Reborn Technology Upstart
Chapter 580 Encountered a large-scale hacker attack
After dinner, he prepared to sit on the sofa with Pei Qing and watch TV for a while as usual. The two hugged each other. Although it was a bit of a waste of time, he felt it was necessary.
But not long after sitting down, someone knocked on the door suddenly, Ye Zishu stood up and opened the door, and there was a man in his twenties standing outside.
Ye Zishu knew this person. When he was the head of Phoenix Software Company, he was already an employee of the company. I don't know why he came here suddenly.
Seeing that it was Ye Zishu who opened the door, he said anxiously: "Mr. Ye, I'm really sorry. I guess you should be at Mr. Pei's place. I disturbed you. You are resting."
Seeing his appearance, Ye Zishu didn't care about it, and asked directly: "Did something big happen?"
Pei Qing, who was still sitting on the sofa just now, heard this, quickly stood up, walked towards the door, and asked, "What happened?"
The man didn't delay either, and immediately said: "The Phoenix Software Company encountered a large-scale hacker attack just now, although our defense line has not been breached yet, we guess this is just the first wave of tentative attacks.
According to the intensity of their first wave of attacks, they may face several times more attacks in the future. Just in case, we want to invite Mr. Ye to sit in charge. "
It turned out that it was this incident that surprised him a bit. The software companies under Phoenix Technology are all over the world, and they have never encountered such a situation until now.
Encountering this situation suddenly made people feel a little uncomfortable. He thought that he would not encounter large-scale network hacking attacks in the short term. After all, the most advanced technology was here.
What's more, Phoenix Software has its own network security business. If you really want to show off your power, you should choose soft persimmons, which are easier to succeed, so why bother with Phoenix Software, which is a hard bone.
But now that he has been invited to sit in the township, it seems that the intensity of this attack is very high, far exceeding Phoenix Software's psychological expectations.
"Why don't you go and have a look." Pei Qing said.
Ye Zishu nodded to Pei Qing and said, "Wait a minute, I'll go over together after I put on my coat."
After speaking, he returned to the house, put on his coat, took his own backpack, and immediately followed the man out. It was not far from Phoenix Software Company, and it took about ten minutes to arrive.
When I came to the network security department of Phoenix Software Company, it was already full of people, and many employees were called from home temporarily.
See Ye Zishu coming over,
The person in charge of the network security department immediately ran over and introduced the situation just now.
I saw him say: "We were not prepared for the first wave just now. Fortunately, our network security system has played a role, otherwise the consequences would be disastrous."
This is not a casual remark. Phoenix Software is only engaged in operating systems, databases, office software, Internet security and other businesses on the surface. In fact, they also provide key basic support for many brother companies.
For example, all the current supercomputers are entrusted to the management of Phoenix Software Company. Once the defense is broken, it means that a lot of data in the supercomputer will be leaked.
In addition, there is a large amount of technical information on their internal network. If all of them are obtained by the other party, many of their advantages in the software field may be lost.
As for the artificial intelligence deployed by Ye Zishu, there is no need to worry too much. He has made very strict security protection, not to mention that artificial intelligence is much better at network security than these hackers.
Although artificial intelligence has not yet reached the point where it can come and go freely and disappear without a trace on the Internet, it cannot compete with it by relying on the number of manpower.
"What kind of network attack mode did they adopt?" Ye Zishu asked.
"It is a technical cracking method. Maybe they wanted to crack it secretly before, but they didn't succeed, so they used a violent cracking method." The person in charge said.
"Do you know where all the cyber attacks come from? How many people are there?" Ye Shu asked.
"Attacks are launched in various places, almost in major developed countries, and even in some developing countries. We cannot judge which country or organization is the specific planner based on this.
According to the characteristics of attacks on us, the number of network attack terminals attacking us is about 10,000, which is already a very large number in the field of Internet security. " said the person in charge.
"Have you found their real IP?" Ye Zishu asked.
"No, our automatic security defense system does not have anti-tracking capabilities, it can only defend against the attack itself, and when we came over, they had already receded.
But I think they organized such a large number of people and launched such a huge attack, it is impossible to let it go, and they may launch a more violent attack after a while. " said the person in charge.
It is not easy to organize so many hackers to launch an attack together. Hackers often wander in the dark, and it is difficult to keep in touch for a long time.
This hacker attack must have been planned a long time ago, and then it took a long time to organize the manpower. If you give up so easily, you don’t know when it will be organized again.
"What kind of attack do you think they will take next?" Ye Shu asked.
"It's hard to say, maybe they will organize another technical cracking. After all, although the first time failed, there should be some gains. If they use brainstorming, they may think they have found a feasible solution.
It is also possible to use DDoS attacks to paralyze our services in this way, hoping to find opportunities that can be exploited.
If a DDoS attack is really adopted, even if it does not break through our network defense, it will have a great impact on our external services. " said the person in charge.
"I see, go get busy!" Ye Zishu said.
"Then what should we do next?" the person in charge asked.
Ye Zishu didn't have any idea at first, and the soldiers came to cover up the water and soil, but this sentence seemed to remind him, and he said: "Immediately make an announcement to disclose this large-scale hacking incident to the outside world.
When disclosing information, you must emphasize the strength of our automatic network defense system. If a crisis is not handled well, it is a danger, and if it is handled well, it is an opportunity.
Now that the Internet has just been built on a large scale, many individuals and companies have no objective understanding of hacker attacks. This time, the world will see how hackers attack and how dangerous they are.
In addition, you immediately contact Brother Internet Company to hype this incident, and let as many people as possible know about it, and everyone must know about it.
At the same time, we can also arrange for people to write related articles about hacker attacks, popularize Internet security knowledge for ordinary people, and introduce our Internet security defense system by the way. "
Having said all of this, the person in charge is not worthy of being the person in charge if he is not clear about it, so he immediately left ecstatically and made arrangements for these.
Phoenix Software's Internet security business has been tepid, but its personal business has a large market thanks to the Phoenix operating system.
It’s just that the personal business is basically free. Although it is stated in the user agreement that advertising may be commercialized, in order to improve the user experience, it has not been done so.
Membership was launched, but since people have free services to use, why use money to buy services, so the income of members is almost zero, and only a very small number of people who can't settle their accounts become members.
In terms of enterprise business, it mainly comes from the services of brother companies. In addition, there are not many companies that purchase their Internet security services, and the revenue of this business is negligible in their total revenue.
This time, we want to fight a battle in an upright manner, to make the whole world realize how powerful Phoenix Software's Internet security technology is, so that it will be easier to open up the international market.
As for the option of defense failure, he has never considered it. If even he can't defend, then who else can defend.
Seeing the person in charge leave, Ye Zishu picked up his laptop, only to "knock" on it, and finally stopped within half an hour.
In fact, a DDoS attack launched by tens of thousands of people is not terrible. It is impossible for such a small number of people to paralyze the service, but just in case, he should take some measures.
So I wrote an intelligent Internet security system, but the security defense system that comes with artificial intelligence itself is simplified a bit, but the effect is absolutely leveraged.
After finishing writing, Ye Zishu directly asked the employees here to deploy, this time it was no longer a passive defense, he wanted these hackers to be punished.
This intelligent security defense system, in addition to its powerful defense capabilities, also has powerful anti-tracking capabilities. It is very difficult to escape under its anti-tracking capabilities.
After reporting that the deployment has been completed, Ye Zishu asked him to help other companies upgrade their network security to prevent them from getting angry and directly attacking other industries under his umbrella.
Not to mention the software and Internet companies under his umbrella, they are physical companies that rely heavily on the Internet. Even if they can't break through, it will have a great impact on their business.
Just as Ye Zishu poured himself a cup of tea and was waiting for the other party to attack again, the global Internet exploded, and anyone who used his Internet products urgently pushed this news.
Even Kunpeng Information Technology Company produced relevant news on its own streaming platform and immediately pushed it to their audience.
As for search engines, portals, and various social platforms, not to mention, they are all headlines. With this kind of publicity, whether it is known to everyone, but Internet users, it is absolutely difficult to ignore this news.
The Qingluan Information Technology Company's blog and other platforms guide users to write knowledge about hackers, and more people are involved, either to eat melons, or to gain their own benefits from it.
You'll Also Like
-
One Punch Man in Infinity
Chapter 2 hours ago -
Saving Uchiha starts with flipping the table
Chapter 86 2 hours ago -
As the mastermind behind the scenes, he created the Lizardman!
Chapter 100 2 hours ago -
Let you spend money to collect beautiful slave girls?
Chapter 253 2 hours ago -
Live broadcast through ancient times, starting with Star Dome Railway
Chapter 79 2 hours ago -
Pokémon: I! The Shiny Champion!
Chapter 302 2 hours ago -
Extremely hot apocalypse: I emptied the icebergs at both poles
Chapter 498 2 hours ago -
Pirate Live: The beginning of the war at the top
Chapter 321 2 hours ago -
Uchiha girl, ignites a group pet war in Konoha
Chapter 289 2 hours ago -
I am just an adopted son, sisters, please stop bothering me
Chapter 344 2 hours ago