Chapter 584: April Fool's Day Action
"Mo Bing, Lu Ming, and a laok. ”
Li Feiteng muttered to himself, he quietly entered the chat room of the hacker alliance, and while looking at the chat content of the members, he used the keyboard next to him to quickly find the ID of IDlaok.
It was also the first time he tracked down laok, and it didn't matter if he checked it, after checking it for a long time, he found that it was still a broiler.
Looking up at the broiler calculation on the software, Li Feiteng has checked tens of thousands of broilers and found thousands of IP addresses, all of which are fake.
When Li Feiteng continued to search, Laok also reacted, and while he fled nervously, he left on the broiler: Who are you?
Obviously, Laok is very confident in his skills and arrogant, and does not believe that the other party will be able to find him.
After Li Feiteng saw the text he left, he smiled and continued to tap on the keyboard, tracing the source of his IP.
After more than ten minutes, he deliberately went around in many circles, and finally found out that laok's IP address was abroad, and Li Feiteng was a little suspicious.
However, this laok must be a Chinese, because the chat room also communicates in Chinese characters, and this laok also talks a lot about current affairs in China, so it will not be a foreigner.
It's just that in this case, Li Feiteng has no way to dig out his true identity.
Every ordinary person abroad is particularly good at protecting his privacy, because it is protected by law.
As for hackers, they are even more tightly protected.
Compared with Mo Bing and Lu Ming, foreign hackers are the real hackers. It's also a ghost like Li Feiteng. It will never come to light.
He thought about it. Tentatively left a text on a broiler: "Laok, I'm the king, and I'm looking for you alone." ”
Laok quickly replied on the broiler, "King, you scared me to death, and almost found me." ”
"I've found you. Li Feiteng smiled slightly, he gently clicked the enter key a few times, and took control of Laok's computer in the magnesium country.
In an apartment building in San Francisco, a young Chinese man wearing glasses. He watched in amazement as the computer was seized by the king.
When he was shocked, the computer's camera suddenly turned on, and after a quick flash, Laok also reacted, and he immediately reached out and unplugged the computer.
It's a pity that he is still a step slow.
"What does this king want to do!" Laok was a little angry, although he admired the king's skill, but this impolite and unfriendly attitude. He was very annoyed and scared.
He didn't know if the king had succeeded in taking pictures.
The answer is yes. Li Feiteng didn't expect him to really take a picture, he looked at the photo on the computer screen, although it was not very clear and a little blurry, but he could definitely see his face clearly.
A young boy in his 20s, wearing glasses, black hair, a bookcase behind him, surrounded by computers and garbage.
After waiting for a while, Li Feiteng saw that he was indeed connected to the Internet again.
"What do you want to do, King?"
"I want you to break the Pentagon with us and steal some information for me. ”
"It's a crime, and I'm not going to do it. ”
"You don't want to see the pictures I took of you?"
Li Feiteng smiled, and he immediately transmitted the photo just now.
After Laok received the photo, he repeatedly shouted out to God God to express his unwillingness and depression in his heart.
But he still didn't agree, leaving a message: "I don't do criminal things, it's too dangerous, it's okay if you have my photo, I have a clear conscience." ”
This laok's reaction made Li Feiteng very helpless.
Li Feiteng smoked a cigarette, thinking about how he should impress Laok and how to make this matter more rigorous.
Monetary gain is the easiest to impress, at least in the case of crime, where money is the first of all evils.
Come to think of it, it's still a bounty order.
However, it is not a matter of time to make the bounty order have the function of electronic money, and the current bounty order is just a numbers game.
"If you can help me, I'll give you 1,000 bounties. ”
"Bounty orders don't work. ”
"The bounty order seems to be a numbers game, but it can replace the electronic ratio, it is a virtual comparison system with P2P technology, I will ask a friend this year to open the exchange between it and the dollar exchange rate, then you will know how expensive it is, one may be worth thousands of dollars, and more importantly, you have it, you don't have to pay taxes, you don't need to open a bank account, and the transactions between people are not subject to any monitoring. “
Li Feiteng could only state the role and value of the reward order quickly.
Laok happened to be a top student majoring in finance, and he quickly understood what the king meant by the bounty order.
"It's a whole new field, and I want 10,000 bounties. Laok immediately opened his mouth.
"There are 2,000 at most, and the bounty is only 1 million in total, and after this year, it will be equivalent to a gold mine, and the more it is developed, the higher the value. ”
"5,000, I can promise you. ”
"Okay, 5,000 is 5,000. ”
Li Feiteng agreed, he didn't just get a bounty order, it was a big deal to develop other virtual gold coins, solve a little more, and get a system of equations with eight or nine million solutions, so that although the value of a very low value, the development prospects were better, and it also had the circulation performance of currency.
After this day's exchange, in the early hours of the morning, Mo Bing, Lu Ming, and a laok who didn't know his real identity, but had a real photo of him.
Together with Li Feiteng, a total of four of the world's top hackers, plus the super hacking software he developed, immediately launched a broiler activation operation all over the world.
The software in their hands is the software that Li Feiteng used to activate some viruses.
The four of them acted at the same time, and after more than three hours, they actually activated millions of broilers in more than a dozen countries around the world.
Although four people can only operate and control 500,000 computers at most, and run a total of attacks as cover, with these tens of thousands of IPs from all over the world as smoke, it is simply a fool's dream for the Pentagon to track them down in a short period of time.
China Time: 01:32 on April 2, 2001.
U.S. time: 11:30 a.m. on April 1, 2001.
It's early morning on Li Feiteng's side, and it's noon on Magnesium Country's side.
He had already passed April Fool's Day, and the April Fool's Day of the Magnesium Country was only halfway through.
The end of the hacker war between China and the United States has made people relax their vigilance, but the Pentagon is still heavily guarded, and hundreds of network engineers are still working intensively.
William sat in his office and surfed the Internet on his computer, when suddenly, the computer's browser and various web pages opened, and the email system swiped out a lot.
Almost in three seconds, the computer was buzzing and then suddenly it went black.
Before William could react, two of his subordinates ran in, and one shouted loudly: "Mr. William, something is wrong, tens of thousands of hackers have illegally invaded our system together, and our system is completely paralyzed, and it is not under our control at all!" (To be continued......