Chapter 27: The Perverted Suy System

Sunday, November 25.

The public information network supervision department, also known as network supervision, is mainly responsible for crimes on the Internet.

Director of the First Division of the Beijing Public Security Network Supervision Department, Xiong Anqiang, today is a long-lost vacation, sitting on the sofa, watching TV, waiting to try the meal cooked by his long-lost wife.

But in this line of work, there is no real vacation, at any time a phone call, you have to go into battle, just like now, his mobile phone rings.

A sense of uneasiness quickly arose in his heart, because the caller was the leader of their place.

When the phone was connected, a hurried voice came from the other side: "Hey, Director! It's a big deal! Last night, the entire network of the public security in the capital was invaded!"

"What?!" As soon as he heard this, Xiong'an Qiang, who hadn't had time to speak, almost threw away the cup in his hand, and immediately shouted: "Wait, I'll be there soon!." ”

Xiong Anqiang quickly got up, walked to the door, changed into work clothes and shoes hanging aside, and then his wife came out: "What's the matter?

Xiong Anqiang shook his head, and changed his shoes faster: "I can't eat, something is wrong, I have to go immediately, I shouldn't be back today, and I don't have to wait for dinner." ”

After speaking, Xiong Anqiang changed his shoes, picked up his mobile phone and car keys, and quickly went downstairs.

The wife shouted from behind, "Drive slower! Remember to buy something to eat, don't go hungry!"

Xiong Anqiang waved his hand, quickly got into the car, and started.

When I returned to the office, the usually spacious office was now full of people, and some big people who couldn't usually see the director of the public security bureau, the director of the transportation bureau, the deputy director and so on all arrived one after another, and Xiongqiangan even saw a deputy secretary of the municipal party committee!

It can be seen that the seriousness of this matter is not trivial.

"What's the situation now?" As soon as Xiong Anqiang came, everyone turned to him, and he quickly walked to the side of several team members who were busy.

Everyone in one place was relieved to see the director coming, and a young man, the person who called him, said: "Report to the director, the other party's invasion was detected by us at 8:02:37 this morning, and then we began to stop the other party's deeper invasion, and tried to capture the traces on the opposite side, but ......"

"But what? Keep talking!" Seeing him stop, Xiong Anqiang shouted with a frown.

"But the other side doesn't seem to have the desire to fight with us at all, entering the important database of the public security is like no one's land, we can't stop the other party's invasion, and then we quickly executed emergency rescue, closing all the channels that the other side can invade, as well as the web network, but still can't block the other party's invasion. After speaking, the young man looked up at the director and everyone around him, and instantly lowered his head.

Syllable!

A loud bang startled the entire office office, and it was the sound of Xiong'an smashing his mobile phone in anger.

"What are you doing!!The best group of talents in the country?Ah? Supervisors on the Internet?Ah? You are a fart! What are you going to do except eat and sleep all day? A big living person, just let you in like this? Can you still do it?" Xiong Anqiang was really angry, and scolded a group of people who couldn't raise their heads.

And the people around him were also watching, and they didn't make a sound, after all, it was not a department, and it was one thing to be embarrassed to interject, this Xiong'an Qiang was angry, and no one would go up to find trouble at this time.

After scolding for a while and being tired, Xiong Anqiang drank a saliva, glanced at the young man who was reporting, and said angrily: "Continue to report, what else to say!"

"Yes!" the young man said cautiously, "The other party invaded high-level secret documents and intelligence databases, but the other party didn't seem to be interested in these, just 'wandered' around for a while, and then left, and there was no trace of the encrypted files being viewed."

According to the other party's style of action and operation level, we speculate that the person should be a Chinese, and has a very high level of computer operation, at least a world-class hacker, and extremely high computer configuration, we can probably think of a photon computer. ”

Hearing that the encrypted files were not leaked, Xiong Anqiang's face also recovered a little, if there was a national-level data leak, the consequences would not be something he could bear.

"How high is that person's computer level? So many people can't stop a person, is there really such a big gap with you?" Xiong Anqiang asked curiously, he is not looking young, and his level is definitely world-level, which is different from ordinary network supervisors, they are the capital here.

Everyone here can be said to be a genius on the computer network, so many people, can't stop each other?

The reporter said with a strange face: "The other party's computer level we speculate, at least can be ranked in the top ten of the world's hackers, the other party and we are like people and ghosts, many of his programs should be developed by himself, his invasion method is different from all the invasion methods we have seen, we hit him as if it was hit in the air, there is no way to deal with it." ”

Xiong'an Qiang: "............"

………………

And Su Yun, the envoy of all this, didn't know that his small move had alarmed the entire capital.

Su Yun was working on his new system at this time, and the laptop displayed the three English letters of Suy.

It took him a week to add some of his ideas to the system, and then it became the current Suy system.

The system has five main functions: processor management, memory management, file management, equipment management and job management, which is invented to make it simpler, faster and more convenient for users to use the computer.

In addition to these five functions, Suyun has designed the sixth function: big data and intelligent management.

The main function of this function is that after Su Yun gives the initial program and information, his computer will continue to collect data for analysis, compression, and storage, just like artificial intelligence.

And when Su Yun needs this information, he will automatically split and assemble the information.

Earlier than now, Su Yun thought about trying this function, and invaded the most heavily defended public security department, but it was quickly discovered.

At this time, the metamorphosis of the Suy system begins to manifest, when the opponent attacks, the Suy system will immediately compare with the data in the data, so as to crack and resolve the opponent's attack.

To put it simply, this system is Su Yun's bodyguard, and if others attack him, Suy's system will use the magnificent amount of data in the database to crack it.

And the Suy system will also automatically analyze the data when it collects, just like a person, draw inferences from one another, and then store it, and extract it directly when needed, which is just a momentary thing, which can save most of the time.

And Su Yun only needs to deal with some relatively simple procedural problems, which even an ordinary hacker can handle, not to mention him now.

That's why the people of the network supervisor say that he is a ghost, because they simply cannot attack him.

Su Yun withdrew from the public security department, and the Suy system cast a big data net, not erasing the traces, but simulating and copying the traces of Su Yun's access, and then casting the net.

In the end, a simple splitting procedure was implanted inside, and Su Yun's traces were successfully spread throughout most of China, and it was impossible to continue tracking.

For the average person, this system is actually useless, but to let a hacker, even if it is an ordinary hacker, it can become very scary.

The day after the Suy system appeared, the network monitor issued a world announcement.

According to China's National Security Law and Public Network Supervision Law, a hacker has maliciously invaded the national security department of China's capital, seriously violating China's laws, and is now wanted all over the world This hacker, this person is extremely dangerous, code: S, bounty: one billion RMB.