Chapter 273: The Sino-American Hacker War

Seeing off Lin Deshuang, Wang Hengxiao felt very heavy.

The master's body began to weaken, and once the signs appeared, then that day would not be far off. Whether it is Uncle Lin, or the old man Zhang Yicheng, or the master Li Jiansheng, they are all worried that after they leave, the national security will be unstable.

In the current social environment that emphasizes peace, stability, and harmony, the armed forces will not be dispatched.

The police can only deal with ordinary petty theft. Special and powerful departments such as national security and special police are particularly important, and if these two systems are disrupted, the consequences are unimaginable.

Back then, #ι˜θ€δΊ²θ‡ͺ见李ε₯η”Ÿθ€ηˆ·ε­ asked him to stay and stay in the capital to take charge of the overall situation, which was to show great importance. Now that Deng Lao is gone, and Zhang Yicheng is also gone, the new generation of leaders is lukewarm about national security, and the political class is vigilant against the powerful intelligence services in the shadows.

On the other hand, the direct expression is that in the past two years, there have been frequent deductions from the funds of the National Security and the Western Bureau.

Last year, Lin Deshuang told Wang Hengxiao that 500,000 yuan had been deducted from the West Bureau's original annual activity fund of 2 million, and the number of special funding applications was 3 million, and only 1 million was approved.

A powerful institution that maintains stability on the frontier is supported by only 2.5 million yuan a year.

Lin Deshuang got drunk at Wang Hengxiao that time.

This year, the situation is okay, Mr. Li personally went out to ask for it, and the funds of the West Bureau were directly approved for 5 million.

The situation is complicated, externally, internally!

Wang Hengxiao sighed, understanding why the master's body would weaken so quickly, almost half the time less than he expected, thinking about these messy troubles every day, hard work, and not old.

Di Di Di ......

The computer sounds an alarm.

Wang Hengxiao was stunned for a moment, quickly cleaned up his mood, turned on the computer screen, and the host was on.

However, Wang Hengxiao smiled.

This is Jenny's prank, maybe Wang Hengxiao can't find it, so he uses this method to force Wang Hengxiao to respond.

"Is there something wrong with Teacher Jenny?"

This is a very simple chat software, which was written by Wang Hengxiao himself.

Jenny quickly responded, "Yes, it's urgent. Send you a web page and see for yourself. ”

A network connection was sent, and Wang Hengxiao opened it with confidence, and a black web page popped up.

"The fight doesn't stop!" A few English letters hang on the screen.

This is the web address of Baidu, a Chinese Internet search company that has just been established for a year. Obviously, Baidu's homepage was hacked and hung up on this picture.

Wang Hengxiao's ten fingers flew, and he quickly mobilized several software to come out, and the lines of instructions were entered, the letters on the screen flashed, and the picture jumped.

Jenny sent a message again: "The Sino-US hacker war two months ago has not ended, and several hacker groups in the United States have organized an operation again. ”

After saying that, Jenny cut off contact.

Wang Hengxiao's face was calm and replied with two words: "Xie Lu Xie!" ”

The Sino-US hacker war in 2001 years is a famous network hacker battle in the world, and it is also from this year that Chinese hackers entered the stage of the world and formed the Red Guest Alliance.

The cause of the incident was the collision in the South China Sea a few months ago, when a Chinese patrol plane collided with an illegal U.S. plane, and Chinese pilot Wang Wei was killed and buried in the sea.

At that time, the United States reversed black and white and became the embodiment of justice, China is an evil faction, and a group of hackers even said that they would retaliate and attack China's fledgling Internet, proving that the United States is strong!

It is not known whether the US hackers' operation was supported by the US government. Chinese hackers have also taken the initiative, attacking many prominent American websites, as well as some military government websites.

The battle between Chinese and American hackers lasted for more than a month, and Chinese hackers used the crowd of fighters to break into the official website of the White House and alter the website pages.

At that time, Wang Hengxiao didn't know the situation, because he was preparing to graduate from primary school at school, and then when the war was high, Teacher Wen called to talk about it, and Jenny also called to mention that Wang Hengxiao came to the camp to log in to the network with a computer during the May Day holiday and participated in the battle in the last few days. …,

In short, at that time, all the people were soldiers, and they knew a little bit of computer skills, and they all participated in it with righteous indignation, and were commanded by masters to do something, and the process of the battle was promoted by a few masters.

The battle at the top is the real decisive battlefield of the battle.

At that time, when more than a dozen masters on both sides were playing to the death on the server of the official website of Beijing, China, Wang Hengxiao suddenly intervened.

It became the most reinforcement, directly crushed seven top hackers in the United States with a powerful data flow, and led tens of thousands of Chinese hackers to directly rush into the official website of the White House, breaking through the White House website server and modifying the web page with an unstoppable posture.

That's a classic one

It has made a reputation for Chinese hackers.

Several major hacker organizations in China have become famous, such as the Red Guest Alliance, the Hacker Alliance, the Rubik's Cube Organization, and so on!

And only a few people know about it, and the data stream that enters the last one is not the so-called crowd tactics arranged by them, but the help of one person. Several top hackers in the United States also know about it, but they don't admit that China is such a powerful hacker, so they say that they have lost in the crowd tactics

Of course, when the most Lu broke through the official website of the White House, it was indeed a crowd tactic, at least more than 50,000 people participated in the attack, and several masters directly broke through the protection of the server under the leadership of Wang Hengxiao, making it defenseless, and tens of thousands of people rushed in.

At that stop, China won, which was a little different from what Wang Hengxiao knew about it.

At this time, the retaliatory attack of American hackers struck again!

Wang Hengxiao frowned slightly, in the two thousand and one year of the Sino-US hacker war, he knew the Tao in his previous life, but he didn't know it when it happened at that time, but he came into contact with these things when he went to college later. But I didn't hear that there was a follow-up battle, but I knew that Lu Dao stopped when the battle ended after the end of May.

Now it's changed because of your own joining?

The Mira hacker group continues, wanting to prove the superiority of their computer technology?

At this time!

China's major hacker groups are gathering at a secret website to discuss the matter.

Such a blatant action by American hackers is known to almost everyone who comes into contact with computers.

The Red Guest Alliance, the Hacker Alliance, the Hawk Alliance, and the Rubik's Cube Organization are the representatives of Chinese hacker organizations, the four largest, the largest, and the most official organizations.

"The fighting continues, then let's continue, everyone is ready to fight, this time we will fight again to their hometown, and report that our flag will be hung on their White House website."

This is what Hongyan, the chief hacker of the Red Guest Alliance, said.

"Of course we have to fight, this time the American hackers must have found more powerful hackers, let's defend first, don't lose our hometown."

The chief hacker of the Rubik's Cube said: "Last time, if it wasn't for the sudden help of a mysterious person, our hometown would have been lost." Have you found out, who is he? Can you get in touch? ”

"I didn't find it, the source of the data can't be traced, and the network can't do it, it's much better than us."

The chief hacker swordsman of the Hacker Alliance said: "There is no news at all, and it may not even be us Chinese." Don't expect too much this time, let's rely on ourselves. ”

"It's still the same as last time, uniting everyone, there are many people, it's what the great man said, although many people don't understand, they can also help brush up the data!"

The eagle of the hawkish alliance spoke: "Time is running out, everyone go back and prepare immediately." ”

Hacker!

In the web, it is synonymous with mystery and horror.

And the earliest predecessors of hackers were radio amateurs in the sixties and seventies. At that time, there were no computers and the Internet, radio was the most cutting-edge technology, and it was also the most convenient tool for long-distance communication.

Then computers and the Internet appeared, and radio amateurs took advantage of their innate advantages and logic to quickly master this new communication tool and look for loopholes in it to do something unruly.

In the history of hacking, there is one man who is legendary.

America's Super Hacker Kevin!

As a teenager, he invaded the North American Air Force command system of the United States with a computer and a modem, and a legendary life followed.

In the 90s, Kevin was synonymous with hackers, and it was he who made it known to the world that a weak hacker with a single computer had the destructive power of a nuclear bomb that could not be matched.

But then he was arrested and imprisoned, and he also achieved another person's reputation, computer security expert Masashi Uemura, a Japanese-American computer expert, who played the biggest role in the hunt for Kevin

Kevin was just released from prison last year and was forced to be denied access to any radio and communication tools, including computers, telephones, modems, routers, and more, for three years after his release! It can be seen how powerful Kevin's threat is, and how deeply the world is afraid of him.

At this time, Kevin, who was in California, received a letter.

Yes, he could not access telephones and computers and all electronic products, and the only channel of communication was the most primitive letterwriting.

"Old friend, we need your help."

There is only a series of 0s and 1s on the letterhead, which is the most primitive computer machine language, which naturally does not bother the super hacker Kevin. Kevin quickly deciphered this sentence from above: "We got permission to use the computer for a day through the FBI, and tomorrow you will get the best lab computer, we need your help, and our target is Beijing, China." "Min