Chapter 84: A Battle Between Hackers
After a long time, Huang Zhi finally finished reading the outline written by Chen Yidao, "Brother Dao, I really doubt how your brain does it, all the outlines, the creativity of each outline is different......." Huang Zhi turned around and ...... , it turned out that Chen Yidao left early.
"If you have such skills at a young age, you must be an extraordinary person when you grow up. Huang Zhi said to himself.
Huang Zhixin was so moved that he found a few excellent writers and sent them the outline written by Chen Yidao. When those well-known writers saw Chen Yidao's outline, they all marveled that it was a masterpiece of the world, and asked Huang Zhi about the person who wrote the outline, saying that they were going to meet this person.
Huang Zhi didn't dare to say Chen Yidao's name without Chen Yidao's permission, although everyone in Qinglin City now knows the name Chen Yidao, but later after Chen Yidao's business became bigger, Chen Yidao began to keep a low profile, and only used the title of Chen Shao when there was a news conference or anything like that.
Of course, his own company should be concerned, and in a blink of an eye, Chen Yidao arrived at the office building of the network pioneer, and as soon as he entered, he saw that the people inside were all facing the computer, desperately typing something.
"Hurry up and check on me, I can't let them run. Li Hui said angrily, today suddenly a computer sounded a short and rapid alarm, I don't know where a group of people came from desperately using hacking technology to attack Baihua Game Company.
Li Hui is not afraid that those hackers will attack him, but he is afraid that those hackers will run away. Because they have the "Cyber Pioneer Firewall", which has caught hundreds of hackers so far. The "Network Pioneer Firewall" was originally written by Chen Yidao for Network Pioneer, and the purpose of this firewall is to achieve three goals: automatic interception of extranet data function, intrusion function, and anti-tracking function. These three functions also have the principle of intelligence. Moreover, the "Network Pioneer Firewall" designed by Chen Yidao will not intercept abnormal data sent by himself. This is very different from other local firewalls.
In this era, Chen Yidao's firewall is already regarded as the most advanced protection software, and there are many hackers attacking Baihua Game Company every day, but none of them fail, and some are even unlucky to be counter-attacked by Li Hui, stealing their information, and then sending their information to the court.
Chen Yidao patted a network pioneer staff member on the shoulder and said, "Let me come." ”
Chen Yidao quickly made a ghost virus, this ghost virus is not a trace of aggression, but he is a master of stalking, and anyone who touches him cannot escape his tracking, and he can also steal all the information of the other party. Chen Yidao also has a zombie virus, this zombie virus is aggressive, as long as you have a target, he can go on a rampage and destroy the opponent's entire computer.
Li Hui was a little ashamed when he saw Chen Yidao in person, because the protection software they made by themselves had been broken by hackers, and now it all depends on the protection software made by Chen Yidao. He felt that he was very useless, he had learned hacking techniques for so long, and the software he made was broken by someone in an hour.
Chen Yidao is very calm, because with these primitive hackers, they can't break through the "Network Pioneer Firewall" they made before if they are given a year: "Li Hui." Chen Yidao suddenly shouted.
"Yes, Brother Dao, is there something wrong?" Li Hui responded.
"Don't send the information of these hackers to the court in the future, because even if we catch them for a few years and come out again, we won't benefit at all. I've made two viruses here, one is a ghost virus, which is designed to track and steal each other's data. There is also a zombie virus, which is used for attack, and the virus will be paralyzed as soon as it comes out of the opponent's computer, except for replacing all the parts in the computer, otherwise his computer will never be used.
Hackers are generally very rich, so we use ghost viruses to hack into their computers to steal their data, and then hehe...... , their money will be ours, hehe....... Money is better than anything else, and when we do, we use zombie viruses to scrap their computers.
You don't have enough technology to rely on me all the time, I think you can do that, you find out about the hacker and lock him with a ghost virus, and then use your own technology to compete with him. Anyway, with my firewall as the backing, you don't have to worry about it at all, just focus on fighting hackers, so that you can grow ...... in the war. If you've had enough, you can sweep up everything they can and let the zombies bite them. Chen Yidao smiled lewdly. Chen Yidao felt that if it was too cheap for them to hand over those hackers to the government, it would be better to do something on them!
"Hey...... , Brother Dao is Brother Dao, this trick is enough damage, and we will treat them as experiments in the future. Li Hui smiled happily. Chen Yidao didn't blame him, he was very grateful, but it made him even more guilty, and he secretly made a promise in his heart that he must become a top hacker like Chen Yidao.
Chen Yidao Weiwei smiled. Fingers on the keyboard: "You're just my tools." ”
Chen Yidao sent out the ghost virus first, and soon the information of the other party's gang was found. Chen Yidao followed the data source and began to detect the target IP. America....... The first level of springboard; 2nd Layer Springboard;MD. The third level of springboard ....... "I didn't expect there to be such powerful hackers in this era. "Obviously, the gang that attacked Baihua Games Company was very clever and used as many springboards as there were to confuse each other so that the other party could not find their specific location.
In a basement in the United States, there are several people with scumbags on their faces, each with a computer, and they are all desperately trying to type strange symbols into the computer. Suddenly, their No. 1 firewall was breached, and the alarm sounded, and the old researcher, who was taking notes in front of the computer, frowned, and showed a solemn expression on his face.
Rice Poison is a group of elite hackers from all over the world, and since its inception, they have lost count of how many companies they have breached. They're also very powerful, and no one has ever really managed to hack into their servers. Their servers are all designed by themselves, and their technology can be said to be the top of the world, and it is never easy to break through their servers. What's more, the firewall they developed themselves has as many as three layers! "Panda" and "Catch Chicken...... It's hard to hack into their main server without being detected!
They wanted to break through the system of Baihua Game Company today, and then wanted to steal the data of "Dragon Knight", but they didn't expect Baihua Game Company to be so powerful, even they top characters couldn't break it, and they were also breached by the other party A firewall was broken, which made them unacceptable, but the sound of the alarm told them that it was true.