typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter VI Investigation

   In the afternoon of the next day, Xiangshan found the person from Net Security.

"You want to talk to those hackers?" The person in charge of this area of ​​the security department is a Frenchman. He scratched his slightly greasy curly hair and said: "This is not good, Director Xiang. After all, we are still in Rama

Within the project park, if the other party gets to know the details, there will be big trouble."

Xiangshan said: "Is it really not possible?"

"'Zhu Rong' is there, and maybe other top hackers are also there. Assuming that the people on this website are probably the top black hats, maybe they are 'Zhu Rong' himself." The person in charge said: "There are all top hackers over there. I

Not recommended to take risks.”

Xiang Shan said: "I'm sorry, please think of a way. This is a work requirement."

As Xiang Shan spoke, he took out a copy of the meeting minutes: "I communicated with other people in the research department in the morning. We all agreed that the ideas being discussed by these hackers are very valuable. I have arranged

A group to verify several key points they raised. I think it is necessary to join this discussion."

"This..." The person in charge took the record and hesitated for a moment.

Xiangshan said: "This is also to crack the 'Orunmila Project' faster. Although the 'Orunmila Project' may not be as important as the 'Obatala Project', it is an important step for us humans to understand the 'Ogun'

A shortcut for the maker.”

The person in charge sighed: "I understand. Today, members of the network security department have a meeting with members of the 'Hanuman Project'. We will temporarily submit to your wisdom. At the meeting, I will put forward your opinions and discuss with you

and others on its feasibility. But please note that there must be absolutely no unnecessary exchange of information with the 'risk' community until we have the results."

 He nodded to the mountain.

That hacker community brings together the most elite "guerrillas" and the most destructive criminals of this era. Especially the Rama Project, a special place. The "intelligence" here itself has the potential to impact the existing order of society.

Whether you are uploading data to the website from here or downloading data from the website, there are risks.

 If you do the former, it may expose your own location and identity, or alert hackers.

 In the case of the latter, it is possible for some dangerous code to sneak into the park.

The people in these security departments are indeed regular troops and the country's elite. However, at most they can only guarantee that "the enemy can be destroyed afterwards", but they cannot guarantee that "the intelligence will not be leaked."

 Xiang Shan nodded and said: "Please. In addition, I hope to temporarily join the work of your department."

The person in charge showed a confused look: "You? This..."

“I’m also a programmer. Although I’m better at hardware and low-level things, it’s okay to understand your discussion, right?” Xiang Shan said.

The person in charge muttered something. I don’t know if he felt that Director Xiang was trying to improve his qualifications, or if he felt that he was not overestimating his abilities.

 But now Xiang Shan is one of the largest officials in this park. The rest of the people are also on the same level as him. This seemingly ridiculous request was actually met.

  After all, during the first phase of the "Orunmila Project", the director had proven his ability as a scientist.

Just as Jing Hongtu expected, Xiangshan can be easily forgiven even if he does some non-compliant operations. As long as the purpose of these operations is directed to "his research project", then everyone will easily forgive him.

  He is a crazy scientist after all.

 This is indeed a very good character design.

Xiangshan sat in the meeting room of the network security personnel, took out his voice recorder openly, and recorded the progress of this time.

To be honest, the current progress of the "Hanuman Project" is really not very good.

  The "Risk" community is a completely anonymous online community. Its structure is very simple, with almost no "unnecessary data" stored, and almost no measures other than account passwords to protect user accounts.

At the same time, this community also uses distributed virtual servers, and even the application framework is written by a powerful hacker individual or group. This website is not an ordinary small website that relies on a server in a small country.

When a user accesses this fixed domain name, it will be temporarily assigned by the algorithm. From a bunch of volunteer proxy servers, three available ones will be randomly selected to form a temporary data link, allowing the user to ping a currently available server IP.

 But the triple springboard is only the first step. For general illegal network activities, the triple springboard is enough, but these hackers obviously will not be satisfied with what has been compromised by law enforcement agencies.

It can be understood this way. The "ontology" of the "risk" community exists in many different servers. Each piece is independent of each other. At the same time, each part backs up each other. No matter which part is destroyed, it can be backed up again.

It is difficult to eradicate. The servers where these "ontologies" are located may even be located in several completely different countries.

These "ontologies", or website source codes, will even continue to transfer themselves to other servers.

The occupied parts of all servers put together are the "complete virtual server" where this online community is located.

This community is like a large group of amoeba that exist on the Internet. It will continue to move, split, and deform. This group of amoeba is still hidden in the turbid water, and it is difficult to see them.

Heavy. And as long as some of these amoeba are missing, they will grow again.

 "Destroying" this website is a very difficult thing in itself.

 Every time you connect to Xiangshan, there are huge risks.

 It’s just that Xiangshan’s side is a little better. They represent the union of the most powerful political entities on the planet.

 The entrance and exit of the "Internet" itself is managed by this consortium or its members.

On these foundations, the network security personnel of Project Rama can use resources unimaginable by ordinary black hats to disguise themselves.

 In addition, they can also use huge resources to dig out everyone who connects to this website.

For example, they can send some of their own servers, mix them into those servers that are "jump nodes", and then use DDOS attacks to destroy most of the jump nodes that are not under their control. No matter how many broilers are controlled by the hacker organization, they will not be able to defeat them.

No more resources than these people have.

  For another example, they can use certain forensic or statistical techniques to dig out the real-world identities of most of the hackers on this website. This is what their violent agencies are better at.

There may be certain political restrictions if a single country wants to take down a hacker nest.

 But the consortium behind Project Rama has no concerns.

The swarm of amoeba hides in the turbid water, but in the worst case scenario, this violent entity can even evaporate the entire pond.

 It’s just that it’s not that time yet.

  Hackers would never have imagined that they would encounter such a level of attack.

 Soon, after long discussions, the people from the network security department found some solutions.

Of course, this is just an episode.

 Their current focus is still looking for “information leakage points”.

 They are looking for files that may be viruses on all devices across the campus.

 They still don’t know where the virus came from.

 The only thing that can be determined is that the "infection" occurred within the park.

"Zhu Rong" is not a hacker who likes to spread Trojans. According to intelligence, all previous actions of "Zhu Rong" are targeted. He will attack large technology companies, especially in an attempt to build some kind of technical barriers and technological hegemony.

companies. He will try his best to dig out the undisclosed technologies controlled by those companies.

Sometimes, he would accomplish this goal by hacking into researchers working in those companies. But most of his methods were to first manipulate the servers of those technology companies, and then infect those researchers through the servers of those technology companies.

personal device.

 There is no record of ordinary people being infected by the virus written by "Zhu Rong" unintentionally.

 So the infection must have occurred when some scholars were communicating with that translation software company.

Other technicians have already gone to that company pretending to be police officers. Their police officer certificates are all real gold, and they even have resumes that are extremely real.

 But the biggest problem is that Ingrid is really just a name in that company. She has not participated in the work of that company in the past year.

 It is unlikely that Ingrid’s equipment was the first contact with the virus.

 She was infected with drugs in the park.

This is very scary. No one knows when the infection of this electronic virus occurred, nor does anyone know how many people have been infected. It is even difficult to know how many people’s devices this gadget exists in.

 The entire park may be penetrated like a sieve.

If "Zhu Rong" hadn't posted "Sita" on the Internet without knowing what was going on, and happened to be noticed by the network security personnel of the "Rama Project", I'm afraid "Zhu Rong" could have emptied the information here.

 This is why the United States is eager to send its top experts over.

However, the original network security department of Project Rama was not really just doing nothing. At least they built high walls to physically isolate the further loss of intelligence.

Now, they are desperately looking for possible virus samples. They hope to do something to save their reputation before "Agni" arrives.

  But the level gap is still there.

 Early in the morning on the third day, there was still no sign of the matter being resolved.

 And a military vehicle also set off from the airport and headed for the park.

 Xiang Shan and several other persons in charge were waiting in the reception area.

 Soon, a small group of United States soldiers appeared.

They saluted to the side of the mountain: "Gentlemen, the 'goods' have arrived."


This chapter has been completed!
Previous Bookshelf directory Bookmark Next