You are a black technology boss, you didn't say it sooner!
Chapter 74 Hacking
Lou Qingyan found that he liked Jiang Fu's "signature together" better than being sent a paper.
Moreover, the result was originally completed by the two of them together, and the signature should also be signed by the two of them together. There was no question of who would send it to whom.
"Then sign it together."
"Ah."
Jiang Fu continued to bury his head in reading the documents, while Lou Qingyan was beside him, swiping his phone boredly.
After an unknown amount of time, Jiang Fu felt his shoulders sink.
Lou Qingyan was half lying on the sofa, leaning his back, using his shoulders as a pillow.
Jiang Fu turned his head sideways, and his chin just brushed against the other's soft hair.There are strands of touch, and the tips of the broken hairs have small thorns, which are carefully tied.Dense itching, itching from the cheeks to the bottom of the heart.
In the hidden corner of his heart, something started to rampage again, and he suppressed it forcefully with self-control.
Lou Qingyan quietly raised the phone, turned on the camera, and looked back at it like a mirror, only to find that Jiang Fu's complexion hadn't changed, and even his posture for reading documents hadn't changed much, as if the sudden weight on his shoulders didn't exist.
"When the busy work is over, you have to study mathematics for me." Lou Qingyan said abruptly,
"What?" Jiang Fu didn't raise his head.
"Mathematical calculations are too annoying. I decided that if I publish articles in the future, I will throw every calculation problem to you."
Jiang Fu stopped moving.
After a while, he turned over a page of the document, looked at it and answered casually: "Since this is the case, the program part of my article will also belong to you in the future."
Lou Qingyan peeped at him from his mobile phone, and found that he was serious, focused, and staring at two meaningless illustrations.Seriously, as if you can see the peerless truth from those two pictures.
He snorted, "Okay, then it's settled."
It has been agreed that articles that can be signed together will be signed together.
The next morning, Xie Jin handed over the packaged complete engine and the castrated version of the open source program to Lou Qingyan.
The full version is posted on the official website, and the open source version is posted on github.
GitHub is a well-known code hosting website and the preferred publishing platform for open source code.
Lou Qingyan opened the background of the official website, and was about to upload the program, when suddenly - "Dididi!"
The firewall warning sounded crazily!
Lou Qingyan's reaction interval was almost zero, and he opened the command line in an instant to call up the DOS panel, and the actions of his fingers tapping on the keyboard had afterimages.The intelligent detection program is quietly opened in the background. This program will evaluate the operation of each service node in the computer, detect abnormalities through artificial intelligence, and output the results to Lou Qingyan's mobile phone.
The packet passing through the email stream reappears.
Not only that……
Anomaly detection results show that many network nodes have been tampered with, and the data flow between servers has been monitored!
Someone is hacking the deep space server!
And this person is so powerful that he can even make the firewall in deep space sound an alarm.At this moment, he may have entered the deep space intranet.
Being able to be invaded means that there is a loophole. Lou Qingyan knows that his firewall has loopholes, and abnormal data packets are the way of intrusion of this loophole.There are too many artificial intelligence programs in deep space that need to be trained. Up to now, the training of special effects plug-ins and echo dubbing is still going on, and the server has to process huge amounts of data every day.The firewall in deep space is not bad at all, what is bad is this little data screening ability.
Fortunately, the intrusion is progressive. After a hacker obtains a certain permission through a loophole, he needs to perform a series of operations to obtain more permissions.
This process was enough for Lou Qingyan to catch him out.
Sure enough, the other party pried open the corner of the authority through the data packet, and approached the server control core step by step.However, when the thief tried his best to dig a dog hole to get in, he didn't know that the owner of the house was watching him all the time.
After observing for a while, Lou Qingyan finally understood the purpose of the abnormal data packets intercepted earlier.
Because the data packets are both incoming and outgoing, it is certain that there is a ghost inside Deep Space, but since the other party can bribe the internal employees of Deep Space, why not trade with him offline instead of using encrypted data packets to communicate online?
Now Lou Qingyan understands that the purpose of encrypting data packets is not for communication, but just for stamping.Encryption is not important, stepping out this intrusion path is the most important thing.
Obviously, the other party can't get the secret from the ghost, so they can only choose to invade the server.
From this point of view, at least the insider is not a core employee of Deep Space, but an ordinary employee on the periphery who has no access to secrets but has access to the server.
Lou Qingyan doesn't take artificial intelligence technology seriously, and core employees can learn it after signing a non-disclosure agreement.He felt that these things would become popular in the future, and there was no need to keep them secret.
He didn't expect that the core employees of Deep Space were all consciously defending the company, and not a single traitor appeared—he didn't believe that no one outside had contacted them.
Time goes back to the present, under Lou Qingyan's deliberate laissez-faire, the intruding hacker finally entered the control center, and is about to gain full access to the server.
After obtaining the permission, he can unknowingly set up a data monitoring network in the deep space network, thereby stealing various keys transmitted back and forth in the network link, and opening various confidential files in the deep space server.
Lou Qingyan typed out a line of code in DOS.
Press Enter, and a program in the background starts instantly, and a roaring ghost suddenly appears in the middle of the screen, rushing towards the outside of the monitor with a very shocking visual effect, the volume of the computer is automatically adjusted to the highest level, and there is a hiss from the stereo There was a loud lung-cracking noise, "Wow--"
"Wow!" In front of a certain computer in the distance, a thin young man suddenly fell to the ground, and his mind went blank for five seconds.
"Xiao Wang, what are you doing?" The people around blamed one after another.
The environment he was in was obviously an office, and this hacker was so bold that he dared to invade the deep space server in the office.
Lou Qingyan didn't change his face, and continued to input dos commands. He knew that the other party would be stunned to a certain extent, and this was a good time to counter-track.
Following the opponent's path, the intelligent firewall began to trace back layer by layer.
Ten seconds later, the hacker on the opposite side returned to the computer.His sluggish brain finally told him that the invasion had been discovered and that he should evacuate immediately.
The hacker who can threaten the Deep Space Firewall is naturally unusual. He quickly came to his senses and immediately withdrew from the server without even erasing the series of traces he left behind.He knew that his opponent's skills were at an abnormal level, and it was good to be able to escape under such circumstances, so he never dared to think about anything else.
Fortunately, the difficulty of escaping and tracking is not in the same order of magnitude.
To retreat, you only need to exit the springboard broiler layer by layer—that is, the computer controlled by the hacker to disguise the IP, and erase the back door and traces.
Tracking requires hacking those springboards first, and then retrieving backdoors or traces from inside.Fortunately, after spending a while, I can find clues and trace them to the springboard on the next floor.Unfortunately it was not found at all, and the tracking broke down.
After exiting the three-tier springboard continuously and taking off the third-tier proxy ip, the hacker let out a sigh of relief.With the gap of three springboards, even if the opponent can catch up, it will take time.
On the first three springboards, he didn’t carefully erase the traces in order to save time. On the fourth floor, before exiting, he erased all the traces, deleted the back door in the computer, and killed the gangsters. Cleaned up the system so clean that there wasn't even a speck of junk.
"You chase, I'll see where you chase."
The hacker grunted and came to the fifth floor springboard.He was also cautious enough to put on so many layers of camouflage for himself.
Just cut to the system interface of the fifth floor, suddenly!
"Wow!"
Ghost head reappears!
"Wow!!!!!!"
The hacker collapsed to the ground again...
"whatthemotherfuck???" he cursed after recovering. "Foul! Foul! Why can you be ahead of me as a follower!!!"
"Little Wang???"
"Oh, it's okay... I'm playing games secretly, don't tell the manager."
Anyway, the top priority is to run away, but before he could get out of the broiler, the screen suddenly went black, and a 3D scene gradually appeared on the screen.
The hacker moved the mouse, then opened his mouth wide.He discovered that this was actually a three-dimensional maze scene.And I don't know what happened, the scene locked the entire screen, and I couldn't get out after exhausting all methods.
One minute later, the hacker found out in despair that he would either get out of the maze, or he would be trapped in the broiler to death.
According to the speed of the other party's tracking, when he walked out of the maze, the police probably came to the door.
"Hold!"
He cursed, kicked the power cord away, and the computer went black instantly.
He stood up from his seat, put on the hood of his sweater, and left in a hurry with his pockets in his pockets.
When the colleagues in the office saw him getting up, they thought he was going to the bathroom, and they didn't make a fuss.
Only one person said: "Xiao Wang, bring me a cup of coffee by the way, thank you."
"Alright, wait." Xiao Wang responded casually.
He then stepped out the office door, entered the elevator, and left the corporate building, never to return.
Although Xiao Wang cut off the power and internet in time, Lou Qingyan still traced his initial IP, and a name appeared in the text box in front of him.
Yuanhui Building.
Lou Qingyan noticed that something seemed wrong.
First, Yuanhui split, then Jiang Fu fans were used to attack Yuanhui, and now it is found that the hackers who invaded deep space are also in Yuanhui.
Two possibilities.First, the hacker did come from Yuanhui.Second, while the other party was trying to steal the secret, he wanted to throw the pot at Yuan Hui.
Lou Qingyan is inclined to the second possibility, that is, Jiang Fu and Shen Kong are both being used by someone behind the scenes to attack Yuan Hui, and at the same time, the other party is also coveting Shen Kong's artificial intelligence technology and trying to steal it.
Lou Qingyan thought for a moment, and then his first move was to call Xie Jin and ask Xie Jin to call the police.
The other party fled in a hurry and didn't have time to clean up, so it was easy to track, and the Internet police should be able to find Yuan Hui soon.
He didn't care if Yuan Hui was framed, anyway, he had nothing to lose.
If there is really another mastermind behind the scenes, it is a good time to use this to draw out the opponent's next move.
After reporting to the police, Lou Qingyan opened the background of the official website of the terminal engine - he was going to upload the program.
The terminal engine is a big killer. Once it is released, deep space will become the center of the world in an instant.
Lou Qingyan opened the source file of the official website, deleted all the information related to deep space, made up a non-existent team, and finally hung up the terminal engine.
At the same time, on github, create an account with this made-up team name, and release the open source program.
Moreover, the result was originally completed by the two of them together, and the signature should also be signed by the two of them together. There was no question of who would send it to whom.
"Then sign it together."
"Ah."
Jiang Fu continued to bury his head in reading the documents, while Lou Qingyan was beside him, swiping his phone boredly.
After an unknown amount of time, Jiang Fu felt his shoulders sink.
Lou Qingyan was half lying on the sofa, leaning his back, using his shoulders as a pillow.
Jiang Fu turned his head sideways, and his chin just brushed against the other's soft hair.There are strands of touch, and the tips of the broken hairs have small thorns, which are carefully tied.Dense itching, itching from the cheeks to the bottom of the heart.
In the hidden corner of his heart, something started to rampage again, and he suppressed it forcefully with self-control.
Lou Qingyan quietly raised the phone, turned on the camera, and looked back at it like a mirror, only to find that Jiang Fu's complexion hadn't changed, and even his posture for reading documents hadn't changed much, as if the sudden weight on his shoulders didn't exist.
"When the busy work is over, you have to study mathematics for me." Lou Qingyan said abruptly,
"What?" Jiang Fu didn't raise his head.
"Mathematical calculations are too annoying. I decided that if I publish articles in the future, I will throw every calculation problem to you."
Jiang Fu stopped moving.
After a while, he turned over a page of the document, looked at it and answered casually: "Since this is the case, the program part of my article will also belong to you in the future."
Lou Qingyan peeped at him from his mobile phone, and found that he was serious, focused, and staring at two meaningless illustrations.Seriously, as if you can see the peerless truth from those two pictures.
He snorted, "Okay, then it's settled."
It has been agreed that articles that can be signed together will be signed together.
The next morning, Xie Jin handed over the packaged complete engine and the castrated version of the open source program to Lou Qingyan.
The full version is posted on the official website, and the open source version is posted on github.
GitHub is a well-known code hosting website and the preferred publishing platform for open source code.
Lou Qingyan opened the background of the official website, and was about to upload the program, when suddenly - "Dididi!"
The firewall warning sounded crazily!
Lou Qingyan's reaction interval was almost zero, and he opened the command line in an instant to call up the DOS panel, and the actions of his fingers tapping on the keyboard had afterimages.The intelligent detection program is quietly opened in the background. This program will evaluate the operation of each service node in the computer, detect abnormalities through artificial intelligence, and output the results to Lou Qingyan's mobile phone.
The packet passing through the email stream reappears.
Not only that……
Anomaly detection results show that many network nodes have been tampered with, and the data flow between servers has been monitored!
Someone is hacking the deep space server!
And this person is so powerful that he can even make the firewall in deep space sound an alarm.At this moment, he may have entered the deep space intranet.
Being able to be invaded means that there is a loophole. Lou Qingyan knows that his firewall has loopholes, and abnormal data packets are the way of intrusion of this loophole.There are too many artificial intelligence programs in deep space that need to be trained. Up to now, the training of special effects plug-ins and echo dubbing is still going on, and the server has to process huge amounts of data every day.The firewall in deep space is not bad at all, what is bad is this little data screening ability.
Fortunately, the intrusion is progressive. After a hacker obtains a certain permission through a loophole, he needs to perform a series of operations to obtain more permissions.
This process was enough for Lou Qingyan to catch him out.
Sure enough, the other party pried open the corner of the authority through the data packet, and approached the server control core step by step.However, when the thief tried his best to dig a dog hole to get in, he didn't know that the owner of the house was watching him all the time.
After observing for a while, Lou Qingyan finally understood the purpose of the abnormal data packets intercepted earlier.
Because the data packets are both incoming and outgoing, it is certain that there is a ghost inside Deep Space, but since the other party can bribe the internal employees of Deep Space, why not trade with him offline instead of using encrypted data packets to communicate online?
Now Lou Qingyan understands that the purpose of encrypting data packets is not for communication, but just for stamping.Encryption is not important, stepping out this intrusion path is the most important thing.
Obviously, the other party can't get the secret from the ghost, so they can only choose to invade the server.
From this point of view, at least the insider is not a core employee of Deep Space, but an ordinary employee on the periphery who has no access to secrets but has access to the server.
Lou Qingyan doesn't take artificial intelligence technology seriously, and core employees can learn it after signing a non-disclosure agreement.He felt that these things would become popular in the future, and there was no need to keep them secret.
He didn't expect that the core employees of Deep Space were all consciously defending the company, and not a single traitor appeared—he didn't believe that no one outside had contacted them.
Time goes back to the present, under Lou Qingyan's deliberate laissez-faire, the intruding hacker finally entered the control center, and is about to gain full access to the server.
After obtaining the permission, he can unknowingly set up a data monitoring network in the deep space network, thereby stealing various keys transmitted back and forth in the network link, and opening various confidential files in the deep space server.
Lou Qingyan typed out a line of code in DOS.
Press Enter, and a program in the background starts instantly, and a roaring ghost suddenly appears in the middle of the screen, rushing towards the outside of the monitor with a very shocking visual effect, the volume of the computer is automatically adjusted to the highest level, and there is a hiss from the stereo There was a loud lung-cracking noise, "Wow--"
"Wow!" In front of a certain computer in the distance, a thin young man suddenly fell to the ground, and his mind went blank for five seconds.
"Xiao Wang, what are you doing?" The people around blamed one after another.
The environment he was in was obviously an office, and this hacker was so bold that he dared to invade the deep space server in the office.
Lou Qingyan didn't change his face, and continued to input dos commands. He knew that the other party would be stunned to a certain extent, and this was a good time to counter-track.
Following the opponent's path, the intelligent firewall began to trace back layer by layer.
Ten seconds later, the hacker on the opposite side returned to the computer.His sluggish brain finally told him that the invasion had been discovered and that he should evacuate immediately.
The hacker who can threaten the Deep Space Firewall is naturally unusual. He quickly came to his senses and immediately withdrew from the server without even erasing the series of traces he left behind.He knew that his opponent's skills were at an abnormal level, and it was good to be able to escape under such circumstances, so he never dared to think about anything else.
Fortunately, the difficulty of escaping and tracking is not in the same order of magnitude.
To retreat, you only need to exit the springboard broiler layer by layer—that is, the computer controlled by the hacker to disguise the IP, and erase the back door and traces.
Tracking requires hacking those springboards first, and then retrieving backdoors or traces from inside.Fortunately, after spending a while, I can find clues and trace them to the springboard on the next floor.Unfortunately it was not found at all, and the tracking broke down.
After exiting the three-tier springboard continuously and taking off the third-tier proxy ip, the hacker let out a sigh of relief.With the gap of three springboards, even if the opponent can catch up, it will take time.
On the first three springboards, he didn’t carefully erase the traces in order to save time. On the fourth floor, before exiting, he erased all the traces, deleted the back door in the computer, and killed the gangsters. Cleaned up the system so clean that there wasn't even a speck of junk.
"You chase, I'll see where you chase."
The hacker grunted and came to the fifth floor springboard.He was also cautious enough to put on so many layers of camouflage for himself.
Just cut to the system interface of the fifth floor, suddenly!
"Wow!"
Ghost head reappears!
"Wow!!!!!!"
The hacker collapsed to the ground again...
"whatthemotherfuck???" he cursed after recovering. "Foul! Foul! Why can you be ahead of me as a follower!!!"
"Little Wang???"
"Oh, it's okay... I'm playing games secretly, don't tell the manager."
Anyway, the top priority is to run away, but before he could get out of the broiler, the screen suddenly went black, and a 3D scene gradually appeared on the screen.
The hacker moved the mouse, then opened his mouth wide.He discovered that this was actually a three-dimensional maze scene.And I don't know what happened, the scene locked the entire screen, and I couldn't get out after exhausting all methods.
One minute later, the hacker found out in despair that he would either get out of the maze, or he would be trapped in the broiler to death.
According to the speed of the other party's tracking, when he walked out of the maze, the police probably came to the door.
"Hold!"
He cursed, kicked the power cord away, and the computer went black instantly.
He stood up from his seat, put on the hood of his sweater, and left in a hurry with his pockets in his pockets.
When the colleagues in the office saw him getting up, they thought he was going to the bathroom, and they didn't make a fuss.
Only one person said: "Xiao Wang, bring me a cup of coffee by the way, thank you."
"Alright, wait." Xiao Wang responded casually.
He then stepped out the office door, entered the elevator, and left the corporate building, never to return.
Although Xiao Wang cut off the power and internet in time, Lou Qingyan still traced his initial IP, and a name appeared in the text box in front of him.
Yuanhui Building.
Lou Qingyan noticed that something seemed wrong.
First, Yuanhui split, then Jiang Fu fans were used to attack Yuanhui, and now it is found that the hackers who invaded deep space are also in Yuanhui.
Two possibilities.First, the hacker did come from Yuanhui.Second, while the other party was trying to steal the secret, he wanted to throw the pot at Yuan Hui.
Lou Qingyan is inclined to the second possibility, that is, Jiang Fu and Shen Kong are both being used by someone behind the scenes to attack Yuan Hui, and at the same time, the other party is also coveting Shen Kong's artificial intelligence technology and trying to steal it.
Lou Qingyan thought for a moment, and then his first move was to call Xie Jin and ask Xie Jin to call the police.
The other party fled in a hurry and didn't have time to clean up, so it was easy to track, and the Internet police should be able to find Yuan Hui soon.
He didn't care if Yuan Hui was framed, anyway, he had nothing to lose.
If there is really another mastermind behind the scenes, it is a good time to use this to draw out the opponent's next move.
After reporting to the police, Lou Qingyan opened the background of the official website of the terminal engine - he was going to upload the program.
The terminal engine is a big killer. Once it is released, deep space will become the center of the world in an instant.
Lou Qingyan opened the source file of the official website, deleted all the information related to deep space, made up a non-existent team, and finally hung up the terminal engine.
At the same time, on github, create an account with this made-up team name, and release the open source program.
You'll Also Like
-
Naruto: Accidentally opening a fantasy world
Chapter 379 9 hours ago -
Pirates: The biggest scum in naval history
Chapter 659 9 hours ago -
People trigger treasure chests in Douluo
Chapter 230 9 hours ago -
Douluo: The Ever-changing Divine King Oscar
Chapter 150 9 hours ago -
Captain Tsubasa: Peak of Glory
Chapter 187 9 hours ago -
Talent advanced! I am invincible with my killing karma!
Chapter 62 9 hours ago -
Dragon Ball: I, Mr. Satan, am invincible!
Chapter 132 9 hours ago -
Xingtie: After my death, Liuying will understand love
Chapter 520 9 hours ago -
Dragon Ball: Destroy Planet Vegeta with Frieza
Chapter 229 9 hours ago -
Alliance: The contract was blocked at the beginning, so I just played badly
Chapter 213 9 hours ago