Cyber Heroes
Chapter 370
Chapter 370
In 2030, Chiang Mai, Thailand.
Zhu Xinyu leaned on the chair in the hotel.There is a computer in front of her.This computer is connected to the hotel's wireless network.The hotel uses common routers and servers.Zhu Xinyu easily found the back door of this system.These are all vulnerabilities that have been announced, but not every user has updated patches in time.
On the screen is an unfamiliar interface.It was an analysis software written by Zhu Xinyu himself.The interface is rather primitive.
And Zhu Xinyu looked at the ceiling.
Her grades were "Ordinary Excellent".She has always maintained this impression.At the same time, in the eyes of the "guardian", she also became more and more rebellious, often running out to play alone.In the eyes of her father and the woman, this was a sign of a girl's rebellion.They still don't know how many corporate secrets their daughter has stolen.
They just think that this girl likes to travel very much, and she will go abroad if she disagrees.
There is also a reason why Zhu Xinyu did this.
Every time she wants to steal the technical secrets of a big company, she will find an excuse to travel.
It is best to go abroad.
This is very helpful to cover up one's real IP, and even has a certain interference effect on social engineering methods-although not strong, it is better than nothing.
Zhu Xinyu's favorite places to use are Southeast Asian countries.It is adjacent to developed areas in East Asia, and the network is in good condition, but it does not have a strong police force.The second is the Russian Federation. The xenophobic power of this corrupt big country can be borrowed by her to cover herself.
Of course, the best places in theory are those war quagmires where the United Nations has nothing to do—such as Iran, Yemen, and Somalia.Even if someone touches it accidentally, it won't be too dangerous.
However, entering these places is inherently dangerous.Of course, Zhu Xinyu's pocket money is not enough to hire mercenaries.And she would not ask for the money, because the matter of "hiring mercenaries" would leave a record in itself, and it was easy to be targeted by social engineering methods.
The reason why Zhu Xinyu is so careful is because she is trying to dig the roots of big capital.
After parting ways with her master "Huode Xingjun", Zhu Xinyu set up a hero competition by herself.
She is already stronger than Master.Therefore, she alone can obtain the honorable title of "Vulcan".
"Zhu Rong", a network guerrilla who specializes in stealing corporate technology secrets and making them public, was born in the world of the World Wide Web.
Zhu Xinyu's first target was his father's business.
It was a well-known security company, and it also acquired an online medical mutual aid app and was operating it.The company has even contracted out the provincial government's cybersecurity duties.
Zhu Xinyu disclosed the source code of all security products of this company and put it on the Internet.
but……
The thing that Zhu Xinyu was looking forward to very much did not happen.Her father wasn't broke, and the family wasn't even a little poorer.
First, an LLC debt itself does not implicate the owners.
Secondly, most security companies do not actually win with technology.
Except for the core products of one or two network security companies that really master the technology, the products of most network security companies are refurbished works.
Source code leaks also fall under the "no big deal" category.
If Zhu Xinyu's father's company is a listed company, maybe the stock price will plummet?
But Zhu Xinyu's father's company is not listed.
Therefore, apart from my father being scolded at the board meeting, the impact was minimal.
It can even continue to contract the network security business of local enterprises and governments.
For enterprise users, the network security company can also play the role of a security consultant and technical support, which will not depreciate just because the source code is open.
Zhu Xinyu's father was depressed for a while.He felt insulted by the secure software system he had created.
Zhu Xinyu was very disappointed with the result.
But she was also aware of the problem.
Many companies do not actually have core "technology".They survive by selling low-tech "services".
If you want to change the world, maybe you should start from a more core place.
bigger business.Enterprises that control technology and use intellectual property to block human progress.
Those larger capitals are at the heart of the "evil".They are the core power components in the machines that prey on humans.
Zhu Xinyu began to carry out activities against these guys.
Of course, this is difficult.
Zhu Xinyu is just an individual.She had found some like-minded people in the past few days-the extreme Internet guerrillas of the open access movement, but they were only a few.It is difficult for her to use social engineering to steal technical information.
But purely with computer technology, there are always some physically isolated data that cannot be stolen.
Of course, Zhu Xinyu also has a way.
No technology comes out of nowhere.It must have been studied by scholars.It is impossible for a company to store every step of a scholar's research in a physically isolated place.There is always some data that gets taken away.
Zhu Xinyu will look at the company's cooperation list, and then look for those corporate scholars, and lock these scholars, and even other partners of these scholars, and pull out as much information as possible from all aspects.
Not just one result.Trial and error data, discarded ideas, she wants everything.
And by chance, she can also get "something that is a few steps away from the result" and "information that has a slightly lowered confidentiality level due to the passage of time".
And as time went on, she also learned to write "a file that can identify technical data and automatically package and send a virus."
This is Zhu Xinyu's proud work.As long as the virus inadvertently invades a place that cannot be invaded originally, "packaging" may be completed automatically without anyone noticing.After that, the packaged data can also be hidden in other people's computers, waiting for the next transmission.
Zhu Xinyu's most frequent "patronage" is various high-tech enterprises, especially electronic information technology.
She has always wanted to try to attack some pharmaceutical companies.But pharmaceutical companies sell products after all.Compared with "mastering technology", they are more inclined to "master patents".So even if Zhu Xinyu stole some technological process, he couldn't let people use it by himself.
At this moment, "Zhu Rong" has experienced many battles.
but……
——Has the world changed because of this...
Zhu Xinyu looked at the ceiling of the room.
Maybe it's because it's rainy season in Thailand right now.The continuous rain made Zhu Xinyu feel gloomy for no reason.
She began to think about the past.
If you do it yourself, will it change the world?
Is it a feasible path to create "prestige" like Master did?
Thinking of this, Zhu Xinyu shook his head, trying to get rid of this thought.
——Master’s reasoning doesn’t really make much sense.I have to find my way out...
——In the future, I will definitely be more...
At this time, a chat software issued a prompt tone.
This is a chat software written by Zhu Xinyu himself, with only the simplest functions.It has no other advantages, that is "concealment" and "secrecy".
The client of this software, Zhu Xinyu only passed it on to a few people.
Those people are Internet "partisans" of the "open access movement" extremists.Some of them are hackers, and some are scholars and intellectuals who publish various appeals on the Internet.Some of these people have connections with real social activists.
They are Zhu Xinyu's "friendly troops".
However, Zhu Xinyu has always been active in the form of a "hacker".She only connects with very few people.
Zhu Xinyu remembers that this person is also a scholar.
Ichigo: 【Zhu Rong, where did you get this data?It's amazing.It's amazing. 】
Zhu Xinyu thought about it.The data automatically sent back by her previous batch of viruses did contain a piece of biological data.From the content point of view, it should be molecular biology or biochemistry.Although Zhu Xinyu has stolen a lot of things, she is not much better than ordinary high school students in non-professional fields.
Zhu Rong: [Judging from the serial number, it should be obtained from that translation software company. 】
Ichigo: [Are you kidding me? 】
Zhu Rong: [? 】
Ichigo: [This may involve proteomics, it may involve genetics, it may involve... oh my god, I can't describe it, but it doesn't involve cognitive science.It is absolutely impossible for it to appear on the server of a translation software company. 】
Zhu Rong: [Really?It might have been an accidental injury. 】
Using cooperative scholars as a springboard, the virus secretly spread to other scholars, and then sent back information that was not originally the target.
Many academics have interdisciplinary projects.For a virus to jump from scholar A to scholar B of a different major, it probably only needs to go through one or two transfers.
Zhu Xinyu's virus has strict self-destruct conditions.The virus she wrote will self-destruct after one attack.At the same time, the virus released in a batch, as well as its replicas, will delete themselves after the system time reaches the predetermined point-whether there is an outbreak or not.
Although there are many accidental injuries, they are not many, and they are rarely discovered.
At this time, Zhu Xinyu will face two choices.
If the scholar who was "accidentally injured" is also a lackey of the capitalist and will contribute to the intellectual property of the capitalist, then Zhu Xinyu will not hesitate to disclose this data.
But if not, then Zhu Xinyu will consider it as appropriate.
At this time, she needs a professional appraisal.
This guy whose ID is Ichigo is her assistant.
Zhu Rong: [Tell me the result directly.What kind of research is this by a scholar?Is it necessary to disclose it? 】
Ichigo: [I don't know... It's hard for me to say.This is so rare.I searched all published papers.do you know?There is only one person on Earth working on this right now.She can definitely win the Nobel Prize. 】
Ichigo: 【God, this is amazing. 】
Zhu Xinyu frowned.
Zhu Rong: [So what is this? 】
Ichigo: [Study on the Enzyme System of Hot Spring Archaea.Only Ms. Nyaguti Ndebile is working on it. 】
【Do you know Ms. Enderbile? 】
(End of this chapter)
In 2030, Chiang Mai, Thailand.
Zhu Xinyu leaned on the chair in the hotel.There is a computer in front of her.This computer is connected to the hotel's wireless network.The hotel uses common routers and servers.Zhu Xinyu easily found the back door of this system.These are all vulnerabilities that have been announced, but not every user has updated patches in time.
On the screen is an unfamiliar interface.It was an analysis software written by Zhu Xinyu himself.The interface is rather primitive.
And Zhu Xinyu looked at the ceiling.
Her grades were "Ordinary Excellent".She has always maintained this impression.At the same time, in the eyes of the "guardian", she also became more and more rebellious, often running out to play alone.In the eyes of her father and the woman, this was a sign of a girl's rebellion.They still don't know how many corporate secrets their daughter has stolen.
They just think that this girl likes to travel very much, and she will go abroad if she disagrees.
There is also a reason why Zhu Xinyu did this.
Every time she wants to steal the technical secrets of a big company, she will find an excuse to travel.
It is best to go abroad.
This is very helpful to cover up one's real IP, and even has a certain interference effect on social engineering methods-although not strong, it is better than nothing.
Zhu Xinyu's favorite places to use are Southeast Asian countries.It is adjacent to developed areas in East Asia, and the network is in good condition, but it does not have a strong police force.The second is the Russian Federation. The xenophobic power of this corrupt big country can be borrowed by her to cover herself.
Of course, the best places in theory are those war quagmires where the United Nations has nothing to do—such as Iran, Yemen, and Somalia.Even if someone touches it accidentally, it won't be too dangerous.
However, entering these places is inherently dangerous.Of course, Zhu Xinyu's pocket money is not enough to hire mercenaries.And she would not ask for the money, because the matter of "hiring mercenaries" would leave a record in itself, and it was easy to be targeted by social engineering methods.
The reason why Zhu Xinyu is so careful is because she is trying to dig the roots of big capital.
After parting ways with her master "Huode Xingjun", Zhu Xinyu set up a hero competition by herself.
She is already stronger than Master.Therefore, she alone can obtain the honorable title of "Vulcan".
"Zhu Rong", a network guerrilla who specializes in stealing corporate technology secrets and making them public, was born in the world of the World Wide Web.
Zhu Xinyu's first target was his father's business.
It was a well-known security company, and it also acquired an online medical mutual aid app and was operating it.The company has even contracted out the provincial government's cybersecurity duties.
Zhu Xinyu disclosed the source code of all security products of this company and put it on the Internet.
but……
The thing that Zhu Xinyu was looking forward to very much did not happen.Her father wasn't broke, and the family wasn't even a little poorer.
First, an LLC debt itself does not implicate the owners.
Secondly, most security companies do not actually win with technology.
Except for the core products of one or two network security companies that really master the technology, the products of most network security companies are refurbished works.
Source code leaks also fall under the "no big deal" category.
If Zhu Xinyu's father's company is a listed company, maybe the stock price will plummet?
But Zhu Xinyu's father's company is not listed.
Therefore, apart from my father being scolded at the board meeting, the impact was minimal.
It can even continue to contract the network security business of local enterprises and governments.
For enterprise users, the network security company can also play the role of a security consultant and technical support, which will not depreciate just because the source code is open.
Zhu Xinyu's father was depressed for a while.He felt insulted by the secure software system he had created.
Zhu Xinyu was very disappointed with the result.
But she was also aware of the problem.
Many companies do not actually have core "technology".They survive by selling low-tech "services".
If you want to change the world, maybe you should start from a more core place.
bigger business.Enterprises that control technology and use intellectual property to block human progress.
Those larger capitals are at the heart of the "evil".They are the core power components in the machines that prey on humans.
Zhu Xinyu began to carry out activities against these guys.
Of course, this is difficult.
Zhu Xinyu is just an individual.She had found some like-minded people in the past few days-the extreme Internet guerrillas of the open access movement, but they were only a few.It is difficult for her to use social engineering to steal technical information.
But purely with computer technology, there are always some physically isolated data that cannot be stolen.
Of course, Zhu Xinyu also has a way.
No technology comes out of nowhere.It must have been studied by scholars.It is impossible for a company to store every step of a scholar's research in a physically isolated place.There is always some data that gets taken away.
Zhu Xinyu will look at the company's cooperation list, and then look for those corporate scholars, and lock these scholars, and even other partners of these scholars, and pull out as much information as possible from all aspects.
Not just one result.Trial and error data, discarded ideas, she wants everything.
And by chance, she can also get "something that is a few steps away from the result" and "information that has a slightly lowered confidentiality level due to the passage of time".
And as time went on, she also learned to write "a file that can identify technical data and automatically package and send a virus."
This is Zhu Xinyu's proud work.As long as the virus inadvertently invades a place that cannot be invaded originally, "packaging" may be completed automatically without anyone noticing.After that, the packaged data can also be hidden in other people's computers, waiting for the next transmission.
Zhu Xinyu's most frequent "patronage" is various high-tech enterprises, especially electronic information technology.
She has always wanted to try to attack some pharmaceutical companies.But pharmaceutical companies sell products after all.Compared with "mastering technology", they are more inclined to "master patents".So even if Zhu Xinyu stole some technological process, he couldn't let people use it by himself.
At this moment, "Zhu Rong" has experienced many battles.
but……
——Has the world changed because of this...
Zhu Xinyu looked at the ceiling of the room.
Maybe it's because it's rainy season in Thailand right now.The continuous rain made Zhu Xinyu feel gloomy for no reason.
She began to think about the past.
If you do it yourself, will it change the world?
Is it a feasible path to create "prestige" like Master did?
Thinking of this, Zhu Xinyu shook his head, trying to get rid of this thought.
——Master’s reasoning doesn’t really make much sense.I have to find my way out...
——In the future, I will definitely be more...
At this time, a chat software issued a prompt tone.
This is a chat software written by Zhu Xinyu himself, with only the simplest functions.It has no other advantages, that is "concealment" and "secrecy".
The client of this software, Zhu Xinyu only passed it on to a few people.
Those people are Internet "partisans" of the "open access movement" extremists.Some of them are hackers, and some are scholars and intellectuals who publish various appeals on the Internet.Some of these people have connections with real social activists.
They are Zhu Xinyu's "friendly troops".
However, Zhu Xinyu has always been active in the form of a "hacker".She only connects with very few people.
Zhu Xinyu remembers that this person is also a scholar.
Ichigo: 【Zhu Rong, where did you get this data?It's amazing.It's amazing. 】
Zhu Xinyu thought about it.The data automatically sent back by her previous batch of viruses did contain a piece of biological data.From the content point of view, it should be molecular biology or biochemistry.Although Zhu Xinyu has stolen a lot of things, she is not much better than ordinary high school students in non-professional fields.
Zhu Rong: [Judging from the serial number, it should be obtained from that translation software company. 】
Ichigo: [Are you kidding me? 】
Zhu Rong: [? 】
Ichigo: [This may involve proteomics, it may involve genetics, it may involve... oh my god, I can't describe it, but it doesn't involve cognitive science.It is absolutely impossible for it to appear on the server of a translation software company. 】
Zhu Rong: [Really?It might have been an accidental injury. 】
Using cooperative scholars as a springboard, the virus secretly spread to other scholars, and then sent back information that was not originally the target.
Many academics have interdisciplinary projects.For a virus to jump from scholar A to scholar B of a different major, it probably only needs to go through one or two transfers.
Zhu Xinyu's virus has strict self-destruct conditions.The virus she wrote will self-destruct after one attack.At the same time, the virus released in a batch, as well as its replicas, will delete themselves after the system time reaches the predetermined point-whether there is an outbreak or not.
Although there are many accidental injuries, they are not many, and they are rarely discovered.
At this time, Zhu Xinyu will face two choices.
If the scholar who was "accidentally injured" is also a lackey of the capitalist and will contribute to the intellectual property of the capitalist, then Zhu Xinyu will not hesitate to disclose this data.
But if not, then Zhu Xinyu will consider it as appropriate.
At this time, she needs a professional appraisal.
This guy whose ID is Ichigo is her assistant.
Zhu Rong: [Tell me the result directly.What kind of research is this by a scholar?Is it necessary to disclose it? 】
Ichigo: [I don't know... It's hard for me to say.This is so rare.I searched all published papers.do you know?There is only one person on Earth working on this right now.She can definitely win the Nobel Prize. 】
Ichigo: 【God, this is amazing. 】
Zhu Xinyu frowned.
Zhu Rong: [So what is this? 】
Ichigo: [Study on the Enzyme System of Hot Spring Archaea.Only Ms. Nyaguti Ndebile is working on it. 】
【Do you know Ms. Enderbile? 】
(End of this chapter)
You'll Also Like
-
How come I'm invincible?
Chapter 136 1 days ago -
Douluo Continent: I, Huo Yuhao, am the Master of Spirit
Chapter 361 1 days ago -
A Mortal's Journey to Immortality: Wang Yu Transmigrates into a Book, the Dao Ancestor of Rein
Chapter 274 1 days ago -
Folk customs begin with the entire funeral procession
Chapter 227 1 days ago -
A man among dragons, building a mysterious ancient church.
Chapter 431 1 days ago -
Lu Mingfei, become the King of Elden!
Chapter 382 1 days ago -
Huayu: Starting from joining the mainstream entertainment industry in 96
Chapter 553 1 days ago -
Immortal Dao Fruits, Cards to Help Me
Chapter 141 1 days ago -
Water elemental became a god, ultimately becoming the master of heaven, earth, mountains, and rivers
Chapter 262 1 days ago -
I've already reached the Nascent Soul stage, and you're saying I didn't time travel?
Chapter 153 1 days ago