I really just want to be a scholar

Chapter 632 What is it, such a big tone?

Chapter 632 What is it, such a big tone?

I saw that on the big screen in the meeting room, the content had changed at some point, and it was replaced with a crude graffiti picture, which showed a tall man in sunglasses smoking a cigarette, and a kneeling and surrendering man stepped on his feet. There is also a line of bloody English: "You have lost! Weak chicken! (You have lost! Weak chicken!)"

Just like the picture displayed after the federation's website was hacked!

At first, everyone thought that a staff member sent out the previous screenshots again to boost morale, but the technicians soon realized that something was wrong, because the computer connected to the projection screen could not be controlled!

And this picture is still dynamic, the man in the sunglasses is stepping on the kneeling man, his movements revealing indescribable arrogance and arrogance.

This is by no means a screenshot!But it was really invaded!
After this thought flashed in my mind, everyone's expressions changed!
This emergency response meeting almost convened well-known computer security experts from all over the country. The number reached more than 300. It was necessary to ensure sufficient computer and network resources. It is difficult for ordinary hotels to have sufficient computer resources, so Chenghai University was finally chosen as the venue for the meeting. The conference center of the computer laboratory building.

Although Chenghai University is not a national-level backbone network center, its School of Computer Science is also ranked among the top ten universities in the country. Has been invaded!
Everyone was still discussing countermeasures, but in the end the enemy had swaggered "killed" in front of them!
If it was in wartime, it would be like the staff department being taken over by a bunch of people!

The experts and professors present only felt that their faces were hot, as if they had been slapped severely, especially the experts and professors of the School of Computer Science, Chenghai University, were even more distraught, and immediately got up and rushed to the computer room, looking for the source of the intrusion on the spot And to intercept and counterattack.

Longteng Zaitian's technicians were also in a hurry. This projection computer saved the PPT used for the previous explanation, and many technical details in it must not be stolen by intruders!
——Although the source code has been leaked and fell into the hands of the enemy, and these PPTs have been encrypted, if they are cracked, the enemy will still know more about the virtual reality of the security mechanism of Lime OS V3.5!
"Unplug the network cable first!" Seeing that the computer was completely out of control and unable to regain administrator privileges in a short period of time, Longteng Zaitian's technical director could only use the last physical disconnection method with a dark face, gritted teeth, and unwillingness.

No matter how powerful the enemy's hacking skills are, as long as the network cable is unplugged and the connection is disconnected, the computer cannot be remotely controlled or data stolen.

In fact, he also knew that it was futile. Before the other party put this picture to demonstrate, it is estimated that the data theft had already been completed. Disconnecting the network can only prevent the morale of the scene from being further reduced.

Just as the scene was buzzing and shouting, a harsh electronic synthesizer sound suddenly appeared from the loudspeaker in the conference room:
"Don't rush to unplug the network cable, it's useless, we can hack into this computer, and we can also hack into your other computers."

The speaker was speaking English, and everyone present had a good level of English, so naturally everyone could understand it.

This made everyone's expressions change even more.

There are cameras and loudspeakers used in video conferencing in the conference room. Now the enemy can use the loudspeaker to make a sound, which means that even the conference video system has been hacked, and the camera and the microphone have become the eyes and ears of the enemy!

In the turmoil of anxiety and anger, Yan Weizhou was about to stand up and answer, Yang Chengke held him down, walked to the camera in person, and said coldly: "Since you can understand Chinese, then speak Chinese."

The electronically synthesized voice made a strange laugh of "hehehe", and still said in English: "Now we are the winners, the rules are made by us, and you must abide by them!"

Yang Chengke ignored him, and continued to speak in Chinese: "You 'Black Skulls' invaded our network with such fanfare, and blatantly demonstrated, you probably want to negotiate conditions. What conditions do you want to raise?"

The electronically synthesized voice laughed loudly: "Hehehe, do you want to admit defeat? Our conditions are very simple. First, pay a ransom of 10 bitcoins; second, the Lime operating system must not be upgraded within five years and must maintain the status quo; third , shall not restrict the entry of foreign operating systems into the Xia country market through various forms..."

He raised ten conditions in one breath.

Everyone was in an uproar again, and at the same time, they were furious!

Yang Chengke, who had been trying his best to keep calm, couldn't help but turn pale.

This is simply a lion's mouth. The total price of Bitcoin alone exceeds 23 billion US dollars. The Lime operating system behind cannot be upgraded. That is to continue to maintain the current state of being slaughtered and invaded. It is impossible to be accepted, let alone the following eight conditions.

The voice of the electronically synthesized voice actually revealed a playful meaning: "I have already mentioned the conditions. I know that you have no right to make a decision, so I will give you 24 hours to consider. If you can't agree to us unconditionally by this time tomorrow All conditions, we will launch an all-round and unlimited attack, causing all your computers and servers installed with the Lime operating system to be completely paralyzed, and all data will be locked..."

The more people listened, the more chilled their hearts became. Whether the "Black Skull" can really do this is hard to say, but now that he can invade the network here and directly negotiate with everyone in this way, it shows that he is a super hacker. level.

The most important thing is that the source code of the security audit mechanism of the Lime operating system V3.5 was leaked, which caught our side off guard. At present, we have not thought of a countermeasure that can take effect in a short time!

24 hours is too short!
If there is a week, it’s fine, but it’s only 24 hours. No one is sure that the security mechanism loopholes in the current Lime operating system can be perfectly repaired in such a short period of time!

Listening to the arrogant voice of the "Black Skull" over there, everyone was shocked, angry and hated. Yan Weizhou clenched his fists even more angrily and reluctantly, not even noticing that the skin on his palm was pierced by nails!

This is simply a great shame to all the security experts present!
At this moment, a speech rate and frequency kept changing, and a very strange mechanical voice sounded abruptly: "Tsk tsk, what is the 'black skull', such a loud tone? Have you eaten garlic?"

In the next moment, the insulting graffiti picture on the big screen was suddenly pushed aside, and a huge red "Q" character appeared in the vacant place.

what happened?

Another intruder?
Sound like a "Black Skull" counterpart?Or a competitor?Can speak Chinese again...

All the people present were stunned, only Yan Weizhou recognized that this was the avatar icon of "Mr. Q", he was surprised and surprised, and Mr. Q made a move!
But Yang Chengke and Chen Jingxue were obviously relieved, especially Lao Yang, who had been delaying time by negotiating conditions just now, in order to wait for Qin Ke to complete the anti-invasion!
The electronically synthesized voice of "Black Skull" was obviously sluggish, showing uncertainty: "Who are you, how can you obtain the same level of administrator privileges? This is impossible! I have locked the account management function, only my account have administrator privileges."

Mr. Q sneered: "You have a Western proverb called 'Every dog ​​is a lion at home'. In Chinese, it means 'a frog at the bottom of a well, Yelang is arrogant'. It is the most suitable description for you. Letting go of the authority, relying on the internal response, you can hack in so easily? Do you think that if we didn't leak the source code on purpose, you can really get it? Can you be sure that there are no traps in the source code you got?"

While speaking, Mr. Q has turned off the camera permission of "Black Skull", so that they can no longer see the scene of the venue.

A series of rhetorical questions, as well as the accidental seizure of the video conferencing system authority, made the over there visibly shaken by suspicion.

"Nonsense, do you think you can scare us by putting on airs?"

"Hehe, scare? It's ridiculous that you fell into a trap without knowing it. I have locked your real IP that has jumped 17 times, and I have also found out where you are hiding. After 24 hours... no, after 20 hours, you You will receive my big gift bag, just wait. If you can last until this time tomorrow, I will write the word 'Q' upside down!"

I don't know what Mr. Q did. The graffiti pictures that originally occupied half of the big screen disappeared, and the electronically synthesized sound of "Black Skull" did not sound again.

All that's left on the big screen is a giant red "Q" character.

"Unfortunately, I can only meet with you in this way. Time is limited, so I will make a long story short. But before I speak, there are three suspicious gentlemen who need to be investigated and questioned separately." Mr. Q's speech rate is constantly changing, Listening to the extremely weird mechanical sound completely occupied the loudspeaker in the conference room.

Three Suspicious Gentlemen?Everyone was amazed and surprised, and their eyes all fell on the red "Q" character.

Three different mobile phone ringtones suddenly rang in the venue. The three of them picked up the mobile phones in a panic, as if they wanted to press the sound, but the ringtones kept ringing, completely uncontrollable.

Yang Chengke looked cold, and shouted: "Take these three people away!"

A few men dressed in black rushed over from the back row of the conference room, and quickly arrested the three experts who were struggling and screaming "What are you doing?" "Why are you arresting us?" "You are abusing power!" stand up.

The voice of "Mr. Q" sounded again in the conference room: "Without your internal response, the 'Black Skull' could have invaded here without anyone noticing it? It's just that you certainly didn't expect that all the networks here have been shut down. Monitoring is deployed, and all international data packets will be analyzed, deconstructed and restored! Your mobile phone has been locked, and you have no chance to destroy the evidence inside, just wait to be jailed!"

Everyone was shocked again. The faces of the three experts who were still struggling changed drastically. Some people wanted to throw their mobile phones on the ground and crush them, but there was no time. In less than a minute, the three had been taken away, waiting for their natural Be a professional interrogator with legal sanction.

When everyone looked at the bright red "Q" character on the big screen, their expressions became more complicated. No one knew how this mysterious person repelled the invasion of the "black skull" and how he controlled the mobile phone of the insider. The supernatural powers have surpassed everyone's imagination.

Yang Chengke cleared his throat, picked up the microphone and said, "This is 'Mr. Q', just like everyone else, he is the computer system security consultant we invited back. 'Mr. Q' is also someone who can be absolutely trusted. I have something to say to everyone, and I hope everyone will cooperate.”

Yang Chengke is a big man who is known to everyone present, and he is also the leader with the highest level present. Even Yan Weizhou has to respect him. Seeing him speak, everyone is a little more concerned about this mysterious "Mr. Q" I trusted him, especially when I saw his "supernatural powers" just now, suppressed the shock in my heart at this moment, and listened quietly.

"To make a long story short, I just frightened the 'black skull' just now, in order to prevent them from attacking Lime operating systems everywhere in a short period of time. And we must complete the operation on Lime within this period of time. The upgrade and optimization of the security audit mechanism of the system version V3.5. The workload is too heavy, and I need everyone's help. I have sent the specific work content to the mailbox of President Yan Weizhou, and he will assign tasks. If you don't want to 'black skull' ''s threat has become a reality, please do your best!"

After finishing speaking, the "Q" character on the big screen disappeared, and the original display content was restored.

Everyone was staring at me, unable to digest this series of shocking changes for a while.

However, many people gradually remembered the rumored mysterious team of experts who only had a code name and did not know the origin of their names. This "Mr. Q" showed such amazing strength that he was obviously one of them!
This made everyone more confident and motivated in addition to curiosity and admiration.

Originally, although they had been discussing all night like chicken blood, they had only come into contact with the security audit mechanism of Lime OS V3.5 for the first time. It was not easy to fully understand and absorb it in one night, let alone what It worked out.

There has been no results, and the consequence is that morale has begun to drop, and there is no hope that the loophole problem can be solved in just two days. Now such a strong leader suddenly appeared, and he witnessed Mr. Q's awesomeness. Blocking the momentum to suppress the arrogant "Black Skull", the confidence suddenly increased, and the enthusiasm surged up again, and they all surrounded Yan Weizhou to challenge.

Seeing this scene, Lao Yang and Lao Chen exchanged glances, and both breathed a sigh of relief.

To be honest, the two originally didn't want Mr. Q to be so conspicuous, but found that more than 300 experts were in a state of disunity due to the lack of a strong leader, unable to form a joint force, and their morale was getting lower and lower, so they quietly passed the satellite phone I contacted Qin Ke and asked him to be the organizer and leader to integrate the strength of the experts.

Just at this time, Qin Ke received a reminder from Shimmer that the anti-intrusion software he installed on Yan Weizhou's laptop found signs of intrusion, as well as abnormal data traffic sent internationally. Qin Ke decided to seize this opportunity and try Can you find out who is behind the scenes, so I discussed with Uncle Yang and Uncle Chen in this way...

Now everything is going smoothly. The computer connected to the large screen and the control video conferencing system is pre-installed with Qin Ke's original anti-intrusion software, so that Qin Ke can easily regain the administrator's authority from the "Black Skull". Taking advantage of Uncle Yang's delay, Weiguang traced the source of the attack, hacked 17 springboard machines one after another, and found out the real IP of the other party.

You should know that LV3's twilight is only slightly inferior to that of "Afal Dog", it has a complete network intrusion function library, and it has more than 200 servers as resource backing!

When purchasing these servers, Lime Technology, which was not short of money, purchased all the servers with the highest performance at present, making the computing resources of more than 200 servers comparable to [-] ordinary high-end home computers.

With such huge computing resources, coupled with intentional calculations and unintentional, traps are laid in advance to find out the real IP of the other party, even if the other party is a member of the top hacker organization "Black Skull". Not to mention using the Lime operating system (mobile version) to find out internal responses.

Not only that, but the experts in the conference room were also able to gather together, and Chairman Yan Weizhou, who was familiar with everyone's situation, assigned Qin Ke's prepared restoration plan tasks according to different professional fields.

After Qin Ke handed over the task decomposition and execution to Yan Weizhou, he disconnected himself from the conference room and began to direct Shimmer to prepare a big gift package for the "Black Skull".

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like