Hk955 The Capital of the Philippines, the Port Problem!
The Philippines is a typical archipelago country with 7,107 islands and its capital is Manila.
Manila, the capital of the Philippines, as the most developed region in the country, has more than half of the country's industrial enterprises, a quarter of the country's colleges and universities, and the country's largest port, the Port of Manila. .
In 2005, the throughput of Manila port was 1.2 million teu, ranking 33rd in the world in throughput. The so-called teu is an international standard container with a length of twenty feet, which is an important unit of measurement for port throughput and ship cargo capacity.
As the most important port in the Philippines, the "government" of the Philippines attaches great importance to the development of the Manila port, and has successively invested more than 300 million US dollars to develop the electronic information technology transformation of the Manila port.
As a modern port, if there is no electronic management, how can it handle the huge cargo throughput every year?
Electronic information technology provides a very convenient management method for Manila Port. However, this information management method also provides convenience for hackers to invade.
The port management system of Manila Port is not a closed management system, but is connected to the Internet. After all, the cargo information of the entire Manila port needs to be displayed to other agencies for viewing.
Although the port management system of the port of Manila has very strong protection measures, when it faces ordinary hackers, it will not worry about being invaded at all. [
But Shi Lei is no ordinary hacker!
Shi Lei is the world's top hacker, with the world's top hacking technology! There are very few Internet electronic information systems in the world that can completely resist Shi Lei.
Including Li Jian Kingdom's National Security Agency ns, if they are on duty, their defense system can't stop Shi Lei's invasion. Even rp's defense system is not Shi Lei's opponent either. Of course. All of this is based on the premise of human defense. If there are security personnel on duty, under the current hardware conditions of Dream Entertainment. At most, Shi Lei would dare to play with the fb FBI. Even the CIA, Shi Lei didn't like to deal with them very much!
Shi Lei currently likes to deal with the Philippines. Especially interested in the Manila port in the Philippines. Shi Lei put his hands on the keyboard, and through the No. 1 server, he attacked the port management system of Manila Port.
"Izuer, take back the 'harassment' attack on the South Vietnam National Security Agency, integrate the wn secret network resources, and prepare to attack the port management system of the Manila port of the Philippines." Shi Lei ordered Yizuer.
Although the South Vietnamese National Security Agency cut off the power attack, it still has some subordinate departments. According to Shi Lei's instructions, Yizuer carried out "harassment" attacks on these subordinate departments.
"Yes, sr. The order is executed." Yizuer immediately started to execute according to Shi Lei's order.
...
Pengcheng.
Mr. Ma hung up Shi Lei's phone and was forced to get up from the female secretary's warm bed. He walked into the bathroom with his mobile phone and closed the bathroom door. After ensuring the sound insulation, he used his mobile phone to call the leader of the Broken Knife Team, Broken Knife.
After waiting for a while, Broken Sword answered the phone. As the world's top hacker, Broken Sword obviously hadn't slept yet. Broken knife group led by broken knife. There are only 24 members in total. They are not a hacker organization in the traditional sense, but a hacker organization dedicated to serving the Big Penguin.
Therefore, Broken Knife was just watching the battle between the hacker circles of the Xia Kingdom and the hacker circles of the Philippines and South Vietnam. He did not lead the Broken Knife Team to participate in the battle.
"Boss, is there an emergency?" Broken Knife asked neatly.
It is already past three in the morning, if there is no important urgent matter, it is impossible for Twisted Vine to find him at this time. Since Ma Huateng is looking for him, it means there is an emergency.
"Duandao, our traffic information management system in Pengcheng has been invaded by the Philippines. You should quickly deal with this matter! Pengcheng is our base camp, we can't lose face!" [
Although Pengcheng's traffic information management system has been hacked by the Philippines, it has nothing to do with the penguin, but sometimes, people are floating in the rivers and lakes, how can they not be stabbed? The headquarters of Big Penguin is in Pengcheng. In the hacker world, Pengcheng is the site of Big Penguin by default. If the big penguin can't even protect its own territory, it will become a joke in the hacker world.
If it was just a joke, Twisted Vine might not care, but in the hacker world, being a joke means weak. Big Penguin is a fat sheep. If it "shows" its weak performance, it will be coveted by countless hackers. Therefore, Twisted Vine and Big Penguin cannot be the laughing stock of the hacker world!
"Understood, boss! Let us handle this matter!" Broken Knife said affirmatively.
Ma Huateng was still relatively at ease about Broken Knife, he encouraged him a few words, promised some rewards for Broken Knife and the Broken Knife Team, and then hung up the phone.
...
Shuangqing City.
Shi Lei and Izuer, with the help of the excessive computing resources provided by the wn secret network, are scanning the port management system of the Manila port, trying to find the loopholes in the port management system from the outside of the management system.
Under the integration of Izuer, the wn secret network has gathered nearly 1,000 tflops. Shi Lei searched for nearly ten minutes outside the Manila port port management system. After still not finding any system loopholes, he directly used the wn secret network to forcibly scan.
The efficiency of the wn secret network is very high. Although the wn secret network did not scan any system loopholes, Shi Lei used the computing resources of the wn secret network to hack into the port management system directly from the official cargo inquiry channel of the Manila port.
Inside the port management system, Shi Lei did not directly attack, but was analyzing the operation of the entire port management system. It is not the management operation of the port, but the operation mode of the data storage of the port management system.
‘Asynchronous data backup system? ' Shi Lei looked at the management system of the Manila port, and a feeling of surprise rose in his heart. Generally speaking, the system using asynchronous data backup is not easy to be hacked.
This data backup structure is realized through differential storage systems and disk array groups. The connection between the backup server and the main server is not close, once the main server is attacked by hackers. The backup server will autonomously disconnect from the primary server, thus preserving the data.
If it is a general hacker, you have encountered a system of asynchronous data backup. Usually choose to give up the intrusion, or vent their anger and wreak havoc in the main system. Shi Lei did not give up. He didn't vent his anger, but lurked in the main server secretly.
Shi Lei is waiting for the backup server to perform asynchronous data backup. Only when the data gap between the main server and the backup server reaches the designed critical value, the asynchronous data backup system will start to work.
That will be Shi Lei's time!
The waiting process was very painful, Shi Lei was busy. The main server inquires about the information in the database, and inquires about the port management system to control how many hardware facilities.
The Port of Manila is the most modernized port in the Philippines, with quite a lot of hardware equipment. "Operation" can be carried out through the port management system. For example, the most common gantry crane in the port, it is responsible for the land part of the port, and transfers the containers into the truck; or from the freight car, the container is transferred to the port for storage on land.
The counterpart is the mast crane, which is responsible for moving standard containers. Or the goods are transferred from the ship to the land; or they are hoisted from the port to the ship.
These machines, which originally needed to be "operated" by personnel, can all be "operated" in the port of Manila through the port management system.
Shi Lei tried to crack the hardware "operation" subsystem of Manila port, if the crack was successful. Shi Lei can control gantry cranes, or mast cranes, or even control the command center at the Port of Manila.
Shi Lei patiently analyzed the port management system of Manila Port. Just when he discovered some unusual information, Izuer suddenly prompted, "Sr, the system has tracked the backup channel of the asynchronous data backup system, are you pursuing it?"
"Let me do it myself!" Shi Lei was a little worried about Yizuer. Although Shi Lei optimized the black magic software, Yizuer did not do well in the aspect of intrusion. At least compared with Shi Lei, the gap was still too obvious. .
After Shi Lei peeled off the defense system of the backup server layer by layer along the backup channel of the asynchronous data backup system discovered by Izuer, a smile appeared on Shi Lei's face. Then quickly go back and inquire about the abnormal information that has just been discovered.
Philippines, Manila port.
As a large port, Manila Port operates 24 hours a day, even if it is more than three in the morning, it is still a busy scene.
Manila in the Philippines and Beijing in Xia are in the same time zone, so there is no time difference. It is now more than three o'clock in the morning on June 4th in the Xia Kingdom, and it is also the same time in the Philippines.
A port forklift operator at the busy Manila port has just completed a dispatch order and is now processing a second dispatch order. The forklift workers on the port land are mainly responsible for transporting some small goods into standard containers to facilitate the next transportation.
The forklift worker named Raul Hernan was holding the second dispatch order. Since the dispatch order was received together, the second dispatch order was soaked with sweat when he was just processing the first dispatch order. , resulting in unclear information on some dispatching. Therefore, Raul Hernan had to use the p he carried with him, enter the consignment note number into it, and inquire about the specific and detailed list.
However, when he entered the dispatch order number into p, connected to the port management system, and wished to inquire about the detailed dispatch list, p did not display any data.
Raul Hernan thought p was wrong at first, he tried several times, still no data. When he entered the tracking number of the first dispatch list and still did not find the result, Raul Hernan realized that something might have happened to the port management system.
Raul Hernan, who discovered the problem, reported the situation to the Port Authority as soon as possible...
ps:
Very sincere 3200 words, including the noon, I gave 500 words as a gift, thank you for the genuine subscription support.
Genuine subscription support is very important to Mushan.
Hey, this sentence seems to have not been said for a while?
————
[Special thanks] Pluto, reward 10,000, thank you!
[Thanks for the reward] King of the Dragon, reward 588 You Ye Xuehexiang, Huanshi Tiandi, reward 100
〖∷Update fast∷∷Plain text∷〗