The Red Alert Begins in the Wasteland

Chapter 711: The Cyber ​​Troops' First Battle Blocking Tokyo

In the Cyber ​​War Command of the Red Police Corps, Li Bowen sits as the commander. He is dressed in a lieutenant general uniform, and he usually has the least general temperament. At this moment, his demeanor is not inferior to those of the real commander A mighty general.

"Activate all bots, the virus starts to load the mail program, and the disguised website program starts to execute."

In the position of commander, Li Bowen decisively gave the order for a formal attack.

In the past few months, the hackers have not done nothing. Although they have not taken the initiative to attack, they have also prepared a sufficient number of broilers for themselves.

These bots are usually quietly controlled by implanting viruses in a large number of game programs or other small files on the Internet.

Usually, these viruses are always lurking in these personal computers. The users of these computers are generally ordinary people. For such viruses that have no effect on computers, they cannot be found at all.

Moreover, there are well-disguised viruses, all of which directly replace an unimportant file in the system, thereby fooling those anti-virus programs.

There are also some bots that use the loopholes of the computer system and directly implant them into these computers from the background. They are also disguised as system files, or simply hide them directly in the files of anti-virus programs, so as to deceive the anti-virus software in those calculations.

Even if users use anti-virus software to scan the whole disk every day, it is almost impossible to find these viruses.

There is also a more clever method, which is to directly invade the computer through the background programs of these anti-virus software, and even directly pretend to replace the anti-virus software itself, simulating an icon of the anti-virus software, and the user cannot distinguish the anti-virus software at all. true or false.

And the real anti-virus software will also be uninstalled at this time, which is directly Li Daitao's death.

Another method is even simpler, that is to send emails or text messages to control mobile phones and computers.

When Future Technology Group and Apple Group launched a comprehensive cooperation. This move is even more convenient.

The broilers that have been prepared in the past few months add up. It has reached a terrifying number of machines. Tens of millions of computers and a similar number of mobile phones have all been implanted with this virus.

Under such circumstances, even if they have never used these controlled computers or mobile phones to do anything. Just by selling these broilers, you can get a lot of income.

so. Some hackers are also doing business in this area.

The Cyber ​​War Command, which currently has 3,000 hackers, naturally doesn't need to buy so-called broilers. There is no such need at all.

When the activated command is fully issued, all users are not aware of it. The attack command and attack method have all been conveyed to these computers.

Next, a lot of people who are using computers and cell phones. All of them were surprised to find that their mobile phones and computers suddenly became very stuck. Especially the network, some even cannot access the Internet in a short period of time.

However, this situation will soon end. None of these users cared, it seemed that such things were quite common.

After all, sometimes, no one really cares about getting stuck occasionally.

But in such a short period of time, users have absolutely no idea that in that short ten seconds, their computers and mobile phones have sent at least hundreds of e-mails or launched consecutive online messages to certain websites. Thousands of access requests.

These requests for emails and website visits are all concentrated in Israel and Japan without exception.

The powerful network data flow has reached trillions of access requests and emails in just a dozen seconds.

The instantaneous influx of huge data streams caused the networks of the two countries to stop for more than 30 seconds.

If it weren't for the fact that the two countries are both in large network countries, the country has a very high bandwidth level, and the network ports are all very smooth, otherwise such a huge amount of data is crowded in an instant, and I am afraid that it is not just a short pause of 30 seconds.

This phenomenon will end soon, and ordinary people naturally don't feel it.

But soon, a large number of computers in many places in the two countries, and even network ports in many areas, were completely blocked.

On a large number of computers, a large number of windows suddenly popped up densely, especially email messages. The new email information popped out instantly reached the efficiency of thousands of messages per second. In just a few seconds, these computers Almost all the screens on the monitor are down.

And on the screens of these computer crashes, almost all of them were stuck by a large number of spam emails.

Every hacker in front of the computer wants to save his own computer, but it is too late to disconnect the network, and the computer has crashed.

And then, the real climax came. The mobile phones on these hackers also began to send out intensive text messages.

A large number of spam text messages are constantly popping up, and the contents of the text messages are all the same, that is, a bloody olive branch, which represents peace and is dripping with blood.

This is the most obvious warning signal. The dense text messages even made the local communication operation department almost crash the computer room because of the huge text message data.

Such an attack, as long as the IP is locked, even the most experienced hacker can only unplug the network cable, but the attack is so sudden that even the most powerful hacker has no way to parry Power.

The real tragedy is that those websites, the IPs of these websites involved in the attack, all received a large number of data flow access applications in an instant, and the intensive access applications directly paralyzed the website servers.

The effect of this kind of attack is almost the same as that of 12306 during the Spring Festival. Almost all netizens who want to visit this website have no choice but to find that the webpage cannot be opened at all.

The websites involved are almost all concentrated in Israel and Japan, and due to a large amount of network data and spam information, the overall network of the two countries has been significantly blocked for a day.

This kind of congestion allows almost everyone to reach 1M bandwidth, and the utilization rate directly leaves less than 100KB, almost all of which have reached the speed of dial-up Internet access. Those who are directly affected are those gamers, because the game has become weird. Incomparable.

There is also a little bit of the financial industry, especially in Japan. Because the Bank of Japan has just implemented a negative interest rate policy, the Tokyo stock market has fallen below the daily lower limit one after another, and it has fallen by 40%. , exacerbated a lot.

This was something that Cai Ruichen never expected. (To be continued.) Enable new URL

Chapter 742/1987
37.34%
The Red Alert Begins in the WastelandCh.742/1987 [37.34%]