Chapter 172: Open for Download (Guaranteed Third Update)
Anonymous is one of the largest and most powerful hacking groups in the world, almost rivaling the cyber forces of the Big Five.
Its founders are two super hackers, and its core members are several thousand, mainly white Westerners, basically young people in their twenties and thirties, including some senior computer experts and journalists from large companies and government agencies.
In addition, Anonymous is riddled with hackers who gain access to internal websites of large companies and government departments, disrupt their services, delete backup information, intercept emails, and steal various files.
Headquartered in the United States and with branches all over the world, Anonymous claims to be the world's largest hacking organization.
The group doesn't have a good relationship with the U.S. government and supports WikiLeaks' Assange, so it's not uncommon for Brennan to be suspicious of Anonymous.
Ao Guanhai pondered for a moment and said: "No matter what, start with the anonymous person first, and keep in touch with China, Russia, Britain, France and other countries, and if necessary, cooperate with them to track down this [Blood Drinking Sword]!" ”
George. Brennan frowned and said, "But Mr. President, these countries are probably more inclined to make deals with the [Blood Drinking Sword]......"
Ao Guanhai got up and looked at the sunny White House lawn outside the window, and sneered: "The technical information of the B-2A has been leaked, and you still expect to be able to seal this opening?" The most realistic choice now is to catch this [Blood Drinking Sword] as soon as possible, this time he can obtain the confidential materials of the B-2A, God knows if he has the ability to obtain the technical information of other weapons and equipment, and he must not be given a chance to strike again! ”
"Got it!"
George. Brennan said solemnly.
"Okay, you go out first, and report the latest news immediately!"
Ao Guanhai rubbed his temples with some headaches.
"Okay. Mr! Brennan turned and walked out of the president's office.
Look at George. Brennan left, and Oku's brow tightened again.
He doesn't care about whether the B-2A leaks will strengthen the technological capabilities of U.S. rivals, China and Russia, on a new generation of fighters.
In fact, everyone understands. Although the B-2A has affected the core national security interests of the United States, it is still in the current international economic and political situation. The likelihood of a large-scale nuclear war is almost negligible, so the impact is not too great.
What Ao Guanhai is really worried about is that the B-2A strategic bomber leak that shook the world is very likely to be used by the Republican Party in the US Congress as an excuse.
In half a year, there will be the biennial midterm congressional elections, and although the Democrats now occupy a majority of seats in Congress, it is difficult to ensure that the Republicans make a fuss about this leak and demand that the B-2A stealth strategic bomber be retired as soon as possible, increase US military spending, and develop a new generation of strategic bombers.
Doing so will not only win the favor of the military's top leaders. It can also squeeze the funding for the medical reform bill that Ao Guanhai focuses on, and more importantly, if the Democratic Party loses the next midterm congressional election, then Ao Guanhai may only be a lame president in the next two years of his term, and it will be difficult to do anything big.
As for whether anyone will question whether the U.S. military's early retirement of the B-2A is too capricious, just look at the previous F117 stealth fighter-bomber.
In the Kosovo War in 1999, an F117 "Nighthawk" stealth fighter-bomber of the US military was shot down by the Yugoslav army.
Later, there were rumors that the Chinese obtained the wreckage of the plane, which also led to the bombing of the Chinese embassy in Yugoslavia by the US military.
Of course, this is just a rumor. But there is an undeniable fact that in 2008, the US military retired all 54 F117s.
You must know that these aircraft are only twenty years old, for a fighter-bomber. Unless there is a fatal flaw in the design, it is simply incomprehensible to decommission in such a short time.
……
Although the B-2A technology leak case has caused a stir on the Internet. It has attracted great attention from all over the world.
But in the world of hackers, most hackers focus on the hacker maze given by Yang Lin.
A hacking maze consisting of thirty-nine levels. It has attracted tens of thousands of hackers from all over the world, including the technical elite of government departments.
But they soon found out. The maze of 39 servers is more difficult than any previous hacking competition.
In the levels set up by these servers, you can only get the IP entrance of the next level if you enter the server and obtain the corresponding permissions.
Inside every server, there is only one vulnerability available to hackers.
Some are system vulnerabilities, some are hardware driver vulnerabilities, and some are third-party software vulnerabilities.
You must find this vulnerability in order to successfully enter the server to carry out the first step of your inreach, and then obtain the corresponding IP address by escalating privileges through various means.
This kind of intrusion is very cumbersome, and the first level alone brushes off 90% of the hackers.
The hackers who entered the second level found that everyone got a different IP address.
This eliminates the possibility of some people passing through the level and then announcing the IP address of the second level.
And for lone hackers, each level takes a lot of time and effort, but this maze is as high as thirty-nine levels, and it is only less than a week.
Unless you crack it for a week without eating or drinking, it will be possible to complete this task.
As a result, more and more hackers are choosing to give up as time goes on.
Even though some of the hackers work together as a team to solve the levels, they also find that each level becomes more and more difficult as they progress through each level.
Only very powerful governments and organizations with super hackers in charge can accomplish such a task.
Later, this competition, which was originally just used by Yang Lin to identify the identity and strength of hackers, has faintly become a big competition in the cyber warfare capabilities of various countries and major hacker organizations.
Of course, at this time, Yang Lin no longer had time to pay attention to the hacker contest triggered by him.
Because at this time, the Android version of MatrixOS is about to be available.
Although the B-2A bomber leak has dominated the headlines of major media in the past few days, the second place is always the countdown to the Android version of MatrixOS.
After all, the former is too far away from ordinary people, while the latter is related to everyone's real interests.
At 0:00 on March 1, 2014, the Android version of MatrixOS was officially available for download on the official website of Matrix Digital. (To be continued......)
PS: There are three more, tonight the steel hammer will be completed without sleeping, today has written 8,000 words, three new books, one old book.
At present, there is a gap of 490 with the third place monthly pass, please continue to support the steel hammer, the steel hammer broke out at the end of the month, whether there is a chance to enter the top three or not, the steel hammer must challenge the limit! Thank you!