typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

hk112 Steal Canon technical data!

The tracking experts from the International Intelligence Bureau of the Ministry of Foreign Affairs of Wasang paused for a moment after tracking down the server of the Hacker Alliance. They obviously regarded Shi Lei as a core member of the Hacker Alliance, and Shi Lei's framing of the crime was very successful!

The tracking expert only paused for a moment and contacted colleagues who specialized in intrusion attacks to help attack the hacker alliance's servers.

The Asahi Shimbun and Yomiuri Shimbun of Wasang Country are controlled by two trios from the Hacker Alliance. In the Hacker Alliance's internal voice channel, Black Blade said with a smile: "Brothers, we can take a breather.

I'm sorry, the grandsons of the Ministry of Foreign Affairs' International Intelligence Bureau were led away by the great god Lucifer. I just don't know if Lucifer can escape in the end!"

Heihu, the second in command of the alliance and the leader of the team, said: "Boss, judging from the strength Lucifer has shown, he should be able to easily escape tracking!"

Black Panther agreed: "Second brother is right, the strength shown by Lucifer is too powerful! The defense force of NHK's official website was actually pierced by him like a blank sheet of paper. NHK's internal security department

, there is absolutely no way!”

"Boss, it's bad!" Heiqian suddenly said, "Boss, our server has been attacked, and it is suspected to be the grandson of the International Intelligence Bureau of the Ministry of Foreign Affairs!"

"What!" Black Blade exclaimed, "What's going on! We didn't provoke the International Intelligence Bureau of the Ministry of Foreign Affairs at all, and didn't they go after Lucifer?"

Black Panther had a bad feeling in his heart, "Boss, do you think it was Lucifer who put the blame on us?"

Black Gun shouted: "Boss, Second Brother, Black Hand, let's go back to defense together! Our team is almost unstoppable!"

"Everyone return to defense! Damn Lucifer!" Black Knife snorted angrily. The seven core members of the Hacker Alliance immediately gave up their missions, took their own chickens, and returned to the Hacker Alliance's server to return to defense.

.

Black Wolf felt a twist in his heart. Something called hatred slowly grew in his heart, and he roared angrily: Lucifer, it's you again! I must catch you, and I must take revenge on you.

!

The International Intelligence Bureau of the Ministry of Foreign Affairs issued an emergency press note through NHK TV station. They only announced one piece of news. The hacker who invaded NHK national TV station was suspected to be a core member of the Hacker Alliance. Currently, their tracking experts are closely encircling the hackers.

Once they break through the hacker alliance's server, everything will be revealed.

Sitting in front of Server No. 1, Shi Lei looked at the Hacker Alliance and the International Intelligence Bureau of the Ministry of Foreign Affairs of Wasang with a smirk, using an internal server of the Hacker Alliance as the battlefield, fighting you to the death!

The strength of the International Intelligence Bureau of the Ministry of Foreign Affairs of Wasang has only been shown to be one-tenth at most. The Hacker Alliance can still withstand it. Shi Lei doesn't care about them for the time being. He has more important goals.

After the second step of framing the blame was completed, Shi Lei began to implement the third step of the plan to invade Canon!

The most fundamental trigger for this drama of hackers from the Xia Kingdom wreaking havoc in the Wosang Kingdom is Canon, Canon's Inu Ichiro. If Koinu Ichiro had not exposed Shi Lei, Shi Lei would not have fueled the cyber war behind the scenes.

.

Although the losses of the Wosang Kingdom have been very heavy, Shi Lei is not satisfied. Canon, who was the trigger, did not suffer any damage. This is simply ironic!

Shi Lei connected to the supercomputer Yan and the first-class broiler from ACCESS. The combined performance of the two powerful broilers secretly attacked Canon.

Shi Lei's target is Canon's technical data, especially optical equipment and digital camera technical data. Although Shi Lei doesn't like the brats from Wosang Country, he has to admit that Canon ranks first in the world in the field of digital cameras.

leading position.

If you could hack into Canon's interior and obtain the technical information of Canon's R&D department, that would be a great development!

The main computer of Canon's R&D department is also a supercomputer, and its computing performance is very advanced, almost one-fifth of the supercomputer Yan, ranking more than 300 places in the global supercomputer rankings.

It is very difficult to invade such a powerful supercomputer. Even if Shi Lei controls Yan, the ninth-ranked supercomputer in the world, it will be very difficult!

The reason why these giant oligarchs in the high-tech confidential technology industry, telecommunications industry, and financial industry like supercomputers is because supercomputers are safe!

Shi Lei controlled the supercomputer Yan and wandered around Canon's official website without immediately invading the interior. He was looking for the most appropriate time to find a gap in Canon's security defense.

From Canon's official website, Shi Lei carefully entered Canon's Human Resources Department server and searched for the personnel information of the R&D Department in the Human Resources Department server.

Before a hacker invades, you need to be fully prepared so that you will not rush to deal with emergencies. Canon's Tokyo headquarters has a total of more than 3,000 R&D personnel, who are distributed in various research institutes in Tokyo.

Corresponding research data is stored in these studies, but the main computer of the R&D department at Canon's headquarters also stores R&D data. However, the main computer of the R&D department is very closely guarded. If you want to enter the main computer of the R&D department,

It's not that simple!

Shi Lei searched for the information of the R&D Department in the Personnel Department, and then a smile appeared on his lips. There is a saying in Xia State that a strong defense often collapses from within!

Canon's external defense is indeed very strong. It can even be described as abnormal. It is definitely not the paper defense like the official website of NHK TV station!

Unfortunately, such a powerful defense system also has a weakness, that is, insufficient internal defense! Shi Lei found out the identities of several senior researchers from the Canon headquarters and R&D department in the server of the Personnel Department. Then he invaded the internal complete defense system.

, after intercepting the account numbers and passwords of those senior researchers from the internal security defense system, they unknowingly bypassed Canon's defense system and entered the internal system of the R&D department.

The internal system of Canon's R&D department, according to the permissions of the senior researchers mobilized by Shi Lei, cannot obtain information other than their research at all, but Shi Lei is a hacker!

Shi Lei secretly bypassed the system authentication and took advantage of the system authorization loophole to secretly temporarily weight the senior researcher's permissions, temporarily allowing the senior researcher to access information on other research projects.

Supercomputer Yan's computing power exceeded that of the R&D department's supercomputer, and the two sides fought fiercely. The system authorization vulnerability continued to take effect under the protection of supercomputer Yan.

Shi Lei quickly entered the code on the keyboard and searched for research on optical technology and digital camera-related technology in the R&D department. Under the conditional filtering restrictions, a large number of technologies related to copiers, fax machines, medical equipment, etc. were eliminated, leaving only

Obtained the digital camera technology and optical technology that Shi Lei needed.

Even if only optical technology and digital camera technology are left, the file data size calculated by the system exceeds 200GB!

Canon's supercomputer strictly limits the flow of data. Although Shi Lei can now easily check this information with the help of supercomputer Yan, there is no way to take it away. Because once Canon's supercomputer detects data flowing through external connections,

An alarm will sound!

Shi Lei was troubled when he saw more than 200GB of data. All of these data were from the Jinshan Silver Mine. If they were not moved away, Shi Lei would definitely not be willing to do so. How could there be any reason to enter Baoshan and return empty-handed?

However, Canon's supercomputer has strict data flow restrictions. This restriction comes from the hardware device, and trying to suspend it through software will only cause an alarm!

Shi Lei scratched his head. Even if he was given the super power of photographic memory at this moment, it might take several months to read through more than 200GB of data! Not to mention that without the ability of photographic memory, how could he have the time?

To remember?

"What should we do?" Shi Lei looked at the computer screen and said to himself.

Suddenly, Shi Lei thought of a story about a child who deceived people. This story was widely circulated in the Xia Kingdom, and it told the story of the boy who cried wolf!

Shi Lei decided to use the story of the boy who cried wolf to test Canon's internal security department. He controlled the supercomputer Yan and created a virtual data package in the supercomputer of Canon's R&D department. Then he sent this virtual data package to

Send out randomly.

Canon's internal security department immediately discovered that the R&D department's supercomputer was transmitting data. They immediately took action and closely monitored the supercomputer, but found that no data was flowing out at all.

Canon's internal security department, which was highly vigilant, relentlessly investigated the entire supercomputer, but found no problems and finally gave up.

When they gave up, Shi Lei increased the size of the virtual data packet, raising it to 10GB in size, and then randomly sent data out again.

The huge data flow caused Canon's internal security department to issue a crazy alarm. The traffic monitoring hardware alarm system calculated that the amount of data was 10GB. However, after the internal security department intervened in the investigation, nothing was discovered. The R&D Department

There is no abnormality in the supercomputer, no loss of internal data, and no traces of copying.

After Canon's internal security department relaxed a little, Shi Lei once again increased the size of the virtual data package to 100GB, and created another random transmission data.

The traffic monitoring hardware alarm, Canon's internal security department, once again thoroughly investigated the supercomputer of the R&D department, as well as the research data in the supercomputer. However, those traffic flows were all virtual data constructed by Shi Lei, leaving no trace at all.

Traces. How can Canon’s internal security department detect the problem?

After repeating this for more than ten times, Canon's internal security department got tired of it. When the traffic monitoring hardware issued an alarm again, they didn't even check it.

Shi Lei knew the opportunity had come!

(To be continued. If you like this work, you are welcome to become a registered member of Piaotian Literature to recommend this work. Your support is my biggest motivation.)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next