Reborn Ace Hack
Chapter 175 The Eve of the Final Battle
Hackers' intrusions and attacks on the Xuanni Firewall are still in full swing. Under the deliberate guidance of Gu Lang and Tang Xinyu, the hackers' technical discussions on the Xuanni Firewall are constantly introducing new ones, and there are constantly new ones targeting the Xuanni Firewall.
Various attack methods and tools have emerged. Although no one can really bypass the defense of Xuannie Firewall, enter the Xuannie server and take away the target files, this does not affect the enthusiasm of hackers for discussing Xuannie Firewall.
And precisely because Xuannie Firewall remains as powerful as ever, hackers are increasingly interested in it. As challenges pass day by day, almost all hot topics in major forums and IRC chat rooms are surrounding
As Xuannie Firewall unfolds, any topic about Xuannie Firewall will attract a large number of hackers to watch and discuss. Any technical analysis post of Xuannie Firewall that dares to post will be read and tried by countless people. Once there is a breakthrough,
, immediately became the center of attention.
When the challenge entered the seventh day, the entire incident had begun to spread from the hacker community. Several domestic influential computer journals began to pay attention to this challenge and reported the entire incident in detail. So originally only hackers
, as well as the challenges that network security companies pay attention to, have become the focus of almost all computer enthusiasts. Xuannie Firewall has also been quickly known and discussed by computer enthusiasts all over China. There is no doubt that Xuannie Firewall was halfway through the challenge.
By that time, it had already become popular, and it was extremely popular.
In recent days, Tang Xinyu and Gu Lang have no longer been guarding the Communications Department every day like they did at the beginning. Instead, after arranging their work, they started to work on more important things.
On the fourth day of the Xuan Nie Challenge, Tang Xinyu received the first call asking about Xuan Nie firewall products. Since then, such consultation calls have continued one after another. These calls also reminded Tang Xinyu that he is very concerned about Xuan Nie firewall products.
The time had come for the firewall to be further packaged and promoted, so after arranging the affairs of the network department, he began to organize people to discuss and deploy the commercialization of Xuannie Firewall.
Gu Lang has two tasks. First, according to Xiao Yuan's instructions in advance, he starts to form a technical forum belonging to Xuannie Company. The name of the forum is called Xuannie Forum.
For this forum, both Xiao Yuan and Gu Lang want to build it into the largest and purest hacker paradise in China in the future. Although it is now established with the spring breeze of Xuannie Firewall, and it also uses the same technology as Xuannie Company.
name, but according to Xiao Yuan's idea, this forum is only nominally affiliated with Xuannie Company, but in fact it is to be operated independently, and its position will gradually separate from Xuannie Company in the future and become a completely neutral forum. He repeatedly
The stated free hacker spirit will be the sole guiding principle of this forum.
Establishing a forum is not just a technical matter. Operation and management are equally important. Fortunately, before Gu Lang met Xiao Yuan, he had been hanging out in major hacker forums and had served as a moderator in several forums.
I hold the position of director, so I am not completely inexperienced in managing a forum.
The construction of Xuannie Forum is not Gu Lang’s current focus. Gu Lang’s current focus is to form the technical team of Xuannie Company and conduct secondary development of Xuannie Firewall to prepare for the official launch of the product in the future. Although the current
Xuannie Firewall has been able to run very well, but most of the configuration interfaces are based on the command line. Even if there are several graphical window interfaces, such as the log system and network traffic monitoring system they have been using, these graphical interfaces are very
It is simple and crude. Although it is not lacking in functions, it is sufficient for personal use, but it is obviously not suitable for marketing.
On the other hand, the current Xuannie Firewall is a full-featured version, which is suitable for some enterprises that have extremely high requirements for security and stability. However, for ordinary individual users, it is overkill, so he needs to organize personnel
, trim the functional modules of Xuannie Firewall, and launch different versions for different users. Of course, the prices of different versions will definitely be different, and even a free version will be specially launched for individual users.
Third, when Xiao Yuan originally developed this firewall, due to limited conditions, he only developed the Windows version. However, as the most profitable part of Xuannie Firewall, a considerable number of enterprise users use non-Windows servers. So,
Gu Lang needs to organize people to develop versions suitable for different server operating systems. In fact, this work is the most important, and it is the largest in terms of workload and difficulty.
Before forming a development team, the first thing to do is to recruit talented people. On the one hand, Gu Lang sent invitations through the Internet to some hacker friends who he thought were reliable in terms of character and technology. On the other hand, he opened a
The list of personnel needs was handed over to the company's newly established human resources department. Of course, because this development team belongs to the company's core team, the final check must be done by him and Tang Xinyu personally. In addition to technology, conduct will also be
listed as an important inspection content.
This series of preparations is simple to say, but in actual operation, many issues need to be considered, and time must be guaranteed. Therefore, when Gu Lang has considered everything that can be considered and arranged it, the time has arrived unknowingly.
January 10th.
Before this, although the Xuannie Firewall was under constant attacks every day, it was always safe and secure. Those specially set traps were also used to welcome people who came to spy on the situation every day.
The hackers visited us without any problems.
The public opinion on the forum is still proceeding in an orderly manner according to Tang Sa, Tang Xinyu's plan, and Gu Xiaodong's gambling forum has also begun to loosen up, and gradually began to increase the odds of winning by betting on Xuanni, although it still has not reached the original level.
It’s a ratio of one to ten, but judging from the current trend, it won’t be long before it returns to one to ten again.
On the night of January 10th, Gu Lang finished his day's work and came to the Network Department again. He wanted to ask about the day's situation, but he found several employees gathered around a computer and were whispering, so he walked over.
"what happened?"
"Mr. Gu."
"Hello, Mr. Gu."
"..."
After several staff members greeted Gu Lang one after another, one of them explained the reason, but it turned out that someone had just posted a post on the forum. In the post, the poster made a well-founded analysis and clearly concluded that
I came to a conclusion, that is, those tools and technical methods circulated in the forum these days, which seem to have made breakthroughs, have actually entered the trap set by Xuannie Firewall. From this perspective, in the past few days, people have
The technical means and attack methods discussed are simply wrong in terms of direction.
Gu Lang sat next to the computer, read the post carefully twice, raised the corners of his mouth slightly, and murmured to himself: "Finally, a master has appeared. Is the decisive battle coming early?"
You'll Also Like
-
The Emperor's Dominance
Chapter 2220 2 hours ago -
Simultaneous traversal: All Abyss difficulty
Chapter 181 2 hours ago -
I'm almost reaching the maximum level of evil god, and you're advising me to change my job
Chapter 179 3 hours ago -
Hunter: I became stronger even after I died
Chapter 121 4 hours ago -
After I became a villain master, my beautiful apprentice fell in love with me
Chapter 117 4 hours ago -
Simulate a thousand times, I have a method to speed through the escape game
Chapter 518 4 hours ago -
Return to Singapore 1995
Chapter 562 4 hours ago -
Hunter x Hunter: Pokémon Master, the World's Strongest
Chapter 475 4 hours ago -
The Wizard: From Zero-Ring Wizard to Almighty Lord
Chapter 64 4 hours ago -
Xiuxian Baiyi System, I know everything
Chapter 638 4 hours ago