The Southern Dynasty was one of the neighbors of the Xia Kingdom, with a territory of only one-ninety-sixth that of the Xia Kingdom, and a total population of about one-twenty-sixth that of the Xia Kingdom.
If it weren't for the existence of particularly bad mathematics, I'm afraid it could be easily calculated that the per capita land area of the Southern Dynasty was smaller than that of the Xia Dynasty.
However, it is such a small country with small land and shortages that has created a series of miracles and become a developed country that has been paid attention to and recognized by the whole world!
That's right!
The Southern Dynasty is a developed country! It is recognized as a developed country by the World Bank, the International Monetary Fund, and even the CIA of the Liberal country.
According to the ranking of the human development index, the Southern Dynasties has been in the top 20 for a long time, while the Hong Kong Island and O Island of Xia have been in the top 10 for a long time. As for the main body of the Xia Kingdom, for some reasons, it has always been around 100.
The highly developed Southern Dynasties had a policy that supported the national economic lifeline as an ‘export-led’ strategy. The Southern Dynasties relied on various advanced technologies to manufacture products that were leading the world and then exported and dumped to the world to maintain the country’s economic development.
The most famous company in the Southern Dynasty was the famous Samsung. Later generations, mobile phones made by Samsung achieved the highest market share sales in the world. Even iPhone series mobile phones made by Apple did not end the rise of Samsung.
However, Shi Lei’s goal this time is not Samsung for the time being!
As a large semiconductor electronics industry group with a market value of nearly 100 billion yuan, if Samsung has no outstanding advantages in electronic defense, how could they succeed?
Every world's giant enterprise, especially the electronics industry, has its network defense. It will at least have one world's peak expert in charge.
Most of these top-level experts in the world are government security experts. These government security experts have chosen some well-known companies to work part-time. Since they are government security experts, they are not hackers who cannot be exposed. They can appear in their lives and do some network security-related things openly.
Therefore, the helmsman of well-known companies can freely meet with security experts and have face-to-face conversations, so that everyone can know the truth. Therefore, well-known companies do not care that these security experts belong to the government, nor are they afraid that these security experts will steal confidential information from the company.
Which world-renowned company has not mastered some secret power? If a security expert who knows the truth still dares to be a two-faced person? That is probably the rhythm of implicating the nine tribes!
In addition to these part-time security experts, only a very small number of electronics industrial groups have their own world peak security experts. As far as Shi Lei knows, Samsung Group has their own world peak security experts, and not only one! According to the speculation of the former Angels Council, Samsung Group has at least six world-class security experts. At least three of them are world peak security experts.
The rise of Samsung Group is not unrelated to the network security services provided by these security experts!
Shi Lei's target of invading the Southern Dynasty this time was only four online game producers, not the giant Samsung. As for the future, if there was a chance, Shi Lei naturally would not let Samsung Group go.
The time zone of Xia Kingdom is utc+8, the time zone of Southern Dynasty is utc+9, the time zone of Xia Kingdom is 11:30 in the night, and the time zone of Southern Dynasty is already 0:30 in the morning. This time period is an absolute sleep time for ordinary people. However, for hackers, the night provides them with the best cover.
Most hackers usually like to act in the late night. It’s not that they have to act at night, but that most hackers are used to act at night.
Shi Lei does not have a fixed time preference. No matter when, as long as Shi Lei wants to invade, he will invade immediately. Now Shi Lei is not feeling well. He controls some of the resources of iwn secret network, crosses the network barriers between Xia and Southern Dynasties, and enters the network of Southern Dynasties. Ilegate is the absolute main force. The relationship between these two companies and Big Penguin Company is closer, and they invest more hackers to participate. With nexon, Shi Lei only consumes a little time, and through their official website homepage, invades the main server, and invests the moon virus in the main server, and ignores it.
The harm of the moon virus is very serious. By repeatedly formatting the hard disk in a low-level way, the purpose of physically destroying the hard disk is finally achieved. The main goal of hackers to destroy computer equipment is storage devices, that is, hard disks.
For ordinary users, the importance and value of computer storage devices are far less valuable than that of CPUs, motherboards, or memory and graphics cards. After all, the price of a hard drive is only one-third of the value of a CPU, or even less. Not to mention high-end, atmospheric and high-end top-level graphics card devices, it is not worth comparable to a hard drive.
However, for enterprise users, the importance of storing devices is far higher than the value of other devices. Storing data inside the device is truly valuable.
There is a saying in the IT industry, "Hard disks are valuable, but data is priceless." This saying intuitively reflects the value of data in enterprises. And nexon's main server stores a lot of game development data. After the moon virus entered the main servers of the two companies, it quickly began to screen the targets.
The attack mode of the Moon Virus against the server has been adjusted to a certain extent by Shi Lei. The server's storage devices are usually disk array groups, rather than single hard disks.
A disk array group consists of multiple hard disks, and the hard disk running the server system usually does not exist in multiple hard disks. According to this feature, Shi Lei changed the attack plan of the moon virus on the server. From the previous full disk array group attack to a screening attack.
The Moon Virus will judge the number of disks on the computer, then distinguish the system disk, protect the system disk, isolate other slave disks, and perform low-level formatting of the slave disk. When the slave disk is formatted at a low level, the Moon Virus will also insidiously block the hard disk data feedback light, simulating the flashing of the hard disk data feedback light in normal state.
This insidious setting makes the moon virus more harmful. It can often destroy the server's slave disks silently. However, the server's main system has no problem. The master server of the nexon is ravaged by the moon virus, and the data stored in the slave disks within the server is erased by the low-level formatting and erasing. The security guards of the other party have not found that their main server has been attacked. It has to be said that the moon virus has become more and more sharp. The attack methods are becoming more and more difficult to defend against. The master server of the nexon was completely killed by the moon virus. But Shi Lei knew that the losses of these two companies were not too great. Their real core data is stored in a server that is isolated from the network environment. Online game producers are different from operators. They are not inseparable from the network environment. They can develop and produce games and ilegate.ilegate's official website in a closed environment.
The network defense of online game producers is much lower than that of online game operators. The focus is different and the importance of network defense is also different. As with the main server of ilegate, Shi Lei did not do any sabotage, but instead formed a temporary small server cluster of the main servers of the two companies, plus a high-performance broiler server from Nanchaoguo.
Shi Lei controls some resources of the iwn secret network, injects this small server cluster, and then controls some resources of the iwn secret network based on the small server cluster.
It is worth mentioning that Shi Lei did not provide special protection for this small server cluster. Generally speaking, broilers under Shi Lei's control are usually protected by Shi Lei, which is to prevent other hackers or anti-hacking security experts from conducting anti-tracking of real IP addresses.
If there are no security protection measures, it will definitely be a big tragedy if the hacker with the real IP address is found. Shi Lei did not set security protection measures this time. Could it be that Shi Lei made a low-level mistake?
Shi Lei obviously cannot make such low-level mistakes. Even if Shi Lei makes low-level mistakes, Yi Zuer will remind Shi Lei and help Shi Lei to smooth these small mistakes and mistakes.
However, neither Shi Lei nor Yi Zuer cared about the temporary small server cluster without a defense system. There was only one possibility, which Shi Lei deliberately did!
Shi Lei is preparing to use this small server cluster to engage in malicious provocation...
.(To be continued...)
ps: [Reward Thanks] Meng Suileng, rewarded 588. Tingyu little loli, rewarded 300. The boss of the Imperial Guard, rewarded 100.
[Hot Recommendation] "The Lord of the God Craftsman", an old book in Mushan, you can read it and then have a "Light of the Great God".