typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

hk159 Premeditated Second Cyber ??War (monthly ticket 440

. Facing Li Kunning’s inquiry, Li Chai fell into deep thought and could not make a decision for a while.

Seeing that Li Guai didn't move, Li Kunning once again made a big deal.

"Xiao Li, if you come to the Department of Mechanical and Electronic Engineering, our department's laboratory will be open to you. Moreover, we can also set up a research project on fuel-controlled remote-controlled helicopters, and you will personally serve as the team leader of this project!"

Li Cai's breathing was stagnant. After this condition came out, he could no longer refuse!

"Professor Li, are you serious?"

Li Kunning nodded, "However, Xiao Li, you can only choose me as your graduate tutor!"

After a whole morning of discussion, Li Kunning's skills have been recognized by Li Chai. He nodded: "Professor Li, I agree to transfer to another department!"

Li Kunning laughed loudly: "Okay, okay! Let's go through the department transfer procedures today! By the way, my daughter will be your class teacher, right? In this way, the procedures for issuance will be very simple!"

Shi Lei felt relieved for Li Cai. This was Li Cai's opportunity. With Li Cai's level, his future achievements would definitely not be low.

After lunch, Li Zhiyue was called by her father Li Kunning to go through various procedures. Even Xiao Lizi was brought along. Shi Lei returned to Jingyayuan full of resentment.

In Room 2003 of Jingyayuan, Shi Lei first unlocked the behavioral dynamic capture program of Server No. 1, connected to Shuangqing University's public server, logged into the school's on-campus forum, and took a look at the school's gossip news.

Life in college is so boring, and all the gossip in the forums is just nonsense from those stupid people!

Shi Lei browsed the school forum. After a period of downplay, his legend no longer existed in the forum, and he had been forgotten by the world!

The hot topic in campus forums recently is the campus lunchtime radio program. Zhu Dan, from the Department of Journalism and Broadcasting, reorganized the program and achieved unexpected success.

The campus lunchtime radio program basically invites one well-known figure in the school for each issue. It is not limited to students, but also teachers. For example, Dean Ji Mingyi of the Department of Computer Science has appeared on the midday radio program.

After reading the campus forum for a while, there was nothing that Shi Lei was interested in. Shi Lei used Shuangqing University's public server as a springboard to open the Hacker Alliance's homepage to view the latest developments of the Hacker Alliance.

The Hacker Alliance is the vane of the Xia Kingdom's hacker community, and their trends, to a certain extent, represent the trends of the Xia Kingdom's hacker community.

Shi Lei logged into the Hacker Alliance forum with Blackstone's ID. After logging into the forum, a series of beeps appeared. Shi Lei opened the information system and found that he had been promoted from a formal member to an internal member. In other words, he was considered a hacker.

It's within the alliance, and I have more or less say in the hacker alliance.

The number of registered members of the Hacker Alliance originally exceeded 150,000. After the last riot in Tokyo, the number of registered members has almost doubled to 300,000! The number of official members has not increased much and is still 33,000.

There are more than a thousand people. One more internal member has been added, and that is Shi Lei!

Although the Hacker Alliance has an overwhelming number of registered and official members, they only have 461 internal members, including Shi Lei's Blackstone Vest.

Judging from the number of internal members, we can also know that internal members have much greater authority than formal members.

After becoming an internal member, Shi Lei entered the hacker alliance's internal forum openly, without having to log in secretly like before.

The internal forum has an online member communication area. Shi Lei just entered the internal forum, and several online internal members sent welcome messages at the same time, expressing their welcome to join him as a new member.

Shi Lei responded politely and said modestly that he was new here and hoped that these seniors would take care of him.

One of the internal members named Hei Ji posted the website address of the Hacker Alliance on the public screen, and issued a question: Our alliance is about to attack the Wosang Kingdom again, do you brothers have time?

The Hacker Alliance achieved great success in the last intrusion operation. Not only did it gain fame, but its registered members doubled, which is a real benefit. Although the Hacker Alliance is a pan-alliance non-profit organization, it is composed of

The ten core members within control the entire alliance, but that doesn’t mean it’s not profitable!

In fact, hacker alliances make a lot of money!

For example, the traffic brought by popularity has led some advertisers to find the Hacker Alliance and place some advertisements on the Hacker Alliance website.

Some network security companies invite hacker alliances to test their new products, or system vulnerabilities, etc., and they also need to pay a high fee. There are also some hidden channel income, allowing the ten core members of the hacker alliance to make a lot of money

!

Precisely because of the motivation of interests, and the last time they invaded Wosang Country, the other party's hackers did not resist at first for some unknown reason, and later the resistance was very small. Therefore, the core layer of the hacker alliance was ready to launch another attack.

The second cyber war against the Wasang Kingdom.

Shi Lei opened the web page to check, and it turned out to be a war preparation notice. This notice can only be seen by internal members. Official members and registered members do not have permission to view it. Registered members are basically cannon fodder. Before the battle, the alliance will issue attack tools.

Let them hold the tools and win with numbers.

As for the official members, they have independent offensive capabilities, but their technical strength is uneven. The alliance will provide a shelter server and let them cause trouble at will.

The real backbone of the Hacker Alliance is its internal members!

After Shi Lei read the news, he secretly wondered, what is the Hacker Alliance trying to do? Do they want to provoke a cyber war between the two countries?

In fact, the reason for the hacker alliance's move was still because of Shi Lei!

Shi Lei used Lucifer's vest to harass NHK TV station over and over again in Wosang country, and also humiliated Yasukuni Shrine, the holy land of Wosang country. This made NHK TV station angry, and then approached the International Intelligence Bureau of the Ministry of Foreign Affairs.

They tracked Shi Lei and tried to catch him.

However, Shi Lei was extremely cunning and technically powerful. He led a group of JFS tracking experts and eventually blamed the Hacker Alliance.

The Hacker Alliance suffered an unthinkable disaster. They fought fiercely with the experts of JFS, and finally managed to beat back the experts of JFS. In other words, the experts of JFS also voluntarily withdrew after knowing that they were teased by Shi Lei!

After being beaten up by the experts of JFS, the bosses of the Hacker Alliance were very unhappy, so they decided to launch a second war to teach the guys of Wosang Kingdom a lesson!

This time to attack the Wosang Kingdom, the Hacker Alliance not only plans to attack on its own. There are three second-generation hacker organizations. The Hacker Alliance is the most active and represents the hacker community of the Xia Kingdom. The other two are the Dark Night Dynasty and the Dafa.

Xia Alliance.

These two hacker organizations are determined to learn from the first-generation hacker organizations and hide themselves from others. Although these two second-generation hacker organizations have not appeared much, their strength is very powerful. Compared with the Hacker Alliance,

That said, it’s just a slight difference!

This time, the Hacker Alliance sent an invitation to the Dark Night Dynasty and the Daxia Alliance, asking them to work together to deal with the hacker community of the Wosang Kingdom.

In the hacker community of the Xia Kingdom, the individual quality is not as good as that of the Wosang Kingdom, but the overall strength and quantity are higher than those of the Wosang Kingdom. The population advantage of the Xia Kingdom is here, and the Wosang Kingdom cannot match it!

If three second-generation hacker groups attack together, they will definitely be able to severely damage the civilian Internet network of Wasang Country, and will also cause trouble!

It's a pity that the Dark Night Dynasty and the Daxia Alliance seemed determined to move closer to the first-generation hacker organization. They focused on hiding themselves and cultivating in secret, and did not agree to the hacker alliance's invitation.

The Hacker Alliance naturally refuses to give up just like that. Since the second-generation hacker organization will not participate, it can invite the most active third-generation hacker organization. Although the technical strength of the third-generation hacker organization is somewhat weak, they have a large number of people, including

There is no shortage of juniors with amazing skills.

The Hacker Alliance contacted the four most powerful third-generation hacker organizations, namely the Shengshi Dynasty, the Shadow Assassin, the Violent Tribe and the Black Phantom. After receiving the invitation from the Hacker Alliance, these four third-generation hacker organizations wanted to

Without thinking, I agreed to join the action.

In the early stages of the last cyber war in the Wosang Kingdom, they were also the protagonists of the war and reaped some of the benefits. This time the Hacker Alliance was in the front, so why didn't they follow and make a fortune?

Representatives of the four third-generation hacker organizations notified members of the official website and above about the attack in the internal forums of their official websites. Not only that, these four third-generation hacker organizations also brought together people with whom they usually work.

The hacker masters with whom I have close relationships, as well as other small and medium-sized third-generation hacker organizations, have formed a huge hacker lineup. Because of this, the news that the hacker alliance is preparing for the second cyber war has spread like wildfire!

Using different identities, Shi Lei hacked into the internal pages of various hacker organizations' official websites and checked the plans for the second invasion of the Wosang Nation's network.

If this plan is really implemented, the country of Wosang will be in serious trouble!

Of course, this is a situation where the hackers established in the Wosang Kingdom did not resist in the early stage like the last time, but failed to resist in the later stage. If they had tried their best to resist from the beginning, then I am afraid that the Internet networks of both parties would have suffered disasters at different levels!

Shi Lei didn't care about the disaster or not, but he was thinking about what benefits he could get from this war.

The Hacker Alliance, as well as the four major third-generation hacker organizations, can gain enough fame from this war to take their organizations to the next step. This is their motivation to launch the war.

Some lone masters join this war, perhaps because they want to be famous, perhaps because they want to satisfy their desire for destruction, or perhaps because they want to steal some information.

Shi Lei thought to himself, what benefits could he get from such a great opportunity to fish in troubled waters?

Maybe, he can

(To be continued. If you like this work, you are welcome to become a registered member of Piaotian Literature to recommend this work. Your support is my biggest motivation.)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next