Chapter 1115: Naked


Kevin Mitnick is very, very happy today because the "Indigo III" workstation he has been looking forward to for a long time has finally arrived.
This is the latest model launched by SGI this year. The top version is equipped with 4 MIPSR3-100CPUs and a professional graphics processing chip, 16MB of memory, 100MB of hard disk, and in order to make this graphics processing computer better To adapt to professional work, SGI has also added the latest options to the workstations launched this year. Customers can choose to match the XGA standard with a resolution of 1024x768, which uses Sony’s latest "Trinitron" technology. Inch flat screen display.
And what Kevin ordered was just such a top-equipped machine.
The price of this machine is as high as US$39,998, and there is no stock available. Customers need to place an order at SGI’s specialty stores and wait at least two weeks before receiving the product. SGI’s official explanation for this is:
Because Too many customers ordered and the factory's capacity was limited, so I had to do this."
Although the waiting time is a bit long, after actually getting the machine, Kevin feels that all this is worth it.
He opened the box of the machine, connected all the cables, and then pressed the power button-with a clear beep from the speaker, the display screen lit up, and a series of flashes flashed on the screen. This is the computer's self-test and booting at power-on. A few seconds later, a series of "OK" flashed, the screen stopped refreshing, and a small cursor flashed after C:>, Kevin Knowing that this is a sign that the machine has successfully started.
He casually entered the command: idor.
The hard drive light flashed immediately, switching colors between red and green, and the small hand that was already familiar to many people appeared on the screen. Holding a pen in the small hand, I drew on the dark screen. A door, and then a small handle was added to the door, and then the small hand threw away the pen, twisted the small handle, and the door was pushed open
The background desktop of the blue sky and white clouds is loaded on the screen, and it looks pleasing to the eye on this high-resolution and carefully adjusted Sony flat-screen display.
Kevin picked up the randomly delivered mouse and began to point and flick on the screen aimlessly, opening and closing windows one after another. From his proficient movements, he can see that he is very familiar with this system, and While doing all this, he always had a smug smile on the corner of his mouth-using the money paid by the "Matrix" laboratory to buy a full set of software and hardware equipment produced by the "Matrix" laboratory, this is really a wonderful shopping experience!
And this success also gave him more ideas.
Even the famous "Matrix" laboratory had to succumb to his attack, and obediently paid a "redemption" fee of up to 39,998 US dollars in exchange for the information not to be leaked and not to be harassed again by him. Then, the other big companies What?
In the past, he had hacked into many systems purely for the purpose of showing off his skills, from the North American Air Defense Command to the Pentagon, from the FBI to the Pacific Telephone Company, except for the time he invaded the Pacific Telephone Company for himself and several others. Apart from setting the permission for free phone calls, a friend of mine did not use his technology to make a profit.
Or subconsciously, he believes that in the online world, invading other people's systems, browsing and even tampering with other people's data are just pranks, just a little bit out of line, and it is the real thing to gain economic benefits for yourself. Crime, and he didn't want to take that step.
However, this successful invasion of the "Matrix" opened the Pandora's Box in his heart. Although there was a difficult opponent there, he was spotted and stopped in time while he was peeping, and he had been involved with him for half a week. Hours of fighting, but in the end, he still won and was rewarded handsomely, which is the powerful and expensive workstation he has dreamed of for a long time.
With the blessing of this workstation, Kevin believes that he can break through those weak network security settings more smoothly, break into the so-called "forbidden areas" more unscrupulously, and peep into the secrets of others. He will become in the online world. King in the dark!
Or, he can become a rich man.
Judging from the performance of the "Matrix" laboratory this time, they obviously don't want to leak out that their network was breached, because this is a huge blow to their reputation!
Because after that attack, he once again sneaked into the FBI network and paid attention to the changes in the contents of his files, but he found that there was no new content added-this was actually something he had to do every three to five. Something happened, and it was because of a whim of his invasion that he realized that he had become a target of the FBI. This allowed him to develop a good habit—not only set the FBI computer under his control to allow him Feel free to enter and exit the back door, and often log in to see the changes in the content of your file information.
And this good habit also allowed him to avoid the trap set by the FBI for him many times.
From this, Kevin also drew an inference-compared with those companies that will report to the police at every turn, the big companies in the IT industry may pay more attention to their reputation in cyber security, instead of pinning their hopes of seizing the attackers. In the case of unreliable police or FBI, they are more willing to solve the problem privately, because exposing these things will not do any good to these companies, but hiding them will allow them to maintain their image in front of customers.
Then, IBM, HP, DEC, SUN...
The more Kevin thought about it, the more he felt fierce, he felt that he had found a secret gold mine!
Of course, even these big companies will be as generous as the "Matrix" laboratory, but one thing must be secured, that is, the confidentiality and untraceability of capital flows must be ensured. Kevin learned from the browsed FBI file. , Monitoring the flow of funds in an account is one of their most commonly used tricks, and it is also the most useful one.
So, to ensure the security of several bank accounts under your control, you must do good preparations.
Thinking of this, Kevin opened the drawer, drew a red-labeled disk from the disk box, and inserted it into the drive of the workstation. At the same time, he moved the mouse and double-clicked a button marked with a telephone on the screen.
The modem's indicator light began to flash, and after a few "squeaks", it was connected to the network. Kevin called a program from the disk and double-clicked it to start running. The Citibank login interface soon popped up on the screen.
"They are really dull!" A mocking smile appeared at the corner of Kevin's mouth again, and his fingers began to tap briskly on the keyboard. With his tapping, Citibank's huge user database appeared in his In front of him, it was like a newborn baby.
Naked.
Latest chapter of Ebook Rebirth of the Military Industrial Overlord Click here