Chapter 276: Unstoppable
"Quick······ Stop it······ What is this procedure? Who is the other party? ”
More than 2,000 broiler computers from all over the world that Richard has operated for more than ten years have disappeared in just ten minutes, and all of them have directly crashed and disconnected, and they have since been out of his control. What he didn't know was that those computers were directly burned off the motherboard.
However, Richard didn't think so much at this time, because the other party was still tracking him through the springboard broilers.
Richard is one of the top hackers in the United States, he didn't participate in the hacker war two months ago, and this time he was joined by another top hacker, Roberta.
Perhaps, his name is not as famous as Kevin and Mitnick, but in the world of hackers, his skills are not much worse, and he is recognized as the top hacker in the world.
Robert, on the other hand, surpassed Kevin in terms of destructive power.
The world's most famous worm was created by Robert, and accidentally emitted it, causing immeasurable damage. It was also he who made the world aware of the dangers on the Internet and promoted the development of the network security industry.
"Robert, we're in trouble, we're in big trouble, who's on the other side?"
Richard and Robert had a voice connection with several familiar hackers, and said loudly: "Oh, they are about to win, and the other party is only fighting back at this time." ”
Robert didn't say much, just said: "I lost six hundred long-range broilers, one of which is a server of the French government, and the other party is very powerful. ”
Yes!
This is the unanimous view of all the hackers who go to war and watch the war - it's powerful.
In the office building of a company in Berlin, Germany, the computers of 15 employees suddenly all crashed for no reason, followed by a few electric sounds, and then a smell of burning.
The company's technical personnel quickly came to repair it, and were told that the motherboard was short-circuited, burned several components, and could not be used, and the motherboard had to be replaced.
The same is true in the United Kingdom, France, Russia, Japan, Hong Kong, Malaysia, Mexico, Australia, and Canada...... And, the United States!
Within two hours, tens of thousands of brains were burned to the motherboard.
At this time, the flames of war had just burned to the United States.
Kevin sat in his humble room with sweat on his face, he had just been released from prison, he was monitored every day, and he couldn't disarm the computer, so he didn't run a few broiler springboards at all, and was directly pursued by the rapid attack, he had to use all his wits to deal with it and escape the tracking of the other party.
However, after two hours of fighting, they still did not avoid the opponent's data tracking.
"Oh...... NO……”
Laugh at...... Not............
Kevin just shouted, the computer he had used for less than three hours was scrapped and crashed automatically, emitting a burnt smell, and he didn't need to look at it to know that it had burned the hardware.
Bang...···
Kevin punched the main chassis and scolded in a low voice, "Shit, what kind of software is this?" Such a powerful anti-tracking capability? ”
In the field of computing, Kevin has always regarded himself as a god-like being, and he feels that as long as there is a zero and one, then he is omnipotent.
The first setback was against Masashi Uemura, who managed to track down his address and work with the police to arrest him. The second time, this time, Kevin clearly knew that the other party was a person, and he didn't even target himself, just an automatic counterattack program to get him. Of course, he knew that the American hackers who participated in the battle like him probably did not feel good.
Kevin was amazed at how such a powerful master could appear in China, where computers had just become popular? So far, he doesn't even know what means, what programming language, and what mechanism the other party uses!
However, just being able to track and counterattack, and burning the hardware every time it touches a terminal, is already terrifying.
In comparison, some viruses that appeared before, worms and the like, are not worth mentioning.
ASCI、Wht! It is the name of a supercomputer, and it is also the fastest supercomputer in the world at this time, which is made for the U.S. Department of Energy by IBM, the most well-established computer company in the United States. The maximum speed is 123 trillion floating-point operations per second.
This computer is used to simulate nuclear tests.
But at this time, this supercomputer located in the secret laboratory suddenly had an abnormality, in an instant, thousands of processors quickly overloaded, the voltage in the entire laboratory increased rapidly, the temperature rose sharply, ten seconds later, the fastest supercomputer in the world at this time suddenly logged out, and then restarted, back to normal. …,
The technicians quickly checked and came to the conclusion that in just ten seconds, the world's fastest supercomputer had been hacked, or attacked.
All of a sudden, the laboratory exploded!
Richard broke out in a cold sweat.
Last year, IBM built the supercomputer ASCI, Wht! Just finished, he participated in some of the test projects, took advantage of the convenience to leave a backdoor in them, and then connected to them to make the world's fastest supercomputer his own broiler, which is something he is proud of.
However, just now, Chinese hackers actually tracked down this supercomputer, and Richard thought that he could rely on the high performance of this supercomputer to fight the other party, but the other party directly controlled the hardware system, so that thousands of processors were all overloaded at the same time, and almost scrapped this highest scientific and technological achievement of the United States, the pride of the United States.
Fortunately, the supercomputer's defense system is very good, and it can automatically log off and restart when it is in danger, so that it can be preserved.
However, this is also his last broiler!
All of his thousands of broilers were tracked and reimbursed.
Below!
It was his own well-built computer, and he was sure that the other party would be able to track it down to his home.
Di Di Di ..................
Sure enough, the thoughts didn't stop.
His computer quickly sent out an alarm, someone maliciously invaded, his ten fingers flew rapidly, one by one data was entered, and lines of instructions changed rapidly, through more than two hours of contact and familiar with the other party's attack methods to make up for his computer defense.
However, it didn't last two minutes, and Richard's computer suddenly crashed, and there was a scorching smell.
Richard sat in his chair in a dejected manner, staring blankly at the computer.
He knew that this time, he had failed!
Moreover, the United States, too, failed!
This time, the Sino-US hacker war has spread very widely.
Two months ago, the battle had attracted the attention of all countries in the world, but it came to an abrupt end in May. From the very beginning, the battle attracted the attention of all those who had access to the computer.
In the early days, almost all of the people who received computers were technical personnel who knew some technical means. It's not like a few years later, when computers became one for everyone, nine out of ten people only knew how to turn on and off and run office software.
More than 100,000 computer enthusiasts from all over the world are watching this battle.
At the beginning, the battle broke out, more than a dozen top hackers in the United States participated in the attack, and China lost many positions almost without any resistance, and finally almost even lost China.com, China.com, a Chinese portal.
At this moment, China's mysterious hackers suddenly struck.
The strength is absolutely powerful, because more than a dozen top hackers in the United States were beaten back without any resistance, and tracked all the way to the other party's lair and destroyed the terminal.
Sixteen world-class hackers have lost their combat effectiveness.
Chinese hackers all poured into the U.S. cyberspace at once, and several large websites were quickly occupied, and their homepages were modified.
The first to be breached was the White House website, which was breached once last time, and the homepage was quickly repaired
Then, AOL, MN was breached one after another, and the homepage was modified.
At this time, the White House spokesman quickly made a public statement, saying that the United States interests have been damaged, BI and the CIA will intervene in the investigation, and at the same time, the US government computer maintenance agency will quickly intervene.
And Chinese hackers are rapidly expanding their results, breaking through several major web portals in the United States, the biggest of which is naturally Yahoo, the world's Internet product representative!
Uemura was sitting in the basement of Yahoo's headquarters at this time, where Yahoo's main server was located, constantly monitoring the data reflections.
Suddenly!
Rows of data pop up.
Someone invaded.
Finally it was Yahoo's turn.
Uemura quickly shouted, "Enter the fight!" ”
Dozens of technicians who had already been ready for the game quickly operated their computers.
At this time, in addition to the attack data, dozens of external data entered at the same time, asking to fight with Chinese hackers together, which is the dozen or so top hackers who have changed computers and the masters of the National Computer Center of the United States!
Uemura quickly passed the request.
At this time, the computer elite from all over the United States was really gathered, and Uemura's face was a little flushed with excitement, he was a master, and he was eager to see a more powerful master.
This time, the mysterious hacker who suddenly appeared in China showed him even more powerful and unbelievable methods.
"I'm going to shut down Yahoo's servers for a day!"
This line of kanji appears on Yahoo's homepage.
Uemura and other top computer experts in the United States were shocked, but they didn't expect that in a silent situation, the other party had already entered the server and directly changed the information of the main business?
Followed by!
The server sub-equipment in the basement automatically shut down, and the on-the-go indicator lights went out one by one.
The technician reported the situation quickly.
Uemura was sweating profusely on the keyboard to check the defense, but at this time, there were more than 30 people sweating like him, and there was nothing they could do if they joined forces.
A minute later!
Yahoo total servers are down. Clear