Chapter 125: List of Hackers Who Shocked the World
(Ask for support, please subscribe, thank you very much...... )
That night, in less than half an hour, tens of thousands of computers around the world were scrapped along with processors and motherboard chips. ,
Tens of thousands of computers are scrapped together is not a trivial matter, but distributed all over the world, it is a very inconspicuous trivial matter, the average family encounters this kind of thing, will definitely consider themselves unlucky, and then find after-sales, or spend their own money to replace new accessories.
However, some people see such a thing, but it is as if they have suffered the biggest blow.
In an apartment building in New York, Jimmy sat in front of his computer, pale as he looked at the phantom of the magic wand that flashed on the screen, and then he saw that several computers in front of him suddenly crashed, and then there was a pungent smell of smoke coming from the main chassis, apparently a wiring had been burned.
Jimmy was a little frightened, and his body stood up with a tremble, and then he reached out to open the main chassis, and found that sure enough, the motherboard chip and processor were burned out.
The loss of these computers is naturally insignificant to him, at most hundreds of thousands of dollars.
However, after this intrusion, he exposed his IP address and revealed his identity, which was the thing that hit him the hardest, making him feel as if the sky had fallen.
"God, God...... I knew it. I shouldn't have taken this a-colored, I knew that guy was a guy I couldn't mess with...... God, what should I do now, am I going to turn myself in? ”
Jimmy stood in front of the burned console, walking back and forth left and right, not knowing for a moment what he was supposed to do now.
At the same time.
In a villa in Israel, Black God, who is also one of the world's top ten hackers, did not panic like Jimmy, but at the moment when his computer was burned. He hurriedly began to pack up his daily necessities and all the cash, and called a friend he knew, transferred the money in his account to a trusted friend, and asked the friend to transfer a few more hands before he could use it.
In less than half an hour, Black God left the small villa he had lived in for a year and drove to the Middle East coast to take refuge in South Africa on a refugee boat that did not require a passport!
Black God thinks. Only in South Africa did it be possible for him to escape capture.
In a high-end apartment in Tokyo, Japan, there is also a middle-aged man who looked at his burned computer in a panic for a few seconds, and then immediately began to pack his things, he is also one of the top experts involved in the invasion, is a senior program engineer at Fujitsu, Japan's largest high-tech company.
Hong Kong Island ......
Island......
Bangkok......
Moscow......
Los Angeles, CA......
Houston, Texas ......
And so on and so on in places where something like this happens......
Dozens of top hackers from all over the world were all destroyed at about the same time as their computer's motherboard and processor, and then they all knew they had been discovered and immediately began to look for a way out.
It's just that. These top hackers are all computer experts, and most of them are also the technical backbone of major high-tech companies in reality, and even have high-level deposits.
Wang Xiao was standing in the center of the technical department of Magic Energy Software Company at this moment, coldly looking at the information on the big screen.
Several other people in the hall were stunned, looking at the screen in amazement, and the director of the technical department was full of incredulity and disbelief.
They couldn't believe that the powerful program of Wang Xiao's software could track down all the hackers, and they couldn't believe that the identities of these hackers were actually these people......
Zhang Xuewen as a manager. I only half-understand the technology.,Looking at the IP addresses listed on the big screen and the character information behind the IP address.。 asked Wang Xiao: "Mr. Wang, is this the identity information of those hackers?" ”
Several people from the technical department glanced at Zhang Xuewen with the eyes of an idiot, and Zhang Xuewen didn't care about it, just looked at Wang Xiao and waited for an answer.
Wang Xiao nodded affirmatively and said, "Yes, this is the hacker information obtained by the automatic anti-tracking of the Heart of Magic Energy." Tomorrow you go to the police, and then publish the information about the hackers that you have tracked down. I want the whole world to see that I dare to provoke the fate of our magic software company. ”
Zhang Xuewen frowned slightly, looked at the thirty-five identity information on the big screen, and asked in a low voice: "Mr. Wang, will this make too much trouble?" ”
Wang Xiao smiled. He looked at Zhang Xuewen with a stern look in his eyes and said, "Too big? General Manager Zhang, I hope you can always be clear about your position. You are the general manager of the magic energy software company that I personally appointed, when the interests of the company are damaged, as long as the other party can pay the price, any legal and reasonable means, we can use it without hesitation, without any scruples. ”
"I don't have any evidence of who posted the bounty for the time being, otherwise, I'll make it even bigger."
He probably knew who had posted the bounty task, so he knew how much of an impact it would have if he got the evidence and published it.
Zhang Xuewen suddenly felt a huge pressure, and didn't dare to persuade Wang Xiao anymore, knowing that Wang Xiao had made up his mind. However, his eyes looked at the names and their identities on the screen, and he still felt a lot of pressure.
Black God's real name is Jason Richard, a former core senior engineer at Microsoft and one of the top 10 hackers in the world!
Jimmy, whose real name is Mike Nix, used to be a senior technical director at IBM, presided over many of IBM's technology research and development projects, and is also one of the top ten hackers in the world.
These two can be said to be real top computer talents, and they are computer masters who can sit on one side wherever they go.
However, there are others whose identities are more sensitive because they still have a position.
Murakami, the current senior engineer of Fujitsu in Japan!
Mike, a senior program engineer at Apple in the United States!
Kusen, the current technical director of Google in the United States!
Anderson, currently the technical director of a computer company in the UK!
Cui Zhenruo, South Korea's Samsung is currently the director of a technology research and development department!
………………
Among the identity lists of more than 30 hackers, nearly half of them are senior technical personnel in top high-tech companies around the world, and even some of them are executives, and most of the rest are also technicians of some small and medium-sized high-tech companies, and only a small number of identities are ordinary people.
Google, Microsoft, Apple, IBM, Qualcomm, Texas Instruments, Fujitsu, Arm and many other top high-tech companies are among them......
The technical department director who was frightened by this list did not dare to interject, for fear that he would not be able to bear the huge pressure at that time.
Under Wang Xiao's gaze, Zhang Xuewen's fingers trembled and called the police.
Then, Wang Xiao operated the interface and directly released the list, as well as a series of evidence such as server intrusion information and tracking information, to the official website of the magic energy software company.
And, he personally sent an open letter to warn Internet companies all over the world! (To be continued.) For mobile phone users, please visit wènhttp://mnet
http://mnet