typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 1060 How sad this must be

At the moment, in fact, Zhang Yang and Xu Danying have not used all the functions of the Shadow System on a large scale, nor have they fully activated the terrifying computing power of the supercomputer with more than 100 billion calculations.

The reason is simple. Zhang Yang and Xu Danying soon discovered that Lockheed Martin's network security system and file encryption technology were completely different from the previous level.

For the United States, which is far ahead of other countries in the world in the field of computer security, this level of security is definitely second to none. If placed in the world, it would be like the brightest diamonds on the crown.

exist.

Theoretically, with such protection technology, even the Nuwa Group's supercomputer with a petaflop computing power would be difficult to crack in a short time.

And if this supercomputer is used to crack the other party's password, such frequent collision attempts in a short period of time will definitely arouse the other party's alert, and allow the other party to easily guess what kind of equipment they are using.

Supercomputers with petaflop calculation capabilities can be detected all over the world. Therefore, if Zhang Yang and Xu Danying want to forcefully crack it, there may be a danger of being detected by the other party.

Of course, if the super complex calculation method of the shadow system is used, it is another matter.

It may only take a second or two to easily enter, but in this case, the other party will definitely be surprised that the hacker is so terrifying, so for Lockheed Martin, the only thing they can do is to replace their security system again.

It's just that the current security system is already the best in the world. What kind of system can they replace it with?

In other words, their information will be completely exposed to the hacker in the future, so can Lockheed Martin continue to operate in the future?

Once such a cracking behavior comes out, it will be no less than a magnitude 12 earthquake in the Internet world.

For a superpower like the United States, this is absolutely unacceptable.

Under this situation, for the United States, whose military strength is unmatched by anyone in the world, all they can do is to immediately arrest this Internet super.

Zhang Yang is not ready to directly face Midi's endless entanglement yet, and his purpose this time is not to obtain Lockheed Martin's technical secrets, so he is not prepared to use the Shadow System to forcibly crack Lockheed Martin's encryption technologies.

So he and Xu Danying only used some of the functions of the Shadow System, and then used the level of ordinary super hackers and the computing power of early supercomputers to attack Lockheed Martin, which was full of flaws but tenacious.

The other party quickly killed the virtual IP currently used by Zhang Yang, and launched anti-tracking and stared at it fiercely. The reason is very simple. Zhang Yang invested the most resources in this IP, and deliberately virtualized it into a computer with a computing power of almost 100 billion times.

The computing power of a supercomputer is obviously at the level of an early supercomputer.

Such a supercomputer still carries certain risks for Lockheed Martin, so whether the other party wants to solve the mystery or eliminate the threat, they must keep a close eye on it.

However, this is exactly what Zhang Yang wants. He only knows that behind this deliberately disguised IP is a company called nrd.

The reason why I chose this company is because when Yao Yun attacked them, he encountered a lot of resistance and failed to successfully invade in the end. Later, he relied on Zhang Yang to use the shadow system to support the attack.

In other words, this international middleman named nrd has good strength, and at least its network security capabilities are first-class, otherwise it would not be possible for even a master hacker like Yao Yun to fail.

So when Loma's people started to counterattack crazily, Zhang Yang still seemed very restrained, because he was now imitating the strength of nrd.

Seeing that he was about to be forced into a dead end, Zhang Yang finally withdrew from the attack with a look of embarrassment, and then ended the hacking operation. Of course, he did not expose the IP of nrd company, because it would be too obvious.

At the same time, Xu Danying's attack slowly began to end.

Zhang Yang took advantage of the finale to start eliminating the real IP information of himself and Xu Danying, as well as any traces of the hijacking of the nrd company.

At the same time, Lockheed Martin, Tuba slammed his fist on the table and couldn't help but cursed: "Damn, just a little bit, just a little bit, let me see your

His true colors."

His engineer, Svensson, had led a security team to seize the IP, but the other party finally retreated at the last moment. This retreat immediately made his efforts in vain.

When this situation happened at the last minute, one can imagine Tuba's mood. He was furious, and the anger in his heart had nowhere to go. It was like being dumped suddenly when he was about to climax.

A slap and then a kick to kick him out of bed, it was simply unbearable.

However, this was not considered a blow. When he was shouting that he was unhappy, Swenson suddenly hurried to him and whispered that data had been stolen.

The reason why the other party retreated was because the hackers had another team and successfully used an employee account to steal part of the code base of the Lockheed Martin Cyber ​​Security Center.

Of course, the database itself is equipped with super strict anti-malicious copy encryption technology. As soon as the system discovers that the data has been copied, it automatically activates the network isolation system and forcibly disconnects the network to block the other party's copy.

But despite this, within just a few seconds, the other party still roughly copied a part of the data. Of course, judging from the traces, the other party probably did not know that they were invading Lockheed Martin's peripheral code library.

Tubal was immediately dumbfounded when he heard this.

As soon as he sat down on the table, the other party was trying to attack the west. While he was holding on to this suspicious target, his accomplices successfully invaded.

"Fuck you." Tuba took a long breath and asked through gritted teeth, "How much was lost?"

"That's not much, but they happened to steal some code base data... These things are some important codes of our newly updated network security system. Although these things use encryption technology, in theory, even if the other party spends several

It won't take hundreds of millions of years to crack it, but who knows, since the other party can successfully invade their code base, it means that they have a chance to crack it..." Swenson said speechlessly, looking like he was about to shed tears.

"But fortunately, no military secrets were stolen this time..." He muttered again in a low voice.

"Bullshit!" Tuba was so angry that he almost spat out a mouthful of blood. For him, as a director of a network security center, what does it mean if the code of the security system is stolen? It means that the security system you built is special.

It is possible that the next time someone attacks you, you may become the emperor's new clothes at any time.

For him, it would be more cost-effective to let the other party steal an important military secret.

"Immediately activate the first-level emergency mechanism and activate the backup security system... Damn it, you guys only copied a little bit of the code, but... I have to update and replace all the security systems that were finally established. This is...

My life." Tuba put his hands on the table and trembled.

"Boss, are you sure you want to activate the first-level emergency mechanism?" Swenson came up again and whispered, "Once activated, the people above will know that there is another problem with our security system."

"Boss, no military secrets have been leaked. The stolen code is just a little bit, and it also uses the highest level of encryption technology on the planet. It is impossible for them to crack it..."

Tubal looked at Swenson, he knew exactly what this guy meant. If the theft was known to the superiors again, he, Swenson and his team would be waiting to receive the dismissal letter.

"What if they crack it..." Tuba couldn't imagine that if the other party cracked those codes, all the security systems they had worked so hard to build would be invalidated. What's more terrible, the entire Lockheed Martin company would be under their noses.

"Nothing is wrong, boss. The most important thing for us right now is to find those bastards immediately and use all means to squeeze them until their bones are left..." Svenson clenched his fists and said.

"Boss, Lieutenant Colonel Miller is calling." A programmer came over with a wireless phone.

"Mr. Tubal, I noticed that they have retreated. Do you..."

Tuba trembled: "Oh, yes, yes, those bastards are gone, but I have obtained their important information... I will share this important information with you immediately."

"To be honest, I have also obtained some things here, but I have to remind you that what you are facing this time is not an ordinary hacker."

"Of course I know that if the person who dares to attack Lockheed Martin is an ordinary hacker, it will be a joke to the world."

"You may have misunderstood me. What I mean is, has your company lost anything?"

Tubal laughed dryly: "God bless, those bastards are not very lucky."

"Then I'm relieved. You know I have to write a report that satisfies the superiors. Can I wish you good night?"

"Wait a minute, Lieutenant Colonel Miller..." Tubal looked at the string of words that Swenson typed on the screen of his mobile phone.

It says "The damn guy's information has been found, and it comes from nrd company...but the guy who stole the code has no clues."

"How can I help you?" Lieutenant Colonel Miller asked.

"Are you sure you don't have any news about those *nurses?"

Lieutenant Colonel Miller stared at the hundreds of IP addresses displayed on the computer screen and hesitated: "None at the moment."

"Okay, good night." Tuba hung up the phone.

Then he looked around at the people present: "No matter what means you use, you must find this self-supporting company before USCC. Oh, by the way, there are also those malicious IPs that attack us, what the hell.

Find them all for me and let us see what these damn gangs are planning to do?" (To be continued.)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next