HacKer

Hk867 Malicious Provocation and Trouble!

The Southern Dynasty is one of the neighbors of Xia, its territory is only one-ninety-sixth of that of Xia, and its total population is about one-twentieth of that of Xia.

If it weren't for the existence of particularly bad mathematics, I am afraid that it can be easily calculated that the per capita land area of ​​the Southern Dynasty State is smaller than that of the Xia State.

However, it is such a small country with little land and resources that has created a series of miracles and has become a developed country that has attracted worldwide attention and is recognized by the world!

That's right!

Southern Dynasties are developed countries! It is recognized as a developed country by the World Bank, the International Monetary Fund, and even the CIA in Lijian.

According to the ranking of the Human Development Index, the Southern Dynasties have been in the top 20 for a long time, while Hong Kong Island and Ao Island in the Xia Kingdom have occupied the top 10 positions for a long time. As for the main body of the Xia Kingdom, because of some reasons, it has always been around a hundred people.

In a highly developed country of the Southern Dynasties, the policy to support the country's economic lifeline is an 'export-led' strategy. The Southern Dynasties rely on various advanced technologies to manufacture world-leading products, and then export and dump them all over the world to maintain the country's economic development.

The most famous company in the Southern Dynasties is the famous Samsung. In later generations, mobile phones made by Samsung have achieved the highest market share sales in the world. Even the phone series made by Pple did not end Samsung's rise. [

However, Shi Lei's goal this time is not Samsung for the time being!

As a large semiconductor electronics industry group with a market value of nearly 100 billion, Samsung is in electronic defense. How can they be successful if there is nothing special about them?

Every world giant. Especially the electronics industry, their network defense is absolutely no trivial matter. At least one of the world's top-level masters will be in town.

Most of these world-class experts are security experts in the field of "government". These "government" security experts have chosen some well-known companies as part-time jobs. Because they belong to the "government" security experts, they are not hackers who cannot be exposed. They can appear in life and can do some network security-related things openly.

therefore. The helm of a well-known enterprise can freely meet with security experts and have face-to-face conversations. Everyone can know the details of their identities. Therefore, well-known enterprises do not care that these security experts belong to the "government", and they are not afraid of these security experts stealing the confidential information of enterprises.

Which world-renowned company has not mastered some hidden power? Would you dare to be a two-faced faction if you were a security expert who knew the bottom line? That is probably the rhythm of the Nine Clan!

In addition to these part-time security experts. Only a very small number of electronics industry groups have their own world-class security experts. As far as Shi Lei knows, Samsung Group has their own top-level security experts in the world, and not only one! According to the measurement of the Angel Council, Samsung Group has at least six world-class security experts, of which at least three are world-class security experts.

The rise of Samsung Group. It is not unrelated to the network security services provided by these security experts!

The target of Shi Lei's invasion of the Southern Dynasty was only four online game makers, not the behemoth Samsung. As for the future, if there is a chance. Naturally, Shi Lei would not let Samsung Group go.

The time zone of the Xia Kingdom is ut8, and the time zone of the Southern Dynasty is ut9. It was 11:30 in the middle of the night in the Xia Kingdom, and it was already 0:30 in the morning in the Southern Dynasty. This time period is an absolute sleep time for ordinary people. For hackers, however, the dark night provides them with the best cover.

The vast majority of hackers, usually like to act in the dead of night. It's not that you have to act at night, but most hackers are used to acting at night.

Shi Lei didn't have a fixed time preference. Whenever Shi Lei wanted to invade, he would immediately invade according to his "sex". Now Shi Lei is not in a good mood. He controls some of the resources of the wn secret network, crosses the network barrier between the Xia Kingdom and the Southern Dynasty Kingdom, and enters the Southern Dynasty Kingdom's network.

There are a total of four Southern Dynasties forces participating in the Anti-Dream Entertainment League. They are nexon, nsoft, neowz, smlegte. Among them, neowz and smlegte are the absolute main force. These two companies have a closer relationship with the big penguin company, and they have invested more hacking power to participate.

Shi Lei's main targets are also neowz and smlegte. As for nsoft and nexon, Shi Lei just took a little time to invade the main server through their official website homepage, put the moon virus in the main server, and ignored it.

The harm of the moon virus is very serious. Through repeated low-level formatting of the hard disk, the purpose of physically destroying the hard disk is finally achieved. Hackers destroy computer equipment, the main target is the storage device, that is, the hard disk. [

For ordinary users, the importance and value of computer storage devices are far less valuable than the central processing unit pu, motherboard, or memory and graphics cards. After all, the price of a hard drive is only one-third of the value of a PU, or even less. Not to mention the high-end and atmospheric top-level graphics card equipment, it is not a value comparable to a mere hard drive.

However, for enterprise users, the importance of storage devices is far higher than the value of other devices. The data inside the storage device is the real valuable thing.

There is a saying in the t world, called "hard disk has a price, data price". This proverb directly reflects the value of data in an enterprise.

The main servers of nsoft and nexon store a lot of game development data. After the Moon virus entered the main servers of the two companies, they quickly began to screen for attack targets.

The attack mode of the moon virus against the server was adjusted and modified to a certain extent by Shi Lei. The storage device of the server, usually a disk array group. rather than a single hard drive.

A disk array group consists of multiple hard disks, and the hard disks that run the server system. Usually does not exist on multiple hard drives. According to this "feature", Shi Lei changed the attack plan of the Moon virus on the server, from the previous full disk array group attack to a screening attack.

Moon virus will determine the number of disks on the computer, then distinguish the system disk, protect the system disk, isolate other subordinate disks, and perform low-level format processing on the subordinate disks. When low-level formatting a slave disk. Moon virus will also insidiously block the hard disk data feedback light, simulating the flickering of the hard disk data feedback light under normal conditions.

This insidious setting makes the Moon virus more harmful. Often times, the server's slave disks can be destroyed, while the server's main system is fine.

The main server of nsoft and nexon was ravaged by the moon virus, and the data stored in the slave disk inside the server. Erased by low-level format.

After Shi Lei had dealt with nsoft and nexon, the security guards of the other party had not yet discovered that their main server had been attacked. It has to be said that the moon virus is becoming more and more sharp, and the means of attack are becoming more and more difficult to defend.

Although the main servers of nsoft and nexon were completely killed by the moon virus, Shi Lei knew. The loss of these two companies is not too big, and their real core data is stored in servers isolated from the network environment. Online game makers are different from operators, they are not inseparable from the network environment, they can be in a closed environment. Develop and make games.

Shi Lei is not completely helpless when it comes to an environment that isolates the Internet. It's just that Shi Lei is too lazy to be honest with nsoft and nexon. Shi Lei's main targets are neowz and smlegte.

Summer time, late at night is approaching the early morning. The time in the Southern Dynasties is approaching one o'clock in the morning. Shi Lei followed suit and entered the official websites of neowz and smlegte.

The network defense of online game makers is much lower than that of online game operators. The focus is different, and the emphasis on network defense is also different.

Shi Lei did not move the main servers of the two companies this time. Because Shi Lei knew that there was no valuable data in the main server. For neowz and smlegte, Shi Lei is not as tolerant as the other two companies. Destroying the main servers of nsoft and nexon is not so much the destruction of their data as it is to vent their anger.

Controlling the main servers of neowz and smlegte, Shi Lei did not do any sabotage. Instead, he combined the main servers of the two companies and a high-performance broiler server from the Southern Dynasty to form a temporary small server cluster. .

Shi Lei controls some of the resources of the wn secret network, injects it into this small server cluster, and then controls some of the resources of the wn secret network based on the small server cluster.

It is worth mentioning that Shi Lei did not provide special protection for this small server cluster. Under normal circumstances, broilers under Shi Lei's control are usually protected by Shi Lei. This is to prevent other hackers or anti-hacker security experts from conducting an anti-tracking investigation of the real p-address.

If there is no security protection measures, if the hacker with the real p address is found, it will definitely be a big tragedy. Shi Lei did not set up safety protection measures this time. Could it be that Shi Lei made a low-level mistake?

It was obviously impossible for Shi Lei to make such a low-level mistake. Even if Shi Lei made a low-level mistake, Izull would remind Shi Lei and help Shi Lei to heal these small mistakes and mistakes.

However, neither Shi Lei nor Yizuer cares that the temporary small server cluster has no defense system, there is only one possibility, Shi Lei did it on purpose!

Shi Lei is going to use this small server cluster to maliciously provoke trouble...

(To be continued. If you like this work, you are welcome to come to the starting point to vote and monthly pass. Your support is my biggest motivation. Mobile users, please go to m to read.)

ps: [Thank you for the reward] Meng Sui Leng, reward 588 Ting Yu little Lolita, reward 300 Royal Forest Army boss, reward 100

[Enthusiasm] "Professional Lord of Divine Craftsman", an old book of Mushan, you can read it, and then have a copy of "Light of the Great God".

〖∷Update fast∷∷Plain text∷〗

Chapter 879/1926
45.64%
HacKerCh.879/1926 [45.64%]