Chapter 629: Paranormal Events

readx;

The super worm was soon discovered, and the computing power of the United States was located. Pen × fun × Pavilion www. biquge。 info

"Caltech's computer room?"

Seeing this result made Lin Hong a little relieved.

Judging from this result, the other party is definitely either a teacher or a student, at least it can be assumed that the other party has no malicious intent, and may just want to verify his own ideas.

Lin Hong had already expected this result, after all, only in this kind of place can there be so many computers that can provide computing power. In addition to schools, there are also Internet cafes.

Lin Hong invaded and checked according to this address, but found nothing worth paying attention to, he didn't bother the other party, and retreated directly.

Judging from the operation logs in these computers, there should not be many people involved in this operation.

Then, Lin Hong hacked into the log server of the computer room of the California Institute of Technology and found that there is only one user in the computer room today, named Charles Wallen.

Using this name as a clue, he found the record of the student on the server of the administrative office.

The next step is the database of the U.S. government's Social Security Administration......

Lin Hong has long been able to do this kind of thing, and he doesn't even need to look for vulnerabilities again when he invades many places, because he has hacked similar servers before, and he can just "open the door" in a targeted manner.

In just a while, Lin Hong knew all the information about Valen, and even the information that he was the "Bluebeard" of "Mask Island" had this information. Lin Hong was found from the FBI's database.

Due to the increasing number of cybercriminal activities, especially after the emergence of Kevin Mitnick's case, the monitoring of hackers in the United States has been greatly strengthened, and the FBI has a list of hackers who are focused on monitoring, and basically those hackers who are more famous in the country are within their monitoring range.

In this way, once something big happens. They can locate these hackers very quickly.

And Valen is on the list.

This sudden change in computing power was caused by Valen.

Lin Hong didn't know what his motive was, but now it seems. His operation has failed, and the total computing power in the computer room is no longer enough to exceed half of the current computing power of the entire network.

Soon. The Super Worm has captured another computing force in the United States.

After seeing the invasion enter several machines, a smile appeared on Lin Hong's face.

Several of them were familiar to him, members of the "cypherpunk" group, including founder Eric.

These people are organizing forces to defend themselves out of the protection of the Bitcoin network.

Although their own computer computing power is limited, they have many supporters, and under their call, many people have joined the mining army, not for Bitcoin, purely to protect Bitcoin from being controlled by others.

"It seems that Eric also knows the weakness of the Bitcoin 51% attack."

For this. Lin Hong was not surprised.

After all, all the algorithms and software source code of Bitcoin are open source, and everyone can basically see that there are so many people, and there will always be people who find this vulnerability.

There are no secrets in the world of open source.

There has been no clue to the two forces of computing power in Britain and Russia, and it seems that both of them are masters of computer networks. Even the super worms have not been able to break through their computer defenses, and they are very cautious, usually very careful about the confidentiality of their information, leaving no traces on the Internet that can reveal their identity.

As for the scattered computing power hidden behind it, Lin Hong finally followed the vine through the clues left by the other party in the broiler. Found the main owner.

However, this person made Lin Hong a little surprised, because the other party was just a teenager, younger than Lin Hongdu, and what made Lin Hong feel a little kind was that the other party turned out to be a Chinese.

"Chen Jian, male, 14 years old, his father is currently a computer engineer at Hewlett-Packard......

Lin Hong looked at the information about Jian Chen on the monitor.

His father was also a cattle man, who was smuggled to Hong Kong by himself, then traveled to many countries, and finally settled in the United States, and also taught himself computer science, was admitted to a private university, and later married a Chinese girl in the Chinese community, and has now become a middle-class person in the United States.

Jian Chen also seems to have inherited his father's intelligence, showing an extraordinary IQ at a very young age. From an early age, he showed a great interest in electronics and mechanics, starting with the ore radio, then the radio, and then the computer......

What he likes most now is to be alone in his room and surf the Internet, when in reality he is constantly hacking and invading and invading.

Lin Hong also saw him on the FBI's key monitoring list, and ranked very high, and the FBI commented on him as "extremely destructive, key monitoring objects".

Liu Jian's file has been repeatedly interrogated by the police, and on one occasion he was prosecuted to court, and in the end, he was not only fined, volunteered in the community, and even banned from accessing computers and the Internet for three months.

Lin Hong looked at his resume, but he became a little interested in this young man.

From him, Lin Hong saw the shadow of himself back then.

Lin Hong has seen something unusual in some of his recent behaviors, and his medical records show that his mother has taken him to a psychiatrist three times in the past month, and the doctor's diagnosis is "preliminarily judged to be depressed".

At this moment, Liu Jian is flying in front of the computer, and he continues to install the mining program in his broiler.

Lin Hong thought about it and finally decided to contact him.

He did not choose to communicate with him directly in Liu Jian's computer, but used the broiler that the other party was operating as a medium, and directly sent a sentence to the other party's terminal in English: "Nightmare, thank you!" (Thank you, Daredevil!) )”

Liu Jian, who was busy with his enthusiasm, saw this sentence that suddenly appeared, his pupils shrank suddenly, and the whole person suddenly stood up from his seat, and then took a few steps back, as if he was afraid that something would crawl out of the computer.

Liu Jian was only scared like this, completely because he saw that the other party called himself "Night Demon", because when he usually invaded other computers, he always took random names, without any rules, and "Night Demon" was a common ID he usually used when contacting his friends.

And now, there is a person who suddenly uses this ID to contact himself, and what is even more difficult to accept is that now the other party is contacting him on one of his broilers, which makes Liu Jian think that he has encountered a supernatural event.