible plans for reconciliation. It is best to use Mr. M to take the earthquake hacker eq in one fell swoop.
Because of this reason, and Shi Lei is Mr. M, how did he reconcile with the International Intelligence Bureau of the Ministry of Foreign Affairs?
Tianyue Hotel, top floor of the 66th floor, room 6606.
Shi Lei took out all the accessories of the kraft carton. When packing the AIP artificial intelligence prosthesis, he thoughtfully packed all the accessories in a small carton, which facilitates the storage of various spare accessories.
The accessories of AIP artificial intelligence prosthesis include four behavioral dynamic acquisition cameras, namely two flat glasses and two brooches; two spare rechargeable batteries, replace the batteries of the two prosthetics respectively; one instruction manual; one warranty card; and finally a guidance CD, which guides users to self-install the AIP artificial intelligence prosthesis.
"Mr. Liu, you arrange for relevant personnel to study and study this CD. You will take off your prosthetics every night and install them in the morning. By the way, if there is any failure in the artificial intelligence prosthesis, please contact us directly according to the phone number on the instruction manual, and do not disassemble the artificial intelligence prosthesis privately. Because we have preset anti-disassembly measures, a specific engineering mode is required. Only by opening the artificial intelligence prosthesis." Shi Lei finally instructed.
In fact, Shi Lei has not finished speaking. The anti-disassembly measures of AIP artificial intelligence prosthesis are very strict. If there is no specific password authorization and the AIP artificial intelligence prosthesis is disassembled without authorization, the built-in system will automatically delete all information, and start the project backup battery, short-circuiting to destroy some circuits and electronic components.
Xia Guo is indeed very bad in the research and development of electronic products, but Xia Guo has a trick, which is to copy and imitate. Once advanced finished products are available, Xia Guo's electronic manufacturers will start copying and imitate one after another.
Although AIP artificial intelligence prosthesis is built on a behavior dynamic simulation system and the counterfeit manufacturers cannot imitate it, Shi Lei still sets very strict protection measures. Just in case, the stricter the better!
It was almost noon and Meng Xun was the host. He ordered room service to deliver all kinds of expensive dishes to the executive suite on the top floor.
Shi Lei coughed lightly, "Sorry, I'll go to the bathroom first."
In the bathroom, Shi Lei took out his phone and pressed the numeric key of '5'. Contact the low-level pseudo-artificial intelligence Yi Zuer.
"Sir, Yi Zuer is here to serve you!" Yi Zuer's synthetic electronic sound was quite cold. This is because Yi Zuer's basic logic application module does not contain human emotion imitation module.
The human emotional imitation module has no practical use except for making Yi Zuer imitate human emotions. Moreover, the human emotional imitation module has very complex program code and has great basic requirements for computer hardware.
For a function that has no practical use, Shi Lei will not write the corresponding human emotion imitation module for the time being, which is a total waste of time!
"Yuzul, controls server No. 2, launches attacks on the Liberian network through broiler network. Attack conditions are limited: First, websites with more than 100,000 views of iris, less than 1 million; second, excludes military networks and zheng fu networks; third, give priority to attacking media industry networks; fourth, attack methods are determined to destroy data. After breaking the server defense, directly clear all data of the other party's server, and control the power supply scheme, adjust the voltage of each component, and burn the hardware!"
The so-called control power supply burns the hardware, which is definitely not a joke. For example, the current popular hardware overclocking, the core voltage of the CPU is generally only a little more than 1v, and the maximum cannot exceed 1.65v. If the power supply solution is tampered with and the CPU is provided with 2v or even 3v voltage, then the CPU will definitely be burned!
When Shi Lei wrote the design of Hei Magic software, he had a dangerous design, which controlled the power supply solution and tampered with the motherboard bios information, making the power supply system unstable and causing serious damage to the hardware.
"Sir, please determine the time to execute the order and the conditions to stop the order." Yi Zuer reminded Shi Lei to set more specific command conditions.
"Start the command immediately! The command stop condition is to protect the server from being attacked. When the load reaches 70%, immediately clear the connection records of all broiler servers. If the record cannot be cleared, discard the broiler that has not been cleaned!" Shi Lei said additionally and set it.
"Sir, the command accepts. The attack target is being screened and the broiler network is being initialized. It is expected that the attack will officially start after 2 minutes and 48 seconds."
Shi Lei hung up the phone and deleted the call record. The contact between Shi Lei's mobile phone and Yi Zuer is not through the mobile phone signal, but through the wap network. After Shi Lei deletes the record on his mobile phone, Yi Zuer will simultaneously delete the network records. This communication method is much safer than using the mobile phone communication method.
After coming out of the bathroom, Shi Lei accepted the invitation for lunch with a smile, creating a certificate of absence for himself.
Even if the matter of Liberty is suspected of Mr. M, there will be nothing about Shi Lei. After all, Shi Lei has sufficient absenteeism, which has completely disconnected from Mr. M's identity. But Shi Lei did not intend to let Mr. M take the jackpot this time, but there were other candidates.
The Western General Administration of the Cybersecurity Bureau, Ling Yumo's father, and the Western General Administration of the Cybersecurity Bureau Ling Yuguo are checking the situation of Lijian. The network of Lijian was attacked. As the four major cybersecurity bureaus of the Xia State, Ling Yuguo immediately received the situation.
In the Liberian Internet world, many websites with more than 100,000 visits and less than 1 million have been attacked.
Since there is a time difference between Ligan and Xia, according to New York time, the gap is 12 hours. Xia was having lunch, and it happened to be around the early morning of the Ligan.
In the early morning, hacker intrusions are usually the time when hackers are inflated, because there are no 24-hour security guards on the server?
Facing a server without security personnel on duty is definitely much easier than a server with security personnel on duty.
Although Yi Zuer is a low-level pseudo-artificial intelligence, it has basic logic application modules and can independently decide some things according to the rules prescribed by the program.
For example, Shi Lei limited the conditions to allow Yi Zuer to attack the Liberian network. Yi Zuer first used the Black Magic software to capture a large number of temporary broiler servers in the Internet world.
Although these temporary broiler servers have no quality, Yi Zuer captured more than 10,000 temporary broiler in a short time.
More than 10,000 temporary broilers are close to Yi Zuer's control limit. After all, Server 2 is not a large supercomputer, and the computing power is not very outstanding. It can only support Yi Zuer to control more than 10,000 broilers servers.
Controlling more than 10,000 broiler servers, Yi Zuer's energy has expanded dozens of times!
It immediately followed Shi Lei's restrictions to stir up trouble in the Internet world of Ligan, causing huge waves. The first to bear the brunt of the Ligan State's famous CBS official website.
The cbs view volume is not too large, with barely 200,000 iPIRI visits. Yi Zuer's first round of attack was to control more than 10,000 broiler servers, form a broiler network, and launch a wave of DDOs flood attacks.
Yi Zuer does not intend to rely on flood attacks to crack the official website of CBS. After all, CBS has a professional DDOS software firewall. Yi Zuer only uses a huge amount of data to allow the DDOS software firewall to occupy a large amount of system resources, and then uses the Black Magic software to pierce the real security firewall and enter the web server.
After entering the web server, Yi Zuer continued to enter the data server and application server through the internal network. He controlled three servers at the same time, and Yi Zuer finally implemented the data deletion plan.
Low-level formatting takes a very long time. For example, for an ordinary 500gb single-disk mechanical hard drive, it is very normal to format low-level for several days.
Yi Zuer naturally would not wait for so long. According to the attack mode of the Moon Virus, when the hard disk is formatted at low level, the power supply of the hard disk will be suddenly cut off, causing the data in the hard disk to be lost, and even causing physical damage to the hard disk.
After killing the hard disk, continue to control the power supply solution, and tamper with the power supply settings of bios, and continue to destroy the CPU and memory stick!
cbs CBS server room, the disk array cabinet made abnormal mechanical noises, which were caused by low-level formatting of the hard disk and was suddenly stopped from power supply.
The cabin of the motherboard emits an unpleasant burnt smell, which is why the CPU and memory stick are burned by high voltage!
CBS CBS's first move and quickly fell under Yi Zuer's attack. Yi Zuer left no information and transferred the center of attack to other websites.
The Western General Administration of the Cybersecurity Bureau, Ling Yuguo looked at the information on the computer screen and felt a chill. From the time CBS CBS was detected to be hacked to the time of falling, it was not more than 3 minutes in total!
"Which top team is it that is asking for trouble for CBS? Could it be that CBS has reported something that has made them unhappy recently?" Ling Yuguo murmured to himself.
However, the monitor of the Western General Administration reported to Ling Yuguo again that many websites of the Liberian Kingdom were attacked at the same time!
"Who is it?" Ling Yuguo was puzzled, but for some reason, a name emerged in his mind...
.(To be continued., welcome to Qidian (qidian.) to vote for recommendations, monthly votes, and your support is my greatest motivation.)