Chapter 187: Super Hack
-
The Era of Magic Technology
- Chopin's Original Sin
- 2023 characters
- 2021-03-01 05:08:00
(At least two more changes today, whether there is a third change depends on the specific situation, everyone gives some support, give some motivation ... Thank you ...)
Mayflower is a legend in the history of hacking. It is the only super hacker that has made the US government helpless after Kate, the first super hacker. {To see the latest chapter, please go to: ww.We}
The period of Kate's vertical Internet was still the wild days of the Internet. Although his record was extremely brilliant, it caused a worldwide shock at the time, and made the world realize for the first time the terrible Internet and the terrible combination of technology and computers .
After Kate was arrested, he was restricted from touching anything radio-related for life.
However, many people did not recognize Kate's technology very much, thinking that it was the reason for the underdevelopment of security technology at that time, and in the end it was caught by a Japanese.
Mayflower is different.
Mayflower's name symbolizes the first group of gold rush immigrants who set off from the United Kingdom to the American continent.
That ship had the earliest big names in the United States, and it also symbolized the beginning of hundreds of years of American history.
Five years ago, Mayflower was born suddenly, and when it appeared, it invaded the Pentagon. In it, a homepage was modified, and the picture of the Mayflower ship was left, so everyone called him Mayflower.
In the following four years, Mayflower's record was called brilliant and dazzling, becoming the world's undisputed first hacker.
He has invaded the NATO Joint Military Command, the White House, fbi and cia, and the European Union headquarters. All the major high-tech companies in Europe and the United States have not been spared ...
In addition to the Chinese Internet, he has not invaded, and his shadow is almost everywhere in Europe and America, leaving other hackers to look up.
However, after invading these places, he did not do any destructive behavior, that is, he simply invaded for invasion, in order to prove his technology.
Therefore, fbi and cia and Interpol are looking for Mayflower. And the wanted ranking is high, but all parties have never really pursued this super hacker with all their heart, because everyone thinks that his destructive power is insufficient and the threat is not high. And the technology is too high to hunt down.
A year ago, Mayflower suddenly disappeared from the Internet, and several hackers familiar with him never heard of him again.
A year has passed, and everyone thought he was completely out of the hacker history arena. He suddenly appeared again.
Moreover, he suddenly appeared at the critical moment of the Sino-US hacking war, as if the knight appeared at the most dangerous moment of the princess, saved the princess, killed the evil dragon, and became a hero admired by the world.
At this moment, the war has spread from Intel to IBM's main server, and Intel has completely fallen.
The director of the National Security Agency, Bob, who specializes in cyber security, was temporarily assigned by the White House to lead dozens of cyber security experts and IBM's technical elites to fight against China's Red Hacker Alliance.
"What's going on in China?"
Bob asked darkly.
The subordinates immediately replied: "Black God and Satan. The three counts of Arthur jointly attacked the main server of the magic software for an hour and failed to win it. When the Chinese hacked us, they now attacked the Chinese Other Internet companies have now broken through several major Internet companies in China and paralyzed the entire Chinese Internet. "
Bob's complexion finally looked a little better, Shen said, "These yellow-skinned monkeys are simply abominable, and this is their due punishment. Wang Xiao of the magic software company must be the hacker sun!"
"Yes, we made a comparison. The odds of the two being the same person are as high as 80%!"
Subordinates checked the data. Answered: "However, the Chinese hacker who attacked IBM this time did not seem to have sun. He disappeared after invading Intel's servers. Their attack power immediately dropped by a few grades, should we launch a counterattack?"
Bob refreshed. Seriously: "Look again, don't worry, don't get caught in the trap. What about Google and Apple?"
"They are still doing their aftermath, starting a backup server, and they have not been attacked yet."
Subordinates tried Google search and it worked.
He then entered the Chinese Internet. Tried Baidu, and it works?
What about paralysis?
He looked startled, and hurriedly re-entered several mainstream websites on the Chinese Internet, and found that all of them could be browsed normally, and the online services were restored.
How is this going?
The black just sent him a message saying that the Chinese Internet had been paralyzed. Why did it recover after a while?
Bob also noticed this anomalous situation, Shen said, "What's going on? Black God, how did they stop attacking?"
Subordinates immediately contacted Black God with secret communication software. After getting the answer, they were shocked: "Boss, Black God said that their offense was blocked. Magic Energy sold its security system to other Chinese Internet companies. The company installed the security system of the magic energy software, and they temporarily targeted the security system of the magic energy software. "
"The entire Chinese Internet is now as impeccable as Tietong!"
Bob's eyes widened. He is mainly responsible for network security. He is definitely a tech-savvy person who knows how high the technical content is.
It can directly improve the Internet security of the entire country by several levels, and it has become a defense like Railcom.
This kind of security system can be said to be coveted by every country.
unfortunately!
That's from China. It was developed by Magic Energy Software. It's Wang Xiao's technology. With the current bad relationship between the United States and the other party, it is impossible to buy such security software from the other party.
What's more, even if it is bought, does the United States dare to install Chinese-designed security systems in government agencies?
They must not dare. Who knows if there will be a hidden door in the system left by Wang Xiao? Will the other party just need to enter a code to bring down all servers with this security system installed?
No one dares to take this risk.
Didi Didi ...
Suddenly, a few sirens came from several computers.
Bob shouted, "What happened?"
A technician hurriedly reported: "boss, it's sun, he shot again, he has entered the ibm server, obtained super permissions, and we were kicked out."
"He's so great, we can't stop it!"
"Ibm was kicked out as well. There is no way but to shut down the server!"
"Other Chinese hackers also came along with it, and IBM's server was down!"
Everyone was panicking, but there was nothing they could do.
One by one intelligence summary u is enough. Makes Bob look angry.
Dozens of national cybersecurity experts cooperate with ibm's technical elites, can't even resist the attack of a Chinese hacker?
What should I do?
Is it just watching this Chinese hacker goofing around on the US Internet?
Bob has an urge to turn the US Internet into a large local area network, so that there is much room for action.
And just then!
Everyone found that Sun, who had just hacked into the ibm server to gain super privileges, suddenly encountered his opponent.
A stream of data also suddenly invaded ibm's server, and sun began to rob the server of super permissions.
Bob saw the data stream and saw the familiar operation. A picture of an old steamship flashed in my mind, and he was suddenly surprised: "It was he who appeared, it was Mayflower."
"Mayflower?"
"It's really Mayflower!"
"This guy disappeared for a year."
"We should recruit him and give him the best treatment. He can definitely improve our overall strength by a notch."
"But this guy turned a blind eye to our contact solicitation and never thought of joining us."
The technical staff of the National Cyber Security Bureau felt the pressure was relaxed.
For the time being, the world's number one American super hacker, Mayflower, and China's newly emerged super hacker, Sun, are on par with each other.
Just after less than a minute, the two sides fought fiercely.
With ibm's server as the battlefield, the two data streams continue to stagger. One code, one logic program, one defense program, one attack program were quickly written by two super hackers. You cracked one of my programs, and I wrote a more targeted one!
The confrontation between the two super hackers you come and go, we only see the two data streams flash rapidly.
Dozens of technicians of the US National Security Agency feel they can't get started at once, including hundreds of technical elites of IBM. These people usually think that they are superior, and that they are personal in the field of computer technology. But now everyone feels small.
At this moment, a large group of people around ibm's headquarters are around the server center, and the large screen of the server is constantly flashing with rapid data flow. Others were a bit dizzy and couldn't see the meaning of their data streams at all.
but. Everyone is a technical person. From the state constantly reflected by the server, we know that the two are fighting fiercely and are fighting for the authority of the server.
This top-level hacker war is really the most exciting ever in the history of the Internet, and it is definitely the most technologically brilliant one. It can be said that it represents the most peak technology in the computer field now!
This war, whether it is the National Security Agency or the technical staff of ibm, the host of this server, or China's Red guest alliance, can not step in and become an audience on the side.
In an instant, this battle turned into a duel between Chinese super hacker Sun and American super hacker May Flower.
The chief technology officer of ibm was a little thrilled to see this battle, but his server was not the master of his own, and he was still very depressed. He said with emotion: "Mayflower disappeared for a year, and the technology has improved a lot. The input data is a brand new algorithm, which may be developed by himself. It is very efficient and good for defense. However, there are some shadows of magic algorithms. It is conceivable that Mayflower has not stood still and has been absorbing the outside world. Technology improves itself. "
"However, the data stream of China's super hacker sun is also a new algorithm, but it is not a magic energy algorithm, but it also has the shadow of a magic energy algorithm, but it is also more efficient. Mayflower's algorithm is somewhat inferior."
Other IBM technical staff agree.
However, the chief technology officer of the National Security Agency saw more and said solemnly: "Sun's algorithm is obviously obviously smarter. Mayflower has temporarily resisted it, but I can't stand it for a long time. Sun is fighting for the bottom. Permissions, once you get the underlying permissions, you can control the entire server, and Mayflower will be unable to do so! "
The technical staff who heard the words were silent, excited, depressed, and angry.
As a technician who witnessed the hacking war in the normal century, I was naturally excited; but I could n’t participate, so I was very depressed; the most important thing was that I could n’t control the site, of course, the atmosphere was extremely high.
They have to admit that ~ EbookFREE.me ~ the Chinese are quietly seeing that they have caught up with them in computer technology in the United States, and have slightly surpassed them.
It seems that the defeat of Mayflower is also a matter of time, and now it has been somewhat difficult to resist the offensive of Sun.
However, at this moment, ibm's server suddenly added a few sharp data streams to fight Chinese hackers with Mayflower!
These hackers are Satan, Earl Arthur, and Black God.
They gave up attacking the Chinese Internet and wanted to do something in the American battlefield.
At this time, it became the Chinese super hacker Sun alone against four of the world's top ten hackers, including the first May flower and the second Satan.
Hackers all over the world who are watching this battle are shocked.
This Chinese super hacker Sun is too powerful, right?
It seems that the position of the world's number one hacker will change hands. (To be continued.)