HacKer

HK1294 Exposure and Stealing, Breaking the Waves and Fighting Pirates!

.

July 28, afternoon. Jingya Garden.

Even if the internal network is isolated from the Internet, there is still no way to stop Shi Lei's invasion. I have to say that Shi Lei took over the Tiandi Xuanhuang Thief Team before, which was definitely a very wise decision.

After easily obtaining the whdi technical information of amimon company, Shi Lei did not plan to sneakily apply it in the VR game helmet, but logged on to the official website of bbc TV station.

Shi Lei hacked the official website of BBC TV by controlling the web server, and then posted an announcement on the homepage of the official website.

The title of the announcement is "whdi.for.free! , which means 'free whdi technology'.

In the announcement, Shi Lei rebuked the Israeli company amimon in English, accusing ammon of being a technology monopoly company that gained a lot of monopoly benefits through whdi technology.

Therefore, as an anonymous hacker, it is the responsibility to stop ammon's ugly behavior and publish ammon's whdi technical information to the world.

In addition to the official website of BBC TV, Shi Lei has also released the same announcement information on major social networking sites and news portals around the world, announcing whdi technology to the world.

Because Shi Lei used an anonymous identity, and Shi Lei's skills were very good, even a master of the same level, he didn't know who it was, and leaked the core confidential information of amimon company.

After the whdi technology was leaked, amimon responded quickly. They first asked the World Intellectual Property Organization for help, hoping that the technical information about whdi would disappear completely from the Internet.

However, their wishes will certainly not come true.

whdi technical information is widely circulated on the Internet, and it cannot be prevented by the World Intellectual Property Organization at all. Besides, there are already a large number of netizens who have downloaded whdi technical materials. What if it is blocked in the network?

Amimon has launched an investigation into the leak of whdi technology, but amimon is very clear that the server where they store technical data is not connected to the Internet at all. For this reason, the top management of amimon is more inclined to the possibility of committing crimes internally.

After all, how can outsiders steal data from internal servers that are not connected to the Internet?

The amimon company after the investigation was launched. It was soon discovered that the surveillance records had been cleaned, a clue that seemed to further point to the internal perpetrators. It is difficult for outsiders to clear the records of the monitoring system if it is not an insider committing the crime.

The reason is that the monitoring system and the server that stores the data belong to independent internal networks, and are also isolated from the internal network of the Internet. How can external personnel control two sets of internal networks that are not connected to the Internet?

amimon company focused on suspecting the possibility of internal crimes. It made Shi Lei less troublesome.

However, making whdi technology public globally is only Shi Lei's first move. Due to patent restrictions and legal reasons, even if the whdi technology is leaked, it is impossible for Dream Entertainment to directly use the whdi technology.

In order to use whdi technology in a fair and open manner, Shi Lei chose to start with two companies in the Southern Dynasties. The two companies in the Southern Dynasties are lg and samsung.

lg and samsung both have a technology. That is the wireless technology known as the most potential, 60ghz 'millimeter wave' technology. This technology, known as wirelesshd technology in later generations, has just released a link specification within a ten-meter range.

In the future, the camp of this technology is very strong. In addition to the two companies from the Southern Dynasties, there are also four companies from the Wosang country, namely nec, Sony, Panasonic and Toshiba.

Six companies in this camp. All of them are giant-level giants. The technology they jointly promote is indeed a very promising solution in the field of wireless display technology.

Shi Lei is going to steal the wireless HD technology, so as to mix the whdi technology with it to form a new technical solution, so as to avoid the patent restriction problem.

lg and samsung, these two giant companies. And not like amimon, the internal network has taken a disconnect from the external Internet.

These two large group companies have R&D centers all over the world, and the data between the R&D centers needs to be exchanged. Except for the absolutely confidential technology, which is stored in an environment isolated from the Internet, the rest of the information is placed on the internal network.

They are very confident in their own network security!

Whether it is lg company or samsung company, they all have the support of the world's top hackers behind them. Even the world's best hackers are unlikely to succeed in attacking their internal networks.

Defending is always easier than attacking!

Unless, like Shi Lei, he has a loophole that has not yet been announced!

Shi Lei first chose LG as the intrusion target. Compared with Samsung, Shi Lei subconsciously believed that LG was better to deal with. In fact, it does.

This is not because the world's top hacker behind LG is weaker than Samsung's backer; it is because Samsung's server computing resources surpass that of LG.

The competition between peak-level hackers and peak-level hackers is usually based on server computing resources. If the server has enough computing resources, even a world-class hacker can beat the world's top-class hackers to the ground.

For example, in the battle between Shi Lei and Tao Wenxian, Tao Wenxian has the support of Izull, plus the iwn secret network and the supercomputer Lightning, and Shi Lei only has a laptop, how can Shi Lei fight against Tao Wenxian?

Even Tao Wenxian was watching the play while eating potato chips, but Yizuer abused Shi Lei into a dog!

This is the truth of one power and ten clubs!

With the assistance of Izuer, Shi Lei carefully invaded the internal network of lg company. As a global multinational enterprise, lg company's internal network is very advanced, even more advanced than the network of some government departments.

In the internal network of lg company, even if Shi Lei is the world's top hacker, he also feels a step by step crisis. However, Shi Lei has the assistance of an advanced pseudo artificial intelligence system, as well as more than 1300tflops of loose distributed computing resources, and 300tflops of intensive distributed computing resources.

such a powerful computing resource. Not to mention an LG company, even the FBI, Shi Lei has the confidence to attack their internal network.

In the LG company's internal network, Shi Lei ordered Yizuer to inquire about low-privileged information, while Shi Lei personally inquired about the information that required high-level privileges to access.

Southern Chaoguo, lg company headquarters, network security department.

"Jin Zaixian. Check the situation on the No. 4 server, the data fluctuation is a little abnormal!" A middle-aged man gave the order.

Kim Jae-hyun is a security expert in the network security department of lg company, with one of the best skills, "Minister Park, please wait a moment, I will check in detail immediately."

Server No. 4 belongs to the high-level confidential server of lg company. Although the information stored in it is not top-secret information, it is also some more important information.

Jin Zaixian carefully inquired about the situation of the server. Shi Lei immediately discovered the situation of the server. He suspended the operation and cleaned up the temporarily generated data records.

About thirty seconds later, Kim Jae-hyun responded to Minister Park, "Minister Park. No problem was found on the fourth server, and the data flow is normal!"

Although the No. 4 server is connected to the Internet, due to the limitation of data traffic, any fluctuations in data replication will be detected immediately. At the same time, the security defense mechanism of the server can also instantly disconnect the transmitted data. With this set of defense mechanisms, even when connected to the Internet. It is also relatively safe.

"Pay close attention to the security of the internal network!" Minister Park said solemnly, "Amimon company in Israel, the most core whdi technology, has been leaked. I don't want our LG company to become the next joke!"

The security experts in the network security department all laughed. Jin Zaixian also smiled and said, "Minister Park, is that their internal personnel committing the crime? After all, the internal network of the Internet is isolated, so how can outsiders invade?"

Minister Park also laughed a few times and did not continue to speak.

Shi Lei found that the command to perform data checking in the server disappeared. Start decrypting and scanning data again. High-level confidential data files are encrypted.

Fortunately, most files don't have a damn special encryption scheme, and ordinary encryption schemes can't stop Izull's decryption. Shi Lei and Izuer searched one file at a time, trying to find the wirelesshd technical information.

It's not that Shi Lei didn't think about it. LG company stored the data of wirelesshd technology in a top-secret server that was not connected to the Internet.

However, a top-secret server does not mean absolute security. Top-secret servers can indeed effectively isolate the interference of the Internet, and even put them in a safe room can prevent theft in the real world.

Everything has advantages and disadvantages.

The top-secret server that isolates the Internet also has drawbacks. One drawback of this is the transfer of file data. As a top-secret server that isolates the Internet environment, its essential purpose is to isolate the feelings of external viruses and hackers.

However, when transferring stored data, it is possible to be attacked from outside. No matter what storage medium is used to store data, transferring data from a top-secret server will definitely come into contact with other storage mediums.

If there are malicious computer viruses in other storage media, it is a huge tragedy for top-secret servers.

Therefore, generally unimportant information will not be placed on top-secret servers. According to Shi Lei's inference, LG will not put wirelessHD technology in top-secret servers.

Not only because lg company does not pay much attention to wirelesshd technology, but also because there are many companies that master this technology, lg company does not need to care too much.

At around eight o'clock in the evening, Shi Lei finally found the wirelsshd technology, and with the cooperation of Izuer, opened the encryption lock of the file. However, how to transfer files has become a big problem!

In the internal server of LG company, Shi Lei has discovered the security mechanism of LG company, that is, the scheme of restricting data flow. Once the data flow is abnormal, the server will immediately terminate the corresponding process.

For example, the No. 4 server of lg company, under normal circumstances, the data flow only fluctuates 5kb-8kb per second, but at a certain moment, the data flow suddenly rises to 20kb, and there is no relevant authorization. Then the No. 4 server will immediately end the corresponding data flow process.

The file size of the wirelesshd technology exceeds 300mb. Shi Lei is quite sure that as long as he dares to remotely copy and download the wirelesshd technical data, the security guards of the No. 4 server will definitely find out the abnormal situation immediately.

In order to obtain the wirelesshd technical information smoothly, Shi Lei must think of a safe and appropriate method.

'damn it. This traffic limit defense mechanism is really annoying! ' Shi Lei scolded inwardly, LG's traffic restriction defense mechanism is very advanced, and the traffic restriction defense mechanism is directly written into the system's underlying defense, which is a core component of the system.

If Shi Lei attempts to end this process, the entire system of Server No. 4 will refuse. Forcibly ending the server will shut down the main system of the fourth server.

With such a big movement, except for the security guards of the LG company, all of them are playing a group meeting in the office. I am afraid there is no second situation, so that they can not detect the movement of the fourth server, right?

'Fuck! Do you have to enter Baoshan and return empty? ’ Shi Lei was a little helpless. Hackers are known as the gods of the online world, but gods also have restricted areas. Intranets of very large international corporations. It is one of the restricted areas.

Especially in the restricted area, when there are also gods, it is very difficult to obtain the required information without knowing it.

‘Have it! Almost forgot about the other means! ' A smile suddenly appeared on Shi Lei's face. He had been thinking about how to use hacking methods to obtain LG's wirelesshd technical data, but Shi Lei forgot about ordinary methods. The same purpose can also be achieved.

The stone of the mountain can attack jade!

"Yizul, start the image recognition engine, prepare for high-speed recognition, and recognize all the wirelessHD technical data through the camera once!" Shi Lei thought of the idea of ​​completing the data theft through the image recognition engine.

Shi Lei hacked into the No. 4 server of lg company and obtained the required information. Due to some technical problems, Shi Lei could not return these materials.

Especially using the copied command, it is easy to trigger the lg company's alarm. Therefore, Shi Lei had to do it in a different way.

The graphic recognition engine is a behavior dynamic recognition engine, a text recognition engine, and a human facial feature recognition engine. And still image recognition engine, integrated image recognition technology.

This technology has not yet been perfected, but there is no major problem in identifying wirelesshd technical data.

Since it is remotely connected to the No. 4 server of LG company, the wirelesshd technical data information displayed by the No. 1 server needs to be sent to the No. 4 server of LG company remotely. In order to prevent triggering traffic restrictions, Shi Lei set the image quality of the remote display content and the display speed of the switching data.

Under the premise of ensuring that the wirelesshd technical data can be accurately identified, it does not matter even if the quality of the images transmitted remotely is slag. Because, the Unreal graphics processing engine can automatically repair the image, and is not afraid of slag image quality.

As time passed, Shi Lei watched the percentage progress bar on the screen with sweat on his forehead. He had not been so nervous for a long time.

At 10:40 in the evening, Shi Lei finally let out a long breath!

The technical data of wirelesshd is finally 'downloaded' from the internal server of lg company.

"Yizul, quickly clean up the traces of the invasion and eliminate all traces!" Shi Lei gave the order, he stood up, twisted his waist, and moved his body.

"Sir, the traces are being cleaned up. In addition, the Wave Breaker will arrive at the predetermined destination in eleven minutes! The weather conditions at the target location are moderate, and the Wave Breaker's on-board laser weapon will be suppressed by the weather and its power will be reduced by 2%. Eleven." Yizuer reminded Shi Lei.

"Are you there?" Shi Lei frowned. The laser weapon was really suppressed by the weather, and its power dropped by one-fifth or more than a percentage point. This is already a miserable situation.

"Sir, the cleanup of all traces of the invasion has been completed!" In less than thirty seconds, Izuer had completed the cleanup. In fact, this work was carried out by Yizuer at any time. When Shi Lei invaded, Yizuer completed the cleaning of system records simultaneously.

Of course, this is the advantage of having the assistance of a pseudo-AI system!

Without the assistance of the pseudo-artificial intelligence system, Shi Lei devoted himself to the attack, how would he have time to complete the work of cleaning up the traces? It can be seen from this. The benefits of having a pseudo-AI system.

Eleven minutes later, the Wavebreaker arrived at its intended location in the Bermuda Triangle.

"Sir, the shipborne radar of the Wavebreaker has not yet found any ship targets in the surrounding waters. Since the height of the waves exceeds 30 centimeters, which greatly affects the work of the shipborne radar, whether to take the target location as the center and clockwise? Around the Searching for possible targets from the center point?" Yizuer asked Shi Lei.

The hull height of the Wavebreaker is only 220mm, and the onboard radar is also at this height, emitting electromagnetic waves outward. Although the electromagnetic waves of the radar are radiated in all directions, they are also blocked by a large part of the waves, resulting in detection errors.

"Yes! Search clockwise!" Shi Lei agreed with the plan proposed by Yizuer. This is not Izull's ability to innovate, but a fixed solution. Similar schemes have long been stored in Izuer's self-inductive learning and judgment module.

The speed of Polang's armed unmanned patrol boat reaches 700 kilometers per hour. Even if the height of the waves reaches 300mm, which exceeds the hull height of Polang, it still does not affect the speed of Polang.

Shi Lei checked the wirelesshd technical data he had just stolen. While watching the situation of armed unmanned patrol boats. When it was close to twelve o'clock at night, it was past twelve noon on Bermuda's side, and the gap between the two sides was thirteen hours.

In the Bermuda Triangle area, the weather at this time is a bit hazy, and the armed unmanned patrol boat, Wave Breaker, is sailing fast on the sea, just like its name.

At this time, the straight-line distance between the Wave Breaker and the sea area where the n235 metal is located. Forty kilometers have been passed. The Wave Breaker sails clockwise and follows the shape of mosquito coils. The actual sailing distance is almost 200 kilometers.

"Sir, I found three targets, about fifteen kilometers away from the Wave Breaker, do you want to investigate?" Izual asked.

Shi Lei sometimes felt that Yizuer was very idiot. In this case, why not investigate?

"Go!" Shi Lei's tone didn't fluctuate too much, he knew that Yizuer didn't have human emotions, even if he smashed the No. 1 server. Izuel will not have the slightest emotional fluctuations.

A distance of 15 kilometers would only take less than two minutes for the Wavebreaker, which travels 700 kilometers per hour!

It's just that the Wavebreaker is not ready to fight in close combat. Izuer controlled the Wavebreaker and stopped three kilometers away from the target, letting the target enter the Wavebreaker's optical observation system and feed back the image to Shi Lei.

Shi Lei looked at the returned images. These three ships were ships of the British Empire, which did not surprise Shi Lei. Two of them were actually warships, while the other one looked like a research ship.

Shi Lei, who discovered the warship, has to say that the British Empire is a bit overbearing, and the warships are coming. What is the rhythm?

Well, Shi Lei doesn't care about your situation!

Shi Lei only wanted to keep the secret of the n235 metal. To keep the secret, he needed to destroy the three ships of the British Empire without knowing it.

"Yizul, has the other party discovered the Wave Breaker?" Shi Lei asked.

The small hull of the Wavebreaker should not be easy to find when the waves exceed 30 centimeters. Even if it is scanned by radar, it will not be regarded as a ship, but only as waves.

"Sir, the armed unmanned patrol boat of the Wave Breaker has not yet been discovered!" Izuer reported what Shi Lei had guessed.

Shi Lei thought about how to destroy the three ships smoothly. Although the ruby ​​laser cannon can be used to kill them, it is impossible to kill them silently.

The sea area where the n235 metal is located is far enough away from the land that even laser weapons are not easily discovered by people on land. The key question now is that the ruby ​​laser cannon cannot destroy three ships in an instant.

But once the ruby ​​laser cannon launched an attack, the other party would be able to find the Wave Breaker armed unmanned patrol boat, thus successfully delivering the message. Even if the Wavebreaker eventually destroys three ships of the British Empire, what is the use of the information already passed on?

For now, the best way is to block the radio communication near the three ships.

It is a pity that the radio interference equipment of the armed unmanned patrol boat of the Wave Breaker is too low to interfere with the three ships of the British Empire.

Shi Lei had to think otherwise!

.

ps: No one should guess the way to get Brother Stone!

Chapter 1310/1926
68.02%
HacKerCh.1310/1926 [68.02%]