supercomputer
8 Beacon Fire I

Crazy Ice

Settings
ScrollingScrolling

Guan Pingchao used to be the technical director of a large security company in the country. His computer skills were basically top-notch in the country. However, a few months ago, Guan Pingchao gave up his handsome salary and joined a new software company, Qihoo 360 Security Guard. This incident caused a sensation in the industry.

In the eyes of many people, the birth of 360 Security Guard was a joke because 360 claimed to eliminate the rogue software on the Internet, but the boss of this company was known as the father of China's rogue software. He was the founder of China's first extremely powerful rogue software, the founder of 3721 Internet Assistant, Zhou Hongwei.

Zhou Hongwei used 3721 Internet Assistant to earn a lot of money. Later, 3721 was searched for by yahoo. Zhou Hongwei and yahoo's top management fell out, so he came to get this Qihoo 360 security guard.

Of course, there were also people who thought that the father of rogue software had taken the lead to kill rogue software, so the effect of the software must be good.

However, no matter what Zhou Hongwei was like, 360 Security Guard, under his promotion, had gathered a large number of users in just a few months and received high praise. This was naturally due to the credit of the father of rogue software. His vision and ability to grasp made 360 Security Guard provide users with intimate services. Of course, it was also thanks to the development team led by Guan Pingchao.

People like Guan Pingchao often had another identity on the Internet. They were unfamiliar but familiar hackers.

However, Guan Pingchao was not a hacker. More accurately, he was a hacker.

He was one of the earliest members of the Chinese Red Guest Alliance.

The Chinese Hacker Alliance (Huc) was established after the May 8 Incident in 1999, which was when the United States bombed the Chinese Embassy in the former yulia. Chinese hackers spontaneously formed an alliance. The members of the organization used their hacking skills to express their patriotic and national awareness. They launched attacks on some American websites, especially government websites.

These hackers changed their names to Hongke and came up with slogans such as " We must be patriotic " and " learn to be a person before learning technology." And in May 2001, they launched a world-shaking China-US hacker war.

At that time, the hacker war between China and the United States was chaotic. Guan Pingchao participated in the battle with the strength of the backbone of the Hongke. In the end, everyone attacked the White House website and successfully hung a bright five-star red flag on the White House website. The Red Guest of the Celestial Dynasty shocked the world.

Although the founder of the Hongker Alliance, Lion, announced the dissolution of the Hongker Alliance on the last day of 2004 due to some pressure, the spirit of the Hongker Alliance was passed down. In 2005, a new Hongke Alliance was formed with the core of the original Hongke Alliance as the core. Name, name, not name." As a declaration on the homepage.

Guan Pingchao wasn't like some otaku hackers who didn't pay much attention to their own health. They often stayed up late or simply lived a life that reversed day and night. He usually went to bed at 10:30 p. m. sharp and drank a glass of warm milk before going to bed. Before going to bed, he would often enter the core chat room of the Hongke Alliance through special communication tools to discuss current industry news, or discuss technical issues, or simply chat.

However, after Guan Pingchao entered the Red Guest Alliance, he felt that the atmosphere in the chat room was especially tense. Everyone was discussing a problem called " The Beacon Virus?" What kind of virus was this?

When Guan Pingchao came online, someone immediately shouted,""You're finally here, brother. Hurry up, something big has happened!”

The person who spoke was a young and fat man. This guy was a beast who liked to show off, so he was usually called Guan Pingchao.

Guan Pingchao was still puzzled when he saw Ying Nian and Zao Fei send him an EXE file and said,"Brother F * ck, come and take a look. The Honker Alliance is in an uproar now. My disciple saw someone post such a kill on a trash forum. They said that all the websites and computers in the world have been infected by this Beacon virus.”

"The whole world got it?" Guan Pingchao chuckled. Could it be that someone was deliberately playing a prank?”

"We all thought so. We were all wondering which idiot posted this so-called kill. How could there be such a powerful virus? But just now, Baby Big Sister came out and said that this might be true because she had already found the virus based on the special kill and was doing her best to deal with it. Now we were all dumbfounded!”

Guan Pingchao trembled when he saw this. The precious big sister that Ying Nianzao had been talking about was even stronger than him in the Hongke Alliance. She could be said to be a world-class hacker in the true sense, but she was already working for the country.

The baby's full name was BULEBaby, and her real name was Xiao Lingran. When she was 11 years old, she showed her extraordinary talent. Because she felt that the advanced WINDOWS3.0 operating system was inconvenient to use, she modified the source code to make it more convenient and faster. When the programmer from Microsoftfound out about this modified product, he was shocked. He offered to send her to the headquarters of the American company with a full scholarship to study while developing software, but Xiao Lingran rejected him.

When Little Ling Ran heard that Gates had played a game of dropping out of university, he actually made a comment that said," Sigh, he just loves to fool around." This made the staff of the company not know whether to laugh or cry.

At the beginning of 1996, Xiao Lingran, who was only 17 years old, solved the "Red Lover" virus that many experts in China could not solve. She became famous. She also rejected the invitations of many large foreign companies and stayed in China.

Guan Pingchao could not compare to Blue Baby's research on viruses. If even she said that this virus really existed, then it was definitely not without reason.

Guan Pingchao quickly turned on the special killer. After scanning, he found that his computer was infected with a virus. He opened several major websites in China and abroad and received a virus implant alert. This alert was raised by the special killer, but the firewall he used did not respond at all!

This was simply unbelievable!

Suddenly, messages popped up on his communication device. Guan Pingchao realized that his phone was ringing as well. He opened it and saw that it was a message from the emergency meeting room. This " emergency meeting room " was filled with the absolute elites of the Honker Alliance. Moreover, they knew each other very well. Generally speaking, unless it was an absolutely urgent matter, they would not discuss it in this chat room.

As soon as the emergency chat room was opened, the message was automatically posted to everyone's mobile phone. All members must immediately go online unless there were special circumstances-even if they were having sex with their girlfriends!

In less than five minutes, all the avatars in the emergency chat room lit up. The first to speak was Blue Baby. I can prove that this special killer is definitely not fake. I found this virus in my computer. It's a very powerful, mixed-type virus that can mutate. Unfortunately, before I used this special killer, I tried to fight against this virus, but I failed. The virus broke out after the attack. Although I took protective measures, the hard disk of the computer was also destroyed.

There was an uproar. Blue Baby was known as a " professional sniper." Her ability to attack and defend against viruses was ranked among the best in the world, but she had actually failed?

Blue Baby: According to my analysis, the power of this virus is that it exploits a loophole in today's computer hardware. This loophole exists in most PCs and servers. Therefore, when this virus really broke out, it would be able to damage the computer's hardware. Moreover, because this virus does not have a fixed virus code, traditional anti-virus methods are useless against it. It can easily penetrate any firewall and silently enter our computers. And it's not only targeted at the WINDOWS operating system, but also the operating system we developed ourselves. It can be embedded into the key processes of the system.

Moreover, this virus was also a hard-disk-resident virus. Even if the hard disk was reformat, it would be useless. I've already contacted my sister, Sima. Her organization is also doing their best to study this virus. Zigma's virus attack and defense level is far above mine. I wonder if she can solve it…

At this moment, Blue Baby suddenly stopped talking. After a few seconds, another line of words appeared on the screen: It seemed that this was not going to work. Zigmar's team had also been completely annihilated.

The chat room was in an uproar. Guan Pingchao felt cold sweat on his back.

Who was Zigmar? Guan Pingchao, who knew about the information of famous hackers that had been exposed internationally, knew about it. This little girl was the virus queen of Argentina and was at the top of the FBI's wanted list. At 15, she single-handedly hacked into the core computer network of the US Department of Defense, causing panic in the pentagon. Moreover, she was the one who developed the " Red Lover " virus. She then asked the US government to release her idol, the world's number one hacker, Kevin Mitnick, and she made the US government flustered.

Such a character, such a team led by such a character, was actually defeated by this virus?

After a while, Blue Baby said," This was more or less within expectations. It's not because this virus is too powerful, but because we know nothing about it. We don't even know what the hardware vulnerability is. And the person or team that issued this kill order is also extremely powerful. At the very least, I can be sure of it. This person or organization's understanding of hardware and software is far above ours. It can even be compared to Kevin Mitnick's most glorious era. If he was alone, he would be too terrifying!

Everyone understood Blue Baby's words. Although Kevin Mitnick, who couldn't touch computers, was no longer the world's number one hacker, he proved the power of hackers to the world when the world's hackers were not developed. At the age of 15, he broke into the US air defense command system and read the information on the US nuclear warheads at that time. If he wanted, he could even press that terrible button. Destroy the entire world.

In that era, there was no doubt that no one could surpass Mitnick.

And in this era, another terrifying person or organization was born-they were even more terrifying and powerful than the organization that developed this virus!

To use a common analogy, this was like a Chinese scholar coming to match a couplet. The real test of a person's skill was not how to make the first couplet, but how to follow up the second couplet. Of course, those who could definitely come up with the first half of the couplet were also very powerful, and those who could match up to this kind of absolute second half were even stronger!

If nothing unexpected happened, the person who developed this super virus might have accidentally discovered a loophole in the hardware and exploited it. This was not only due to technical reasons, but also due to moral character. And the person who released this kill and solved the virus had cracked the virus without knowing anything. This was simply a miracle!

The circle of the world's top hackers was not big. In one night, almost all the world's top hackers received this special kill and found the virus. Without exception, these self-conceited hackers either worked alone or formed groups to fight against this virus without using special killing methods, but all of them ended in failure.

In the end, these hackers had to admit that if they were given enough time and manpower, they might be able to completely crack this virus in a week or two. However, it was impossible now.

Of course, many foreign hackers, especially the most arrogant top hackers in the United States and Russia, believed that this virus had appeared a long time ago, and it was definitely not a single person who cracked this virus, but a team, a very powerful team that was proficient in both software and hardware!

As for why this game would appear in China, and why it had an entirely Chinese interface. The foreign hackers who thought highly of themselves would never think that such a top-notch existence would appear in China, so they all maintained the same argument. This was a very obvious cover-up. This organization definitely did not belong to China. The reason why they used Chinese and posted it on a small forum in China was just to hide their identity. That was all.

Many hackers had already found out that the earliest location of this special killer was on a small forum called " Soft Killer Paradise " in China. When they looked for the IP address of the login called S.MMH with a glimmer of hope, as expected, they did not find anything.

The only glimmer of hope was destroyed, and the hacker who went to check could not help but despise himself. With the strength of this expert, how could he make such a mistake? What shocked the hackers all over the world was that although they found the Beacon virus, they couldn't crack the virus, but they couldn't even deconstruct this seemingly ordinary application!

Why did he have to deconstruct it?

The meaning of deconstruction was to use a certain method to crack the existing software and deduce the composition of the software or even the source code. This was because the virus was too contagious and destructive, to an unimaginable extent. Therefore, the world's major security companies, as well as Microsoft.com, had to upgrade their anti-virus software in a short period of time or take out system patches to nip this virus in the bud.

However, they couldn't solve the virus with their current ability, so they could only use the special killer released by S.MMH. The problem was that this special killer wasn't released by these companies, so they wanted to crack the special killer and change it to something produced by their own company. They didn't expect that all of them would fail!

Of course, Chen Xu had not expected these two things.

First of all, the most important thing for a hacker was to know how to protect himself. Chen Xu foolishly logged into the forum and posted a kill. He did not take any protective measures, so it was easy for the other party to find him.

Fortunately, he had a supercomputer and a very smart grandson.

Before Chen Xu's grandson sent the computer over, he had already set the highest level of security for Little Man. In other words, if Chen Xu didn't make any special requests, then when he used this computer, it would be under the highest level of security measures.

He logged into the webpage and created the software. They used the most powerful encryption algorithm in 2086. How could hackers nowadays have the ability to crack it?

Of course, some were happy, some were surprised, some admired, and some were worried and angry.

The ones who were angry were the virus developers. They could no longer be called angry, but could only be described as furious!

This virus was indeed created through a hardware loophole that they had accidentally discovered. Just the production time alone took half a year to complete! However, they didn't expect the virus to be cracked by someone after three days on the ALEXA World's website traffic ranking. Moreover, the virus was almost perfect!

Half a year's hard work had all gone to waste. How could they accept this?

But at the same time, they also felt a deep fear. Who was it, or what kind of organization, that could actually crack their virus? And in such a short period of time, he discovered and made a perfect kill?

No one knew. They racked their brains and desperately thought of the world's well-known hackers or hacker organizations, especially the hacker organizations in China. Although they didn't think that China had such a top-notch hacker, they couldn't help but take it to heart when they thought that this killer was from China.

However, after thinking for a long time, they could not think of any hacker they knew who was so powerful. What was such a powerful person doing?

Chen Xu rolled over on the bed, rubbed his nose, and wiped the saliva from the corner of his mouth. He chuckled like a night owl, mumbled a few words, and then turned to continue sleeping. In his dream, he dreamt of that exquisite girl with curly hair. He stood behind her and watched her quietly…

This book comes from:m.funovel.com。

Last Next Contents
Bookshelf ADD Settings
Reviews Add a review
Chapter loading