Cyber ​​Heroes

Chapter 366 Academic Exchange

Chapter 366 Academic Exchange

As a hardware engineer with a professional background, Xiang Shan actually had an inexplicable psychological advantage over hackers before.He felt that he was doing construction, and those hackers were doing damage.They don't have a systematic and overall vision, and they can only build houses on the foundations built by "people on their side".

No, the guy who built the house was a software engineer.Hackers just drill holes in the house.

But the snail shell can still be used as a dojo.Self-drilling holes in the house, well drilled, the position of those holes is just right, the house can be warm in winter and cool in summer.

Communicating with Hartman, Xiangshan can indeed occasionally feel the taste of "a stone from another mountain".

The angle of departure is different, and the things you see can indeed be different.

Xiang Shan is looking forward to meeting "Zhu Rong" even more.

He and Hartman didn't have a long chat.Soon, people from the security department greeted him.

A "script" will be provided by the research department.This script includes questions that can be asked later.

Xiang Shan and the others waited to communicate with hackers in the "risk" community, and they had to adopt the questions in this preset "script".Even if you have inspiration temporarily and want to ask new questions, you have to wait for multiple departments to review before you can ask them.

That's already an exceptional treatment.

I don't know whether the officials of the United Nations think that Xiang Shan's achievements in cracking the "Aurummira Project" are worthy of this treatment, or they think that Xiang Shan will not be able to stay in this position for long, so they are extra indulgent like cutting off their heads.

Xiang Shan felt that there might be both.

In the early years, when Xiang Shan's father drank and bragged with his uncle, he would say things like "power is complete" and "power does not expire".He always thought that was bullshit from a previous era.Or this is only taught at a certain level of the dog fly camp.

At the level of the United Nations, and standing in this position, Xiang Shan felt, oh, it makes sense.

The two scholars were explaining their proposal point by point.Xiang Shan rubbed his nose.

——Judging from the conversation just now, this Hartman is actually an element that can be used.Thus……

The hazy plan in Xiang Shan's heart became a little clearer.

Soon, the "Online Academic Exchange Conference" started.Scholars participating in the meeting included some scholars of the Rama project and some hackers from the "risk" community.

Of course, the account is still Xiang Shan's "Ramanujan".

The opening line is nothing more than the worst high street "I think this idea sucks. I have an idea, etc."

The point is to ignite those hackers' emotions while shedding a little bit of the right direction.

Those hackers are all "jianghu people".For the sake of one breath and one face, you can risk your real name being dug out to engage in high-risk, low-return activities such as "hero fights".

Emotions are up, so why care about other things?

However, the direction provided by Xiangshan and the others is indeed "correct".

After all, "Sita" is a small part of the derived data in the "Aurummira Project", and it is the part that Ingrid thinks "maybe it can be analyzed following the research method of linguistics".Corresponding to this part of the binary code, it should not be too basic.

But Xiang Shan and his group had the whole picture in their hands.

The code of "Project Oren Mira" is indeed relatively large, and it is not data that can be directly processed by the human brain, but Xiang Shan does have a "holistic understanding".

At least this one guess "is very similar to that" among the many speculations of those hackers.

Xiang Shan narrowed his eyes.

This is not his direct communication with those hackers.For him, every word he said was based on the script, and he didn't have the refreshing feeling of brainstorming.He only felt that he had a vague illusion of "inspiration collision", but it was not real.

Xiang Shan narrowed his eyes to hide his inner thoughts.

——The first step has been taken out, the opening has been opened...

At this time, he heard some arguing voices outside.

Turning his head to look at Xiang Shan, he found that it was Hartman's side.Hartman seemed to want to come closer, but was held back by the FBI monitor and another guard.There seems to be a bit of an argument.

Xiang Shan walked over and asked, "What's going on?"

Seeing that it was Xiang Shan, the guard introduced him in a low voice.The job here is to use a projector to put the chat content of the hacker community on the screen, while the experts discuss it loudly.

Hartman was curious, so he leaned over.Hartman's duty is to analyze the virus and report it at any time, and as an outsider, he obviously does not have an independent office, so he is arranged in that corner.Anyway, it's quiet enough here.

The guard was not sure whether Hartman was allowed to participate in this matter, so he wanted to stop him.The former FBI officer was responsible for ensuring that Hartman did not have "unnecessary contact" with other people and that Hartman "has no other movements."He was also not sure if Hartman was deliberately drawing the attention of a guard to do something, so he also stood up.

Xiang Shan pretended to think for a moment, and asked Hartman: "Have you finished your work now?"

Hartman nodded: "The analysis tool is still analyzing, and it will take a few hours to run through the data."

He really felt itchy when he heard what was said in the house.

Xiang Shan looked at the former FBI member: "He is now included in Hanuman's team, I can make a decision."

The former FBI member thought for a moment, then nodded silently.

Xiang Shan looked at Hartman: "Before you came, did someone tell you the whole picture of Rama's plan?"

Hartman nodded: "I have read all the data of 'Sita'. But without orders, I cannot participate in the discussions of those hackers."

"Since you are also a hacker, why don't you come over and take a look?"

Xiang Shan looked behind him in a discussing tone, but one hand grabbed Hartman's shoulder.

The people over there discussed for a while.Hartman had been transferred to work with hackers, and it was normal for him to be involved with the "risky" community.It's just that some people think that this discussion was originally added deliberately by the research department, and it began with the research activities of the Rama project.Hartman's participation is not necessarily compliant.

Xiang Shan waited for a while, then made an impatient expression, and dragged Hartman into the small circle where the discussion was held.

A few staff members showed some displeasure, but said nothing.

Xiang Shan did have the right to decide.He is the biggest official here.

Hartman seemed moved.
Of course, after an hour or so, the discussion ended normally.There is no need for any "finishing".After all, hackers just get together to play with technology.

The two scholars who followed Xiangshan were in high spirits.They feel that their minds have been opened and they have gained a lot.

Xiang Shan spends the rest of his time arranging research projects.

And when it was time to eat after get off work, Officer Xiao Hu appeared again, and mentioned a few words to Xiang Shan, to the effect of "be careful of an FBI agent".

Xiang Shan laughed wildly in his heart.It seems that his series of behaviors are all explained by the reason of "scholar's idiocy".

No one realizes his true purpose.

Hartman was the first to deliver the results when he started work the next day.

"Zhu Rong" did use a Trojan horse.He should have left another dark hand in the servers of those corporate research institutes.When scholars download data needed for research from that server, their computers are poisoned.This Trojan can spread through U disk, mobile hard disk, and Bluetooth, and under certain conditions, it will send data to certain specific IP addresses or mailboxes after connecting to the public network.

After triggering once, the virus will completely delete itself.

The good news is that Hartman found several samples of the virus that hadn't yet been triggered.

The bad news is that "Zhu Rong" has not made public all the stolen information.

Another copy of the data was also stolen.

And the most important thing is that this data is not part of the "Aurummira Project", but from the "Obatala Project".

It contains alien organic compounds.

"'Zhu Rong' probably didn't understand it." Hartman said with a cigarette in his mouth, "but the worst case is that she knows friends in related majors, and then finds friends to appraise the value of the paper..."

The former FBI member cleared his throat, as if to remind him not to say too much about things that are not his responsibility.

Hartmann immediately shut up.

In the following discussion, Hartman still participated.

But there was a little hiccup along the way.

The network security department detected signs of illegal access.Probably because the performance of the raw face "Ramanujan" was too prominent, so it attracted the attention of some hackers.Someone tried to feel along the network cable.

But this is actually an impossible task.The consortium behind the Rama project is physically in charge of the entrance and exit of the network.

But Xiang Shan looked at Hartman: "Dude, can you turn around and locate those who tried to invade?"

Hartman thought about it seriously: "Actually, you can give it a try, but I can't guarantee anything."

Xiang Shan then called those people to have a small meeting.Hartman was not allowed to touch other computers without permission.Without special permission, he can only use the equipment he brought with him.

The others were already used to the officer's style of thinking about it as soon as he said it, but this matter still needs to be discussed.

Of course, the results were predictable.

The "Hanuman Team" is nominally responsible for the search and arrest work around the world.However, using social engineering methods to dig out "risk community" hackers around the world involves countless manpower and material resources.Although Xiang Shan is the person in charge in name, he can't command any of the police forces mobilized outside the park.

But in this group, his words are still very useful.

After concluding the discussion, Hartman began the task of reverse tracking.

Xiang Shan patted Hartman on the shoulder: "Work hard, brother, it's best to be able to figure out the structure of the online community."

Hartman smiled: "That, I studied it last year."

 ticket……

  
 
(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like