typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

hk428 ignite the beacon of strength!

. Shi Lei and the International Intelligence Bureau of the Ministry of Foreign Affairs are currently at odds with each other, and there is basically no possibility of reconciliation.

The International Intelligence Bureau of the Ministry of Foreign Affairs wants to investigate the situation of Mr. M from Shi Lei so that the information of the Robot project can be recovered. It is best to use Mr. M to get rid of the earthquake hacker EQ.

For this reason, and because Shi Lei is Mr. M, how can he reconcile with the International Intelligence Bureau of the Ministry of Foreign Affairs?

Tianyue Hotel, top floor of the 66th floor, room 6606.

Shi Lei took out all the accessories from the kraft carton. When packing the AIP artificial limb, he very considerately packed all the accessories in a smaller carton to facilitate the storage of various spare accessories.

The accessories of the AIP artificial intelligence prosthesis include four behavioral dynamic collection cameras, two flat glasses and two brooches; two spare rechargeable batteries to replace the batteries in the two prostheses respectively; a manual; a warranty card;

Finally, there is a guidance CD that guides users through the entire process of self-installation of AIP artificial limbs.

"Mr. Liu, please arrange for relevant personnel to study this CD. He will remove the prosthetic limb for you every night and put it on for you in the morning. By the way, if any malfunction occurs with the artificial intelligence prosthetic limb, please directly follow the phone number in the instruction manual.

Get in touch with us and do not disassemble the artificial intelligence prosthetic limb without permission. Because we have preset anti-disassembly measures, a specific engineering mode is required before the artificial intelligence prosthetic limb can be opened." Shi Lei gave final instructions.

In fact, Shi Lei hasn't finished talking yet. The anti-disassembly measures of AIP artificial intelligence prostheses are very strict. If the AIP artificial intelligence prostheses are disassembled without specific password authorization, the built-in system will automatically delete all data and start a backup project.

Battery, short circuit destroys some circuits and electronic components.

Xia State is indeed very poor in the research and development of electronic products, but Xia State has a unique trick, which is copycat imitation. Once advanced finished products are available, Xia State's electronic manufacturers will start copying them one after another.

Although AIP artificial intelligence prostheses are based on a behavioral dynamic simulation system and cannot be imitated by copycat manufacturers, Shi Lei has still set up very strict protection measures. As a precaution, the more stringent the better!

Near noon, Meng Xun was the host and ordered room service to deliver various expensive dishes to the executive suite on the top floor.

Shi Lei coughed lightly and said, "Sorry, I have to go to the bathroom first."

In the bathroom, Shi Lei took out his phone and pressed the number key '5' to contact Yizuer, a low-level pseudo-artificial intelligence.

"Sir, Yizuer is at your service!" Yizuer's synthetic electronic voice sounded quite cold. This is because Yizuer's basic logic application module does not include a human emotion imitation module.

The human emotion imitation module has no practical use other than allowing Yizuer to imitate human emotions. Moreover, the program code of the human emotion imitation module is very complex and has great basic requirements on computer hardware.

For a function that has no practical use, Shi Lei will not write the corresponding human emotion simulation module for the time being. It is a complete waste of time!

"Yizur, controls the No. 2 server and launches an attack on Lijianguo's network through the broiler network. Attack condition restrictions: first, websites with IP daily views exceeding 100,000 and less than 1 million; second, excluding military networks

, government networks; third, attack the media industry network first; fourth, the attack method is to destroy data, after breaking the server defense, directly clear all data on the other party's server, and control the power supply scheme, adjust the voltage of each component, and burn the hardware!

"

The so-called controlled power supply burning hardware is definitely not a joke. For example, in the currently popular hardware overclocking, the core voltage of the CPU is generally only a little more than 1V, and the maximum cannot exceed 1.65V. If the power supply scheme is tampered with, 2V is provided to the CPU.

, or even a voltage of 3V, then the CPU will be burned out!

The black magic software written and designed by Shi Lei has an insidious design to control the power supply scheme and tamper with the motherboard BIOS information to make the power supply system unstable and cause serious damage to the hardware.

"Sir, please confirm the time to execute the order and the conditions for suspending the order." Yi Zuer reminded Shi Lei and set more specific order conditions.

"Start executing the command immediately! The condition for stopping the command is to protect the server from being attacked. When the load reaches 70, immediately clear the connection records of all broiler servers. If the records cannot be cleared, discard the broilers with uncleared records!" Shi Lei added the settings

Certainly.

"Sir, command accepted. Attack targets are being selected, and the control broiler network is being initialized. The attack is expected to officially begin in 2 minutes and 48 seconds."

Shi Lei hung up the phone and deleted the call history. The contact between Shi Lei's mobile phone and Yizuer was not through mobile phone signals, but through the WAP network. After Shi Lei deleted the records on his mobile phone, Yizuer would synchronize

Delete the records in the network. This method of communication is far safer than using a mobile phone to communicate.

Coming out of the bathroom, Shi Lei accepted the lunch invitation with a smile on his face, creating an alibi for himself.

Even if Mr. M is eventually suspected of Li Jianguo's affairs, nothing will happen to Shi Lei. After all, Shi Lei has a sufficient alibi and is completely disconnected from Mr. M's identity. But this time, Shi Lei did not

I don't plan to let Mr. M jack the cylinder, but there are other candidates.

The Western General Bureau of the Cyber ​​Security Bureau, Ling Yumo's father, Ling Yuguo, the Western General Director, is checking the situation in Li Jianguo. Li Jianguo's network was attacked, and as one of the four major network security bureaus in the Xia Kingdom, Ling Yuguo immediately received the situation.

In the Lijianguo network world, many IP websites with daily visits exceeding 100,000 and less than 1 million have been attacked by a large number of attacks.

Due to the time difference between Li Jian Guo and Xia Guo, there is a full 12 hours difference based on New York time. When Xia Guo was having lunch, it happened to be around early morning in Li Jian Guo.

Early in the morning is generally a time when hacker intrusions are most common, because how can the security guards of ordinary servers guard them 24 hours a day?

Facing a server without security personnel on duty is definitely much easier than a server with security personnel on duty.

Although Yizuer is a low-level pseudo-artificial intelligence, it has a basic logic application module after all, and can decide some things independently according to the rules predetermined by the program.

For example, Shi Lei limited the conditions and asked Yi Zuer to attack Li Jian's network. Yi Zuer first used black magic software to capture a large number of temporary broiler servers in the Internet world.

Although these temporary broiler servers have no quality to speak of, Yi Zuer captured more than 10,000 temporary broiler chickens in a short period of time.

The number of temporary broilers of more than 10,000 is close to Yizuer's control limit. After all, the No. 2 server is not a large supercomputer, and its computing performance is not very outstanding. It can only support Yizuer's control of more than 10,000 broiler servers.

Controlling more than 10,000 broiler servers, Yizuer's energy has expanded dozens of times!

It immediately followed the conditions restricted by Shi Lei and stirred up troubles in the Internet world of Li Jian. The first one to bear the brunt was the official website of CBS, a famous broadcasting company in Li Jian.

The number of views of CBS is not very large, barely 200,000 IP daily visits. In the first round of attack, Yizuer controlled more than 10,000 broiler servers, formed a broiler network, and launched a wave of DDOS flood attacks.

Yizuer does not intend to rely on flood attacks to crack the official website of CBS. After all, CBS has a professional DDOS software firewall. Yizuer just uses the huge amount of data to let the DDOS software firewall take up a lot of system resources, and then uses the black magic software.

, penetrate the real security firewall and enter the web server.

After entering the web server, Yi Zuer continued to enter the data server and application server through the internal network. After controlling the three servers at the same time, Yi Zuer finally executed the data deletion plan.

Low-level formatting takes a very long time. For example, for an ordinary 500GB single-disk mechanical hard drive, it is normal for low-level formatting to take several days.

Naturally, Yi Zuer would not wait for such a long time. According to the attack mode of the Moon virus, when the hard disk is low-level formatted, the power supply of the hard disk will be suddenly interrupted, causing the data in the hard disk to be lost, and even causing physical damage to the hard disk.

After killing the hard drive, he continued to control the power supply scheme, tampered with the BIOS power supply settings, and continued to destroy the CPU and memory modules!

In the server room of CBS, the disk array cabinet made abnormal mechanical noises. This was caused by the hard disk being low-level formatted and the power supply suddenly stopped.

There was an unpleasant burning smell in the motherboard's engine compartment. This was the reason why the CPU and memory modules were burned by high voltage!

CBS was the first to be tricked and quickly fell to Yizuer's attack. Yizuer did not leave any information and shifted the focus of the attack to other websites.

In the Western Bureau of the Cybersecurity Bureau, Ling Yuguo looked at the information on the computer screen and felt a chill in his heart. From the time CBS was detected to have been hacked to the time it fell, the total time did not exceed 3 minutes!

"Which top team is looking for trouble with CBS? Could it be CBS? What things have been reported recently that made them unhappy?" Ling Yuguo murmured to himself.

However, the monitor of the Western General Administration once again reported to Ling Yuguo that many websites in Lijian State were attacked at the same time!

"Who is it?" Ling Yuguo was confused, but inexplicably, a name emerged in his mind.

(To be continued. Please search Piaotian Literature, the novel will be better and updated faster!)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next