The Technology Tree of Xueba

Chapter 59: Hacking (Part 2)

After the hacker attacks declined, Zhou Yu and Zhang Yunqiang led the backbone team to the Yanjing data center and cooperated with the data center's network security experts to defend the servers.

Zhou Yu encouraged the network security team: We have determined that the other party does not have a supercomputer by analyzing the other party's attack methods.

Want to use a laptop to conquer a supercomputer, this will only happen when the king hits bronze, the gap between us and hackers is not so big.

Your task now is to teach the hackers a lesson and let them know that Spark Technology is never easy to mess with.

Let the future hackers avoid our company when they see our company, or they will stick to us like jelly candy, and it will also involve our energy.

Everyone understands what Mr. Zhou means. I will lead you to stop hackers together, and our teamwork will be more efficient.

The artificial intelligence Xiaomi can also develop corresponding tools to help us according to the real-time situation of the online battlefield, and the final victory will definitely belong to us. Zhang Yunqiang said confidently.

The security experts in the data center issue instructions according to the situation, and Xiaomi mobilizes supercomputers to execute corresponding actions or write programs from time to time.

While managing the security team, Zhang Yunqiang also reported to Zhou Yu the situation on the network battlefield.

A total of two hackers attacked us. Their skills are much higher than mine. They should be internationally famous hackers. One hacker is mainly responsible for defense, and the other hacker is mainly responsible for attack.

We have detained the hacker responsible for the attack and are tracking down his IP address.

Not good, the server has encountered more attacks. It is not a conventional bot attack. There are thousands of hackers trying to attack our server, and the number is still growing.

At this time, Xiaomi also informed: [Searching for information on the dark web, someone offered a reward of US$500 million for the source code of our company's artificial intelligence. 】

Zhou Yu's expression froze, and he said in his heart: Sure enough, they are here, Spark Technology is not afraid of hackers, and Xiaomi can stop them with the Pangu-1 supercomputer, but with this $500 million reward, some employees of the company will definitely be tempted.

Fortunately, he is not sure about people's hearts, and he never tries to test people's hearts. Only he and Xiaomi know the source code of artificial intelligence. Xiaomi itself is an artificial intelligence and will never leak the secrets.

Zhang Yunqiang said with a wry smile: I didn't expect the source code of artificial intelligence to be so valuable, 500 million US dollars is a huge amount, enough to make all hackers flock to it.

Mr. Zhou, I apply for the data center to start a Class A defense plan, suspend all artificial intelligence services, and concentrate all resources to survive this wave of violent attacks.

Zhou Yu nodded and agreed: In this situation, we can only try our best to ensure the security of our data. I agree to launch the Class A defense plan.

Xiaomi, the data center has launched a Class A defense plan, sending a message to all smart devices, 'Due to a large number of hacker attacks, in order to ensure the security of your data, Spark Technology has temporarily stopped network services for you, and has stored your progress' .”

Xiaomi: [Start the super authority function, please verify the authority. 】

Zhou Yu verified the biological data of the iris and the human body's electromagnetic field through the Protoss bracelet.

Xiaomi: [Verification passed, the data center Class A defense plan is being launched. 】

[Take over all computing resources and use it to write programs to deal with intrusions. 】

The dark web hacker gathering place.

More than 3,600 hackers have attacked Xinghuo Technology, but Xinghuo Technology's server has not moved at all. Artificial intelligence is really so advanced.

As expected of a company that can get a reward of 500 million, just because it can survive the attacks of most hackers in the world is enough to say the strength of Xinghuo Technology.

[Sacred Bear]: I found an interesting piece of information, how can we stragglers conquer Spark technology.

He immediately released the stolen information, which showed the performance of the Pangu No. 1 supercomputer, and the number of supercomputers configured in each data center of Xinghuo Technology.

Damn it, how can we fight against so many supercomputers with our laptops? The computing resources are not in the same order of magnitude. No wonder Spark Technology has defeated us.

[Dark Serpent]: Baga, so many of us are blocked by Spark Technology, even Google can't stop our attack. moment.

Idol, the dark serpent god who ranks second on the hacker supreme list.

The Great Dark Serpent is best at attacking from sideways, using power networks, creating fires, and releasing destructive and huge network viruses. He does everything he can.

Spark technology data center.

Xiaomi: [Alarm, it was found that the attacker edited the weak electric signal to attack through the wire, it has been intercepted, and the power supply is on guard. 】

Zhou Yu immediately ordered: Contact immediately, their system has been attacked, and ask if they need technical support.

Engineers prepare emergency backup power and must ensure data security.

Xiaomi: 【Through the network traces, the hacker has been captured and is searching for his IP address. 】

In Seoul, South Korea, a balding middle-aged man wearing glasses saw the information displayed on his computer that his broiler was about to be compromised.

Forcing me to zoom in on Smecta.

The index finger of his right hand was placed on the Enter key, and he pressed it down heavily.

Alarm, activate the emergency power supply to maintain the operation of the storage matrix, the supercomputer is on standby with the lowest power, and is using the Shanghai Data Center and the Bayu Data Center to resist.

The system was cracked, causing damage to the transformer in the high-tech park in the DX area. They have activated the backup emergency system, and it will take 5 minutes for the repair team to restore power.

Xiaomi: 【Discover supercomputer admission, through network packet analysis, supercomputers are located in New York and Tokyo. 】

Zhang Yunqiang anxiously said: The number of hackers has reached 13,000, the number of broilers has reached 500,000, and supercomputers have joined.

With only the remaining supercomputers, the risk of our being compromised has reached 30%, and hackers have begun to attack major corporate websites.

Immediately disconnect the network interface with the outside world. They have no problem now, and companies such as Pinduoduo and Weibo can no longer provide services.

Zhou Yu's eyes became sharper, and he made up his mind: We can't let these hackers run rampant and release the smart virus mobsters.

Zhang Yunqiang said unwillingly: President Zhou, the broom star is too powerful, and it won't be good to release it. After the power supply is restored, give me some time, and we will be able to confirm their identities.

We can afford to wait, but others can't, and the loss will be disastrous. Zhou Yu waved his hand.

Xiaomi, release the smart virus broom star. Zhou Yu issued an order.

Xiaomi: [The smart virus broom star is being released. 】

The dark web hacker gathering place.

This is a feast for the hacker community. It's been a long time since we acted together.

No, why are there fewer and fewer people attacking Xinghuo Technology?

God, there's a data stream following me, my computer is infected, I'm going to die.

[Dark Serpent] How is this possible, someone actually broke through the firewall of my laptop, my God, why are there so many diseases...

Seeing the hackers attacking the server disappearing one after another, Zhang Yunqiang sighed: Broomstar is worthy of being an intelligent virus, and its actions on the network will inevitably leave traces, and it can track all data flows.

Whether it's a bot in disguise or a real hacker, it directly attacks all devices indiscriminately.

Broomstar can automatically analyze software and hardware vulnerabilities, and there is no way to protect it now.

It instantly formats all data on the hard disk through software vulnerabilities, and generates garbage data that interferes with data recovery on the hard disk.

If someone prevents the broom star from executing this program, it will directly start generating various viruses to attack the device, and hundreds of new computer viruses can be generated in one second.

The CPU and hard disk are directly scrapped through the hardware virus, and the data in the hard disk is also sent to the outside world.

No matter how skilled the hacker is, the computer will not be able to play a role if it is conquered.

Zhou Yu Zhizhu said: To be killed by a broom star is just a small fish and a shrimp, and a hacker who can temporarily block the broom star's invasion is a big fish.

Xiaomi, sort out the data sent back by the broom star, and publish the information of those well-known hackers.

Let these people who wander in the black zone be exposed to the sun, I want to make hackers feel palpitations when they hear the name Xinghuo Technology in the future.

Thanks to Little brother is Hua Tsai for the reward.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like