Chapter Seventy-Seven: Making a Virus
"At present, without an order, we are not allowed to attack any US website without permission."
The birthplace of computers is in the United States, and it can be said that the computer technology of the United States is decades more advanced than that of China. Even if you can be called a master in China, maybe put it in the United States, that is, an ordinary programmer. Moreover, the current environment in China will make most of the hacker members develop a sense of sitting in a well and watching the sky. thinks that heaven and earth are the most awesome. I don't know if I know it, and in the end, I can only end up in ashes.
Why does the "Ice Soul" easily reveal its identity, on the one hand, it is angry and unprepared, and on the other hand, it is indeed that the gap between China and the United States is too obvious. just fought back, but all of them were defeated, which made Chen Jia feel dignified. In the accounts of some alliance members such as Ice Soul, Chen Jiayi knew that the side of the US government must have invited a master to take charge. And this master is likely to be "Kevin, Mitnick" who was released from prison not long ago.
In Chen Jiayi's cognition, so far, only the legendary Kevin will use this terrifying virtual honeypot technology.
All this is Chen Jiayi's speculation, maybe Chen Jiayi is too worried. But no matter what, the other party was already prepared, Chen Jiayi didn't want the alliance members to step into the ice soul, so he had to give this order.
"Yes."
After the members of the alliance went to the official website of the White House, they knew how powerful the United States was. Although I was not convinced, I still didn't dare to touch it again without much certainty. The current task, which is what Chen Jiayi mentioned just now, is to release this news and organize a hacker attack and defense war that will shake the world.
On the same day, the members of the alliance used hacking techniques to release the news in countless online media across the country. In addition, in the TT group across the country, the content of this hacker war is conveyed from time to time. I hope that those who love their homeland and have the technical ability will come to participate in this big war.
In addition, the official hacker alliance also organized these members in different TT groups. And, first issue some basic knowledge of the Internet, in order to have a hacker war in a few days. Of course, that software has not been released in the hands of netizens at this time, after all, the power of that software is too terrifying. If some netizens use this software to attack computers in their own country, Chen Jiayi will have to hit the wall. Of course, in order to prevent this situation, Chen Jiayi also set a time limit on this software, and also made restrictions in the IP address bar. At the very least, don't take the software you make and attack your own country.
After releasing the task, Chen Jiayi got in touch with the main members of the alliance and learned some internal information about the alliance. Subsequently, Chen Jiayi exited the chat room. Because, now, he still has to prepare several tools for committing crimes.
This crime tool, of course, is for invading.
If the master of the White House in the United States does not take it, the members of the hacker alliance will be in danger. For such a master, Chen Jiayi wanted to be the first to cut him into the horse. At the very least, in the Sino-US offensive and defensive war three days later, Chen Jiayi didn't want this person to hinder his plan.
For this reason, Chen Jiayi sat in front of the computer and carefully thought of ways to restrain the technology of the United States.
Judging from the current situation, the United States has no choice but to be more than a little stronger than China in terms of technology, computer hardware equipment, and bandwidth. For example, in terms of hardware, there are some teams on the U.S. side that already use hardware firewalls. Simple hacker attack and defense must be a loss for domestic hackers. Even if Chen Jiayi's "Ice Soul" software comes out, it can only be a tie at most. For such a situation, it is not what Chen Jiayi wants to see.
Either they will not fight, or if they do, they will be afraid of the US side, and they will not dare to raise their heads again.
Chen Jiayi is such a person, if he doesn't make a sound, he will be amazing.
"That's right, the virus."
In the process of continuous thinking, Chen Jia came up with a brilliant idea, which was to create a computer virus.
We know that computer viruses have super destructive ability and transmission ability. As long as Chen Jiayi produces a worldwide virus and releases it now, it will definitely cause the US side to suffer heavy losses. However, the virus made by Chen Jiayi is different from other viruses. ,
In the program he designed, the virus that is now released is only lurking in other people's computers, and it does not break out for the time being. The trigger for the outbreak of the virus was the spam information used to attack the software "Ice Soul". In this way, it can also cover up the fact that the United States was attacked by the virus, and establish a prestige for this Sino-US hacker war.
It took a whole day for Chen Jiayi to finally program the virus.
In order to spread this virus program to the United States as soon as possible, Chen Jiayi hit the major web portals in the United States. For example, AOL, Yahoo, and other large websites. Among these websites, they took advantage of their website vulnerabilities to implant this virus program into the web page. As long as a user browses their website, the user will be infected by this virus.
However, the virus is only hidden, and even if he is infected now, he will not break out. Only when he is attacked by the "Ice Soul" software will his destructive power be revealed. In this way, even if some American civilians are infected with these viruses, if the Chinese side does not attack them, his computers will be safe. After all, the virus produced by Chen Jiayi only wanted to hit the U.S. government, and did not want to cause a worldwide virus frenzy.
"OK, that's all right."
Chen Jiayi, who has superb hacking skills, implanted a virus program, it is not very simple.
However, Chen Jiayi was afraid that the virus would not spread completely enough. To this end, he has targeted various government websites in the United States. For example, the White House, North American Air/Defense Command Sites, Pentagon and many other official sites. In order to let them get recruited as soon as possible, Chen Jiayi wrote an email and forcibly sent it to the mailboxes of major government websites.
The content of the email, after a few short words of greeting, was very agreed to tell them that after April 3rd, we will meet again. Of course, in this email, there is also this virus that Chen Jiayi spent a day making.
……
China Red Guest Alliance.
"Ice Soul, the side of the Hacker Alliance, why did you start a new move?"
Since Ice Soul left the Hacker Alliance, in order to keep himself safe, Ice Soul had no choice but to reveal his identity and take refuge in the Chinese Red Ke. It's just that I didn't expect that I had just left the Hacker Alliance, and on the side of the Alliance, I had arranged a big move. Looking at the current actions of the hacker alliance, it seems that it is about to launch a big station of life and death for hackers in the two countries.
"After I left the Hacker Alliance, I handed over all the power to the Alliance, and I don't know the situation over there."
The person who talked to the Ice Soul was "Changfeng", the deputy stationmaster of the Red Guest Alliance, and a professor of computer science at a well-known university.
After he learned the identity of the Ice Soul, he was the first to propose that he wanted to absorb the Ice Soul into the organization. The reason is that even if Ice Soul was not the webmaster of the Hacker Alliance before, with such a technical talent, the Red Guest Alliance must vigorously fight for it.
After all, the significance of the Red Guest Alliance organization is to a large extent to maintain government network security.
);