typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

hk949 Stinger meritorious service, gold mine secret!

. South Vietnam, National Security Agency.

Ruan Kang, the director of the National Security Bureau, is five years older than Chen Guang this year. Ruan Kang also has some physical defects, which are more serious than Chen Guang's baldness. Ruan Kang is a one-eyed man.

When Ruan Kang was young, he participated in official combat operations and lost an eye. Since then, Ruan Kang worked hard to study network technology, human psychology, and thick black science, and eventually became the director of the National Security Agency.

Now, the National Security Agency's internal network is facing a powerful hacker intrusion. Ruan Kang stood behind Chen Guang and asked about the situation. If the hackers are too powerful and the National Security Agency cannot respond, Ruan Kang can only choose to cut off the National Security Agency's external network.

Physical connection.

"Brother Kang, the current situation is not good!" Chen Guang said in a frustrated tone, "The intruders are very powerful. Our defense system is under tremendous pressure. The computing resources of the main server are almost unable to bear it.

, I have ordered the activation of four sets of backup servers and also enabled the remote assistance system."

"Who is the other party?" Ruan Kang asked cautiously.

There was a gloominess in Chen Guang's tone, "Brother Kang, so far, we have not found any clues about the other party's identity, nor the other party's connection IP address, let alone the real IP address."

Ruan Kang had a look of shock on his face. He knew that Chen Guang had world-class hacker strength. If Chen Guang couldn't find any clues, could the other party be even more powerful?

"Old Chen, you are talking about the other party's strength..." Ruan Kang did not say it out loud. There were others around them. If this news spread, it would have a heavy blow to the morale of the National Security Agency.

There seem to be many top hackers in the world around the world, but for small countries, the top hackers in the world are nothing more than a legendary myth.

Hackers also have a legacy. Only a very small number of geniuses can be self-taught and reach the top of the world. There are very few such people in the world.

The population of South Vietnam denies the possibility of such a genius appearing in South Vietnam. South Vietnam also has no external help for their hacker community, so South Vietnam does not have world-class hackers!

If the world's top hackers invade the Internet network of South Vietnam, South Vietnam can only rely on its huge numerical advantage and its obvious hardware performance to stop the world's top hackers. Otherwise, they will completely

There is no chance to stop the world's top hackers.

"That's right! From the other party's intrusion form, I have already deduced that the situation is as you guessed." Chen Guang sighed a little in his heart. He has reached the level of a world-class hacker for a long time, but he has never broken through this stage. The reason

It's just that Chen Guang no longer knows how to make a breakthrough, doesn't know which direction he should work towards, and doesn't know what technology he should learn.

Now, facing a world-class hacker, Chen Guang was both worried and excited. The reason why he was worried was because he was afraid that the defense system of the National Security Agency of South Vietnam would not be able to stop this world-class hacker, thus causing

Confidential information was leaked. As for the reason for excitement, it was that he could face off against a top hacker in the world. He tried to learn some knowledge about the top hacker in the world from this confrontation!

Ruan Kang's face became a little ugly, "Old Chen, can we stop it? If we can't stop it, cut off the physical connection to the Internet as soon as possible to ensure the security of our confidential data!"

Chen Guang thought for a while, but before he could answer, one of his capable men said loudly: "Manager Chen, it's not good, it's not good, the attacker's attack intensity suddenly increased, exceeding 900tflops!"

"

"What?" Chen Guang's face changed drastically, "900tflops! How is this possible, how is this possible!"

The amount of computing resources of 900tflops is really terrifying!

Ruan Kang's face is also quite ugly. Although Ruan Kang's technical strength is only close to first-class, he is still a first-generation hacker and knows a lot of common sense in the hacker world.

For example, there are almost no hackers who can call 900tflops! Except for one situation, that is official hackers. Only official hackers can call such powerful resources.

Otherwise, even if the world's top hacker wants to gather 900tflops of resources, it will be impossible. After all, even if the world's top hacker hacks all the top ten supercomputers in the world, he will not be able to gather so many.

Computing resources.

Hacked supercomputers cannot be used on a large scale. For example, a supercomputer with 200tflops, after being hacked, can only use 20% of its daily usage at most. Once this warning line is exceeded, it will be very easy to be discovered.

.

Of course, if the daily workload of this supercomputer does not occupy too many computing resources, then it can be used however you want. However, how can an institution with a large supercomputer spend huge sums of money to build a large toy?

This kind of thing is impossible at present. As for whether it will happen in the future, please look at Tianhe II, the world's number one supercomputer in later generations. After spending a huge amount of money to build it, how many applications it has been used is really a big question!

Considering all the circumstances, Ruan Kang and Chen Guang of the South Vietnam National Security Bureau could only believe that Shi Lei was an 'official' hacker from another country.

"Hurry up and cut off the physical connection to the network!" Ruan Kang yelled.

Chen Guang looked at the computer screen and smiled bitterly, "Brother Kang, it's too late, our defense system has been torn apart by the opponent!"

"Damn! So fast!" Ruan Kang also expressed his helplessness, "Old Chen, since the other party has broken our defense system, shouldn't it be more appropriate to cut off the physical connection?"

"Brother Kang, look here, the other party has placed a worm in our internal system. I am analyzing the core of this worm to see how harmful it is." Chen Guang captured a prototype of the worm.

It is being analyzed.

As a world-class hacker, Chen Guang can't even catch a worm.

When he began to analyze the harm of the worm prototype, Chen Guang showed a feeling that it was indeed the case, "Brother Kang, this worm has a network communication protocol. Once it cannot access the Internet environment, it will automatically explode, and

It was a devastating explosion."

Ruan Kang also knows the network communication protocol, which is a method used by some clever hackers. Although Ruan Kang cannot make it, Chen Guang can make it.

"That is to say, we can't disconnect the Internet now? Can we disconnect the main power supply and power off all devices?" Ruan Kang said with some uncertainty.

"Yes! However, how much loss will we suffer if we disconnect the main power supply? Brother Kang, even after the power is cut off, we cannot completely eliminate this worm virus." Chen Guang analyzed.

"Then what should we do now?" Ruan Kang has one advantage, that is, he will never guide an expert by an outsider. It is a tragic mistake for an outsider to guide an expert!

Chen Guang showed a look of hesitation on his face, "Brother Kang, I'm afraid we will suffer losses this time. We must find a way to reduce our losses now!"

"Is there any way?" Ruan Kang acted relatively calmly. "As long as the core secrets are not leaked, we can accept other losses."

"Is that so? I feel a little unsure!" Chen Guang quickly started typing on the keyboard, "Brother Kang, don't be idle, come together to help!"

Ruan Kang pulled out an office chair and sat next to Chen Guang. Following Chen Guang's instructions, they began to deal with the worm virus that appeared in the internal network.

The stinger worm virus created by Shi Lei successfully entered the internal network of the South Vietnam National Security Bureau. The first task Shi Lei set for the stinger worm virus was not to destroy it, but to find confidential information. As long as the internal network of the South Vietnam National Security Bureau continues to

If you open a connection to the Internet, the stinger worm virus will not automatically explode.

"Sir, the worm has invaded the second layer of confidentiality of the South Vietnam National Security Agency's internal network, and no important information has been found yet." Yi Zuer reminded Shi Lei of the situation.

The internal network of the South Vietnam National Security Agency is also divided into security levels, and only corresponding permissions can open the corresponding security level space. The sting worm virus has already captured the first and second levels of confidentiality space.

Yizuer will automatically extract potentially important files and pass them to Shi Lei, who will also manually screen them. So far, Shi Lei has not found any files of any importance.

'Damn South Vietnam, no matter how you hide important documents, I will find the documents you want to hide!' Shi Lei sneered in his heart.

South Vietnam, National Security Agency.

Chen Guang and Ruan Kang were defending against Shi Lei's attack and cleaning up the worms in the internal network. They felt like they were overwhelmed and couldn't stop at all!

"Brother Kang, what happened? The opponent's worm broke through the second layer of defense. We need to speed up!" Chen Guang reminded.

Ruan Kang's technical strength was not good, so he smiled bitterly and said: "Old Chen, can we stop the opponent?"

Chen Guang didn't say it was possible or not, he just said: "Brother Kang, don't think too much, let's work harder now, otherwise the losses will be huge!"

Jing Ya Yuan.

Yi Zuer reminded again: "Sir, the worm has entered the third layer of defense space and found suspicious encrypted files. Please check carefully!"

Shi Lei immediately checked the suspicious document. The title of the document was [Border Gold Mine]….

(To be continued. Please search Piaotian Literature, the novel will be better and updated faster!)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next