The Red Alert Begins in the Wasteland

Chapter 710: Red Police Network War Force

Speaking of this, a look of contempt flashed across Li Bowen's face. For such a method, it can be said that he doesn't even have a hacker background.

Of course, this is seen from his eyes, if it is seen by other people, it is already a very magical method.

"This method is at best a group of beginners, and advanced hackers basically don't use this method. There are also some hackers who specialize in controlling bots, and then sell them to such junior hackers to achieve their own profit. It won't get you into any trouble."

Li Bowen further explained: "A real hacker must be able to control the network situation, and use various technical means of the network to obtain a large amount of data and intelligence. Just like Anonymous, the main means of profit for this organization is its An evaluation company, this evaluation company is specifically looking for troubles for those companies, looking for negative information about these companies, and further publishing these news, so that the company will be questioned by everyone.

This kind of method can cause the stocks of listed companies to plummet almost every time, and then get the benefits of the stock market. Judging from the previous actions of anonymous people, under such behaviors, the market value of almost every listed company has at least dropped. Thirty percent, of course, can also be reversed. Announcing some positive news about listed companies can also attract many investors and increase the market value on a large scale.

Of course, there are also more powerful hackers, and these hackers are often able to control the wind and rain on the Internet, but the real top masters are often unknown to no one. Such people are the ones who really need to be vigilant. "

When Li Bowen said this, he took a deep breath and continued: "Currently, the hackers attacked by the Future Technology Group are all concentrated in the United States, Europe, the Middle East, and parts of Asia. The main attack points are Israel and Japan. Next That is the United States and Europe.

The largest flow is from Europe, but not concentrated. Every attacking IP. All are evenly distributed in every country in Europe, so I doubt very much that most of these attack sources from Europe are controlled broilers.

The second largest source of attacks was in the United States. The attack mode here in the United States is very localized, and the source addresses of the attacks are also relatively concentrated. This is not like a controlled broiler, but the source of the attack is indeed from the United States, and Israel and Japan are similar to the United States.

So I conclude. Those who have been maintaining cyber attacks on Future Technology Group mainly come from these three countries, as for other places in the world. Although there are also sources of attack, they are all so sparse that they are almost negligible. "

After listening to Li Bowen's words. Cai Ruichen, who didn't know much about this line of business, now has a little understanding.

"You guys are so motivated to fight. How much confidence do you have in dealing with these attack sources?" Although Cai Ruichen didn't know the tone in it,

But he knows how he should make his own decision.

Li Bowen heard this, and hurriedly said: "At present, we can basically lock the IP addresses of most hackers. If we want to fight back, there are three ways, one of which is the simplest, that is to directly publish the addresses of these hackers, but Such behavior will attract more attacks from hackers around the world.

The second method is to use the same way as the person to do the opposite to the person, and use the attack of the Internet bot to completely paralyze all the computers that attack us. This will allow the Red Queen to cooperate with us, and it will definitely paralyze most of the computer networks in an instant.

The third way is to let spies from all over the world go out and implant control programs on the network terminals near these hackers, so as to intercept and remotely control the network of these people, and use the network to control the network of these people when they are connected to the network. By implanting a brand new Trojan horse developed by ourselves, we can also counter-control their computers and get all the information in their computers when necessary. "

"At present, which method is better?" Cai Ruichen is not very proficient in this, so he can only leave the choice to Li Bowen.

"The result of the first method may be endless. In such a situation, it is not advisable. The third method is too troublesome, and it is not very worthwhile in terms of cost-effectiveness. The second method It’s a good way to compare the price. At present, we have locked a large number of intruder IPs and obtained a large amount of hacker information. We can start with the network and personal information, which is enough to make them lose their blood.” Li Bowen weighed it slightly in his heart , said.

"How sure are you?" Cai Ruichen asked again.

"Ninety-nine percent, we have been defending but not attacking for several months, which greatly increased the arrogance of those hackers. My suggestion is, if you don't fight, don't fight. If you want to fight, you must attack them." A harsh lesson," Li Bowen said.

"Then you can figure it out. I only have one request. Since I have made a move, I have to make a thunderous blow. I will completely defeat the opponent in one fell swoop. I dare not invade our network easily from now on." Cai Ruichen doesn't understand the Internet. However, when dealing with the enemy, his first goal has never changed. If he wants to fight, he must fight beautifully, and he must not give the enemy any chance to come back.

This kind of requirement is the same no matter what field it is placed in. To deal with the enemy, one must show the fear that the enemy's entire army will be wiped out or the opponent will be completely terrified.

"Please rest assured, Commander, I promise to complete the task." Li Bowen promised with some excitement.

In order to counterattack, he has been preparing for months, everything is for the moment of counterattack.

Several months of preparation, just for this brief counterattack, this alone is enough to make his adrenaline soar.

After the excited Li Bowen promised, before Cai Ruichen could say anything, he walked to his computer with fluttering steps, and then the order to counterattack was immediately conveyed to the entire Cyber ​​War Command.

At this moment, almost every hacker was in front of their computers, raising their hands and cheering, but soon every hacker restrained all their emotions, and began to make final preparations before the counterattack according to the counterattack plan that had been formulated. .

After the red queen of the central computer bowed to bid farewell to Cai Ruichen, she also began to join this group of crazy hackers.

In the entire Cyber ​​War Command, only Cai Ruichen was left alone, because in the entire Command, he was the only one who was still at leisure.

Seeing this, Cai Ruichen could only shake his head. Naturally, it was impossible for him to disturb the hackers who were eager to fight. (To be continued.) Enable new URL

Chapter 741/1987
37.29%
The Red Alert Begins in the WastelandCh.741/1987 [37.29%]