After hearing Gretchen's narration, Liu Haotian smiled and said, "So that's what happened. You can go to sleep peacefully. This matter will be over when you get up early tomorrow morning."
After hearing this, Rachel was stunned: "Secretary Liu, are you kidding me?
Now that the entire Tianhe Virtual Industrial Park project is on the verge of collapse, how can I possibly sleep?"
Liu Haotian smiled slightly: "Don't worry, everything is as expected. Now the entire Tianhe Virtual Industrial Park project is essentially a honeypot system. The real purpose of this system is not to operate normally, but to adopt a
A virtual real resource deceives the intruder, thereby collecting the intruder's attack data and attack behavior, and achieves the purpose of protecting the real host.
Do you know why I want to introduce Hongke Group into such a large project?
The reason is very simple, because the security information system of a large-scale Internet application platform like Tianhe Virtual Industrial Park is the most important.
Hongke Group enters the investor system, and they are responsible for the network security of the entire virtual industrial park project app.
I heard that recently, under the leadership of Yang Xiaoxie, they developed a new type of honeypot system. This honeypot system is completely different from the traditional honeypot system. The honeypot system they created is a
In a real operating system, intruders can even steal the source code of the entire system directly through the network. However, the intruders do not know that the so-called source code they stole is itself a super powerful virus software.
When part of the core source code of the honeypot system is transferred away, these source codes will quickly take root in the intruder's operating system. If the other party is not able to copy all of these source codes, but only copies a part, and
These parts of the source code that have been implemented will automatically complete the remaining programs through internal calculation programs.
This is a highly intelligent honeypot system that can not only undertake normal business functions, but also extract information such as the attacker's attack behavior and attack characteristics, and can even automatically interact with the other party through intelligent attack and defense programs.
, let the other party feel a certain degree of defensive pressure, and adopt more attack methods to delay the other party's attack time, and prepare all the ambush to finally lock the other party's real IP.
And even if the other party stops attacking, as long as their devices are implanted with the virus code of the honeypot system, as long as their devices are connected to the network, these networks will continue to secretly send their IP addresses through internal programs.
It is to control the other party's audio and video equipment and cooperate with the remote system for remote control.
It can be said that this new honeypot system created by Hongke Group is very advanced. It can not only automatically link with active security products such as ips and firewalls to strengthen the company's defense capabilities, but can also automatically attack and turn into a Trojan horse.
!”
After Liu Haotian gave a brief explanation, Gretchen was completely shocked. He asked with confusion on his face: "Secretary Liu, do you mean that the app platform currently running in our Tianhe Virtual Industrial Park is fake?"
Liu Haotian smiled and shook his head: "You can say he is fake, but in fact he is also real, because there are two server-side apps, one is the app that is really running outside, and this app is
It's fake, but all of his appearances are real, and what's fake is just his internal original code.
In fact, all users' data first enters the underlying control system, which is the system that has been encrypted for a long time by our technical staff. No hacker can break through this system.
They can only extract application-level data.
What they don't know is that all application-level data has already been quietly transferred to another real operating system through the underlying system.
The system that hackers attacked was a honeypot system, which was a super trap!
It can be said that the Tianhe Virtual Industrial Park project is a system with two sets of operating programs. You can think of it as two screens of a computer. You can see everything in this computer on both screens, and
In fact, what the system facing the outside shows is what the virtual industrial park project team wants you to see, and the real thing is in the system inside."
Hearing Liu Haotian's explanation, Gretchen suddenly realized that at this moment, his admiration for Liu Haotian was like an endless river.
Liu Haotian is really too rigorous in his work.
Who would have thought that this large-scale virtual platform is actually fake, but the best thing about this platform is that although it is fake, it does not affect your application, as long as you do not attack its core source code.
There won't be any side effects.
This is really awesome.
In the end, Gretchen did not go to sleep, but directly took charge of the Tianhe Virtual Industrial Park project. Even though he knew that he was of no use at all, he also wanted to see the matter settled with his own eyes.
Liu Haotian, on the other hand, just took out his mobile phone and dialed Yang Xiaoxie's number: "Old Yang, someone came to the door to do some work!"
On the other end of the phone, Yang Xiaoxie was wheezing and breathing heavily, and said with some displeasure: "Wait a little longer, really, I finally found a beautiful woman to relax, but you are causing trouble for me at this time, no matter it is
Whoever comes back, I will destroy them."
At this moment, the room where Yang Xiaoxie was sitting was filled with wind and moon, and the spring flowers were brilliant.
Half an hour later, Yang Xiaoxie came to his computer in his pajamas with a satisfied expression, opened a special software platform on the computer, glanced at it, frowned, and cursed for a while,
Sitting in front of the computer, typing on the keyboard, programs are running crazily one after another on the big screen in front of me.
At this moment, Donglin Group’s super data center in Hexi Province is already filled with joy.
Zhang Shengli, the head of the data center, was celebrating with champagne, surrounded by dozens of his subordinates.
Because after nearly three hours of offensive and defensive battle, they finally broke through the defense system of the Tianhe Virtual Industrial Park project, and successfully copied the source code of the other party's project to their own database center, and copied all the data at the first time.
Afterwards, it was manually sent to the Donglin Group's headquarters in Kyoto City.
The reason why the network is not used for transmission is very simple, because these source codes are too precious, because Zhang Shengli knows very well that no matter what data is transmitted on the network, it will definitely leave traces, so he directly uses
He used this method of data copying to ensure the security of the data. He did not want the source code he finally obtained after spending so much manpower and material resources to be intercepted by others during the data transmission.
Moreover, this kind of transmission is extremely easy to attract the attention of relevant regulatory authorities.
Zhang Shengli was celebrating, as were senior officials from Kyoto City, Zhu Liang and Donglin Group Headquarters.
Because Zhu Liang has received accurate information, the group's internal technical department has obtained the source code of the Tianhe Virtual Industrial Park project through super hacking technology.
However, after a period of carnival, Zhu Liang suddenly frowned and called Zhang Shengli: "Zhang Shengli, are you sure that the source code you copied must be the driving engine of the Tianhe Virtual Industrial Park project?"
Zhang Shengli nodded vigorously: "Mr. Zhu, I cannot guarantee 100% that this source code must be the source code of the driving engine, but after running, this source code can drive the Donglin Virtual Industrial Park project we built before.
of all programs.
Actually, Mr. Zhu, I am really surprised by this victory.
Because I remember Liu Haotian once said that their system uses supercomputers for layer-by-layer encryption, and it would take at least half a year to crack it, but I didn't expect that they would put the original code in a very hidden corner.
In other words, no matter how they encrypted the source code, they made a fatal mistake, which was to hide the real source code in the form of an ordinary file outside the unencrypted system.
They thought it would be impossible for others to discover it, but we just discovered it.
I don’t know if they did it on purpose or if it was an oversight, but in the end we achieved our goal.”
Zhu Liang was a little confused after hearing this, because he didn't expect things to go so smoothly.
After pondering for a moment, he asked: "Do you have any suggestions for this source code?"
Zhang Shengli said in a deep voice: "I suggest that the headquarters try to run the source code first. If it is confirmed that these source codes can drive the Donglin Virtual Industrial Park project we built before, then we only need to use our technology to
Through encapsulation and super-strong encryption, we will no longer need the authorization of Liu Haotian and Tianhe Virtual Industrial Park in the future. Our virtual industrial park project platform can still continue to operate and will not affect our subsequent development."
Zhu Liang's eyes suddenly brightened after hearing this, and he immediately called to urge the delivery personnel to speed up.
For Donglin Group, every minute and every second is precious now, because they are under pressure from investors from all sides every minute and every second. If they can get the virtual industrial park project back to normal operations
, then with the strong strength and connections of their Donglin Group, this risk should be resolved quickly.
Two hours later, the data was finally sent to the headquarters of Donglin Group. Zhu Liang found top technical talents within the group to immediately conduct a trial run of the data. Soon, the technical staff of Donglin Group discovered that these source codes were in
After a trial run, it was actually able to drive all their previous projects, and it ran smoothly without any obstacles.
In other words, these source codes are completely authentic.
Zhu Liang immediately became excited.
At this moment, it was already around 7 a.m. on the second day.
Although Zhu Liang didn't sleep all night, he was in very good spirits. He immediately arranged for his staff to super-encrypt the existing source code, and also arranged for the group's publicity department to hold a press conference three hours later.
At the press conference, he wanted to officially announce that the driver program developed by Donglin Group was officially launched.
As soon as this press conference ends, Zhu Liang believes that the crisis of Donglin Group will be easily resolved.