Chapter 885: Adam's Counterattack
The Natasha shooting caused quite a stir in San Francisco, and people were more concerned about why the mild-mannered Natasha shot and killed her husband and then committed suicide.
The speed of the police investigation was very fast, and a day later, the results of the investigation were announced to the public, and in the course of this day, throughout the United States, there were several more evil ** incidents, shootings, suicides, the most serious one was a suicide bomber attack on the church, the incident occurred, it was a church service, the explosion killed seven people, dozens of injuries.
When all these events come together, all the public who pay attention to the events find that one thing that these events have in common, that the parties involved in these events are all devout Christians, and they have all read a novel called Creation Theory through the Internet or other channels before, and it is precisely because of this novel that the faith of these believers has collapsed, and then they cannot accept such a reality, and they have committed extreme behaviors.
In order to stabilize the situation, the authorities announced that the creation theory would be listed as **, and together with it, there was another academic article "Religion Tracing the Origins" that was closely related to it.
Not long after the United States listed "Creation Theory" and "Religious Origins" as **, Western countries with Christianity as the main body of faith almost unanimously announced that they were listed as **, and even the Holy See in the Vatican also openly declared that "Creation Theory" and "Religious Origins" are hereticals.
If the above things happened hundreds of years ago, it would not be unusual, and it would even be easy to calm down this crisis of faith, but it is a bit unusual for such a world-class religious event to occur in modern society, and because human society has more advanced means of information dissemination, it is not so simple to calm things down.
Curiosity is human nature, the more forbidden things will stimulate this nature, originally some people who don't care or have not heard of "Creation Theory" and "Religion Tracing the Origins" people also want to see the true face of these two **, and as they wish, although these two books have become **, but because of the existence of the Internet, and because there are more countries and regions in the world that have not banned these two books, therefore, they want to find these two books, it is not very difficult, more importantly, Adam is not idle, He's also in action.
Throughout this process, most people focus only on time itself, and on the Creation Theory and the Origin of Religion itself, but ignore their author, the man who named himself after the first human beings in the Bible, and even more so on the purpose of his Creation Theory and Religious Origins.
Ordinary people have their own focus and blind spots, but even the Western governments that have declared "The Theory of Creation" and "The Tracing of the Origin of Religion" as the first world's Christian circles, represented by the Vatican, cannot ignore these blind spots, and it is precisely these blind spots that have become the key to calming down the incident.
It's just that they have no other information about the author of these two articles except that they know that his name is Adam, where is Adam from, whether Adam is this person's real name or a pseudonym, and what is the purpose of writing these two articles? Whether it's for fame or for some other purpose, everything is unknown.
Just when many countries were looking for Adam, Adam fought back against the fact that two of his articles were listed as **.
Adam only did one thing, that is, to break through the Internet confinement, and put his two articles listed as ** on the homepage of several large traffic portals in the West, followed these two articles, and also attached two other articles, one of which was "The Origin of Creation Theory and Religion", which he had published before, and the other article was called "Distinguishing the Authenticity of Today's Religion".
"The Origin of Creation Theory and Religion" is a popular expository essay, and "The Authenticity of Today's Religion" is a very clear polemical article, but also a battle essay, in which Adam expressed shock that his two articles were listed as **, and also said that if religious people think that there is anything wrong with his article, they can raise it for debate, rather than banning it.
“…… Truth is called truth because it stands up to scrutiny, and if someone thinks that my articles and ideas are problematic, they can put them up for debate, rather than banning them by virtue of their own power......"
“…… Why do you want to ban my articles, ban my opinions, because I told the truth of the matter, and you can't find a reason to refute me, do you feel empty-hearted? ……”
“…… Yes, I know that telling the truth will trigger a series of events, but what are these events compared to the progress of civilization of the whole human race, when the light of truth shines on the deep-rooted fallacies in people's hearts, it will definitely cause labor pains, but after the labor pains, there will be a brighter future for human civilization......"
“…… Hundreds of years ago, Bruno was willing to die for the truth, and now I have the determination to pay tribute to the pioneers and the faith to defend the truth......"
Above are a few passages from "Authenticity in Religion Today", which are impassionedly written, pointing at religious authority and issuing their own declaration of challenge.
After Adam bundled his four articles together, they attracted widespread attention around the world, the non-Christian public was concerned about the content expressed in these articles, some of them were watching the excitement, governments were concerned about the destructive power of these articles on public faith, and the social crisis that might be caused by them, and even the social crisis that had been caused, the religious community was concerned about how to refute Adam, and the Christian believers were concerned about whether the foundation of their faith still existed, and in the process, Although governments have tightened regulations, there are still some extreme believers who do extreme things from time to time.
In addition to the above-mentioned parties, Adam's actions have also attracted the attention of the computer industry, especially the cybersecurity community and hackers, because when "Creation Theory" and "Religious Origins" were listed as ** by various countries, their websites in these countries have been completely cleaned, and content filtering has been set for these articles, and under normal circumstances, these articles are impossible to publish.
Of course, Adam sent them out again, and the method used was not normal, but the hackers used to hijack websites, but the method Adam took was somewhat unusual, even a little weird, and this is what cybersecurity experts and hackers are most interested in, and even eager to study.
**Directly bypass the content filtering mechanism of the website, blatantly hung on the home page of the website, is a very serious matter, after the major websites are discovered, the first time, the website management personnel will realize that their website has been hacked, hacking is a very serious thing for a website, not to mention that the content is still very sensitive, therefore, what the website urgently needs to do is to delete the article that Adam hangs on their homepage.
A large website in the management and maintenance, the division of labor is very clear, the work of deleting articles is done by the website home page editor, and the website intrusion is the website background responsible for the security management of the technical personnel, the home page editor in the deletion of the article, found a problem, these articles can not be deleted at all, more precisely, it can be deleted, but after the deletion, there will soon be a new copy there, this phenomenon is like cutting leeks, cutting a stubble, Soon another stubble will grow, but the roots are very stubborn and cannot be removed no matter what.
Eradication of this problem belongs to the work of the background technicians, but when the website editor feeds back the problem to the background technicians, the background technicians are very embarrassed, because no matter what means they use, they cannot detect the traces of the website being invaded, after the front desk editors delete the article, the articles they see in the background database are also deleted, but the deleted article records in the database will soon be generated again, It's just that this generation process is not carried out by the database management system (DBMS), as if it was made out of nothing.
"This hacker is so clever, what kind of technology is used, can write records directly in the database, instead of the usual DBMSSQL operations!"
"If you don't write records to the database through the DBMS (database management system), is this hacker directly manipulating the database files?"
"This is impossible, the database file is encrypted, how can it be possible to write data directly?"
"What the hell!"
After the above discussion, the technical staff of the website came to the hellish conclusion that they could not solve the problem by themselves, so they could only turn to the database development company and ask the technical experts in the same industry for advice.
The process of asking for advice was actually a process of peer-to-peer communication, and the news spread quickly, and it didn't take long for hackers around the world to learn the details of the hijacking of these websites, and as a result, all kinds of technical speculations and discussions about website hijacking began to flood the chat rooms, mail lists, and forums where hackers gathered.
The database development company was also very quick to respond, but, after an intense investigation, the conclusions reached excited the hackers and made the site's technicians want to vomit blood: the database was not compromised.
"If the database has not been compromised, how can it be possible not to write data to the DB through the DBMS?" So, someone asked this question, but it was embarrassing for the database development company, but it couldn't give a reasonable explanation.
The database development company couldn't solve the problem, so it had to reflect upwards and look for a higher technical expert to solve the problem.