HK867 Malicious provocation and trouble!
. The Southern Dynasty was one of the neighbors of the Xia Kingdom, with a territory area of only ninety-sixths of the Xia Kingdom and a total population of about one-twenty-sixth of the Xia Kingdom.
If it weren't for the existence of particularly bad mathematics, I am afraid that it could be easily calculated that the per capita land area of the Southern Dynasties was less than that of the Xia Kingdom.
However, it is such a small country that has created a series of miracles and become a developed country that has been concerned and recognized by the whole world!
That's right!
The Southern Dynasties are developed countries! It has been recognized as a developed country by the World Bank, the International Monetary Fund, and even the CIA CIA in Lijian.
According to the ranking of the Human Development Index, the Southern Dynasties have long been in the top 20, while the Hong Kong Island and Ao Island of the Xia Kingdom have occupied the top 10 positions for a long time. As for the main body of the Xia Kingdom, for some reasons, it has always been around a hundred.
In the highly developed Southern Dynasties, the policy that supports the country's economic lifeline is an 'export-led' strategy. The Southern Dynasties relied on various advanced technologies to produce products that were ahead of the world, and then exported and dumped them to the whole world to maintain the country's economic development.
The most famous company in the Southern Dynasty is the well-known Samsung. In later generations, the mobile phones manufactured by Samsung have achieved the highest market share in the world. Even the iPhone series of mobile phones manufactured by Apple did not end the rise of Samsung.
However, Shi Lei's target this time is not Samsung for the time being!
As a large semiconductor electronics industry group with a market value of nearly 100 billion, how can Samsung succeed in electronic defense if it has nothing to excel in?
Every giant company in the world, especially in the electronics industry, has its cyber defense. Definitely not trivial. There will be at least one World Realm pinnacle-level master in charge.
Most of these world-level masters are security experts in the government. These government security experts have chosen some well-known companies to work part-time. Since they belong to the government's security experts, they are not hackers who cannot be exposed, they can appear in life, and they can do some cybersecurity-related things openly.
Therefore, the helmsman of a well-known enterprise can freely meet with security experts and have a face-to-face conversation, so that everyone's identity can be known. So. Well-known companies don't care that these security experts belong to the government, and they don't fear that these security experts will steal confidential information from the company.
Which well-known company in the world has not mastered some secret strength? If you know the basics of security experts, do you dare to be a two-faced? That's probably the rhythm of the Nine Clans!
In addition to these part-time security experts, only a very small number of electronics industry groups have their own world-class security experts. As far as Shi Lei knows. Samsung Group has its own world-class security expert, and there is not only one! According to the speculation of the former Angel Council. Samsung Group has at least six world-class security experts. At least three of them are security experts at the pinnacle of the world.
The rise of Samsung Group is not unrelated to the cyber security services provided by these security experts!
Shi Lei's target for this invasion of the Southern Dynasties is only four online game producers, not the behemoth of Samsung. As for later, if there is an opportunity. Shi Lei naturally will not let go of Samsung Group.
The time zone of the Xia Kingdom is UTC+8, and the time zone of the Southern Dynasty Kingdom is UTC+9, and the time zone of the Xia Kingdom is half past eleven in the evening, and the Southern Dynasty Kingdom is already half past ten in the morning. This time period is for the average person. It is an absolute sleep time. However, for hackers, the dark night provides them with the best cover.
The vast majority of hackers usually like to act in the dead of night. It's not that you have to act at night, but most hackers are used to acting at night.
Shi Lei does not have a fixed time preference, no matter when, as long as Shi Lei wants to invade, he will invade immediately as he wants. Now Shi Lei is not in a good mood, he controls part of the resources of the IWN secret network, crosses the network barrier between the Xia Kingdom and the Southern Dynasty Kingdom, and enters the network of the Southern Dynasty Kingdom.
There are four countries in the Southern Dynasties that participated in the Anti-Dream Entertainment Grand Alliance. They are Nexon, NCsoft, Neowiz, and Smilegate. Neowiz and Smilegate are the absolute mainstays, and these two companies have a closer relationship with Big Penguin, and they have invested more hacking power to participate.
Shi Lei's main targets are also Neowiz and Smilegate. As for NCsoft and Nexon, Shi Lei just consumed a little bit of time, through the homepage of their official website, invaded the main server, and in the main server, put in the Moon Virus, and then ignored it.
The harm of the Moon virus is very serious, and the purpose of physically destroying the hard disk is finally achieved by repeatedly formatting the hard disk at a low level. The main target of hackers to destroy computer equipment is the storage device, which is the hard disk.
For ordinary users, computer storage devices are far less important and valuable than CPU, motherboard, or memory and graphics cards. After all, the price of a hard drive is only one-third of the value of a CPU, or even less. Not to mention any high-end and high-end top-level graphics card equipment, it is not a value comparable to that of a single hard disk.
However, for business users, storage devices are much more important than the value of the rest of the devices. Storing the data inside the device is what really counts.
There's a saying in the IT world that 'hard drives are valuable, data is priceless'. This proverb intuitively reflects the value of data in an enterprise.
NCsoft and Nexon's main servers store a lot of game development data, and after the Moon Virus entered the main servers of both companies, it quickly began to screen attack targets.
The attack mode of the Moon Virus against the server has been adjusted and modified to a certain extent by Shi Lei. A server's storage device, usually a group of disk arrays, not a single hard drive.
A disk array group is made up of multiple hard drives, and the hard disks running a server system do not normally exist in multiple hard drives. According to this feature, Shi Lei changed the attack scheme of the Moon Virus on the server. The previous full-disk array group attack has become a screening attack.
The Moon virus will determine the number of disks on the computer, then distinguish the system disks, protect the system disks, isolate other slave disks, and perform low-level formatting on the slave disks. When the subordinate disk is formatted at a low level, the Moon virus will also insidiously block the hard disk data feedback light, simulating the flashing of the hard disk data feedback light in a normal state.
This insidious setting makes the Moon Virus more harmful. Often, in the absence of a word, the server's secondary disk can be destroyed. And the main system of the server has no problems.
The main servers of NCsoft and Nexon were ravaged by the Moon Virus, and the data stored on the slave disks inside the servers was erased by low-level formatting.
Shi Lei finished dealing with NCsoft and Nexon, the security guards on the other side. They haven't even found out that their main server has been attacked. It has to be said that the moon virus is becoming more and more sharp. Means of attack are becoming more and more difficult to defend against.
Although the main servers of NCsoft and Nexon were completely taken out by the Moon Virus. But Shi Lei knew that the losses of these two companies were not too large, and their real core data was stored in servers isolated from the network environment. Unlike operators, online game producers are not inseparable from the network environment, they can completely do it in a closed environment. Develop and produce games.
For the environment of isolating the network, Shi Lei is not completely helpless, but Shi Lei is too lazy to compare with NCsoft and Nexon. Shi Lei's main targets are Neowiz and Smilegate.
Summer time, late at night close to early morning. The time of the Southern Dynasty. It was already close to one o'clock in the morning. Shi Lei drew a gourd in the same way and entered the official websites of Neowiz and Smilegate.
The cyber defenses of online game producers are much lower than those of online game operators. The focus is different, and the importance of network defense is also different.
Shi Lei did not touch the main servers of the two companies this time. Because Shi Lei knew that there was no valuable data in the main server. Shi Lei is not as tolerant of Neowiz and Smilegate as the other two companies. Sabotaging NCsoft and Nexon's main servers is not so much destroying their data as it is venting their anger.
Taking control of Neowiz and Smilegate's main servers, Shi Lei did not do any vandalism, but instead took the main servers of the two companies, plus a high-performance broiler server from the Southern Dynasty Kingdom, to form a temporary small server cluster.
Shi Lei controls some of the resources of IWN's secret network, injects this small server cluster, and then uses the small server cluster as the basis to control some of the resources of IWN's secret network.
It is worth mentioning that Shi Lei did not specifically protect this small server cluster. Under normal circumstances, broilers under Shi Lei's control are usually protected by Shi Lei, which is to prevent other hackers, or anti-hacker security experts, from conducting anti-tracing real IP address investigations.
Without security measures, it would be a great tragedy if a hacker with a real IP address was found. Shi Lei didn't set up security protection measures this time, could it be that Shi Lei made a low-level mistake?
It is obviously impossible for Shi Lei to make such low-level mistakes, even if Shi Lei makes low-level mistakes, Yi Shuer will remind Shi Lei and help Shi Lei smooth out these small mistakes and mistakes.
However, neither Shi Lei nor Yi Shuer cared that the temporary small server cluster did not have a defense system, there was only one possibility, Shi Lei did it deliberately!
Shi Lei is ready to use this small server cluster to make malicious provocations and troubles....
(To be continued......)
PS: [Reward thanks] Dream Sui Ridge, reward 588.Tingyu little Lori, reward 300.The boss of the Royal Forest Army, reward 100.
【Warm Recommendation】"Divine Craftsman Occupation Lord", Makuyama's old book, you can take a look, and then come to a copy of "The Light of the Great God".