Cyber Heroes
Chapter 363 Troubleshooting
Chapter 363 Troubleshooting
In the afternoon of the next day, Xiang Shan found someone from Wang An.
"You want to talk to those hackers?" The head of this part of the security department is a Frenchman.He scratched his slightly greasy curly hair and said, "It's not that good, Director Xiang. After all, we are still in the park of the Rama project. If the other party finds out the details in reverse, there will be a big mess."
Xiang Shan said, "Really?"
"'Zhu Rong' is there, and maybe other top hackers are also there. The person who set up this website is probably the top black hat, maybe it is 'Zhu Rong' himself." The person in charge said: "There are all top hackers over there. I It is not recommended to take risks."
Xiang Shan said: "I'm sorry, but please think of a way. This is a job requirement."
As Xiang Shan spoke, he took out a meeting minutes: "I communicated with other people in the research department in the morning. We agreed that the ideas that these hackers are discussing are very valuable. I have arranged A group to test a few key points they raised. I think it is necessary to join this discussion."
"This..." The person in charge took the record and hesitated for a moment.
Xiang Shandao: "This is also to decipher the 'Aurun Mira Project' faster. Although the 'Aurun Mira Project' may not be as important as the 'Obatala Project', it is our human understanding of the 'Ogun' A short cut for the maker."
The person in charge sighed: "I see. The members of the cyber security department have a meeting with the members of the 'Hanuman Project' today. We may be temporarily placed under your command. At the meeting, I will list your opinions To discuss the matter, discuss its feasibility with others. But please note that there must be no unnecessary exchange of information with the 'at risk' community until we have the results."
Xiang Shan nodded.
That hacker community brings together the most elite "guerrillas" and the most destructive criminals of this era.Especially the special place Rama Project.The "intelligence" here itself has the potential to impact the existing order of society.
Whether uploading data to the website from here, or downloading data from the website, there are risks.
In the former case, it is possible to expose your own position and identity, or trigger the vigilance of those hackers.
In the latter case, it is possible for some dangerous codes to sneak into the park.
The people in these security departments are indeed the regular army, the country's elite.However, at most they can only guarantee that "the enemy can be destroyed afterwards", but they cannot guarantee that "intelligence will not be leaked".
Xiang Shan bowed his head in greeting: "Please. In addition, I hope that I can also temporarily join the work of your department."
The person in charge showed a confused look: "You? This..."
"I'm also a programmer. Although I'm better at hardware and low-level things, it's okay to understand your discussions, right?" Xiang Shan said.
The person in charge grumbled.I don't know if he thinks that Director Xiang is trying to improve his qualifications, or if he thinks that he is overreaching.
But now Xiangshan is one of the biggest officials in this park.The rest of the people are also on the same level as him.This seemingly silly request was actually fulfilled.
After all, in the first phase of the "Aurummira Project", the director has proved his level as a scientist.
Just as Jing Hongtu expected.Even if Xiang Shan has some operations that are not compliant, they can be easily forgiven-as long as the purpose of these operations is directed to "his research project", then everyone can easily forgive him.
After all, he is a crazy scientist.
This is indeed a good character.
Xiang Shan then sat in the meeting room of the Internet security personnel, took out the recording pen in a fair manner, and recorded the progress of this time there.
To be honest, the current progress of "Project Hanuman" is really not very good.
The "Risk" community is a completely anonymous online community.Its structure is very simple, almost no "unnecessary data" is stored, and there are almost no measures other than account passwords to protect user accounts.
At the same time, this community also adopted distributed virtual servers, and even the application framework was written by a powerful individual or group of hackers.This website is not an ordinary small website that relies on a server in a small country.
When a user accesses this fixed domain name, it will be temporarily allocated by the algorithm. Among a bunch of voluntary proxy servers, three available proxy servers are randomly selected to form a temporary data link, allowing users to ping to a currently available server IP.
But the triple springboard is only the first step.For general illegal online activities, triple springboard is enough, but these hackers are obviously not satisfied with what has already been compromised by law enforcement agencies.
It can be understood in this way. The "ontology" of the "risk" community exists in many different servers, each of which is independent of each other, and at the same time, each part is a backup of each other. No matter which part is destroyed, it can be backed up again, which is difficult to eradicate.The servers where these "ontologies" are located may even be located in several completely different countries.
These "ontologies", or the source code of the website, will even continuously transfer themselves to other servers.
And all the occupied parts of the server are put together to form the "complete virtual server" where the online community is located.
This community is like a swarm of amoebas that exist on the Internet.It's constantly shifting, it's splitting, it's deforming.The swarm of amoebas are still hiding in the murky water, making it difficult to see them.As long as some of these amoebas are missing, they will regrow.
"Destroying" the site itself is a very difficult thing to do.
Every time Xiangshan connects, there is a huge risk.
However, there is something good about Xiangshan.They represent the union of the most powerful political entities on the planet.
The entrance and exit of the "Internet" itself is managed by this association or its members.
Based on these foundations, the cybersecurity personnel of Project Rama can use unimaginable resources for ordinary black hats to disguise themselves.
In addition, they can also use huge resources to dig out everyone who connects to this website.
For example, they can send some of their own servers to mix with those "jump nodes" servers, and then use DDOS attacks to destroy most of the jump nodes that are not under their control.No matter how many bots controlled by a hacker organization, it will not exceed the resources these people have.
For another example, they can use some forensic or statistical techniques to dig out the real-world identities of most hackers on this website.This is what their violent agencies are better at.
There may also be some political constraints on a single country wanting to take down a hacker den.
But the consortium behind Project Rama has no qualms.
The swarm of amoebas hides in the murky water, but this violent entity can even vaporize the pool in the worst case.
But, that's not the time yet.
Hackers would never have imagined that they would encounter such a level of attack.
Soon, after a long discussion with the network security department, some solutions were found.
Of course, this is just an episode.
They are currently focusing on work and are still looking for "points of information leakage."
They are looking for files that may be viruses on all devices across the campus.
They still don't know how the virus came from.
The only certainty is that the "infection" occurred within the park.
"Zhu Rong" is not a hacker who likes to spread Trojans wantonly.According to intelligence, all previous actions of "Zhu Rong" were targeted.He will attack those large technology companies, especially companies that attempt to build some kind of technical barriers and technological hegemony.He will do his best to unearth undisclosed technologies in the hands of those companies.
Sometimes, he also does this by hacking researchers working for those companies.However, most of the methods are to first tamper with the servers of those technology companies, and then use the servers of those technology companies to infect the personal devices of those researchers.
There is no record of ordinary people being inadvertently infected with the virus written by "Zhu Rong".
So the infection must have occurred when some scholars communicated with that translation software company.
Other technicians have already gone to that company pretending to be police officers-their police officer certificates are all real gold, and they even have resumes that can't be more real.
But the biggest problem is that Ingrid is really just a name in that company.She has not participated in the work of that enterprise in the last year.
Ingrid's device could not have been the first contact with the virus.
She was poisoned in the park.
This is scary.No one knows when this electronic virus infection occurred, nor how many people were infected.It's even hard for you to know how many people's devices this thing exists.
The entire park may be infiltrated like a sieve.
If "Zhu Rong" hadn't posted "Sita" on the Internet without knowing it, and happened to be noticed by the network security personnel of "Project Rama", I am afraid that "Zhu Rong" could empty out the information here.
This is why the United States is eager to send the top experts under its command.
However, the original network security department of the Rama project is not really just a dry meal.At least they built a high wall to physically isolate the further loss of information.
Now, they are desperately searching for possible samples of the virus.They hope they can do something before the arrival of "Agni" to save their reputation
But the level gap is still there.
Early in the morning of the third day, there was still no sign of a solution.
And a military vehicle also departed from the airport to the park.
Xiang Shan and several other persons in charge were waiting in the reception area.
Soon, a small group of United States soldiers appeared.
They saluted Xiang Shan: "Gentlemen, the 'goods' have arrived."
Sorry, this chapter is difficult to write
(End of this chapter)
In the afternoon of the next day, Xiang Shan found someone from Wang An.
"You want to talk to those hackers?" The head of this part of the security department is a Frenchman.He scratched his slightly greasy curly hair and said, "It's not that good, Director Xiang. After all, we are still in the park of the Rama project. If the other party finds out the details in reverse, there will be a big mess."
Xiang Shan said, "Really?"
"'Zhu Rong' is there, and maybe other top hackers are also there. The person who set up this website is probably the top black hat, maybe it is 'Zhu Rong' himself." The person in charge said: "There are all top hackers over there. I It is not recommended to take risks."
Xiang Shan said: "I'm sorry, but please think of a way. This is a job requirement."
As Xiang Shan spoke, he took out a meeting minutes: "I communicated with other people in the research department in the morning. We agreed that the ideas that these hackers are discussing are very valuable. I have arranged A group to test a few key points they raised. I think it is necessary to join this discussion."
"This..." The person in charge took the record and hesitated for a moment.
Xiang Shandao: "This is also to decipher the 'Aurun Mira Project' faster. Although the 'Aurun Mira Project' may not be as important as the 'Obatala Project', it is our human understanding of the 'Ogun' A short cut for the maker."
The person in charge sighed: "I see. The members of the cyber security department have a meeting with the members of the 'Hanuman Project' today. We may be temporarily placed under your command. At the meeting, I will list your opinions To discuss the matter, discuss its feasibility with others. But please note that there must be no unnecessary exchange of information with the 'at risk' community until we have the results."
Xiang Shan nodded.
That hacker community brings together the most elite "guerrillas" and the most destructive criminals of this era.Especially the special place Rama Project.The "intelligence" here itself has the potential to impact the existing order of society.
Whether uploading data to the website from here, or downloading data from the website, there are risks.
In the former case, it is possible to expose your own position and identity, or trigger the vigilance of those hackers.
In the latter case, it is possible for some dangerous codes to sneak into the park.
The people in these security departments are indeed the regular army, the country's elite.However, at most they can only guarantee that "the enemy can be destroyed afterwards", but they cannot guarantee that "intelligence will not be leaked".
Xiang Shan bowed his head in greeting: "Please. In addition, I hope that I can also temporarily join the work of your department."
The person in charge showed a confused look: "You? This..."
"I'm also a programmer. Although I'm better at hardware and low-level things, it's okay to understand your discussions, right?" Xiang Shan said.
The person in charge grumbled.I don't know if he thinks that Director Xiang is trying to improve his qualifications, or if he thinks that he is overreaching.
But now Xiangshan is one of the biggest officials in this park.The rest of the people are also on the same level as him.This seemingly silly request was actually fulfilled.
After all, in the first phase of the "Aurummira Project", the director has proved his level as a scientist.
Just as Jing Hongtu expected.Even if Xiang Shan has some operations that are not compliant, they can be easily forgiven-as long as the purpose of these operations is directed to "his research project", then everyone can easily forgive him.
After all, he is a crazy scientist.
This is indeed a good character.
Xiang Shan then sat in the meeting room of the Internet security personnel, took out the recording pen in a fair manner, and recorded the progress of this time there.
To be honest, the current progress of "Project Hanuman" is really not very good.
The "Risk" community is a completely anonymous online community.Its structure is very simple, almost no "unnecessary data" is stored, and there are almost no measures other than account passwords to protect user accounts.
At the same time, this community also adopted distributed virtual servers, and even the application framework was written by a powerful individual or group of hackers.This website is not an ordinary small website that relies on a server in a small country.
When a user accesses this fixed domain name, it will be temporarily allocated by the algorithm. Among a bunch of voluntary proxy servers, three available proxy servers are randomly selected to form a temporary data link, allowing users to ping to a currently available server IP.
But the triple springboard is only the first step.For general illegal online activities, triple springboard is enough, but these hackers are obviously not satisfied with what has already been compromised by law enforcement agencies.
It can be understood in this way. The "ontology" of the "risk" community exists in many different servers, each of which is independent of each other, and at the same time, each part is a backup of each other. No matter which part is destroyed, it can be backed up again, which is difficult to eradicate.The servers where these "ontologies" are located may even be located in several completely different countries.
These "ontologies", or the source code of the website, will even continuously transfer themselves to other servers.
And all the occupied parts of the server are put together to form the "complete virtual server" where the online community is located.
This community is like a swarm of amoebas that exist on the Internet.It's constantly shifting, it's splitting, it's deforming.The swarm of amoebas are still hiding in the murky water, making it difficult to see them.As long as some of these amoebas are missing, they will regrow.
"Destroying" the site itself is a very difficult thing to do.
Every time Xiangshan connects, there is a huge risk.
However, there is something good about Xiangshan.They represent the union of the most powerful political entities on the planet.
The entrance and exit of the "Internet" itself is managed by this association or its members.
Based on these foundations, the cybersecurity personnel of Project Rama can use unimaginable resources for ordinary black hats to disguise themselves.
In addition, they can also use huge resources to dig out everyone who connects to this website.
For example, they can send some of their own servers to mix with those "jump nodes" servers, and then use DDOS attacks to destroy most of the jump nodes that are not under their control.No matter how many bots controlled by a hacker organization, it will not exceed the resources these people have.
For another example, they can use some forensic or statistical techniques to dig out the real-world identities of most hackers on this website.This is what their violent agencies are better at.
There may also be some political constraints on a single country wanting to take down a hacker den.
But the consortium behind Project Rama has no qualms.
The swarm of amoebas hides in the murky water, but this violent entity can even vaporize the pool in the worst case.
But, that's not the time yet.
Hackers would never have imagined that they would encounter such a level of attack.
Soon, after a long discussion with the network security department, some solutions were found.
Of course, this is just an episode.
They are currently focusing on work and are still looking for "points of information leakage."
They are looking for files that may be viruses on all devices across the campus.
They still don't know how the virus came from.
The only certainty is that the "infection" occurred within the park.
"Zhu Rong" is not a hacker who likes to spread Trojans wantonly.According to intelligence, all previous actions of "Zhu Rong" were targeted.He will attack those large technology companies, especially companies that attempt to build some kind of technical barriers and technological hegemony.He will do his best to unearth undisclosed technologies in the hands of those companies.
Sometimes, he also does this by hacking researchers working for those companies.However, most of the methods are to first tamper with the servers of those technology companies, and then use the servers of those technology companies to infect the personal devices of those researchers.
There is no record of ordinary people being inadvertently infected with the virus written by "Zhu Rong".
So the infection must have occurred when some scholars communicated with that translation software company.
Other technicians have already gone to that company pretending to be police officers-their police officer certificates are all real gold, and they even have resumes that can't be more real.
But the biggest problem is that Ingrid is really just a name in that company.She has not participated in the work of that enterprise in the last year.
Ingrid's device could not have been the first contact with the virus.
She was poisoned in the park.
This is scary.No one knows when this electronic virus infection occurred, nor how many people were infected.It's even hard for you to know how many people's devices this thing exists.
The entire park may be infiltrated like a sieve.
If "Zhu Rong" hadn't posted "Sita" on the Internet without knowing it, and happened to be noticed by the network security personnel of "Project Rama", I am afraid that "Zhu Rong" could empty out the information here.
This is why the United States is eager to send the top experts under its command.
However, the original network security department of the Rama project is not really just a dry meal.At least they built a high wall to physically isolate the further loss of information.
Now, they are desperately searching for possible samples of the virus.They hope they can do something before the arrival of "Agni" to save their reputation
But the level gap is still there.
Early in the morning of the third day, there was still no sign of a solution.
And a military vehicle also departed from the airport to the park.
Xiang Shan and several other persons in charge were waiting in the reception area.
Soon, a small group of United States soldiers appeared.
They saluted Xiang Shan: "Gentlemen, the 'goods' have arrived."
Sorry, this chapter is difficult to write
(End of this chapter)
You'll Also Like
-
Douluo Continent: Starting from Awakening the Vermilion Bird Martial Soul
Chapter 106 21 hours ago -
World Aid Guide
Chapter 238 21 hours ago -
Qi Tongwei: Can I be young again?
Chapter 207 21 hours ago -
Honkai Impact 3rd: Starting with creating an anime version of Honkai Impact 3rd
Chapter 283 21 hours ago -
Full-Time Magister: One System, One Forbidden Spell, the Strongest Divine Gift
Chapter 39 21 hours ago -
Douluo Continent: The Ten Kings of Hell, I am the Emperor of the Underworld
Chapter 53 21 hours ago -
His extraordinary comprehension allowed him to create immortal techniques at the age of six, astonis
Chapter 251 21 hours ago -
How can one become an immortal with such laziness?
Chapter 845 21 hours ago -
Arknights' Lock of Heaven
Chapter 669 21 hours ago -
American Hunting: Starting with Solitary Life in the Wilderness
Chapter 48 21 hours ago