Cyber Heroes
Chapter 364
In the arena of hackers, there are also "Wulin Conferences." They will compete in various ways.
And these "Martial Arts Conferences", of course, are also divided into two types.
First is to show your face. Such competitions are usually held offline. For example, the most famous one is the Pwn2Own hacker tournament hosted by ZDI, a network security service provider in the Pentagon of the United States. Many companies, including Software, Google, and Apple, have provided sponsorship. Internet companies on the side of the Republic also hold similar events.
These activities either require hackers to attack existing security software on the spot, or require them to solve certain technical problems. There are also confrontational offensive and defensive wars.
This type of competition has rich bonuses to attract experts from all walks of life.
Of course, even in this "white road" arena, hackers are still trying to challenge the rules. Some contestants will hack into the opponent’s computer to spy on the opponent’s problem-solving process, and then answer in advance; some contestants will hack into the organizer’s server to interfere with the opponent’s work; some contestants will be in the “limited number of participants” competition China secretly "over the wall" to find foreign aid.
If it is in a normal sporting event, this kind of unsportsmanlike behavior may be banned in various ways.
But in the hacker world, many people will only smile at this kind of behavior. It's just that the technology is not in place if it is discovered, and it is a very hacker-like behavior if it is not discovered.
This is still in the "White Road" competition.
The underworld competition is even more dangerous and treacherous.
Of course, it must be explained here that this does not mean that the technical level of the "underworld" must be higher than that of the "white way". It is possible that some famous experts in the "white hat" have a few "underworld" vests. It is possible that the most powerful thief in Dark World is an unknown cybersecurity officer.
The identities of the two can be changed with each other.
And the game on the underworld is more dangerous than the one on the white road.
It is said that a few years ago, a good person developed a new form of hacking competition. The "champion" will leave some "colors" on the preset server, perhaps a virtual currency, or some intelligence that can be sold (such as vulnerabilities that can be used to threaten cybersecurity service providers or even sovereign nations) ], and make arrangements here. The first person to get this piece of information is considered a victory. In that server, contestants can act wilfully.
Of course, this kind of thing is not without risk.
Participants may be directly dug up by the challenger’s "real name"
In the hackers’ world, the "real name and real surname"-the identity of the real world, just like The real name of the devil in the legend is the same.
In the "magic world" in the common fantasy of mankind, any prudent wizard regards his real name as the most cherished secret, and at the same time the greatest threat to his own life. Because once the enemy has his real name and surname, any common magic known to everyone can kill him. From Africa to the westernmost part of Europe, to Japan, which is the easternmost part of Asia, this kind of "speaking spirit belief" can be seen everywhere.
The world has changed with time. After the information revolution, "technology" allowed magic to come again, and people became worried about their real names again.
Once the enemy has his real name, and he is unwilling to be a running dog, then he can only show limited obedience to the person who holds his real name.
Of course, this point is the same for the "chall master". Only the most powerful electronic wizard can dare to open such a "hero challenge".
For the technicians of the Academy faction, this kind of competition is really hard to understand. They didn't understand why they had to take a huge risk, and they just breathed a sigh of relief.
But those cyber knights who wander in the gray area really enjoy it.
In the server prepared by the challenger, the hackers can do whatever they want. It doesn't matter whether it is a virus, a backdoor, or an escalation of rights, it all works.
Some guys who overestimate one's capabilities also want to make a name and become a challenger. This kind of person may even be hacked at the stage of "just spreading hero posts", and the server he prepared is filled with other people's "honeypots".
In short, it was a period of time when heroes competed.
Soon, the chaotic arena is over. A hacker with the ID "FirewallDragon" put an end to the chaos and gained a dominant position.
……………………………………
"Uh, wait..." Xiang Shan raised his hand and interrupted Colonel Lei's recounting: "That What’s the guy’s ID? FirewallDragon? Firewall Dragon?"
——This name...I feel really strong when I hear it!
It took a second or two for Colonel Lei to react: "Ah, yes, that's right, it is like this. FirewallDragon, the firewall dragon, seems to have some literary allusion——Speaking of Director Xiang, you This pronunciation...has to be practiced."
Guardian Hu also nodded: "It's a bit. Director Xiang, we are also peers, I probably understand you. But you are also working in an international place now. This English pronunciation is still more practiced."
Lei morning sun did not suspect him, and continued to tell: "The firewall dragon, the hacker, is indeed very dominant. Within five months, He played three heroes in a row and kept not one drop of water can leak out. He was called the "defender of the iron wall" and he was worthy of his name. However, half a year later, there was an ID of "Loki". '——That is, the hackers of'Loki' defeated him."
"In order to humiliate opponents,'Loki' hacked into the website of'Firewall Dragon' and left'Dragonisnotbrave' on the homepage, Ignisisbrave'[The dragon is not brave, Ignis is brave] text message. Ignis means'flame' in Latin. It is also considered to be a'spirit of fire' in some areas, and also has the meaning of'god of fire'. You may not know, so explain..."
Xiang Shan has a nodded expression that he has fully understood and even got some special smiles: "Oh, what then?"
"Then? In the second year, a hacker named'Agni'-the Chinese translation of'阿耆尼'" joined and defeated'Loki', and then changed the signature of part of the community of'Loki' to'Lokiisnotbrave' , Agniisbrave' [Loki is not brave, but Agni is brave]'Agni' and'Ignis' are synonymous words. "
Xiang Shan frowned: "Wait, according to the timeline you just mentioned, this incident was also six or seven years ago, right? This'agni', that is, Jakub Hartman was only ten years old at that time? Is the level already so high? And still playing so big? "
"It's not. Colonel Lei shook his head: "At that time, the ID of'Ajini' was not owned by Jakub Hartman. According to later intelligence, the first generation of "Ajini" should be the dragon of the firewall. He changed his ID and returned in a swirl of dust to take revenge and shame. "
Xiang Shan nodded: "Oh. "
"But this'Agiani' was dug out by Hartman's real name three years ago. The hacker with a criminal record was sent to prison by the FBI. Even if he was released from prison, he would have to face life-long restrictions on access to electronic products. "Colonel Lei said, "According to hackers' rules, the ID of'Ajini' belongs to him. It is said that Hartman's defense and anti-tracking techniques were taught online by the firewall dragon. "
Mr. Hu exclaimed: "It's a ruthless character." I'm afraid that in the eyes of this Hartman, this is called righteousness. "
Colonel Lei continued to be introduced: "This incident has formed a trend. Loki was originally a god of fire, a god of fraud, a god of lies, and a god of mischief. It fits the aesthetics of some hackers, so in the hacker world, it can be regarded as a'not too rare ID'. And Ignis and Agni should have been just Battle Qi in a small circle. But it unexpectedly gave out a signal-this is the battle between'Vulcan' and'Vulcan'. "
"So, the ID of the "Vulcan" in various myths was dug up and used as the name of the hacker. From that time on, holding the Vulcan vest was the most beautiful thing for hackers. It is precisely because of this that the hacker's arena is more regular. "
Xiang Shan was taken aback: "It means..."
"en. If the loser admits defeat and agrees to hand over the vest, the winner will stop there. Don't dig the real name of the loser. This kind of arena has become more orderly. This has also become a kind of "rules of the rivers and lakes", a kind of "cultural phenomenon". It can be said to be a kind of "martial virtue". "
Xiang Shan nodded: "Understood. The Imperial Court eagle dog and scum of the Imperial Court like Hartman have no virtue. "
Although Colonel Lei wanted to point out that "everyone present has official identities. Isn’t it a bad idea to use the term "Imperial Court Eagle Dog"", but he still conscientiously explained: "In the face of the public In the community, hackers don’t do anything. But in the hacker's own community, hackers will avoid using IDs with the name of Vulcan. You Leng Touqing accidentally took a related one, and it is very likely that the blind guy will dug up his real name, and will not be able to go deep into the circle from then on. Everyone will consciously maintain the majesty of the expert. "
"However, at the same time, outside the competition, hackers wearing Vulcan vests will become the hunting targets of those who want to be famous and often face challenges. "
"It can be said that every "Vulcan" is a hacker of thousands hammers, hundred refinements, skilled in technology. "
Xiang Shan said: "Then this'Zhu Rong' may be from our Republic?" "
"This is not necessarily true. "Lei Morning Sun shook his head: "'Ajini' is the god of fire in Indian mythology, but the two'Ajini' were born in the United States. Wearing the name of the Roman god of fire "Vulcan" is actually an Indian. Japanese hackers have the ID of the Greek god of fire "Hephaestus". They were also obsessed with the ID of'Kagutu Ming', but they couldn't get it. "
"After all, this ID is globally competitive. Even if the first person to apply is from his own cultural background, the person who snatches it may not necessarily be the case. Moreover, cultural integration is a major trend now, and it is common to like foreign myths and stories. "
Xiang Shan nodded: "In other words, we don't know anything about'Zhu Rong' now?" What about other "Vulcans"? "
You'll Also Like
-
The original god's plan to defeat the gods is revealed, starting with the God of Fire saving th
Chapter 117 1 days ago -
The end of the world: My refuge becomes a land of women
Chapter 430 1 days ago -
Return to Immortality: One point investment, a billion times critical hit!
Chapter 120 1 days ago -
Steel, Guns, and the Industrial Party that Traveled to Another World
Chapter 764 2 days ago -
The Journey Against Time, I am the King of Scrolls in a Hundred Times Space
Chapter 141 2 days ago -
Start by getting the cornucopia
Chapter 112 2 days ago -
Fantasy: One hundred billion clones are on AFK, I am invincible
Chapter 385 2 days ago -
American comics: I can extract animation abilities
Chapter 162 2 days ago -
Swallowed Star: Wish Fulfillment System.
Chapter 925 2 days ago -
Cultivation begins with separation
Chapter 274 2 days ago