typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 2 Hacking Community

 Xiangshan was in the room, picking up his tablet and visiting the hacker community "The Risk".

There is also a string of blood-red characters on the front page, "Catch Me If You Can" - "Catch me if you have the ability."

In short, from the name of the community to the material on this front page, it gives off an "illegal" atmosphere.

There are many communities for hackers. There are naturally many types of hacker communities. Some simply discuss some computer knowledge, some programming experiences, and share some self-written programs. Plug-ins and patches are not considered dangerous places.

.

But others are completely different. They teach remote control technology, anti-virus technology, and even provide remote control, anti-virus, and DDOS services. They teach people how to steal accounts, invade, penetrate, write Trojans, reverse engineering...

This kind of website is "illegal" in most countries. If it becomes large, it will attract the attention of the security departments of major countries, and then the website will become inaccessible under various attacks and disappear.

There are so many such websites and they will not exist for a long time. They are born and destroyed, but they are endlessly killed.

There is never a shortage of restless souls.

Of course, Xiangshan didn't have so many thoughts at this moment.

His first impression of this website was...

The creator must be a chuunibyou addicted to old movies.

"Risk" is a documentary about a famous hacker, and the provocative "Catch Me If You Can" are both crime movie titles, which are somewhat nicknamed.

Xiangshan clicked in. A few days ago, under the supervision of the Internet Security Department, he temporarily registered an ID of "Ramanujan".

This kind of website is a standard "guerrilla base" and does not require users to provide any identification. Only an ID and a password are enough. Xiangshan originally thought that he was the person in charge of the "Rama Project", so he used a "Rama" ID

It was very suitable. But unfortunately, the ID "Rama" was seized by someone else. So Xiangshan had to choose "Ramanujan" - this name belonged to a great mathematician. And before that mathematician, there was a barker

A saint of the Tuo religion also has this name. He is the founder of the Ramanujan sect. The meaning of this name is similar to "Rama's younger brother".

Xiangshan swore that he really just used the search engine to search for keywords, and did not deliberately choose a cool ID. After all, the people from the network security department were still watching, and he was too embarrassed to look through the dictionary to find one that pleased his eyes.

word.

What Xiangshan was watching now was the hackers' discussion of the series of unknown codes.

By the way, the stolen data will be referred to as "Sita" in subsequent documents.

In mythology, "Sita" is the wife of "Rama". Sita was kidnapped by the ten-headed demon king Ravana. Rama, with the help of the monkey Hanuman, found the ten-headed demon king

, and defeated him and took back his wife.

Hackers are actually very sensitive. Although they saw a bunch of data that earth computers could not run anyway, under the guarantee of "Zhurong"'s prestige, they read the codes of "Sita" and really felt

Here’s the “law” inside.

This seems to be a feeling highly based on "experience" and "intuition".

After this fact appeared, the hackers became excited. They began to speculate about "what kind of black technology" this "Sita" was.

After all, "Sita" really doesn't look like something that would run on current-generation computers.

The translation software company in Europe is said to have been beaten like a sieve by hackers. Those hackers are looking for protocols and tools that can provide operating conditions for these codes in every corner of the translation software company's equipment.

, plug-ins or something.

Of course they found nothing.

But "finding nothing" itself piques the interest of these hackers.

In the eyes of some people who watch the excitement and don't mind the big deal, the thing is probably...

"To hide it so deeply, there must be some dirty secret."

So the hackers proposed to work together to solve the puzzle. Several hackers were already discussing on the spot, "Can we write a simulator to run these data?".

Xiang Shan is quite concerned about this issue.

Because someone in the R&D department has been making similar attempts in the past few months. Xiang Shan also participated in part of the work.

Of course, Xiangshan thinks the most promising direction is to restore the original appearance of the alien garbage, and then make other attempts - such as writing a compatibility agreement between it and the earth's computer, or programming the earth's system in the alien computer

.

After all, the alien garbage tentatively codenamed "Orunmira" is also an engineering implementation of a Turing machine. It is still possible to start coding from scratch.

Put a modern bare metal machine in front of computer researchers in the 1960s, and it would be possible for those researchers to figure out how to program it. Although it is certainly not as good as modern programmers, they can at least run it.

However, the wild imagination of these hackers still touched him.

These hackers do not know what the complete data exported from "Orunmila" is, let alone the "function" of the data contained in "Sita" [after all, even Xiangshan doesn't know]. To them, these data are

A "black box" with a very strange shape and which is temporarily inoperable. It is impossible to see what is "inside the box".

But this does not prevent them from using various techniques to mess with the codes contained in "Sita".

It is precisely because "Sita" is so mysterious that more and more hackers want to take a closer look.

At this point, it no longer matters what the data contained in "Sita" really is. It has become a carnival that only exists among a few technical geeks.

Hackers are also working hard to crack it.

These movements eventually alerted the security department of Rama Project.

To be precise, it was the technical staff of the network security department who discovered this data when they were browsing this community. They were keenly aware of the problem, then downloaded the data disclosed by "Zhurong" and compared it with the internal data of Rama Project

comparing.

It was only then that the "leak incident" was discovered.

When the incident occurred, several major countries thought about taking down this website. However, "Zhurong" uploaded the data a few days ago, and it has been downloaded and accessed thousands of times. And the data may be used in some countries

Shared twice within a more closed community.

In short, the matter is irreversible.

Experts analyze that taking down this community now will only further stimulate hackers.

The best way is to turn a major issue into a trivial one and pretend it doesn't exist.

And Xiangshan was able to see these discussions because of this.

I have to say that some of the ideas are quite interesting. Xiang Shandu secretly noted them down and planned to communicate with people in the research department and try them out himself.

This involves a somewhat embarrassing reality. The Rama Project was established in a hurry. Except for the United States, which was the first to end and had planned in advance, all other countries were disrupted by such an incident and only sent "trustworthy and at the same time"

"Ability" scholars. First of all, they must be "trustworthy". Therefore, although the scholars in Rama Project Park are all at the top level, there are also many people of the same level outside, and it is impossible to include them all.

What's even more pity is that the guys who have a special talent for "cracking" are all unstable elements. These hackers may be able to leave a small mark in the field of computer science, but it is almost impossible for them to pass

After political review, enter this park of Rama Project.

Their perspectives and technical concepts are completely different from those of Xiang Shan, who came from a professional background and emphasized "construction". Therefore, many of the ideas they proposed were ones that Xiang Shan had not thought of in the past and were easily ignored.

This even gave Xiang Shan the idea of ​​"it would be great if they could also participate in the research."

But that’s just thinking about it.

At this time, there was a knock on the door.

"Please come in." Xiang Shan said.

The person who walked through the door was Director Hu. Xiang Shan was already familiar with this cadre responsible for coordinating the Republic's scholars and the park's organizations. After Xiang Shan took over the position of head of the research department, Director Hu was almost exclusively responsible for connecting with him.

Director Hu said enthusiastically: "Director Xiang, this is a comrade from my hometown. I heard that you have met him before."

Xiangshan was a little surprised when he saw the person behind Director Hu: "Director Lei?"

The person who came was none other than the soldier with sharp eyebrows and starry eyes who had recruited him into this project. After several years of not seeing each other, the soldier's face had not changed at all. He stood up at attention, saluted Xiangshan, and said: "The People's Liberation Army of the Republic of China, stationed in

United Nations Military Staff, Lei Chaoyang. I'm really sorry to tell you, researcher, that I didn't tell you my real name when we last met."

"You even wore your epaulettes this time." Xiang Shan glanced at him and said, "Should I call you Colonel Lei? You probably didn't work for the United Nations Military Staff in the past few years, right?"

"You can call me Staff Officer Lei and Colonel Lei. If you are happy, you can call me Lao Lei." Colonel Lei smiled and was very talkative, but did not answer the question behind Xiang Shan.

Soon, with Director Hu's explanation, Xiang Shan quickly understood.

Colonel Lei came here this time to participate in what was tentatively named the "Hanuman Project Working Group." This working group was temporarily created in response to the "leak incident", and the theoretical person in charge is Xiang Shan.

Colonel Lei is the person responsible for Xiangshan's connection with the Republic's military.

Xiang Shan frowned: "The military...this matter has something to do with the military? Does the military also want to come forward?"

"It's still unclear." Colonel Lei shook his head: "This incident has been classified as a 'terrorist attack'. If the truth about the 'Rama Project' is spread to the society, I really don't know what will happen.

Turmoil. Therefore, all countries will work together to resolve this incident."

"At least, the dangerous element 'Zhurong' must be controlled."


This chapter has been completed!
Previous Bookshelf directory Bookmark Next