Chapter 5 The result is unsuspenseful
The man called the leader suddenly stopped his hands suddenly, and his face froze.
Leader, unexpectedly, lost, these few technicians in the hearts of the onlookers rippled, a circle of not a small ripple...
The technicians who came to watch were also stunned, looking at the stuck computer in disbelief. If nothing else, it's because he's the computer in the hands of the boss. The technology of the leaders, they couldn't know better.
The real identity of the boss is the technical director of the game company, but he is a key member of the Red Guest Alliance in the network.
The Red Guest Alliance is a group that has recently emerged in the domestic network to protect the tranquility of the Internet, and because of its excellent reputation in the Internet community, it was once popular on the Red Network. More than has been dominating the network world and the rise of the relatively old, the first position of the hacker alliance.
Between them, in the eyes of the outside world, one is the main defense, and the other is the main attack. In fact, it doesn't matter if you're a hacker or a red guest. If you're only good at defending, or if you're only good at attacking. Then you will always be in a passive state. It's like a big river that rises to water, if the river washes it away, you have to mend it, and when you are about to repair it, the river will wash it up again, and you have to rush to repair it.
Isn't there a state of being in a state of constant busyness? If you can take a defensive measure if the river is about to rise, or if you think it's the most likely to be washed away, then the river will be yours, won't you?
For a hacker, or a red guest. Especially for hackers with very good skills, if they want not to be led by the nose by others, they can only be proficient in all computer technologies, whether it is defense or attack.
In fact, there is not much difference between hackers and red customers, they are both talents who have studied computer technology, which has a great role in promoting the development of network technology. But these talents like the night, and like the feeling of their own world in the night. It's not that the country doesn't have talents in this area, but most of the people who have studied computers are concentrated in the network, and their identities are called hackers.
The term hacker is synonymous with sabotage since its appearance, when we mention the word hacker, in our minds, the characteristics of hackers appear like a conditioned reflex, only the word sabotage can be used to describe the destruction of servers, destruction of the State Grid official website system, destruction of computers, leakage of data, etc. This has caused the state to vigorously hunt down hackers in the network on this ground, and since then this kind of cyber battle between pursuit and anti-pursuit has never been interrupted······
As a result, some countries have also set up technical departments related to the pursuit of hackers, the most famous of which is MG's FBI Internet Supervision Bureau. MG's FBI Cyber Supervision Bureau is an organization that can be said to be extremely dissatisfied with hackers in the world... For some hackers, if you meet MG's FBI in the network, it means that his hacking career is over, and what awaits him is an endless prison life, unless your hacking skills are very good, then what awaits you may be Zhao'an, do things for the country, or hunt down similar hackers, if you are recruited, it means that your freedom is deprived forever. No matter what, as a hacker, if you get caught, then you have to admit it...
Of course, there are also super hackers who never take MG's FBI pursuit into account... The kind of super hacker who never falls off the FBI's wanted list. No matter how wanted you are, I still go my own way in the network, and from time to time I blow a small storm in the network. If you are not satisfied with your FBI, you can also urinate at your doorstep, which is also a common thing.
In 2009, the whole MG network suddenly appeared in an unstable state, and then there were local network web pages that could not be opened, servers could not enter, many large companies data leaked, the bank and currency system was tragically damaged, the national official website was attacked by a large number of viruses, and the power grid control system collapsed, but generally this key system that is very easy to be hacked by hackers has most protective measures and reserve systems.
If such a terrorist incident occurs, some of the damage can be mitigated. It's not that the defense of such a state-owned system is insufficient, but the technology of some hackers is really to the point where your defense is nothing. These same hackers love to attack such critical surname systems. The time of the hacker attack caused direct economic losses to the United States was $10 billion. Not to mention some uncountable economic losses.
In the outside world, as far as the Internet community is concerned, the discussion about the incident of the US network being hacked has not been able to subside for a long time. It is said that since then, a large number of rookies have emerged in the hacker world, and it seems that hackers can use a small keyboard to deflate this number one power, which is still very attractive to novices. Such a heroic figure in the hacker world is undoubtedly an idol in the hearts of hackers, and he worships this kind of hacker incomparably.
Of course, in the ranks of rookies, there is also Mu Xuan. Mu Xuan secretly vowed at that time that he would become such a hacker in the future. With a flip of the hand, you can make a country submit. This ambition has never been forgotten in Mu Xuan's heart, and it has created the blackest hacker in the world in the future.
After that, like other rookies, he worked hard to develop theoretical knowledge of computers... It's two years at first glance... In the past two years, Mu Xuan has read almost all the books related to computers... It can be said that Mu Xuan has completely gone from a rookie to a completely proficient, computer-literate person and scholar... But hacker knowledge is still worrisome...
Later, according to the information revealed by the US FBI, the hacker who attacked the United States was a person whose IP was called Dao Breaker.
Since then, the knife has never appeared on the Internet. Myth 1: He has been wanted by the FBI and is in prison. Myth 2: He was bombed by an American missile and died. Otherwise, the United States would not have announced such a thing that would hurt the country's face...
When it comes to MG's FBI, then we have to talk about ZG's national security. ZG has the largest population base in the world, and of course, the number of hackers is also the highest. Basically, in every hacker war, you can see the figure of ZG hackers, whether as the protagonist or as a spectator...
"Why are you stunned, you don't see the black screen. Hurry up and change the server.,The player's customer service can't log in to the game.,I'll definitely call to complain.,Do you want the boss to scold to death? I guess the boss will call in a while, so why don't I call him first. The man who called the leader commanded his men in a deep voice. Rubbing his temples, he got up from his seat and went on the phone.
The man named Boss thought as he walked, 'I thought it could be solved, but I didn't expect to kill it halfway, alas, those two people were enough for me to solve, but I didn't expect to come out with a more powerful one.' Still a little careless, I didn't expect him to attack like that... It seems that I have to call the boss to say a word, see if he can say a word to the big guy of the alliance, and see if I can recruit him into our Red Guest Alliance...
After the man called his boss, he explained the reason, and the boss didn't blame him much. This is also a small reason why he is the backbone of the Red Guest Alliance working here... At least the boss's people are very good...
"Hey, boss, I met a hacker today, he can, ring wave attack." When he said the ringwave attack, the man named Leader stopped speaking a little, and listened to the 'En' sentence from the other side. He continued: "Also, he embedded the virus code on the ringwave attack, and as a result, I lost. I want you to see if you can recruit him into our Red Guest Alliance when we meet again in the future. When the man who called the leader finished speaking, he stopped making a sound.
Over there, when he listened to the person who called the leader talk about the ringwave code attack, his heart shook slightly, he knew how difficult it was to use the ringwave attack, and he guessed the result after the person called the leader finished speaking. What shocked him was that the hacker was able to embed the virus code on the basis of the ring wave attack. This is definitely quite shocking news for people who can also use ring wave attacks.
"Okay, I got it. You keep an eye on him for me, and as for your thoughts, if you come across them, you can talk to him. But I don't think the odds of getting into the league are very good. This kind of existence will not be casually sent to the fence. The man on the other end of the phone said slowly.
After successfully hacking the opponent's computer, the flames and freezing solidified everything After seeing the boss show his might, the flames kept chasing Mu Xuan and asked about the seemingly extremely weak attack just now, but in the end, how did the attack of others be completed after blowing the ancient and destroying the enemy, Mu Xuan explained the reason and went offline...
He also wondered why he could only do it once. Impossible, it should be something that went wrong, just when Mu Xuan was puzzled, the sound of the old lady knocking on the door came from outside the door·····
ps: Ask for recommendation, ask for collection.;