Urban Denon

Chapter 222 Anti-Japanese War

"Why waste time when we have a clear goal? Get started, God," said Christ.

"Okay, for our safety, we use the two super servers of the Siemens company and the satellite of the American CNN radio and television network as a springboard, and other large servers and zombie computers in your hands as the main attack firepower. Alright, I lead the way, you follow me."

Under Xiao Yihan's leadership, Yang Shaojun and Mak followed Yang Shaojun to Nikon's server through the Siemens company's server and the American CNN satellite broadcasting network. When they came to the port connecting the optical cables between China and Japan, the three of them Feeling the huge data stream shuttle back and forth in the optical cable, it can be seen that the hacker battle between China and Japan is fierce.At this time, Xiao Yihan discovered that there was a hacker who wanted to hack himself through reverse search, and saw a sinister smile on the corner of Xiao Yihan's mouth. He tapped his finger on the pda, Xiao Yihan's Tianlong system started, and he found the hacker's location in a few seconds. Xiao Yihan Looking at the other party's system full of loopholes, he knew that the other party was just a rookie, probably using a few hacking software, and Xiao Yihan frowned, and with a light tap of his finger, he injected a cih-like virus into it.At this time, I saw a boy sitting in front of the computer in Japan, and when he was typing on the keyboard nervously and excitedly, he saw a dialog box appear on his computer monitor: You will pay the price for your ignorance and stupid behavior. Your country will also pay for their ignorance and stupidity. "Then the young man saw a puff of smoke coming out of his main box, and heard the Japanese young man yelling in Japanese: "Damn, my newly installed computer. "All these actions took Xiao Yihan only a few tens of seconds.

Xiao Yihan brought Yang Shaojun and Mak to Nikon's server, and heard Xiao Yihan say: "Okay, now it's up to you."

As Xiao Yihan said, he activated the hundreds of thousands of zombie computers he captured through the Tianlong system, and attacked Nikon. Xiao Yihan naturally used his best DDoS distributed denial of service attack.

Just as Xiao Yihan launched his own attack, Yang Shaojun and Mak also started to attack.

Because Yang Shaojun considered that there were two super servers, the server of Siemens and the satellite of the American CNN broadcasting network, as springboards, he also mobilized the server of the China Security Bureau to attack Nikon.

Then Mak is even more terrifying. This guy has been immersed in the Internet for many years. Since he can give Xiao Yihan such a super chicken as the satellite of the CNN radio and television network, one can imagine how many large servers he has in his hands.

Xiao Yihan and Yang Shaojun were even more surprised by that mak. Not only did this guy have many large servers as bots, but he also installed malicious attack programs on these bots. Immediately tens of millions of viruses were sent to Nikon's servers. gushes away.

Immediately, Nikon's server was overwhelmed, and its running speed was extremely slow. At this moment, Xiao Yihan successfully invaded Nikon's server. At this time, Nikon's server was prone to system crash at any time, just because Yang Shaojun and Mak Chong's sex started At that time, I heard Xiao Yihan shout: "Don't attack too hard, you have to show weakness now, otherwise if Nikon shuts down the server, then our previous efforts will be in vain this time."

At this time, Yang Shaojun and Mak suddenly realized that this operation organized by Xiao Yihan was to steal the other party's research results. If his side attacked too hard, the other party might shut down the server if they couldn't stand it.Even the most powerful hacker can't steal even a code from the other party's closed computer.The two quickly stopped the attack on the super-large server in their hands, and only used those relatively ordinary zombie computers to attack Nikon's server.

It is said that when Nikon's server issued an alarm, several computer engineers from Nikon rushed over immediately.It turned out that during this time of the Sino-Japanese hacker war, most of the computer security engineers of large companies in China and Japan lived and lived in the company, because they were afraid of being hacked and causing certain losses to the company.

In other words, when the computer engineers saw the surging data flow and viruses rushing towards the server, their faces turned pale with fright. Just when they decided to shut down the server, the surging data flow He retreated suddenly, and at this time Xiao Yihan was quietly lurking in Nikon's server, waiting for Nikon's people to chase him out before taking action.Sure enough, several computer engineers from Nikon looked at each other, and followed Yang Shaojun and Mak through reverse tracking.

After Nikon's computer security engineer chased him out, Xiao Yihan began to search for their R&D department in the Nikon's server system.

Xiao Yihan came to the R&D department of the Nikon system, and quietly dropped a Trojan horse virus written by himself at the door of the R&D department. As long as someone logged into the R&D department, the Trojan horse would automatically send the login username and password to his pda.

When Xiao Yihan finished all this and left behind the back door, he quietly exited Nikon's server and called Yang Shaojun and mak to retreat

.

For this action, both Yang Shaojun and Mak felt uncomfortable. It can be said that they didn't do much, so Xiao Yihan told them to stop.Xiao Yihan didn't know what the two of them were thinking, so he promised them: in a few days, let them have a big fight.

In the next two days, Xiao Yihan's pda received several login usernames from the R&D department of Nikon Corporation in Japan. The degree of preciousness of the data is also different.After waiting for three days, Xiao Yihan obtained the user name and password with the highest authority.

Xiao Yihan chose to enter the Nikon server through the back door left at the beginning in the middle of the night in Japan, and used the user name and password he had in hand to enter the most secret center of the Nikon R&D department. Copy the data to your own pda. Although it is only a small camera, the research data is as much as 600g, which shows the energy that Nikon has spent on research and development.

After Xiao Yihan copied Nikon's R&D data, he hacked into the server of a large domestic company and found that the R&D data was only a few gigabytes. Seeing this, Xiao Yihan was heartbroken. This is the gap. Chinese businessmen only pay attention to what is in front of them. Benefits, no long-term development can be seen at all.

In the future, there will be three chapters in the morning and evening without any accidents. Please look forward to more exciting events

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like