Rebirth Online Entertainment

Chapter 570: Fight against hackers all over the United States with one's own strength

Chapter 570: Fight against hackers all over the United States with one's own strength

In this way, the situation is getting worse and worse, and the second Sino-US hacker war seems to be about to break out. 【

Aishang Reading Network]

In 2001, an unprecedented war broke out between Chinese and American hackers. The ending was that under the order of the US government, the Sino-US hacker war ended.Although the final result, according to the comments made by the outside media, the Chinese hackers won.However, for many American hackers, he did not accept such a judgment.If it were not for the order from the US-government, they would probably continue to attack the Chinese-government-website, and even destroy the entire Chinese Internet.

In recent years, whenever they thought of the humiliation they suffered during the Sino-US hacker war, they would curse inwardly.Now, the Tang Dynasty Group is openly fighting against hackers from all over the world. With such arrogance, the first ones to get offended are these American hackers.They have long wanted to launch the Sino-US hacker war again, but there has been no excuse.In addition, in recent years, Sino-US trade has tended to be normalized and the relationship between them has become closer.Neither the United States - the government - nor the American civil society will allow such a hacker war to take place.

Until now, some hackers couldn't bear it.

They ran around telling each other, disseminating the threat theory of the Tang Dynasty company.What's more, some hackers bluntly said that if Tang Dynasty Corporation is not taught a bloody lesson, it may be a disaster for the future of the United States.Such remarks have been supported by many American hackers.They believe that, judging from the current development of Tang Dynasty Company, in the future, he will occupy the US Internet and even the world Internet in a more comprehensive way.

This kind of monopoly is still more powerful than Microsoft's monopoly.

As a hacker, as a hacker who has been focusing on technology and innovation.They don't allow such a thing to happen, so when they see such news.Whether it is those evil hackers or those good hackers, they all hate Tang Chao Company from the bottom of their hearts.In particular, at this moment, Tang Chao Company actually violated the spirit of hackers and directly handed over the "Hacker Five" to the US-government-, which will make these hackers hate it even more.

They must give Tang Dynasty Company and China a resounding slap in the face.They believe that as long as American hackers join forces, the United States - the government - will no longer interfere.Then, the second Sino-US hacker war, victory, must belong to them.Could it be that Chinese hackers are so powerful?Even some of his Internet, just relying on some novel ideas, which attracted many users.

But when it comes to its technical nature, there is nothing at all. They can copy any company.

However, it is such an Internet network without any technology, but he monopolizes the whole world.As a hacker, he absolutely does not want such a bad technology to directly monopolize the world.Therefore, they were not calm anymore, and after that, they broke out.Moreover, in the process, they also found that the US-government-authorities did not block their actions, and seemed to keep acquiescing.

Seeing this, the American hacker laughed.

Come to think of it, the United States - the government - also saw the threat from Tang Dynasty Corporation, so they chose to remain silent.That being the case, then, what do they have to worry about.All hackers in the United States, let's go together to eliminate Tang Dynasty Company and the Chinese Internet.Let their Internet go back to primitive times.

……

Tang Dynasty Company.

"Everyone, the American hackers don't seem to give up. Think about it, what can you do?"

Seeing the rampage of American hackers, Chen Jiayi felt a little guilty.I went there, but I didn't expect that my small demonstration would actually ignite the anger of these American hackers.However, it is useless to blame yourself now. Judging from the current situation, it is really possible for the second Sino-US hacker war to break out.

"Boss, we are still afraid that they will not succeed. They have already lost the first Sino-US hacker war. I believe that they will also lose the second time."

Sitting at this time are all the technical elites of Tang Dynasty Software.Some of these elites are former members of the hacker alliance, and some are former members of the Honker Alliance.However, now, for the development of China's computer, they all gathered in Tang Dynasty Company, under the command of Chen Jiayi.

"No, our Tang Dynasty company is certainly not afraid. However, our Chinese Internet, relatively speaking, is still not comparable to that of the United States. Especially for those multinational Internet companies, if they are attacked. I am afraid that we will spread all over the world. The overall situation, but everything will be shattered."

At this time, the China Honker webmaster stood up and said.

"Yang Zhan said it well."

Although the China Honker Alliance is only here to help Tang Dynasty Company temporarily, it has a certain -government-nature.However, for the development of the operating system, Chen Jiayi didn't bother to argue with them.Anyway, Chen Jiayi's purpose is the same as that of the domestic - government - and it would be great to work together.

Therefore, this "Yang Zhan" directly denied that he was fighting with American hackers for the safety of the Chinese Internet.Although it was considered by the government, Chen Jiayi felt right and did not deny it.Especially, Chen Jiayi's previous strategy.If it is attacked by hackers from all over the United States, it is estimated that it will be over.Such a loss of selfishness is too great.

Thinking of this, Chen Jiayi also figured it out.Why did the United States-the government-choose silence in this war.The reason is that he only needs to defeat the Chinese Internet companies represented by Tang Dynasty Company.Well, for the United States - the government - the benefits are huge.At least, this war can instantly break the monopoly of the Tang Dynasty Company.

Even if the dominance of the Tang Dynasty Company cannot be destroyed, it can still allow all American companies to take root.

"This time the war is not a war between companies, but a war between countries. Once the battle starts, the loss to our country will be exponentially multiplied. Moreover, if many domestic companies are damaged, It is also a great disadvantage for our Tang Dynasty Group."

The metaphor of the image, that is, the Tang Dynasty Group is the ancient king, and other domestic enterprises, he is some generals.If the soldiers are about to die, leave the polished commander of the Tang Dynasty Company.Then, no matter how awesome this king is, he is also a wild and lonely king. It won't take long for him to be destroyed by himself.

All of a sudden, everyone was analyzed by Chen Jiayi, but they didn't know what to do.

At this moment, in the conference hall, Xiaobai said something.

"By the way, I have a solution?"

"any solution?"

"Since the war that is about to break out this time is caused by us. Then, we can also divert the attention of this war."

"What transfer?"

Some people waited, but they didn't understand.However, upon hearing this, Chen Jiayi nodded and sighed secretly, Xiaobai is really a lucky star.Dangerous pass, but he had a sudden inspiration.

"Think about it, everyone. Hackers all over the United States hate Tang Chao Company, saying what about Tang Chao Company. Then, we, Tang Dynasty Company, might as well make another statement. Just put down the ring and make an appointment for a battlefield to fight against the hackers all over the United States. In this way, Even if our Tang Dynasty company loses, it won't hurt much. At most, it will hurt a little reputation, but for ordinary people, they don't know it at all. Besides, it's not certain who wins and who loses."

Although Tang Chao Company is only a group company, its technical strength is simply the strength of all hackers in China.Such a company, to put it bluntly, can represent the entire Chinese hacker community.Besides, Xiaobai admires the hacking skills of the boss "Chen Jiayi".As long as Chen Jia is in charge, the Tang Dynasty Group is absolutely impenetrable.

"awesome."

Until, after Xiaobai fully explained, everyone finally understood.

Afterwards, Tang Dynasty Company declared to the outside world, "The last incident was entirely a personal matter of Tang Dynasty Company, which was related to the Chinese Internet and the US Internet. The hacker war between the two countries. Let’s not talk about who will win this war. As long as the war breaks out, it will definitely be a disaster for mankind. There are even some bad hackers who will do something during this war. Illegal hacking. We strongly condemn this kind of behavior. And, our Tang Dynasty company hereby announces that we will completely accept the challenge of all hackers in the United States. If the hackers in the United States want to use this hacker war to do other things, I think you guys The idea is wrong, this is not allowed by hackers all over the world..."

The above is just one of them.There is another point that Tang Dynasty Company needs to emphasize.That is, Tang Dynasty Company is a computer information company, an Internet company that serves everyone, not a hacker organization, please don't talk about hacker ethics with a group company.For all the hackers who invaded the Tang Dynasty Group, the Tang Dynasty Group has the right to publish their p, and let them be punished by law?

Could it be that the Tang Dynasty Group couldn't fight back after being hacked?

After such remarks were released, they were supported by many neutral hackers.They believe that if you want to fight, you can fight, why bother to harm others.They despised it even more, because a small hacker act actually involved a big war between the two countries.You must know that the Internet in the world today is no longer the Internet before 2001.Now the Internet, he has connected the world into one piece.If any part is damaged, other places will also be damaged.

As a wise hacker, we should think about the health of the Internet around the world.

Naturally, the remarks made by Tang Dynasty Company stood at the highest point of justice, and many hackers expressed their support for Tang Dynasty Company.Especially the hackers in the lnux community of the Tang Dynasty, this group of hackers has been concentrating on researching the operating system.Their hacking technical strength is no less than that of other hackers who are engaged in hacking activities every day.Tang Dynasty Company is known as the boss of Tang Dynasty lnxu, so naturally, they also support it one after another.Moreover, they also stated that if American hackers ignore human Internet security, then they will stand on the side of Chinese hackers and fight against American hackers.

Until the end, facing the oppression from hackers from all over the world, American hackers compromised and accepted the conditions of Tang Dynasty Company.Moreover, the agreed battlefield is still the Tang Dynasty network.However, this battle is no longer about searching for a certain piece of information.They can show their strength, including destroying the official website of the Tang Dynasty Internet.Of course, Tang Dynasty Company can fight back, but many hackers think that under the concentrated attack of hackers all over the United States, is it possible for Tang Dynasty Company to fight back?

So far, the second Sino-US hacker war broke out.

However, the difference between the second Sino-US hacker war and the first is that the United States is still the United States.However, China sent a Chinese phalanx represented by the "Tang Dynasty Group".A long time later, when people recall this war, the materials often say that this is a Sino-US information war, this is a confrontation of cold weapons, and this is a war recorded in history.Perhaps, this war is not as eye-catching as the direct invasion in reality. Perhaps, no life will die in such a war.However, in such a war, the destructive power it produces is stronger than any real war.

"Everyone, are you ready?"

This time, Chen Jiayi personally sits in charge.

"Ready."

"Well, this is a battle of honor for the Chinese Internet. We need to pay a price to win this war."

The gunfire is coming, the battle is about to begin, the horn is about to be blown.

"It's exactly twelve o'clock."

The second Sino-US hacker war officially broke out.

At this moment, all attack sources from various regions in the world entered the Tang Dynasty network server in one go.Of course, you didn't say that Tang Dynasty Company was competing with American hackers, how could it be global.Actually, it's very simple.on the one hand.Every hacker, they will use a springboard, pretend to be p, besides, there are some American hackers, they don't necessarily stay in the United States.Of course, there are also some hackers from other countries or regions, but they want to take a trip to fish in troubled waters.

Of course, in a situation like this, the Tang Dynasty Company has nothing to do with it now.There is no benevolence or injustice in the war.After all, among the hackers in the world, there are too many hackers who have no morals.

"Brothers, go directly."

Facing the crazy influx of data packets, Chen Jiayi didn't panic at all.He was in the lobby, commanding hundreds of technical personnel of the Tang Dynasty Group, and kept defending.The task they have to do is to defend in an all-round way in the first stage.As long as the defense is successful, it is a victory.

As for the counterattack after the defense, for the time being, Chen Jiayi didn't want to start it so quickly.

"Tang Dynasty Firewall, open."

For Tang Dynasty Software, he once researched a firewall and completed it under the guidance of Chen Jiayi.The function of the firewall, nothing else, is to isolate illegal junk data packets.As an effective way to fight against hackers, it is to develop a good firewall.In the global market, Tang Dynasty Firewall has always had a very high market.

Because Tangchao Firewall has powerful functions, simple operation and reasonable price, it is deeply loved by ordinary users and enterprise users.Often, many times, as long as companies use the Tang Dynasty Firewall, they don't even need to hire any technical experts.As long as a few computer maintenance personnel are invited, they can ensure the data security of the entire enterprise.From this we can see the power of the Tang Dynasty Firewall.

Not to mention, the current firewall is still a super firewall that Tang Dynasty Company has not released, and is only used by Tang Dynasty Company alone.It is not an exaggeration to say that he is a firewall within a firewall.As soon as this firewall is released, thousands of junk data will be rejected.

Even if all the hackers in the United States came, Tang Chao Company still didn't have a trace of fear.

This is the Tang Dynasty Company, and this is the technical strength of the Tang Dynasty Company.

"Damn, God, what kind of firewall is this."

At the same time, all the hackers around the world began to curse.

They found that the junk data packets they sent were useless at all.The official website of Tang Dynasty Network is still running normally, and there is no card phenomenon at all.Even, when the official website of Tang Dynasty Network was still being attacked by hackers all over the United States, it had nothing to do with a news, lamenting that the attacks of these hackers were too weak.

However, these hacks are not easy to use.

After they spam the data attack effect, they switched to another method.

"Direct invasion."

In this way, instead of sending junk data packets, it directly enters the official website of Tang Dynasty Network in the way of normal user login.And, find the bug, and then invade.I have to say, this method is still very useful.After all, your official website is there.Your firewall can filter spam information, but for normal fake data, the firewall has nothing to do, it can only let him in.

Until, when they enter.The invasion begins.

What, you said, how did they invade.

Of course it is to find bugs.You know, any software has bugs.Not to mention, for websites that are not safe at all.Many hackers, the way they invade is directly from the official website.Then, follow the vine-touch-melon all the way to find the control of the entire-operating-system.

However, how could the Tang Dynasty Company have not thought of this point.

You have Zhang Liangji, I have a wall ladder.

"Virtual system, start."

With an order, the Tang Dynasty Network Server, a world-class virtual system, was officially launched.

This virtual system has been learned by many hackers long ago.However, there are really few people in this world who can really know the true face of Lushan in this virtual system.Countless master hackers died in this virtual system.

Illegal user 1 enters.

Illegal user 2 enters.

Illegal user 3 enters.

In the virtual system log, users who illegally entered the operating system flashed one after another.Under the display of the database, we can clearly know what these users have done in the entire operating system.Whether it is destroying files, deleting information, or wanting to gain control over the operating system.

"p, 220, 123..."

"p, 113, 345..."

One p after another flashed, and all these ps were recorded by Tang Chao Company.And, under the command of Chen Jiayi, the technicians began to analyze and find the final p address.

The most effective way to deal with hackers is to find out the other party's p and publish it.Then, these hackers will be defeated in an instant.Chen Jiayi, of course, knew this clearly.

Therefore, in the later time, many people saw such a scene.On the official website of Tang Dynasty Network, p-addresses from all over the world flashed from time to time.Some are very detailed, even the name, identity, occupation...all are marked one by one.At first, such p-addresses were rare.However, as time goes by.One p after another flashed from time to time, especially when a hacker named "Paul" appeared, the world was shocked.

Because, this Paul is the third hacker tycoon in the world.Once directly invaded the US Department of Defense, and stole a secret weapon information.It is said that this weapon information has been sold to Iran.

"Retreat, retreat across the board...all the hackers who attacked the Tang Dynasty's network are completely defeated."

After this information was released, even if there were any hackers who were not afraid of death, they would all be defeated.

the next day.

When the bell of dawn rings, the Second Hacking War ends.

The final result is needless to say.With its own strength, Tang Chao Company firmly resisted the hackers all over the United States and won the whole battle.



Aishang Reading Network]

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like