The Nanchao Kingdom is one of the neighbors of the Xia Kingdom. Its territory is only one-ninety-sixth of the Xia Kingdom, and its total population is about one-twenty-sixth of the Xia Kingdom.
If you weren't particularly bad at mathematics, you could easily calculate that the per capita land area of the Southern Dynasties was smaller than that of the Xia Kingdom.
However, it is such a small country with a small land and limited resources, but it has created a series of miracles and become a developed country that has attracted the attention and recognition of the world!
That’s right!
South Korea is a developed country! It is recognized as a developed country by the World Bank, the International Monetary Fund, and even the CIA of the United States.
According to the ranking of the Human Development Index, Nanchao Kingdom has been ranked in the top 20 for a long time, while Xia Kingdom’s Hong Kong Island and Macao Island have long occupied the top ten positions. As for the main body of Xia Kingdom, due to some reasons, it has always been
It fluctuates around a hundred people.
The highly developed Southern Dynasty country's policy that supports the country's economic lifeline is the 'export-led strategy. The Southern Dynasty country relies on various advanced technologies to manufacture world-leading products, and then exports and dumps them all over the world to maintain the country's economic development.
The most famous company in the Southern Dynasties is the famous Samsung. In later generations, the mobile phones manufactured by Samsung achieved the highest market share in the world. Even the Phane series of mobile phones manufactured by Amale Company did not end the rise of Samsung.
However, Shi Lei's goal this time is not Samsung for the time being!
As a large semiconductor electronics industry group with a market value of nearly 100 billion, how could Samsung succeed if they didn't excel in electronic defense?
Every giant company in the world, especially in the electronics industry, must have at least one of the world's top experts in charge of its network defense.
Most of these top experts in the world are government security experts. These government security experts have chosen some well-known companies to work part-time. Since government security experts are not hackers who cannot be exposed, they can appear in daily life.
, you can do some network security-related things openly.
Therefore, the heads of well-known companies can freely meet with security experts and have face-to-face conversations, and they can know everyone’s identity. Therefore, well-known companies do not care that these security experts belong to the government, and they are not afraid that these security experts will steal the company.
confidential information.
Which world-renowned company does not have some secret power? If a security expert knows everything about it, would he still dare to act as a two-faced person? That is probably the rhythm of implicating the Nine Clans!
In addition to these part-time security experts, only a handful of electronic industry groups have their own world-leading security experts. As far as Shi Lei knows, Samsung Group has their own world-leading security experts, and not only
One! According to the speculation of the Angel Council, Samsung Group has at least six world-class security experts, of which at least three are top-level security experts in the world.
The rise of Samsung Group is not unrelated to the network security services provided by these security experts!
Shi Lei's target for invading the Southern Dynasties this time is only four online game manufacturers, not the behemoth Samsung. As for the future, if there is a chance, Shi Lei will naturally not let go of the Samsung Group.
The time zone of Xia Kingdom is UTC8. The time zone of Southern Dynasty Kingdom is UTC. Please search Piaotian Literature, the novel will be better and updated faster!|To be continued.+?Reading.·Xia Kingdom time is 11:30 late at night, and Southern Dynasty Kingdom is already 0:30 in the morning .This period of time is an absolute sleep time for ordinary people. However, for hackers, the dark night provides them with the best cover.
The vast majority of hackers usually like to operate in the dead of night. This does not mean that they must operate at night, but that most hackers are used to operating at night.
Shi Lei does not have a fixed time preference. Whenever Shi Lei wants to invade, he will invade immediately. Now Shi Lei is not in a good mood. He controls some resources of the IWN secret network, spanning the Xia Kingdom and the Southern Dynasty. The network barriers between countries entered the network of the Southern Dynasties.
There are a total of four Southern Dynasty forces participating in the anti-dream entertainment alliance. They are NNxwn, NCaftNNmwz, and Snrilegate. Among them, NNawnz and SnrMeqate are the absolute main forces. These two companies have a closer relationship with the Big Penguin Company and they are involved. More hacker forces are involved.
Shi Lei's main targets were NNawz and Snrlegate. As for NCuaft and NNxwn, Shi Lei just spent a little time and invaded the main server through their official website homepage. He just put the moon virus into the main server and ignored them. .
The harm of the moon virus is very serious. By repeatedly low-level formatting the hard disk, it finally achieves the purpose of physically destroying the hard disk. The main target of hackers to destroy computer equipment is the storage device, that is, the hard disk.
For ordinary users, the importance and value of computer storage devices is far less valuable than the central processing unit (CPU), motherboard, or memory and graphics card. After all, the price of a hard disk is only equivalent to one-third or even one-third of the value of a CPU. It's even less. Not to mention the high-end and top-grade graphics card equipment, which is not comparable to the value of a mere hard drive.
However, for enterprise users, the importance of storage devices is far higher than the value of other devices. The data inside the storage device is the truly valuable thing.
There is a saying in the IT world, "Hard drives are valuable, but data is priceless." This saying intuitively reflects the value of data in an enterprise.
The main servers of NCaft and NNxm store a large amount of game development data. After the Moon virus entered the main servers of the two companies, it quickly began to select attack targets.
The attack mode of the Moon Virus against servers has been adjusted and modified to a certain extent by Shi Lei. The storage device of the server is usually a disk array group rather than a single hard disk.
A disk array group is composed of multiple hard disks, and the hard disks running the server system usually do not exist in multiple hard disks. Based on this feature, Shi Lei changed the moon virus's attack plan on the server, from the previous full disk array group The attack became a screening attack.
The Moon Virus will determine the number of disks on the computer, then identify the system disk, protect the system disk, isolate other slave disks, and perform low-level formatting on the slave disks. When low-level formatting the slave disks, the Moon Virus will still be very vulnerable. Insidiously blocks the hard disk data feedback light and simulates the flashing of the hard disk data feedback light under normal conditions.
This insidious setting makes the Moon Virus even more harmful. It can often destroy the slave disk of the server silently, but the main system of the server has no problem.
The main servers of NCaft and NNxm were ravaged by the moon virus, and the data stored in the slave disks inside the servers were erased by low-level formatting.
After Shi Lei finished dealing with NCaft and Nexm, the other party's security personnel did not find that their main server had been attacked. It must be said that the moon virus is becoming more and more sharp, and the attack methods are becoming more and more difficult to defend against.
Although the main servers of NCsaft and NNxan were completely wiped out by the moon virus, Shi Lei knew that the losses of these two companies were not too big. Their real core data was stored in servers isolated from the network environment. Online game manufacturers and operators are not the same.
Likewise, they are not inseparable from the Internet environment. They can develop and produce games in a closed environment.
Shi Lei is not completely helpless in the isolated network environment, but he is too lazy to compete with NCaft and NNxm companies. Shi Lei's main targets are NNawik and Smlegqte.
In Xia Kingdom time, it was late at night and close to early morning. In Southern Dynasty time, it was already close to one o'clock in the morning. Shi Lei followed the same pattern and entered the official websites of Neawz and SnrMeg#te.
The network defense of online game manufacturers is much lower than that of online game operators. The focus is different, and the emphasis on network defense is also different.
Shi Lei did not touch the main servers of the two companies this time. Because Shi Lei knew that there was no valuable data in the main servers. Shi Lei was not as tolerant of NNawz and SnrMeqate as the other two companies. Destroying the main servers of NCuaft and N
Server, rather than destroying their data, it is better to vent their anger.
After controlling the main servers of NNawz and SnrMegate, Shi Lei did not do any sabotage. Instead, he combined the main servers of the two companies and a high-performance broiler server from the Southern Dynasty to form a temporary small server cluster.
Shi Lei controlled some resources of the IWN secret network, injected it into this small server cluster, and then used the small server cluster as the basis to control some resources of the IWN secret network.
It is worth mentioning that Shi Lei did not provide special protection for this small server cluster. Under normal circumstances, the broilers under Shi Lei's control are usually protected by Shi Lei. This is to prevent other hackers or anti-hacker security experts.
, conduct anti-tracing investigations of real IP addresses.
If there are no security protection measures, it will definitely be a big tragedy if a hacker with the real IP address is found. Shi Lei did not set up security protection measures this time. Could it be that Shi Lei made a low-level mistake?
It is obviously impossible for Shi Lei to make such low-level mistakes. Even if Shi Lei makes low-level mistakes, Yizuer will remind Shi Lei and help Shi Lei correct these small mistakes and mistakes.
However, neither Shi Lei nor Yi Zuer cared that the temporary small server cluster had no defense system. There was only one possibility. Shi Lei did it deliberately!
Shi Lei is planning to use this small server cluster to carry out malicious provocations and cause trouble...