Chapter 570: Single-handedly, resist hackers across the United States

In this way, the forms are getting more and more varied, and the second Sino-US hacker war seems to be about to break out.

In 2001, an unprecedented war broke out between Chinese and American hackers, and the end ended with the Sino-US hacker war under the orders of the US government. Although the final result, the comments made by the outside media are that the Chinese hackers have won. However, for many American hackers, he is not convinced by such a judgment. If it weren't for the orders of the U.S. government, they would have continued to attack the websites of the Chinese government and even destroy the entire Chinese Internet.

In recent years, they have been secretly scolding every time they think of the humiliation suffered by the Sino-US hacker war. Now, the Tang Dynasty Group is openly working against hackers all over the world, and the first thing to provoke is these American hackers. They have long wanted to launch another Sino-US hacker war, but all along, there is no excuse. In addition, in recent years, trade between China and the United States has become more and more connected. Neither the U.S. government nor the U.S. people allow such a hacker war to happen.

Until now, some hackers can't help it.

They rushed to tell each other and spread the threat theory of the Tang Dynasty company. What's more, some hackers bluntly said that if they don't teach Tang Dynasty a bloody lesson, I am afraid it will be a disaster for the United States in the future. Such remarks are supported by many American hackers. They believe that judging from the current development of the Tang Dynasty Company, he will dominate the American Internet and even the world Internet more comprehensively in the future.

This kind of monopoly is still more powerful than Microsoft's monopoly.

As a hacker, as a hacker who has always specialized in technology and has been trying to innovate. They wouldn't allow that to happen, so when they saw the news. Whether it is those evil hackers or those good hackers, they hate Tang Dynasty Company from the bottom of their hearts. In particular, at this moment, Tang Dynasty Company actually violated the spirit of hackers and directly handed over the "Hacker Five" to the US government, which will make these hackers deeply hated.

They must give the Tang Dynasty company and China a resounding slap in the face. They believe that as long as American hackers join forces, the US government will no longer interfere. Then, the second Sino-US hacker war, victory, must belong to them. Could it be that there is anything else powerful about Chinese hackers? Even some of his Internet is just relying on some novel ideas, which attracts many users.

But when it comes to technology, there is no such thing at all, any company, they can copycat.

However, it is such an Internet network without any technology, but it has a monopoly on the whole world. As a hacker, he definitely doesn't want such a rotten technology to directly monopolize the world. So, they didn't calm down anymore, and after that, they broke out. Moreover, in the process, they also found that the US government authorities did not block their actions and seemed to maintain a tacit acquiescence.

Seeing this, the American hackers burst out laughing.

Come to think of it, the U.S. government also saw the threat from the Tang Dynasty company, so they chose to remain silent. In that case, then, what else do they have to worry about? All hackers in the United States, everyone will work together to eliminate the Tang Dynasty Company and eliminate the Chinese Internet. Let their Internet, go back to primitive times.

……

Tang Dynasty Company.

"Everyone, the American hackers don't seem to be going to give up, think about it, what can be done."

Seeing the rampage of American hackers, Chen Jiayi had some self-blame. I went for a while, but I didn't expect that a small demonstration of mine actually detonated the anger of these American hackers. However, it is useless to blame yourself now, looking at the current situation, it is really possible that a second Sino-US hacker war will break out.

"Boss, we're still afraid they won't make it. In the first Sino-US hacker war, they had already lost. I believe that the second time, they will also lose. ”

At this time, sitting were all the technical elites of Tang Dynasty Software. Some of these elites are members of the former Hacker Alliance, and some are members of the former Red Guest Alliance. However, now, for the development of China's computers, they are all gathered in the Tang Dynasty Company, under the command of Chen Jiayi.

"No, our Tang Dynasty Company is certainly not afraid. However, our Chinese Internet, relatively speaking, still cannot be compared with the United States. Especially for those multinational Internet companies, if they are attacked. I am afraid that the whole world will be shattered. ”,

At this time, the stationmaster of China Red Guest stood up directly and said.

"Yang Zhan is right."

The Chinese Red Guest Alliance, although it is only temporarily coming to help the Tang Dynasty Company, has a certain political nature. However, for the research and development of the operating system, Chen Jiayi was too lazy to bother with them. Anyway, Chen Jiayi's purpose is the same as the purpose of the domestic government, and it is better to work together.

Therefore, for the sake of the security of China's Internet, this "Yang Station" directly denied fighting with American hackers. Although he considered it for the government, Chen Jiayi also felt right and did not deny it. In particular, Chen Jiayi's previous strategy. If it is rushed by hackers across the United States, it is estimated that it will be over. This kind of damage is too huge.

Thinking of this, Chen Jiayi also figured it out. Why did the U.S. government choose to remain silent in this war? There is no other reason, as long as to defeat the Chinese Internet companies represented by the Tang Dynasty Company. Well, for the U.S. government, the benefits are great. At least, this war can instantly break the monopoly of Tang Dynasty companies.

Even if it can't destroy the hegemony of the Tang Dynasty company, it can also allow American enterprises to take root.

"This war is not a war between enterprises, but a war between countries. Once the battle starts, the damage to our country's selfishness will be multiplied. Moreover, if many domestic enterprises are damaged, it will also be a great disadvantage for our Tang Dynasty Group. ”

The metaphor of the image, that is, the Tang Dynasty group is the king of ancient times, and other domestic enterprises, he is some generals. If the soldiers are finished, the Tang Dynasty company will be left with a light commander. Then, no matter how bullish this king is, he is also a lonely monarch, and it won't take long for him to be destroyed by himself.

For a while, everyone was analyzed by Chen Jiayi, but they didn't know what to do.

At this moment, in the conference hall, Xiaobai said a word.

"By the way, I have a solution?"

"What's the solution?"

"Since this time the big war that is about to break out is caused by us. Then, we can also shift our attention to this big war. ”

"What transfer?"

There are some people who wait, but they don't understand. However, hearing this, Chen Jiayi nodded and sighed secretly, Xiaobai, this guy is really a lucky star. endangered the pass, but he had a flash of inspiration.

"Come to think of it, hackers all over the United States hate Tang Dynasty Company and say how Tang Dynasty Company is. Then, our Tang Dynasty company might as well make another statement. Directly put down the ring, about a battlefield, and go head-to-head with hackers across the United States. In this way, even if our Tang Dynasty company loses, it will not lose much selfishness. At most, a little damage to the reputation, but for ordinary people, they simply don't know. Besides, who wins and who loses, that's not certain. ”

Although Tang Dynasty Company is only a group company, its technical strength is simply the power of all hackers in China. Such a company, to put it bluntly, can simply represent the entire Chinese hacker community. Besides, Xiaobai admires the hacking skills of the boss "Chen Jiayi". As long as Chen Jiayi is in charge, the Tang Dynasty Group is absolutely impregnable.

"It's amazing."

Until, after Xiaobai fully explained, everyone finally understood.

After that, Tang Dynasty Company declared to the outside world, "The last incident was completely a personal matter of Tang Dynasty Company, which has nothing to do with the Chinese Internet and has nothing to do with the American Internet." But among them, there are people with ulterior motives who have been interfering with everyone's sight and maliciously instigating a hacker war between the two countries. Let's not talk about who wins or loses in this war, as long as the war breaks out, it will definitely be a disaster for mankind. There are even some bad hackers, and they will do some illegal hacking in this war. We strongly condemn such acts. In addition, we at Tang Dynasty hereby announce that we have completely taken over all hacker challenges in the United States. If the hackers in the United States want to take advantage of this hacker war and do something else, I think you have the wrong idea, and this is not allowed by hackers all over the world......"

The above is just one of the points. There is another point that Tang Dynasty needs to emphasize. That is, Tang Dynasty Company is a computer information company, an Internet company that serves as a big servant, and is not a hacker organization. For all hackers who invade the Tang Dynasty Group, the Tang Dynasty Group has the right to publish their IPs and let them be punished by law? ,

Could it be that after being hacked, the Tang Dynasty Group still can't fight back?

After such a statement was published, it was supported by many neutral hackers. They think that if you want to fight, you can fight, so why bother with other things. They despise it even more, because a small hack is actually involved in a big war between the two countries. You must know that the current world Internet is no longer the Internet before 2001. Now that the Internet has connected the world. If any one place is damaged, the other places will also be damaged.

As a wise hacker, we should think about the health of the world's network.

Naturally, the remarks made by the Tang Dynasty Company stood at the highest point of justice, and many hackers expressed their support for the Tang Dynasty Company. IN PARTICULAR, THE HACKERS OF THE TANG DYNASTY LINUX COMMUNITY, THIS GROUP OF HACKERS, HAVE BEEN CONCENTRATING ON THE STUDY OF THE OPERATING SYSTEM. Their hacking skills are no less powerful than some other hacking activities that are important every day. Tang Dynasty Company is known as the boss of Tang Dynasty LINXU, and naturally, they also support it. Moreover, they also said that if American hackers ignore human Internet security, then they will side with Chinese hackers and fight against hackers across the United States.

Until the end, in the face of oppression from hackers from all over the world, American hackers compromised and accepted the conditions of the Tang Dynasty company. Moreover, the agreed battlefield is still the Tang Dynasty network. However, this time the war is no longer about looking for a certain piece of information. They can show their power, including destroying the official website of the Tang Dynasty network. Of course, Tang Dynasty can fight back, but many hackers think that under the concentrated attack of hackers across the United States, Tang Dynasty Company may fight back?

At this point, the second Sino-US hacker war broke out.

However, the second Sino-American hacking war is different from the first one, and the United States is still the United States. China, however, sent a Chinese phalanx represented by the "Tang Dynasty clique". A long time later, when people recalled this war, the materials often said that this was an information war between China and the United States, a clash of cold weapons, and a war that went down in history. Perhaps, this war is not as interesting as the direct invasion in reality, and perhaps, such a war will not kill any life. However, the destructive power of such a war is greater than that of any real war.

"Guys, are you ready?"

This time, Chen Jiayi was in charge.

"Ready."

"Well, this is a battle of honor for the Chinese Internet. We need to win this war without a single cost. ”

Artillery fire is coming, the battle is about to begin, and the horn is about to blow.

"Eight o'clock sharp."

The second Sino-US hacker war officially broke out.

At this moment, the attack sources from countless regions around the world, all of them, entered the Tang Dynasty network server. Of course, didn't you say that Tang Dynasty was competing with American hackers, how could there be a world. Actually, it's quite simple. On the one hand. Every hacker, they use a springboard, disguise the IP, and in addition, there are some American hackers, who don't necessarily stay in the United States. Of course, there are some hackers from other countries or regions, but they want to fish in troubled waters.

Of course, in a situation like this, Tang Dynasty Company can't control it now. The war was fought, and there was nothing benevolent or unbenevolent. After all, among the hackers in the world, there are too many hackers who have no morality.

"Brothers, go straight up."

In the face of the crazy influx of data packets, Chen Jiayi did not panic at all. He was in the hall, commanding hundreds of technicians of the Tang Dynasty Group, constantly defending. The task they have to do is to defend in the first phase. As long as the defense is successful, it is a victory.

As for the counterattack after the defense, for the time being, Chen Jiayi didn't want to start it so quickly.

"Tang Dynasty Firewall, open."

Tang Dynasty Software, he once researched a firewall, and it was completed under the guidance of Chen Jiayi. The function of the firewall, among others, is to isolate a piece of illegal spam packets. An effective way to combat hackers is to have a good firewall. In the global market, the Tang Dynasty Firewall has always had a very high market.

Because, the Tang Dynasty firewall has strong functions, simple operation and reasonable price, and is deeply liked by ordinary users and enterprise users. Often, many times, as long as the enterprises use the Tang Dynasty firewall, they don't even want to invite any technical masters. With just a few computer maintenance staff, they can keep the data safe for the entire enterprise. From this, it can be seen that the power of the Great Firewall of the Tang Dynasty. ,

Not to mention, the current firewall is still a super firewall that Tang Dynasty Company has not launched and is only used by Tang Dynasty Company alone. It is not an exaggeration to say bluntly that he is a firewall within a firewall. As soon as the firewall came out, thousands of garbage data were all rejected.

Even if all the hackers in the United States arrived, Tang Dynasty Company still did not have a trace of fear.

This is the Tang Dynasty Company, this is the technical strength of the Tang Dynasty Company.

"Holy, God, what kind of firewall is this."

At the same time, all the hackers in the world began to curse.

They found that the spam packets they sent were useless. The official website of the Tang Dynasty Network is still running normally, and there is no card at all. Even, the official website of Tang Dynasty Network, when it was attacked by hackers in the United States, posted a news that it was okay, lamenting that the attacks of these hackers were too powerful.

However, these hackers are not fuel-efficient lamps either.

After their spamming attack didn't work, they took another approach.

"Direct invasion."

In this way, no longer sending spam packets, but directly entering the official website of the Tang Dynasty Network in the way of normal user login. In addition, find the bug and then invade it. I have to say that this method is still very effective. After all, your official website is there. Your firewall can filter out spam, but the firewall has nothing to do with normal data but to let it in.

Until, when they enter. The invasion began.

What, you say, how did they invade.

LOOKING FOR BUGS, OF COURSE. You know, any software, he has bugs. Not to mention, it's not safe for websites that aren't safe at all. Many hackers, the way they invade is to start directly from the official website. Then, work your way down the ladder to find control of the entire operating system.

It's just that for this, how could Tang Dynasty Company not think of it.

You have a good plan, I have a wall ladder.

"Virtual system, boot."

At the sound of an order, the Tang Dynasty network server, a world-class virtual system, was officially opened.

This virtual system has been taught by many hackers long ago. However, there are really few people who can really recognize the true face of Lushan of this virtual system. Countless hacker masters, they died in this virtual system.

Illegal user 1 enters.

Illegal user 2 enters.

Illegal user 3 enters.

In the virtual system log, one after another users who illegally entered the operating system flashed. With the database displayed, we can clearly see what these users are doing in the entire operating system. Whether it's destroying files, deleting information, or trying to gain control of the operating system.

“IP,220,123……”

“IP,113,345……”

One IP after another flashed, and all of these IPs were recorded by Tang Dynasty Company. And, under the command of Chen Jiayi, the technicians began to analyze and find the final IP address.

The most effective way to deal with hackers is to find the other party's IP and publish it. Then, these hackers will be defeated in an instant. Chen Jiayi, of course, knows this clearly.

So, in the later time, many people saw such a scene. In the official website of Tang Dynasty Network, IP addresses from all over the world flash from time to time. Some are still very detailed, even with names, identities, occupations...... All of them are marked one by one. In the beginning, such IP addresses were rare. However, over time. One IP after another flashed from time to time, and in particular, the world was shocked when a hacker named "Paul" appeared.

Because, this Paul is the third-ranked hacker tycoon in the world. He once directly invaded the U.S. Department of Defense and stole a secret weapon material. It is said that this information on the weapons has now been sold to Iran.

"Defeated, all retreated...... All the hackers who attacked the Tang Dynasty network were completely defeated. ”

When this information was released, even if there were hackers who were no longer afraid of death, they were defeated.

The next day.

When the bell of dawn rings, the second hacker war is over.

The final result is needless to say. Tang Dynasty Company single-handedly resisted the hackers in the United States and won the whole line.

(To be continued.) [This text is provided by [·Give up] in recruitment, if you are interested, you can come and explain!] ])