HacKer
Chapter 867: malicious provokes trouble!
The Southern Dynasty is one of the neighbors of Xiaguo. The territory is only one-sixty-sixth of Xiaguo, and the total population is about one-sixth of Xia.
If it is not a particularly bad existence of mathematics, I am afraid it can be easily calculated. The per capita land area of the Southern Dynasty is less than that of Xiaguo.
However, it is such a small country where small things are lacking, but it has created a series of miracles and become a developed country that has been watched by the whole world and recognized by the whole world!
That's right!
The Southern Dynasty is a developed country! It was recognized as a developed country by the World Bank, the International Monetary Fund, and even the CIA CIA of Lijian.
According to the ranking of the Human Development Index, the South Dynasty has long been in the top 20 rankings, while the Hong Kong Island and the Australian Island of Xia Guo have long occupied the top ten status. As for the main body of Xia Guo, for some reasons, it is always floating around 100 people.
The highly developed South Dynasty and the country's policy of supporting the country's economic lifeline are ‘export-led, strategy. The Southern Dynasty relies on advanced technologies to produce world-leading products and then dumps them to the world to maintain the country's economic development.
The most famous company in the Southern Dynasty is the famous Samsung. Later generations, Samsung-made mobile phones have achieved the highest market share in the world. Even the Phane series of phones made by Amale did not end the rise of Samsung.
However, Shi Lei’s goal this time is not Samsung at the moment!
As a large semiconductor electronics industry group with a market value of nearly 100 billion, Samsung's electronic defense, if there is nothing extraordinary, can they succeed?
Every world giant enterprise, especially the electronics industry, has absolutely no cyber defense. At least one of the world's best-ranking masters will be in town.
Most of these world-class experts are government security experts. These government security experts have chosen some well-known companies to work part-time. Because they belong to the government's security experts, hackers who are not invisible, they can appear in life and can do some cybersecurity-related things with great brilliance.
Therefore, the helm of a well-known company can freely meet with security experts to conduct face-to-face conversations, and everyone's identity can be known. Therefore, well-known companies do not care that these security experts belong to the government, and they are not afraid that these security experts will steal confidential information from enterprises.
Which world-renowned company does not have some secret power? If you know the security experts, do you dare to be a two-sided party? That is probably the rhythm of the Zhulian and the Nine!
In addition to these part-time security experts, only a handful of electronics industry groups have their own world-class security experts. According to Shi Lei, the Samsung Group has their own world-class security experts, and there is more than one! According to the speculation of the Angel Council, Samsung Group has at least six world-class security experts, at least three of whom are world-class security experts.
The rise of the Samsung Group is not unrelated to the security services provided by these security experts!
Shi Lei’s goal of invading the South Dynasty is only four online game makers, not Samsung. As for the future, if there is an opportunity, Shi Lei will naturally not let the Samsung Group.
Xia Guo's time zone is UTC8 Southern Dynasty's time zone is UTC, please search for floating astronomy, the novel is better updated faster!|To be continued.+?Read. · Xia Guo time at 11:30 in the middle of the night, the Southern Dynasty is already at 0:30 in the morning. This time period is an absolute sleep time for ordinary people. However, for hackers, night provides them with the best cover.
The vast majority of hackers usually like to act in the dead of night. It doesn't mean that you have to act at night. But most hackers are used to acting at night.
Shi Lei does not have a fixed time preference. Whenever Shi Lei wants to invade, it will immediately invade as soon as possible. Now Shi Lei is not too happy. He controls some of the resources of the IWN secret network, spans the network barrier between Xiaguo and the Southern Dynasty, and enters the network of the Southern Dynasty.
There are a total of four South Korean countries participating in the Anti-Dream Entertainment Alliance. They are NNxwn, NCaftNNmwz, and Snrilegate. Among them, NNawnz and SnrMeqate are the absolute main players. The two companies have a closer relationship with Big Penguin, and they are involved in more hacking forces.
The main goal that Shi Lei wants to clean up is NNawz and Snrlegate. As for NCuaft and NNxwn, Shi Lei only spent a little time, invading the main server through the homepage of their official website, and investing in the moon virus in the main server, they ignored it.
The harm of the moon virus is very serious. By repeatedly formatting the hard disk in a low-level manner, the purpose of physically destroying the hard disk is finally achieved. The main goal of hackers to destroy computer equipment is the storage device, which is the hard disk.
For ordinary users, the importance and value of computer storage devices is far less than the CPU of the central processing unit, the motherboard, or the memory and graphics cards. The price of a hard disk is only three-thirds of the value of a CPU. It is less. Not to mention the top graphics card equipment in the high-end atmosphere, it is not the value of a hard disk in the district.
However, for business users, the importance of storage devices is much higher than the value of the rest of the devices. The data inside the storage device is really valuable.
There is a saying in the IT world that ‘hard disk is valuable, data is priceless. This proverb is very intuitive to reflect the value of data in the enterprise.
NCaft and NNxm's main server stores a lot of game development data. After the moon virus enters the main servers of the two companies, it quickly starts to screen the targets.
The attack pattern of the Moon virus against the server was adjusted and modified by Shi Lei to a certain extent. The storage device of the server, usually a disk array group, not a single hard disk.
A disk array group consists of multiple hard disks, and a hard disk running a server system usually does not exist on multiple hard disks. According to this feature, Shi Lei changed the attack plan of the moon virus to the server, and the previous full disk array group attack became a screening attack.
The moon virus will determine the number of disks in the computer, then distinguish the system disk, protect the system disk, isolate other slave disks, and perform low-level formatting on the slave disks. When the slave disk is formatted at a low level, the moon virus will also insidiously block the hard disk data feedback light, and simulate the flashing of the hard disk data feedback light under normal conditions.
This insidious setting makes the moon virus more harmful. Often in the silent, you can destroy the server's slave disk, but the server's main system is no problem.
The primary servers of NCaft and NNxm are corrupted by the moon virus, and the data stored in the internal slave disks of the server is subjected to low-level format erasure processing.
Shi Lei handled NCaft and Nexm, and the security guards of the other party had not found their main server attacked. It must be said that the moon virus has become more and more sharp, and the means of attack have become more and more difficult to defend.
Although the main servers of NCsaft and NNxan were completely killed by the Moon virus, Shi Lei knows that the losses of the two companies are not too big, and their real core data is stored in servers that are isolated from the network environment. Online game makers are not the same as operators. They are not inseparable from the network environment. They can develop games in a closed environment.
For the environment that isolates the network, Shi Lei is not completely unable to do anything, but Shi Lei is too lazy to be true with NCaft and NNxm. The main targets of Shi Lei are NNawik and Smlegqte.
Xia Guo time, late at night close to the early morning. The time of the Southern Dynasty is already close to one o'clock in the morning. Shi Lei's painting of the gourd entered the official website of Neawz and SnrMeg#te.
The network defense of online game makers is much lower than that of online game operators. The focus is different, and the degree of defense of the network is different.
Shi Lei did not move the main servers of the two companies this time. Because Shi Lei knows that there is no valuable data in the main server. For NNawz and SnrMeqate, Shi Lei's tolerance is not as tolerant as the other two companies. Destroying NCuaft and N's main server is not so much to ruin their data as it is to vent their anger.
Controlling the main servers of NNawz and SnrMegate, Shi Lei did not do any sabotage. Instead, he built the main server of the two companies, together with a high-performance broiler server from the South Dynasty, to form a temporary small server cluster.
Shi Lei controls some of the resources of the IWN secret network, injects this small server cluster, and then controls some resources of the IWN secret network based on the small server cluster.
It is worth mentioning that Shi Lei did not specifically protect this small server cluster. Under normal circumstances, broilers under the control of Shi Lei are usually protected by Shi Lei. This is to prevent the investigation of real IP addresses by other hackers or anti-hacking security experts.
If there is no security protection, it is definitely a big tragedy if the hacker who has found the real IP address. Shi Lei did not set security protection measures this time. Could it be that Shi Lei made a low-level mistake?
It is obviously impossible for Shi Lei to make such a low-level mistake. Even if Shi Lei made a low-level mistake, Yi Lei would remind Shi Lei and help Shi Lei to heal these small mistakes and mistakes.
However, whether it is Shi Lei or Yi Zheer, they did not care about the temporary small server cluster without defense system, there is only one possibility, Shi Lei deliberately!
Shi Lei is preparing to use this small server cluster to carry out malicious provocations...
You'll Also Like
-
Naruto Live: The Death of Naruto in the Beginning Movie
Chapter 829 14 hours ago -
Anime: Saiyans eat the world of food
Chapter 285 14 hours ago -
Hogwarts Summoning Guide
Chapter 466 19 hours ago -
The wrist of the Marvel world
Chapter 525 19 hours ago -
The beginning of the original god became General Raiden's personal ninja Yunmo
Chapter 876 19 hours ago -
Battlefield of Ten Thousand Races: I Have a Billion Times Critical Strike System
Chapter 789 19 hours ago -
Traveling through the beast world, I used hundreds of billions of materials to raise cubs
Chapter 640 19 hours ago -
Rebirth: I Want to Collect Rent
Chapter 673 19 hours ago -
Beastization of the whole people: Evolution from the willow tree
Chapter 814 19 hours ago -
I, the villain, start the game with the protagonist, the saint!
Chapter 1227 19 hours ago