Cyber psychosis is my girlfriend
Page 627
But in reality, the eyeballs under his eyelids are also gurgling like rapid eye movement.
By analyzing the network equipment seized from the voodoo gang, they obtained a large amount of data.
These things not only allow them to analyze the system of the Voodoo Gang in a targeted manner, but also the operating style. They can even write signature detection plug-ins according to the degree of idiomatic codes to catch any troubles that may come from the Voodoo Gang.
It's a good habit not to leave traces in the cyberspace, but your own server, your own data fortress, can't still be the same as on the Internet, just wipe it with a little bit.
This is the space and base they rely on for their activities. As long as they don't stop their activities, they will definitely leave behind a large amount of data.
"They are very cautious. They must have deliberately changed the original model, so as not to be caught by us with the captured guys."
Paul showed a wretched smile, half boasting and half explaining, "However, habits are not so easy to change. If they have the ability, they will abandon everything and change the hardware and software from head to toe."
"How did you find them?"
Bug is also a little curious.
The program she wrote was unaware of the activities of the deeply camouflaged voodoo gang.
"Network interface layer." Seeing that Bug took the initiative to talk to him, Paul naturally explained quickly without reservation, and at the same time kept moving, "The frame sealing of network packets, MAC addressing...they have done everything. Very good, almost no problem can be seen, even with software analysis, it would take a lot of neural network learning to distinguish this small difference. But the redundant code they use for error detection, haha, these stupid people must be lazy Yes, the original set is still used, it is estimated that it is fixedly generated by the small plug-in."
"But, how did you see the abnormality..."
Although the Internet in Taipingzhou is underdeveloped, there are many hackers. The Voodoo Gang also likes to disguise their origin, raising a large number of "broilers" all over Night City.
If all the data are tested, it is definitely unrealistic.
"Uh...that's because...well...ah...well...let me be honest."
Paul was embarrassed for a moment, and then said bravely, "I hacked the network monitoring, and I can see what they can see, I just borrowed their computing power a little bit..."
"Oh boy."
T-Bug really wanted to slap himself in the face.
Fortunately, I thought that the members of the violent terrorist mobile team were all the police, so at least they would not do anything too outrageous.
In the end, I didn't expect that such an unknown master was still hidden.
However, when I think that Luo Qi's "Night City evil forces" can be recruited, and people like me who have a lot of criminal records and continue to create new ones every day can also be drawn to work, I suddenly feel as if It also makes sense.
"That's Internet surveillance, aren't you afraid of being killed by their ICE?"
T-Bug thought of the many times he had almost lost his mind since he was in this industry, and immediately felt that Paul was a pure artist and bold.
In other words, his brain is neurotic, and his actions are stupid and bold.
"Ha, Internet surveillance is also human, and ICE is also written by human beings. There is nothing to be afraid of. If you can't do it, just slip away."
Paul said shaking his head.
He didn't think it was a big deal before, anyway, he would take advantage of it when he found an opening, and after he got in, he started to make small moves inside.
Over time, it has become a habit to prostitute all kinds of resources for online monitoring.
Now being asked by T-Bug with such an unbelievable attitude, an emotion called pride suddenly emerged——
Hey man, I'm still pretty cool, right?
"Oh, I think... ha, don't run! I've got you!!"
Paul still wanted to chat with Bug a few more words, but the new movements of the Voodoo Gang immediately attracted his attention.
Rush over, find out all their backgrounds, and then start to trap.
He wants these malignant hackers to enjoy what it means to be unresponsive every day and to be ineffective when they are running!
But Bug was stunned for a while, and after feeling the real talent gap, he silently opened the communication.
However, Paul is indeed very good, but he is not bad, but he is not good at these tasks, at least on the offensive level, he is still very fierce.
Although this is true, Bug always feels that he is comforting himself by thinking this way.
Rocky had spoken to her before.
People should not always live in such bitterness and hatred. If you think about everything being bad, the result will always be better, but it is also a fact that you are suffering.
T-Bug is not so much looking forward to his own island villa, but rather wants to get rid of this life of licking blood on the Internet.
But now it seems that working for the violent terrorist mobile team seems to be a reassuring choice.
It doesn't matter if she says she wants to or not, but they hold so many things against themselves, they can't even think about it.
However, she was also the one who entered the gate with trepidation every time.
Every time I finish the work happily and then go home with the salary, it is she who is happy.
Whether you like it or not, sometimes as a party, you may not be able to make an accurate judgment.
T-Bug is such an awkward person.
She and Dexter were old acquaintances. Although she knew that he had betrayed everyone including herself, it took her a long time to get out of that tangled mood.
Perhaps this is the price of having a hacker talent. In terms of self-regulation of mood, he is somewhat weak.
She looked at Paul, who was knocking the codes flying, and thought about Luo Qi, who always rushed to the front and made her feel at ease, and suddenly breathed a sigh of relief.
Then dialed the phone.
"Hello? What's the matter?"
It was Luo Qi's voice on the other end of the phone, but after using the voice changer, there was a unique black voice, which made Bug feel extra friendly.
"Paul found out about the voodoo gang."
She paused, "I'll see if I can create an opportunity."
"Okay, waiting for your news."
Chapter 490 Another Good Deed by the Terrorist Mobile Squad
"Are you sure? If so, let's get started."
Luo Qi nodded and ended the call with Paul.
The other two disguised team members immediately cast him a questioning look.
Putting away the PDA, Luo Qi moved his body a little.
"The voodoo gang started to lose their temper. Our people caught traces of their activities on the Internet and are ready to launch a full-scale attack."
This is shorthand.
In fact, because the equipment of the Voodoo Gang was seized, the expedited analysis of the content can make it easier for them to distinguish the information of the Voodoo Gang.
This is really too hurt for them.
Although some of the data was destroyed by the "emergency" automatic destruction program they set up, but because the total amount was huge, there was no impact.
Moreover, the information technology department also notified the network monitoring, hoping that they can allocate some staff to launch a coordinated attack on the voodoo gang.
As for whether they come or not, that is their own decision.
In addition, since Bug himself is at the headquarters of the Terrorist Mobile Squad, Luo Qi also coordinated a group of people to follow her command——
From the afterlife club, the Internet thug called by Roger.
There is a wide range of standards, from strong characters who are self-reliant and independent, to rookies who are new to the industry and not very skilled.
It is unknown how the battle will be, but the number is really quite a lot.
Moreover, in such a short period of time, it is actually very good to find such a group of hackers who can be trusted, know the basics, and obey the command.
T-Bug is responsible for leading these mercenaries in cyberspace, also known as "Edgerrunners", so as not to be accidentally injured by hackers from the Supreme Force Tactics Department or network surveillance.
When conducting a concentrated attack on a network area, the code will not show whether you are a friendly army.
Seeing someone follow him in to share permissions, he might subconsciously fight back.
Thus, the cyber offensive against the Voodoo Gang was launched amidst a burst of peace and tranquility.
There is no gunfire, no earth-shattering, not even a little extra movement, which makes people even have the illusion of "Have you really started to do it?"
Perhaps over there, the battle has gradually heated up.
But from Luo Qi's perspective, the surrounding area is still quiet.
At this time, in the eastern part of Taipingzhou, in an abandoned building.
"what--!!!"
With a scream, the guy lying on the hacker chair modified by the voodoo gang suddenly fell out of the crowd.
The body is like a loach out of water, desperately began to wriggle.
The orifices of the eyes, ears, nose, and mouth all began to emit dangerous electric sparks without exception, and the colors shone so brightly that they seemed to be on fire.
The gradually sinking wails and movements proved the gradual passing of his life.
There was only one corpse left half-slung on the ground after detaching from the hacking chair in a strange posture.
"We were attacked!"
When the other hackers saw that their own people were disconnected, they knew that something was wrong with him, and when they received the warning of the loss of vital signs, they had already confirmed that they were in an ambush.
Ever since another lair was taken away by the Terrorist Mobile Squad, the Voodoo Gang began to notice that there was an impetuous mood spreading among them uncontrollably.
Maman Bridget, who managed to reorganize the team and morale with great difficulty, looked a little tired to the point of aging. Although she was not very young, the Voodoo Gang regarded cyberspace as more than reality. There is a more advanced hacker group in the space, but this change still makes everyone secretly startled.
It is indeed a very difficult situation for the Voodoo Gang to be besieged from all sides.
And they know very well that someone is messing with them.
Otherwise, how could there be such a coincidence! ?
At first, they only tentatively began to pickpocket the data of these gangs in an attempt to find the key evidence they wanted.
However, the information was overwhelming, and what they didn't expect was that in order to ensure the absolute confidentiality of the communication, Luo Qi used satellite communication.
Still, they got some useful snippets.
For example, judging from the orders that a certain Valentino gang gave to their subordinates, their attack was indeed cooperative and purposeful.
And the last time the stronghold was exposed, it also made them doubt the safety of internal and external communication.
Not just the actual exchange of material, but also the possibility of leaks resulting from the exchange of information.
As many backup strongholds, their activities here have avoided all external communication to the greatest extent.
Whether it's survival supplies or electronic components, they have stockpiled a large amount, as if they would stay here until the end of the world.
The only connection with the outside world is an electrical cable and a network fiber optic cable.
As long as they don't make mistakes in their online activities, they will never be traced here.
To this end, they used a large number of high-quality broilers that had been prepared long ago but had not been used.
Layers of nesting, heavy encryption, and a large amount of useless and complicated redundant data are used as smoke bombs to confuse opponents.
But even so, when the attack came, each of them couldn't help trembling in fear——
In fact, with the size of the Voodoo Gang, there is absolutely no chance of winning in a frontal decisive battle.
The Voodoo Gang used the "Sea God" data fortress they built to infiltrate the Black Wall.
In essence, that is a server, the engine and tool that hackers rely on to move freely in cyberspace.
In order to prevent it from being used by others, they chose to hide the data fortress, and set up quite complicated and thick authority verification and security protection, so as to ensure the stability of Sea God's operation.
But once the enemy discovers the actual IP of "Sea God", then overwhelming attacks will follow immediately.
The biggest difference between the Sea God Fortress and a website serving the public is that it serves the crowd.
When the hackers of the Voodoo gang use their own server resources, they remove those high-end nouns and attributives. In fact, they are no different from those who use ordinary portal websites, and they are all interacting with the server.
But the server is limited.
Their designs may be exquisite, and the codes are so precious that even network surveillance is coveted, but their performance, limited by the size of the Voodoo Gang, is bound to not be too large.
And enemy hackers, as long as they find a loophole in their data fortress, they can gain authority through the loophole and maliciously access their server.
Among them, there must be the famous DDOS attack (Distributed denial of service attack, Distributed denial of service attack).
This ancient attack pattern essentially involves destroying a target's server in two main ways.
Packet blocking, and, massive requests.
You'll Also Like
-
A five-year-old Daluo Jinxian? I simulated binding with the prehistoric world.
Chapter 88 13 hours ago -
I got rich by extracting skills from games
Chapter 204 13 hours ago -
Houfu Key Class
Chapter 548 1 days ago -
The Record of Righteousness
Chapter 227 1 days ago -
God rewards hard work: Farming and cultivating immortality
Chapter 552 1 days ago -
I work as a security guard at Marvel.
Chapter 173 1 days ago -
Wizard: I have an inventory
Chapter 65 1 days ago -
The Unspeakable Diary
Chapter 583 1 days ago -
Since the Spring and Autumn Period and the Warring States Period, he has been regarded as a god.
Chapter 232 1 days ago -
Iron Cross Fire
Chapter 5120 1 days ago