Chapter 1109: Tan Zhenhua's Reasoning
-
Rebirth of the Military Industrial Overlord
- Qian's Feather
- 1235 characters
- 2021-01-30 08:03:05
"Aha! My dear boss, are you willing to reimburse me now?"
"No, it's not a reimbursement. This is a commission worth $39,998. It comes from a mysterious organization, Mike. I must declare that even if you do what you hear next, the money you get will be given by a private organization. Yours, and me, have nothing to do with the "Matrix" laboratory and its affiliates. It is a completely private act, and I will not admit it on any occasion afterwards."
"It doesn't sound like a good thing!" McGregor shrugged and said in a joking tone: "Okay, my dear boss, I am your most loyal employee. So, just say what you want. , Even if you let me attack the Pentagon, I will do it, well, I will keep it secret for you."
"It's not the Pentagon, Mike, you want to attack the FBI... No, I was wrong. I don't need you to attack the FBI. More accurately, you need to hack into the FBI's system and download some information."
"Wait a minute, Eric, are you serious?" McGregor's face changed a little. After thinking about it, he thought Tan Zhenhua might be joking along with his ridicule, but when he studied his boss's face seriously After the expression on the face, he felt that he was not joking at all.
"Eric, do you think this hacker was sent by the FBI?" He asked with some confusion.
"No, I don't think the hacker was sent by the FBI. On the contrary, I think the FBI is probably also looking for him."
"Why do you think so?"
"Mike, we can analyze the process of the whole thing-NSFnet, which is the "National Science Foundation of the United States" network that we are now connected to, was just opened to social institutions at the beginning of this year. Before that, we "matrix "The laboratory is not connected to an external network, neither ARPAnet nor NSFnet. During that time, if a hacker wants to attack our network and system, he must sneak into our office park, right? In other words, unless the hacker is hidden among us, it would be difficult for him to attack us."
McGregor thought for a while, then nodded: "Eric, you are right. Only when we connect to NSFnet, we can be attacked by outsiders."
"Mike, think about it again, what is the backbone of NSFnet?"
"Well, of course I know this. It is a network built by the government to interconnect five supercomputer centers that serve scientific research and education throughout the United States. Since this year, it has opened up support for regional networks, so we chose to connect. This network is used instead of ARPAnet, which was dominated by the military. Although the two networks have been interoperable and have a tendency to merge with each other, at least for now, NSFnet is more open and has the least restrictions on use."
"Look, Mike, what you just concluded is that this hacker is a dual master of networking and programming, and judging from his various performances, the possibility that he has a military background is very low-the military should not There will be time to bet like that with you, so he has a high probability of being a civilian. Well, I personally even prefer him to be a student. And we all know that to become a real master, he must accept systematic Training and immersion in both aspects for quite a long time-even if he is a genius, he has to repeatedly practice basic skills to become a real master."
"Yes, Eric, I agree with you."
"So, we can basically come to a conclusion that before, this person, where the hacker exercises his skills, most likely is the relatively open NSFnet rather than the ARPAnet, which is mainly controlled by the military."
McGregor thought for a while, and agreed: "Yes, Eric, your reasoning is very reasonable. Although NSFnet was only opened to social institutions this year, it has been running under the management of the "National Science Foundation of the United States NSF". , And the five supercomputing centers managed by NSF are all set up in universities. Stanford near us is one of them. The supercomputing centers established in universities are relatively loosely managed, and many people have the opportunity to use some The terminal, among these, the management of students' computer is the most loose."
"And we have a circumstantial evidence." Tan Zhenhua said immediately: "Just now you had a guess, that person is likely to use the computing power of a supercomputer in Los Angeles or at least a minicomputer-if I remember correctly , One of the five supercomputing centers managed by NSF happens to be in Los Angeles!"
"Los Angeles Institute of Technology!" McGrady blurted out.
"Yes, it is the Los Angeles Polytechnic University. We are not sure that the hacker is a student of the Los Angeles Polytechnic University, but at least all the information currently points to the computer with a large computing power used by the hacker. It is very likely that the hacker is located at the Los Angeles Polytechnic University. Supercomputer host."
"Well, the possibility is quite high-but Eric, you haven't answered why you think the FBI will also be looking for this person."
Of course it’s because the hacker likes to show off his personality.
Tan Zhenhua explained with a smile:
From his struggle with you, you can see that this hacker is quite confident in his skills. After peeking and downloading our information, he not only did not immediately retreat and eliminate the network traces left by him, but instead challenged you. This fully illustrates his personality characteristics. If we make some labels for him, then, He likes to show off, likes to challenge, and likes to stimulate. These three labels are definitely indispensable. Of course, maybe his performance in real life is completely different. After all, the Internet is a virtual social environment, and now it is still a place outside the law. "
"But what is the use of knowing this?"
"Ha ha ha, Mike, do you think our "Matrix" will be his first prey or victim?"
"I don't think it should be possible. With the skills, abilities, and calmness that this man showed after being discovered, I think he must have done this more than once... Ah, Eric, I understand. Up."
Although the conversation between the two just now made Guo Zhaode, who doesn’t know much about this aspect of it, sound in the air, but when it comes to this, it has nothing to do with technology but has entered a field he is familiar with. This makes him react quickly and grab The first one before McGregor called: "Eric, do you think this person must have a criminal record?"
Tan Zhenhua nodded and said: "Yes, since we are unlikely to be the first attack target of this Mr. Hacker, and we will inevitably suffer a certain loss if we have a master like Mr. Mike. The units that have been attacked must have suffered more losses. So, what will they do? The police should be their first choice. We all know that real life is not a TV series. In addition to driving cars, local police stations Almost nothing can be done except issuing a ticket, so this kind of case will definitely be transferred to the FBI, Mike, now you should know what you are looking for from the FBI?"
"Understood, I will now find a way to hack into the FBI system, um, start with the wanted order."