Rebirth of the Tech Madman
Chapter 691 Don't want this order, just wait and see
Tang Huan's disciple is named Rich Skrenta. He is very young and is still in college. However, after careful training, he can still be independent in the field of computer security. ,The latest chapter access: ШШШ..СоМ.
Back then, Rich Skrenta was a brat. He dared to think of a way when he was in middle school. He flew from Pittsburgh to Las Vegas to visit COMDEX by himself. The edited ElkCloner virus was copied into the latest Fangyuan personal computer to observe the reaction, and the result was chaos.
Due to the attention of the media, Tang Huan did not deal with this little thing. Instead, he sent him to Cupertino, Silicon Valley, for a visit, while notifying his parents to lead him.
However, after Tiancai became one with the bear child, his thinking became more and more different from ordinary people. Rich Skrenta, who was overwhelmed by the dazzling technology of the Cupertino R\u0026D Center, clamored to learn from Tang Huan.
It must be admitted that all living beings in the technical field are divided into different classes and have their own positions. Even if most people are smart, they are still only suitable for working as blue-collar workers on the assembly line. For the minority of 'sexuality', ∠79 novel network, m. is suitable to stand in the front as the captain, and realize the creativity and execution ability into the development force.
Tang Huan saw that Rich Skrenta had the qualifications of the latter, coupled with the media's fanning the flames, he half-pushed and acquiesced to this matter.
It is conceivable that Rich Skrenta's life path has naturally undergone a major turning point when he got into this relationship with the Silicon Valley tycoon and the richest man by chance. For the most important thing for young people to strive for-opportunity, you don't have to worry about it since then up.
Tang Huan didn't miss it. Rich Skrenta is indeed a talent, and he has honed his skills in the emerging field of computer security.
The story of this bear child quickly transforming into a real technical elite just reflects a phenomenon in the IT industry-aspiring people are not old, and those who have no ambitions can live a hundred years. Many outstanding achievers are so young that people are jealous.
The team led by Rich Skrenta, which also includes two researchers from Symantec, is characterized by a lot of energy. After arriving at Pacific Telecom's computer room, they immediately started working Status, night battles, and system logs and other clues to investigate.
Because he knew that his teacher wanted to know the extent of Pacific Telecom's dereliction of duty in this safety accident, Rich Skrenta turned around and sent the results of the preliminary judgment.
The computer system has this advantage, no matter how elaborate it is on the surface, the binary data inside will not lie - Pacific Telecom does not dare to make up for mistakes such as deletion. The quality has changed again, and nothing has become something!
According to Rich Skrenta,
Pacific Telecom is indeed a little wronged. Its engineers are actually very serious about their work, but the problem is that the transition from the old mainframe system to the more advanced Fangyuan server system requires a complicated process. Even though the security policies are similar, but in specific There are still obvious differences in the way of implementation.
The compromised mainframe is about to be decommissioned, and the data involved is being migrated to the Fangyuan server in stages. It may be for the convenience of work, so that there is a 'hole' in the permission configuration of the connection between the different systems that is already a short board. Then he was taken advantage of by the hacker.
After Tang Huan saw this result, he couldn't help grinning, because it was not far from the outside world's discussion, and it might be used by some competitors to make a big fuss.
Since AT\u0026T was split into one big and seven small, Pacific Telecom has become the most noticeable of the seven gourd babies.
Compared with the other six small bells, Pacific Telecom is much more 'radical' in its development. One of its major manifestations is that it actively develops new businesses and has tasted great sweetness.
For example, Pacific Telecom overcame various technical difficulties and took the lead in implementing the caller ID function, which immediately scratched the user's itch and made the previous investment get a good return. Even other telecommunications companies did not hesitate to save time. Spend 'premium' to introduce this proven successful application.
Caller ID is just a small test of Pacific Telecom. Its bigger move is to fully introduce the most advanced digital communication technology, and then cooperate with banks, insurance companies, public service companies and other units to provide users with information query services.
In terms of network construction, Pacific Telecom is also significantly faster than its peers, especially the speed of data connection services. In just a few years, it has spread from the original 300 bit rate to 1200 bit rate and 2400 bit rate. The central area reached 4800 bit rate, and even the experimental area reached 9600 bit rate.
You should know that although the demand for data services is increasing day by day at this stage, telecommunications companies tend to prefer a solution - don't you dislike the slow network speed, then apply for a few more lines.
As a result, telecom companies are making more and more money.
But Pacific Telecom ignored this ready-made method of making money, and always strived to achieve the fastest speed on one line, which made it very difficult for colleagues in the industry, as if they were not kind to users.
According to the evaluation of observers in the communication industry, although Pacific Telecom claims that its intensive upgrade, after the initial equipment investment, is more concentrated on the software level at the office end, and the cost control is more reasonable, but the investment of hundreds of millions must be there. .
More importantly, the current communication technology represented by ISDN is in the ascendant, and even Europe is ready to fully implement it, which makes the industry keep a cautious attitude towards the future direction of network development. But Pacific Telecom buried its head and tried its best to expand the traditional network. Aren't you afraid that it will be difficult to turn the ship's bow and lose your fortune?
Also, Pacific Telecom's early, full-throttle rush into the cell phone business was seen as a shaky venture.
However, the western United States is the territory of Pacific Telecom, and people can do whatever they want, ignoring such doubts at all, and still doing their own way as a distinctive star in the telecommunications industry.
Now Pacific Telecom can't play high-cold, your system has been hacked, how can you put on airs, the guy who usually feels that Pacific Telecom breaks the rules and makes everyone passive, can't help but gloat.
Of course, as a listed company, Pacific Telecom's share price has inevitably been affected.
Seeing this situation, Pacific Telecom's board of directors couldn't sit still, and quickly suggested to Tang Huan: Mr. Chairman, you should go back to the headquarters in San Francisco. Let's hold a meeting to discuss it.
How could Tang Huan be willing to have his rhythm disrupted? So he calmly asked Chuck Smith, CEO of Pacific Telecom, to send a message: You are responsible for the specific work, and don't make any mistakes. As for investors' doubts about our future development direction, I will wait until I go to the Hannover Industrial Exhibition After the game is over, it just goes away.
The members of Pacific Telecom's board of directors who had gathered at the San Francisco headquarters were not so easy to appease. Seeing that Tang Huan stayed in New York and was unwilling to move, they flew to the eastern United States one after another and persistently sent the meeting over.
Tang Huan couldn't laugh or cry, couldn't even wait a few months? Alright then, let's all sit together, drink tea and crack sunflower seeds, chatting and chatting.
In fact, it is impossible to become a director of a large company with a market value of tens of billions of dollars without a city government. The reason why they came all the way here was to see with their own eyes whether Tang Huan was really as stable as Mount Tai.
However, when they saw their chairman of the board of directors calmly playing bowling with a group of dolls in a club, everyone was still shocked—how much nerves were needed for this!
In this way, the board meeting, which was originally planned to be serious and tense, turned into a lively and interesting leisure activity.
Soon, another piece of fun came over. Rich Skrenta, who went to Pacific Telecom to investigate and evaluate security incidents, unexpectedly met the hacker who hacked Pacific Telecom's mainframe on America Online's BBS, and started to do it.
It can only be said that the thinking of hackers these days is relatively simple - if you don't show off, you will feel uncomfortable, and if you don't show off, you will die. Maybe this person is more extreme, and he talked a lot in the original forum board, and even let it go He said: I know, maybe Pacific Telecom and even people from the FBI have already squatted here. If you have the ability, you can follow me. I also heard that the richest man is very skilled. I don't know if he has changed. It became 'once'. I captured your telecommunications company, why don't you show up in person and let's play together.
Seeing that the other party dared to provoke his teacher, Rich Skrenta quit, and immediately said: How can you use a bull's knife to kill a chicken? It is enough for me to accompany you. You are not qualified to challenge my idol.
These two people had such an argument in the forum, which immediately attracted a large number of users who were using other AOL services to watch. The son stared at the text scrolling on the screen, for fear of missing such a fun new event.
In fact, Rich Skrenta and the hacker whose ID is Condor spat at each other in the forum, it was not boring, it was also a kind of fighting.
Just like last year in the popular Kung Fu movie Jing Wu Heroes in the United States, Fumio Funakoshi played by Yasaki Kurata and Chen Zhen played by Li Lianjie deliberately used words to excite the generals and tried to disturb The mood of the other party.
The same is true of confrontation on the Internet. After you come and go, you can speculate on the opponent's thinking and behavior habits to a certain extent, and then help the next battle on the target host agreed by the two parties. Competition.
In the final analysis, the game of network security is a battle between people, so it is an extremely complex system engineering, and if you only know technology, you will fall into the lower class.
Rich Skrenta took the lead in throwing the bait to Condor: You must also understand that the mainframe you entered before is a mainframe that is about to be eliminated. So, even if you get control of it, you won't see If you are capable, it is very likely that you happened to meet during the 'handover' period of the system change. Now, we choose a host of the Fangyuan server system as the battlefield, do you dare to compete?
Under the live broadcast, Condor was obviously unwilling to back down, so after setting some conditions, he accepted Rich Skrenta's invitation, and the two of them officially engaged in direct confrontation——Condor is the spear of attack , Rich Skrenta is the defensive shield.
After Tang Huan got the news, he thought it was quite funny, but he didn't stop Rich Skrenta's approach, because the quality of personality is too important for a person who is in charge, and his own is cheap It is a rare opportunity for apprentices to practice their hands through actual combat.
In addition, Tang Huan also hopes to catch this lawless hacker—Nimma, there are so many telecommunications service providers in the United States, and there are seven local Bell companies alone. Why do you only focus on Pacific Telecom? Now that everyone has formed a bridge, it is time to discuss the truth.
How did you 'touch' the other party's bottom? Tang Huan asked in a relaxed tone on the phone.
Not a lot, but not too little. Rich Skrenta replied maturely: According to my judgment, this hacker whose ID is Condor should be about the same age as me, and his position is very likely to be In Los Angeles. I've set up the 'honeypot' and it's up to the other side to do it.
Los Angeles is one of the top three metropolises in the United States. If you want to find someone in this area, it is not an exaggeration to say that you are looking for a needle in a haystack.
Tang Huan didn't say much, but just reminded: Remember, you are not fighting alone. There is a strong backing behind you. If you need any resources, just ask them.
Rich Skrenta finally couldn't suppress the excitement in his heart, and said quickly: I have used the latest computer security research results. Although Condor is arrogant, but given My feeling is to watch an active little white mouse hump around.
You have maintained a good mentality. After a few words of encouragement to his disciples, Tang Huan hung up the phone and asked John Chambers, who walked in with a serious face, What happened?
Unfavorably affected by the information leak accident of Pacific Telecom, which widely used Fangyuan servers, we were out of the order competition of the computer system of the stock exchange. John Chambers replied with a heavy tone.
After listening to the other party's explanation, Tang Huan smiled coldly, It's no big deal, we don't want this order, the future will last forever, just wait and see!;
You'll Also Like
-
I'm a priest, it's reasonable for me to have a little more health and healing.
Chapter 383 2 hours ago -
Honghuang: Wu clan soldiers, plundering entries begin to rise
Chapter 125 2 hours ago -
This pirate is actually a sixth-rate
Chapter 170 2 hours ago -
When I Woke Up, I Became a Top Boss
Chapter 472 12 hours ago -
Pirates: The Strongest Experimental Subject at the Beginning.
Chapter 631 18 hours ago -
I will turn the Wanjie Mall continent into a primitive land.
Chapter 290 18 hours ago -
I just want to give the elves a home. What's wrong with that?
Chapter 236 18 hours ago -
Starting with Pokémon, and moving towards the pinnacle of beast control
Chapter 179 18 hours ago -
Elf: Become invincible from the moment you draw the Unbreakable Barrier!
Chapter 500 18 hours ago -
The Adventure of All Worlds Starting from Doupo
Chapter 1048 18 hours ago