Cyber Heroes

Chapter 366

In the afternoon of 2nd day, Xiang Shan found someone from Net Security.

"Do you want to talk to those hackers?" The Chief-In-Charge in the security department is a Frenchman. He scratched the slightly greasy curly hair and said, "This is not great, Director Xiang. After all, we are still in the park of the Rama project. If the other party touches it to the bottom, it will be a big mess."

Xiang Shan said: "Really not?"

"'Zhu Rong' is there, maybe other top hackers are also there. Assuming that the people on this website are also cream of the The crop’s black hat may be Zhu Rong himself.” Chief-In-Charge said: “There are all Peak hackers over there. I don’t recommend taking risks.”

Xiang Shan said: “Sorry, also Please think of a way. This is a job requirement."

While talking, Xiang Shan took out a meeting record: "In the morning, I communicated with other people in the research department. We agree. I believe that the ideas these hackers are discussing are very valuable. I have arranged a group to verify the key points they made. I think it is necessary to join the discussion."

"This..." Chief-In-Charge took the record and hesitated.

Xiang Shan said: "This is also to crack the'Olenmira Project' faster. Although the'Olenmira Project' may not be as important as the'Obatara Project', it It is a shortcut for us humans to understand the creators of'Ogun'."

Chief-In-Charge sighed: "I know. Today, the members of the network security department and the members of the'Hanuman Project' A meeting. We will temporarily fall into your wisdom. At the meeting, I will put forward your opinions and work with others on its feasibility. But please note that before we get the results, we must not have any disagreement with the “risk” community. Necessary information exchange."

Xiang Shan nodded.

The hacker community gathers the most elite "guerrillas" and the most destructive power criminals of this era. Especially the special place of the Rama project. The "intelligence" here has the potential to impact the existing social order.

Whether you upload data from here to the website or download data from the website, there are risks.

The former may reveal your own location, identity, or alert hackers.

In the latter case, it is possible for some dangerous codes to sneak into this park.

The people in these security departments are indeed the regular army, the elite of the country. However, at best they can only guarantee that "the enemy can be destroyed after the fact", but they cannot guarantee that "the intelligence will not be leaked."

Xiang Shan nodded and greeted: "Please. In addition, I hope I can temporarily join the work of your department."

The Chief-In-Charge was confused. "You? This..."

"I am also a programmer. Although I am better at hardware and low-level things, it’s okay to understand your discussions, right?" Xiang Shan said .

The Chief-In-Charge murmured. I don't know if he thinks that Director Xiang is reviewing his qualifications, or he thinks he is overestimate one's capabilities.

But now Xiang Shan is one of the biggest officials in this park. The rest are also equal to him. This seemingly nonsense requirement has actually been met.

After all, the 1st Stage of the "Olenmira Project", the director has proven his level as a scientist.

As expected by Jing Hongtu. Xiang Shan is easy to forgive even if there are some non-compliant operations-as long as the purpose of these operations is directed to the "project he researched", then everyone can easily forgive him.

Is a crazy scientist after all.

This is indeed a very good personality.

Xiang Shan sat in the Conference Hall of the network security personnel, just and honourable took out the voice recorder, and recorded the progress of this time there.

To be honest, the current progress of the "Hanuman Project" is really not very good.

The "risk" community is a completely anonymous online community. Its structure is very simple, almost no "unnecessary data" is stored, and there are almost no measures other than account passwords to protect user accounts.

At the same time, this community has also adopted distributed virtual servers, and even the application framework is written by a powerful individual or group of hackers. This website is not an ordinary small website that relies on a server in a small country.

When a user visits this fixed domain name, it will be temporarily allocated by the algorithm. From a bunch of voluntary proxy servers, three available ones are randomly selected to form a temporary data link, and the user can ping one The server IP available now.

But the 3rd-layer springboard is only 1st Step. For general illegal network behavior, the 3rd-layer springboard is enough, but these hackers are obviously not satisfied with what has been compromised by law enforcement agencies.

It can be understood like this. The "ontology" of the "risk" community exists in many different servers. Each piece is independent of each other. At the same time, each part is a backup of each other. No matter which part is destroyed, it can be backed up again, which is difficult to eradicate. The servers on which these "ontologies" are located may even be located in several completely different countries.

These "ontologies", or website source code, will even continuously transfer themselves to other servers.

And all the occupied part of the server together is the "complete virtual server" where this online community is located.

This community is like a large group of amoeba that exists on the Internet. It will constantly shift, split, and deform. This group of amoeba is still hiding in the muddy water, and it is difficult to see them. As long as these amoeba miss a part, they will grow again.

"Trashing" this website itself is a very difficult thing.

Every time Xiang Shan connects, there is also a huge risk.

However, Xiang Shan is a bit better. They represent the union of the most powerful political entities on this planet.

The entrance and exit of the "Internet" itself is managed by this consortium or its members.

On these foundations, the network security personnel of the Rama project can use the unimaginable resources of general black hats to disguise themselves.

In addition, they can also use huge resources to dig out everyone who connects to this website.

For example, they can send out some of their own servers, mix into those servers that are "jump nodes", and then use DDOS attacks to destroy most of the jump nodes that are not under their control. No matter how many broilers the hacker organization controls, there will be no more resources than these people have.

For another example, they can use certain techniques of criminal investigation or statistics to dig out the identity of most hackers on this website in the real world. This is what their violent organization is better at.

If a single country wants to kill a hacker den, there may be some political restrictions.

But the consortium behind the Rama project has no concerns.

The group of amoeba hides in the muddy water, but this violent entity can even evaporate the water pool in the worst case.

It’s just that, it’s not yet that's all.

Hackers don’t expect that they will be hit by this level.

Soon, after a long time of discussion, the people in the network security department found some solutions.

Of course, this is just an episode.

The focus of their current work is still looking for "points of information leakage."

They are looking for files that may be viruses in all the devices in the entire campus.

They still don’t know how this virus came about.

The only certainty is that the "infection" occurred in the park.

"Zhu Rong" is not a hacker who likes to spread Trojan horses. According to intelligence, all previous actions of "Zhu Rong" were targeted. He will attack those large technology companies, especially those that are trying to build some kind of technological barriers and technological hegemony. He will try his best to dig out the undisclosed technologies that companies control.

Sometimes, he also accomplishes this goal by hacking researchers who work in those companies. But most of its methods are to first manipulate the servers of those technology companies, and then use the servers of those technology companies to infect the personal devices of the researchers.

There is no record of ordinary people accidentally infected with the virus written by "Zhu Rong".

So the infection must have occurred when some scholars were communicating with that translation software company.

Other technicians have pretended to be police officers and went to that company-their police officer IDs are all pure gold, and they even have resumes that are too real.

But the biggest problem is that Ingrid is really just a name in that company. She has not participated in the work of that company in the past year.

Ingrid's equipment impossible is the first contact of the virus.

She was infected in the park.

This is scary. No one knows when this electronic virus infection occurred, or how many people were recruited. It is even difficult for you to know how many people's devices this thing exists in.

The entire park may be infiltrated like a sieve.

If it weren’t for "Zhu Rong" who didn’t know it and posted "Sita" on the Internet, and it happened to be noticed by the network security personnel of the "Rama Project", I’m afraid "Zhu Rong" could hollow out the information here. .

This is why the United States Congress is eager to send its own cream of the crop experts.

However, the original network security department of the Rama project is not really just doing it. At least they built a high wall to physically isolate the further loss of intelligence.

Now, they are desperately looking for possible virus samples. They hope that they can do something before the arrival of "Ajini" to restore their reputation

But there is still a gap in level.

Early in the morning of 3rd day, the matter still has no signs of resolution.

And a military vehicle also set off from the airport to the park.

Xiang Shan and several other Chief-In-Charge are waiting in the reception area.

Soon, a squad of the United States soldiers appeared.

They saluted Xiang Shan: "Gentlemen, the'cargo' has arrived."

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like