Chapter 60
When he returned to the dormitory area, it was already evening. Nick was in a daze all the way. What happened today was so embarrassing that he always thought about it. When he arrived at the door of the dormitory, Nick was about to push the door open when suddenly a girl laughed from it.
Girl? Nick, who was in a daze, wondered if he had heard it wrong. He shook his head and took out his ears, but still heard the girl's voice. In confusion, Nick pushed the door and was stunned for a moment. He saw a girl sitting on Sean's bed playing with a computer. She was very beautiful. Sean sat next to him with a happy smile on his face. It should be the girl he had soaked from a certain tie.
"Come back!" Sean raised his head and greeted. He was so excited when he was happy, and he was so proud that he even said hello.
"Yeah!" Nick responded.
"Let me introduce it. This is Nick, this is Lina!"
"Hi~!" The girl smiled and greeted Nick.
Nick, who was not used to communicating with strangers, just nodded signally and returned to his bed. The girl seemed to have been here for a while and was a little familiar with Wesenlude in the dormitory. Several people were chatting laughter.
Nick looked at the time, and there was still some time left before working. He looked at Sean opposite him, and seemed very happy and very intimate with the girl.
Happiness belongs to others. Nick is on the Internet, and this is his world. As soon as he goes online, he immediately encounters David and Storm full of dust.
Storm: "There is nothing more exciting than seeing the man at this time. Come on, we are miserable!"
FD: "Where's it?"
David: "I don't know where it is now, but it's very beneficial. Several major websites have been broken!"
FD: "Okay, start integrating the offensive and defensive system!"
Storm: “Received!”
David: "Received!"
AG: "Received!"
FD: "When did you come out?"
GA: "How come I can't miss such a lively thing? Will the boss ask me to go?"
FD: "Can I say no?"
GA: "Dark and dark..."
Nick turned on three interfaces, Storm, David and GA computers were immediately inserted. Nick's screen's operating interface immediately switched to the operating interface of the offensive and defense system. The entire screen was marked with indicators like charts, monitoring data traffic, ports and other things on the network. With their inlay, the indicator lights in the corresponding area light up and the hardware and software connection was completed. Several people's computers were integrated together, controlled by Nick, and the others were each responsible for a module. This was a system developed by Nick, which could instantly organize several computers into a powerful fortress.
Immediately rushed to the battlefield, and people from all over the country gathered on the battlefield. They fought for themselves in chaos and the situation was very unoptimistic.
Nick checked the situation and found that the attack source was an inexplicable place, with very strong attack power. It is estimated that several security personnel on the attacked server could only survive until now.
He immediately took Storm David and GA to investigate the attack source. The attack source was difficult to find because no one would expose himself. The intruders started attacking through several springboards, first invading server A on the network, occupying it, and then invading server B from server A. This made a few times, and there were several springboards. If you want to find the attack source, you had to touch it one by one.
The source of the attack was found, and it was a foreign server. After ordinary criminals violated the law, they would flee abroad to escape pursuit. Hackers could commit transnational crimes directly. Even if they were found out, they were not afraid of being caught because they were already abroad.
The thirty-story office building is a symbol of the wealth of IT giants. Few people can understand that the virtual and empty thing like the Internet can make such wealth. In the computer room where the optical cable is in place, a large computer team is running. It is rare that the boss is here in person today. This is a deep middle-aged man, wearing a black suit, and his face reveals the momentum of Mount Tai collapsed in front of him who has been chasing in the shopping mall for many years. But at this moment, he can't hide his anxiety. The service crew has been paralyzed for a long time, which is a loss of millions per hour.
I was anxious and had no choice. Seeing that these security personnel invited back were busy with sweat, they were all helpless when the server team was swallowed a little bit. It was not that they were reluctant to pay the money. These security personnel were very advanced and paid hundreds of thousands of yuan per person annual salary. What else could they do? Top security experts, even if they had annual salary of millions, could not be hired.
These security personnel were also embarrassed. Although there seemed to be nothing unusual in the computer room, the experts understood that the electronic pulses of attacks on the network were surging, hitting various ports like a huge wave. These security personnel could only add a defense layer to hold on, but sooner or later they would be broken.
The attack strength suddenly increased, the pressure increased sharply, and the defense side retreated repeatedly. In the midst of the chaos of these security personnel, they received the call invitation. At this time, the security personnel were already like frightened birds, afraid that this was also one of the means of invasion. After measuring it, they felt that this was impossible, so they continued the conversation. A security personnel in the lead began to ask:
SAI: "Why attack our server?"
FD: "You seem to have misunderstood. We are here to help you!"
SAI: "Help? Who are you?"
FD: "Some computer enthusiasts, spontaneously organize!"
It turned out to be a wild miscellaneous army. The security personnel led by the leader replied unfairly: "No need, as long as you don't get in the way, that's great!"
FD: "No, you need us, let us come in and work together to deal with the intruders most effectively!"
SAI: "Put some messy people in? Just kidding! Don't scratch me anymore, I'm very busy!"
After talking, the jacket broke!
There is no hope of cooperation, so I have to do it myself. Nick organized the scattered people on the periphery and organized these people. The appeal of the name FD is enough. The main task of security experts is to manage their own doors, and hacker belief attacks are the best defense. Division of labor and cooperation. Nick began to attack the springboard exposed to the outermost layer. David intercepted data packets, analyzed data by Storm, and GA positioning. The rest assisted defense on the periphery to relieve the pressure on the server.
Some scattered people on the periphery, and these people on the periphery are by no means mediocre. Being able to join in the fun of this kind of people on the Internet has already shown their level. This kind of war without gunpowder on the Internet begins to end secretly. Most people only know how to use the Internet to watch web pages and chat, and may not know the existence of war at all, let alone how to intervene in such wars.
Military base of a certain country.
"What have you been researching? Congress has withdrawn hundreds of millions of dollars in research projects, giving you supercomputers, and giving you the best equipment, and the result is just like this? Can this be used to become a weapon of war?" In the huge research room, an admiral was furious. From the rows of medals on his chest, he could know that it was not an ordinary person.
Chapter completed!