typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter IX Academic Exchange

 As a hardware engineer with a professional background, Xiangshan actually had an inexplicable psychological advantage over hackers before. He felt that he was engaged in construction, while those hackers were engaged in destruction. They had no systematic or overall view.

With vision, one can only build a house on the foundation built by "people on one's own side".

No, the people who build the house are software engineers. The hackers just drill holes in the house.

But the snail shell can still be used as a dojo. If you drill holes in the house, if you drill them well, and the holes are in the right position, the house can be warm in winter and cool in summer.

After communicating with Hartman, Xiangshan can indeed occasionally feel the taste of "stones from other mountains".

If you start from a different angle, you can indeed see different things.

Xiang Shan is even more looking forward to meeting "Zhu Rong".

He and Hartmann didn't chat for long. Soon, people from the security department called him over.

The research department will provide a "script". This script includes questions that can be asked later.

When Xiangshan and the others communicate with hackers in the "risk" community, they must use the questions in this preset "script". Even if they have temporary inspiration and want to ask new questions, they have to wait for review by multiple departments before they can ask them.

This is already an exceptional treatment.

I don’t know whether the UN officials felt that Xiang Shan’s achievements in cracking the “Orunmila Project” deserved this treatment, or whether they felt that Xiang Shan would not last long in this position, so they indulged themselves like a destitute man.

Xiang Shan felt that maybe there were both.

In the early years, when Xiangshan's father and uncle were drinking and bragging, they would talk about things like "right is complete" and "right does not expire and become invalid". He always thought that was the nonsense of the previous era or a certain dog.

This is only discussed at the Gouying Camp level.

After reaching the level of the United Nations and standing in this position, Xiang Shan felt, oh, it makes sense.

The two scholars were explaining their proposed plan point by point. Xiang Shan rubbed his nose.

——Judging from the conversation just now, this Hartman is actually an exploitable factor. In this way...

The hazy plan in Xiangshan's heart became a little clearer.

Soon, the "Online Academic Exchange Meeting" was held. The participating scholars included several Rama Project scholars and several "risk" community hackers.

Of course, the account used is still Xiangshan’s “Ramanujan”.

The opening line is nothing more than the worst kind of "I think this idea is terrible. I have an idea, and so on."

The point is to ignite the emotions of those hackers while revealing a little bit of the right direction.

Those hackers are all "charlatans". In order to gain a breath and a face, they can risk having their real names dug out to engage in high-risk, low-return activities like "Hero Challenges".

When your emotions are high, where do you care about other things?

However, the directions provided by Xiangshan and the others are indeed "correct".

After all, "Sita" is a small part of the data exported from the "Orunmila Project", and it is a part that Ingrid thinks "maybe able to be analyzed according to linguistic research methods." This part of the binary code corresponds to

, it shouldn’t be too basic a part.

However, Xiangshan and his gang have the whole picture.

The code of the "Orunmila Project" is indeed relatively large, and it is not data that the human brain can directly process, but Xiangshan does have a "holistic understanding".

At least this speculation is "similar to that" among the many speculations of those hackers.

Xiangshan narrowed his eyes.

This was not a direct communication between him and those hackers. For him, every word of this was based on reading a script, and there was no refreshing feeling of brainstorming. He only felt that he had a vague illusion of "inspiration collision", but

Not true either.

Xiang Shan narrowed his eyes to hide his inner thoughts.

——The first step has been taken, and the door has been opened...

At this time, he heard some arguments outside.

Xiangshan turned around and saw that it was Hartman's side. Hartman seemed to want to come over, but was held back by the FBI monitor and another guard. There seemed to be a little dispute.

Xiangshan walked over and asked, "What's going on?"

The guard saw Xiang Shan and introduced him in a low voice. The work here was to use a projector to put the chat content of the hacker community on the screen, while the experts discussed loudly.

Hartman was curious, so he came over. Hartman's duty is to analyze viruses and report at any time, and as an outsider, he obviously does not have an independent office, so he was arranged in that corner. Anyway, here

It's quiet enough too.

The guard was not sure whether Hartman was allowed to participate in this matter, so he wanted to stop him. The former FBI officer was responsible for ensuring that Hartman did not have "unnecessary contact" with other people, and that Hartman did not have "unnecessary contact" with other people.

There was "no other movement" from Terman. He was not sure whether Hartman was deliberately attracting the attention of a guard so he could do something, so he also stood up.

Xiang Shan pretended to think for a moment and asked Hartmann: "Is your work done now?"

Hartman nodded: "The analysis tool is still analyzing, and it will take a few hours to run through the data."

When he heard what was said in the room, he really felt itchy in his heart.

Xiang Shan looked at the former FBI member: "He is now part of Hanuman's group. I can make the decision."

The former FBI member thought for a moment, then nodded silently.

Xiang Shan looked at Hartman: "Before you came, did anyone tell you the full story of Rama's plan?"

Hartman nodded: "I have read all the data of 'Sita'. But without an order, I cannot participate in the discussions of those hackers."

"Since you are also a hacker, why don't you come over and take a look?"

Xiang Shan looked behind him in a consulting tone, but grabbed Hartman's shoulder with one hand.

The people there discussed for a while. Hartman was originally transferred to deal with hackers, so it was normal for him to participate in contact with the "risk" community. However, some people felt that this discussion was deliberately added by the research department.

, which began as research activities on Project Rama. Hartman’s participation may not be in compliance with regulations.

Xiang Shan waited for a short while, then made an impatient expression and dragged Hartman into the small circle where the discussion was taking place.

Several staff members showed some dissatisfaction, but didn't say anything.

Xiang Shan does have the right to make decisions. He has the most authority here.

Hartmann seemed moved.

Of course, after a few hours, the discussion ended normally. There was no need for any "ending". After all, hackers just got together to play with technology.

The two scholars who followed Xiang Shan were very happy. They felt that their ideas had been opened up and they had gained a lot.

Xiangshan spent the rest of his time arranging research projects.

When it was time for dinner after get off work, Officer Xiao Hu appeared again and gave Xiang Shan a few words of caution, to the general effect of "beware of an FBI agent."

Xiang Shan laughed wildly in his heart. It seemed that his series of actions were all explained by the "scholar's crazy nature".

No one realizes his true purpose.

When work began the next day, Hartman was the first to report the results.

"Zhu Rong" did use a Trojan. He should have left another hidden hand in the servers of those corporate research institutions. When scholars download the data required for research from that server, the computer will be poisoned. This Trojan

It can be spread through U disk, mobile hard disk and Bluetooth, and under certain conditions, data will be sent to certain IPs or mailboxes after connecting to the public network.

After being triggered once, the virus will be completely deleted by itself.

The good news is that Hartman found several samples of the virus that hadn't triggered yet.

The bad news is that "Zhurong" has not disclosed all the stolen information.

Another piece of data was also stolen.

And the most important thing is that this data is not part of the "Orunmila Project", but comes from the "Obatala Project".

It contains alien organic compounds.

"'Zhu Rong' probably didn't understand it," Hartman said, holding a cigarette in his mouth: "But the worst case scenario is that she knows friends in related majors, and then asks them to appraise the value of the paper..."

The former FBI member cleared his throat, as if to remind him not to say too much about things that were not his responsibility.

Hartmann stopped immediately.

In the following discussion, Hartmann still participated.

But there was a little hiccup along the way.

The network security department detected signs of illegal access. Perhaps the appearance of the new face "Ramanujan" was too prominent, which attracted the attention of some hackers. Someone tried to follow the network cable and touch it.

But this is actually an impossible task. The consortium behind Project Rama physically controls the entrances and exits to the network.

But Xiangshan looked at Hartman: "Brother, can you in turn locate those who are trying to invade?"

Hartman thought about it seriously: "Actually, you can give it a try, but I can't guarantee anything."

Xiangshan called those people over and held a small meeting. Hartmann could not touch other computers without permission. Without special permission, he could only use the equipment he brought.

Others were already accustomed to the officer's tendency to think of something as soon as he thought of it, but this matter still needed to be discussed.

Of course, the results are actually predictable.

The "Hanuman Group" is nominally responsible for the global hunt. However, using social engineering methods to dig out "risk community" hackers around the world involves countless manpower and material resources. Although Xiangshan is the nominal person in charge,

He could not command any of the police and military forces mobilized outside the park.

But within this group, he still speaks very idiomatically.

After concluding the discussion, Hartmann began the task of reverse tracing.

Xiang Shan patted Hartman on the shoulder: "Do a good job, brother. It's best to understand the structure of the online community."

Hartman smiled: "That, I studied it last year."


This chapter has been completed!
Previous Bookshelf directory Bookmark Next