those years of rebirth
Chapter 276 Unstoppable
"Quick... stop it... what program is this? Who is the other party?"
In just 2000 minutes, 10 of the more than [-] broiler computers around the world that Richard had operated for more than ten minutes disappeared, all of them crashed and disconnected, and they have since escaped his control.What he didn't know was that the motherboards of those computers were burned directly.
However, Richard didn't want to think so much at this time, because the other party was still tracking him through the springboard broilers one by one.
Richard is one of the top hackers in the United States. He did not participate in the hacker war two months ago. This time he was brought together by another top hacker, Robert.
Perhaps, his name is not as famous as Kevin and Mitnick, but in the world of hackers, his skills are not bad, and he is recognized as the world's top hacker.
And Robert surpassed Kevin in destructive power.
The world-famous worm virus was created by Robert, and it was accidentally distributed, causing immeasurable damage.It is also he who made the world aware of the dangers on the Internet and promoted the development of the Internet security industry.
"Robert, we are in trouble, we are in big trouble, who is the other party?"
Richard had a voice connection with a few hackers familiar to Robert, and said loudly: "We are about to win, and the other party will fight back at this time."
Robert didn't say much, just said: "I lost [-] remote broilers, one of which is a server of the French government, and the other party is very powerful."
Yes!
This is the unified view of all the hackers who participated in the battle and watched the battle - very powerful.
…………………………… In the office building of a company in Berlin, Germany, the computers of fifteen employees suddenly crashed for no reason, and then there were several electric sounds, and then there was a burning smell.
The company's technicians quickly came to repair, and were told that the main board was short-circuited, and several components were burned out, making it unusable and the main board had to be replaced.
The same happens in England, France, Russia, Japan, Hong Kong, Malaysia, Mexico, Australia, Canada...and, America!
Within two hours, the motherboards of tens of thousands of computers were burned.
At this time, the flames of war had just reached the United States.
Kevin was sitting in his humble room, his face covered with sweat. He had just been released from prison, and he was monitored every day, and he couldn't unlock the computer, so he didn't manage a few broiler springboards at all, and was directly pursued by rapid attacks. He had no choice but to Don't use all your wisdom to deal with it and escape the opponent's tracking.
However, after the battle lasted for two hours, they finally failed to avoid the opponent's data tracking.
"Oh...no..."
Chi... um... Kevin just yelled that the computer he had used for less than three hours was scrapped, shutting down automatically, and emitting a burnt smell. He didn't need to look to know that the hardware had been burned.
Boom... Kevin punched the main box, and cursed in a low voice: "Shit, what kind of software is this? Such a powerful anti-tracking capability?"
In the computer field, Kevin has always regarded himself as a god-like existence, because he feels that as long as there are zeros and ones, then he is omnipotent.
The first setback was when he confronted Uemura Masa. Uemura successfully traced his address and cooperated with the police to arrest him.The second time, this time, Kevin knew very clearly that the other party was a person, and he didn't even target him specifically. It was just an automatic counterattack program, and he was dealt with.Of course he knew that the American hackers who participated in the battle like him probably didn't feel well.
Kevin was very surprised—how could there be such a powerful master in China, a place where computers have just become popular?So far, he doesn't even know what method the other party used, what programming language, what mechanism!
However, just being able to track and counterattack, and burning the hardware every time it encounters a terminal, is already terrifying.
In comparison, some viruses that appeared before, such as worms, are not worth mentioning.
……………………asci, white!It is the name of a supercomputer, and it is also the fastest supercomputer in the world at this time. It was manufactured by IBM, the most well-established computer company in the United States, for the US Department of Energy.The highest speed reaches 12.3 trillion floating point operations per second.
This computer is used to simulate nuclear tests.
But at this time, the supercomputer in the secret laboratory suddenly experienced an abnormality. In an instant, thousands of processors were rapidly overloaded, the voltage in the entire laboratory increased rapidly, and the temperature rose sharply. After [-] minutes, the supercomputer with the fastest calculation in the world at this time suddenly logged off, then restarted, and returned to normal.
The technicians quickly checked and came to a conclusion that in just ten seconds, the world's fastest supercomputer was hacked, or it could be said to be attacked.
All of a sudden, the laboratory exploded!
………………… Richard broke out in a cold sweat.
Last year, ibm made supercomputer asci, white!Just finished, he participated in some of the test projects, took advantage of the convenience to leave a back door in it, and then connected to it, using the world's fastest supercomputer as his own broiler. proud thing.
However, just now, Chinese hackers actually tracked down this supercomputer. Richard thought that he could rely on the high performance of this supercomputer to fight against the opponent, but the opponent directly controlled the hardware system, allowing thousands of processors to simultaneously The overloaded operation almost directly scrapped the highest scientific and technological achievement in the United States, the pride of the United States.
Fortunately, the defense system of this supercomputer is very good, and it can automatically log off and restart when it encounters danger, so it was saved.
However, this is also his last broiler!
All of his thousands of broilers were traced and reimbursed.
under!
It was his own well-built computer. He was sure that the other party could track it to his home.
Beep beep... As expected, my thoughts haven't stopped yet.
His computer quickly issued an alarm, someone maliciously invaded, his fingers flew quickly, one after another data was input, and each line of instructions changed rapidly, through these more than two hours of contact, he was familiar with the other party's attack methods to make up for himself computer defense.
However, it didn't last for 2 minutes. Richard's computer suddenly crashed, and there was a scorching sound.
Richard sat decadently on a chair, staring at the computer with blank eyes.
He knew that this time, he failed!
Moreover, the United States has also failed!
………………………………………………………………………………………………………………………………………………………………………….
The fighting happened two months ago and attracted the attention of countries all over the world, but it ended suddenly in May.The battle has attracted the attention of everyone with access to a computer since its inception.
The early adopters of computers were almost all technicians who knew some technical means.It's not like when everyone has a computer a few years later, [-]% of people only know how to turn it on and off and run office software.
More than [-] computer enthusiasts around the world are watching this battle.
At the beginning, the battle broke out, and more than a dozen top hackers from the United States participated in the attack. China lost many positions with almost no power to parry. In the end, it almost lost even China's portal station Zhonghua.
At this moment, mysterious Chinese hackers made a sudden move.
The strength is absolutely powerful, because more than a dozen top hackers in the United States were beaten back without any parry, and traced all the way to the opponent's lair, destroying the terminal.
Sixteen world-class hackers lost their combat effectiveness.
Chinese hackers all flooded into the US network at once, and several large websites were quickly occupied and their homepages were modified.
The first to be breached was the White House website, which had been breached once last time, and the homepage was quickly modified.
Then, America Online and msn were hacked one after another, and the homepage was modified.
At this time, the White House spokesperson quickly made a public statement, saying that the interests of the United States have been damaged, and the FBI and CIA will intervene in the investigation. At the same time, the US government computer maintenance agency will quickly intervene.
And the Chinese hackers are rapidly expanding their achievements, hacking all the major portals in the United States. The biggest one is of course Yahoo!, the global representative of Internet products!
Uemura is sitting in the basement of Yahoo headquarters at this time, where Yahoo's main server is located, constantly monitoring the data reflections one by one.
suddenly!
Rows of data jumped out.
Someone has invaded.
Finally it was Yahoo's turn.
Uemura was quickly shouting loudly: "Enter the battle!"
Dozens of technicians who had been prepared for a long time quickly operated their own computers.
At this time, in addition to the attack data, dozens of external data entered at the same time, demanding to fight the Chinese hackers together. These are the top hackers who replaced their computers and the masters of the US National Computer Center!
Uemura quickly passed the request.
At this time, the computer elites from all over the United States were really assembled, and Uemura Masa's face flushed with excitement. He is a master, and he is eager to see more powerful masters.
This time, the mysterious hacker who suddenly appeared in China made him see more powerful and unimaginable methods.
"I'm going to shut down Yahoo's servers for a day!"
This line of Chinese characters appeared on Yahoo's home page.
Uemura and other top computer experts in the United States were shocked. Unexpectedly, without a sound, the other party had already entered the server and directly changed the information of the main business?
Next up!
The server sub-equipment in the basement shut down automatically, and the lights that were on went off one by one.
Technicians promptly report the situation.
Uemura was sweating profusely typing on the keyboard to check the defense, but at this time there were more than 30 people sweating profusely like him, and there was nothing they could do together.
1 minutes later!
Yahoo's main server is down.
(To be continued)
In just 2000 minutes, 10 of the more than [-] broiler computers around the world that Richard had operated for more than ten minutes disappeared, all of them crashed and disconnected, and they have since escaped his control.What he didn't know was that the motherboards of those computers were burned directly.
However, Richard didn't want to think so much at this time, because the other party was still tracking him through the springboard broilers one by one.
Richard is one of the top hackers in the United States. He did not participate in the hacker war two months ago. This time he was brought together by another top hacker, Robert.
Perhaps, his name is not as famous as Kevin and Mitnick, but in the world of hackers, his skills are not bad, and he is recognized as the world's top hacker.
And Robert surpassed Kevin in destructive power.
The world-famous worm virus was created by Robert, and it was accidentally distributed, causing immeasurable damage.It is also he who made the world aware of the dangers on the Internet and promoted the development of the Internet security industry.
"Robert, we are in trouble, we are in big trouble, who is the other party?"
Richard had a voice connection with a few hackers familiar to Robert, and said loudly: "We are about to win, and the other party will fight back at this time."
Robert didn't say much, just said: "I lost [-] remote broilers, one of which is a server of the French government, and the other party is very powerful."
Yes!
This is the unified view of all the hackers who participated in the battle and watched the battle - very powerful.
…………………………… In the office building of a company in Berlin, Germany, the computers of fifteen employees suddenly crashed for no reason, and then there were several electric sounds, and then there was a burning smell.
The company's technicians quickly came to repair, and were told that the main board was short-circuited, and several components were burned out, making it unusable and the main board had to be replaced.
The same happens in England, France, Russia, Japan, Hong Kong, Malaysia, Mexico, Australia, Canada...and, America!
Within two hours, the motherboards of tens of thousands of computers were burned.
At this time, the flames of war had just reached the United States.
Kevin was sitting in his humble room, his face covered with sweat. He had just been released from prison, and he was monitored every day, and he couldn't unlock the computer, so he didn't manage a few broiler springboards at all, and was directly pursued by rapid attacks. He had no choice but to Don't use all your wisdom to deal with it and escape the opponent's tracking.
However, after the battle lasted for two hours, they finally failed to avoid the opponent's data tracking.
"Oh...no..."
Chi... um... Kevin just yelled that the computer he had used for less than three hours was scrapped, shutting down automatically, and emitting a burnt smell. He didn't need to look to know that the hardware had been burned.
Boom... Kevin punched the main box, and cursed in a low voice: "Shit, what kind of software is this? Such a powerful anti-tracking capability?"
In the computer field, Kevin has always regarded himself as a god-like existence, because he feels that as long as there are zeros and ones, then he is omnipotent.
The first setback was when he confronted Uemura Masa. Uemura successfully traced his address and cooperated with the police to arrest him.The second time, this time, Kevin knew very clearly that the other party was a person, and he didn't even target him specifically. It was just an automatic counterattack program, and he was dealt with.Of course he knew that the American hackers who participated in the battle like him probably didn't feel well.
Kevin was very surprised—how could there be such a powerful master in China, a place where computers have just become popular?So far, he doesn't even know what method the other party used, what programming language, what mechanism!
However, just being able to track and counterattack, and burning the hardware every time it encounters a terminal, is already terrifying.
In comparison, some viruses that appeared before, such as worms, are not worth mentioning.
……………………asci, white!It is the name of a supercomputer, and it is also the fastest supercomputer in the world at this time. It was manufactured by IBM, the most well-established computer company in the United States, for the US Department of Energy.The highest speed reaches 12.3 trillion floating point operations per second.
This computer is used to simulate nuclear tests.
But at this time, the supercomputer in the secret laboratory suddenly experienced an abnormality. In an instant, thousands of processors were rapidly overloaded, the voltage in the entire laboratory increased rapidly, and the temperature rose sharply. After [-] minutes, the supercomputer with the fastest calculation in the world at this time suddenly logged off, then restarted, and returned to normal.
The technicians quickly checked and came to a conclusion that in just ten seconds, the world's fastest supercomputer was hacked, or it could be said to be attacked.
All of a sudden, the laboratory exploded!
………………… Richard broke out in a cold sweat.
Last year, ibm made supercomputer asci, white!Just finished, he participated in some of the test projects, took advantage of the convenience to leave a back door in it, and then connected to it, using the world's fastest supercomputer as his own broiler. proud thing.
However, just now, Chinese hackers actually tracked down this supercomputer. Richard thought that he could rely on the high performance of this supercomputer to fight against the opponent, but the opponent directly controlled the hardware system, allowing thousands of processors to simultaneously The overloaded operation almost directly scrapped the highest scientific and technological achievement in the United States, the pride of the United States.
Fortunately, the defense system of this supercomputer is very good, and it can automatically log off and restart when it encounters danger, so it was saved.
However, this is also his last broiler!
All of his thousands of broilers were traced and reimbursed.
under!
It was his own well-built computer. He was sure that the other party could track it to his home.
Beep beep... As expected, my thoughts haven't stopped yet.
His computer quickly issued an alarm, someone maliciously invaded, his fingers flew quickly, one after another data was input, and each line of instructions changed rapidly, through these more than two hours of contact, he was familiar with the other party's attack methods to make up for himself computer defense.
However, it didn't last for 2 minutes. Richard's computer suddenly crashed, and there was a scorching sound.
Richard sat decadently on a chair, staring at the computer with blank eyes.
He knew that this time, he failed!
Moreover, the United States has also failed!
………………………………………………………………………………………………………………………………………………………………………….
The fighting happened two months ago and attracted the attention of countries all over the world, but it ended suddenly in May.The battle has attracted the attention of everyone with access to a computer since its inception.
The early adopters of computers were almost all technicians who knew some technical means.It's not like when everyone has a computer a few years later, [-]% of people only know how to turn it on and off and run office software.
More than [-] computer enthusiasts around the world are watching this battle.
At the beginning, the battle broke out, and more than a dozen top hackers from the United States participated in the attack. China lost many positions with almost no power to parry. In the end, it almost lost even China's portal station Zhonghua.
At this moment, mysterious Chinese hackers made a sudden move.
The strength is absolutely powerful, because more than a dozen top hackers in the United States were beaten back without any parry, and traced all the way to the opponent's lair, destroying the terminal.
Sixteen world-class hackers lost their combat effectiveness.
Chinese hackers all flooded into the US network at once, and several large websites were quickly occupied and their homepages were modified.
The first to be breached was the White House website, which had been breached once last time, and the homepage was quickly modified.
Then, America Online and msn were hacked one after another, and the homepage was modified.
At this time, the White House spokesperson quickly made a public statement, saying that the interests of the United States have been damaged, and the FBI and CIA will intervene in the investigation. At the same time, the US government computer maintenance agency will quickly intervene.
And the Chinese hackers are rapidly expanding their achievements, hacking all the major portals in the United States. The biggest one is of course Yahoo!, the global representative of Internet products!
Uemura is sitting in the basement of Yahoo headquarters at this time, where Yahoo's main server is located, constantly monitoring the data reflections one by one.
suddenly!
Rows of data jumped out.
Someone has invaded.
Finally it was Yahoo's turn.
Uemura was quickly shouting loudly: "Enter the battle!"
Dozens of technicians who had been prepared for a long time quickly operated their own computers.
At this time, in addition to the attack data, dozens of external data entered at the same time, demanding to fight the Chinese hackers together. These are the top hackers who replaced their computers and the masters of the US National Computer Center!
Uemura quickly passed the request.
At this time, the computer elites from all over the United States were really assembled, and Uemura Masa's face flushed with excitement. He is a master, and he is eager to see more powerful masters.
This time, the mysterious hacker who suddenly appeared in China made him see more powerful and unimaginable methods.
"I'm going to shut down Yahoo's servers for a day!"
This line of Chinese characters appeared on Yahoo's home page.
Uemura and other top computer experts in the United States were shocked. Unexpectedly, without a sound, the other party had already entered the server and directly changed the information of the main business?
Next up!
The server sub-equipment in the basement shut down automatically, and the lights that were on went off one by one.
Technicians promptly report the situation.
Uemura was sweating profusely typing on the keyboard to check the defense, but at this time there were more than 30 people sweating profusely like him, and there was nothing they could do together.
1 minutes later!
Yahoo's main server is down.
(To be continued)
You'll Also Like
-
Pirates: I plundered entries in the underwater prison!
Chapter 114 1 days ago -
Doomsday: Sign in to the planetary shelter at the beginning
Chapter 1376 1 days ago -
After Rebirth, I Became the Treacherous Minister Black Moonlight
Chapter 423 1 days ago -
Swallowed Star: Reborn Thunder Dragon King, Many Children, Many Blessings
Chapter 436 1 days ago -
The prince of heaven only wants salted fish
Chapter 295 1 days ago -
Participating in a money-saving variety show, earning billions because of stinginess
Chapter 109 1 days ago -
Mortal Cultivator
Chapter 334 1 days ago -
Galaxy Lich
Chapter 598 1 days ago -
The young man who cultivated the truth returned to the city
Chapter 668 1 days ago -
I don't want to be a heroic spirit
Chapter 207 1 days ago