HK428 Ignite the Beacon Flame!

PS: I sincerely ask for genuine subscription to support "Hacker", it is in a critical period, and I really need genuine subscription support!.

Shi Lei and the International Intelligence Bureau of the Ministry of Foreign Affairs are already in a situation where they are in the same situation, and there is basically no possibility of reconciliation.

The International Intelligence Bureau of the Ministry of Foreign Affairs wants to investigate the situation of Mr. M from Shi Lei so that the information on the Robot plan can be retrieved. It is best to be able to pass Mr. M and put the earthquake hack EQ in one pot.

Because of this reason, and Shi Lei is Mr. M, how can he reconcile with the International Intelligence Bureau of the Ministry of Foreign Affairs?

Tianyue Hotel, top floor of the 66th floor, room 6606.

Shi Lei took out all the accessories in the kraft cardboard. AIP artificial intelligence prosthesis, when packing, is very considerate to pack all the accessories in a small carton, which is convenient for the storage of various spare accessories.

The accessories of the AIP artificial intelligence prosthesis include four behavioral dynamic acquisition cameras, namely two flat glasses and two brooches; Two spare rechargeable batteries to replace the batteries in the two prostheses; a copy of the instruction manual; A warranty card; There is also a guide CD at the end, which guides users through the whole process of self-installing AIP artificial intelligence prostheses.

"Elder Liu, this CD, you arrange for relevant personnel to study and study, and take off your prosthetic leg every night, and then put it on for you in the morning. By the way, if there is any malfunction of the AI prosthesis, please contact us directly according to the phone number on the manual, and do not disassemble the AI prosthesis without permission. Because we have pre-set anti-disassembly measures, we need a specific engineering mode to open the AI prosthesis. Shi Lei instructed after the most reluctance.

In fact, Shi Lei has not finished speaking, the anti-disassembly measures of AIP artificial intelligence prostheses are very tightly protected. If there is no specific password authorization. Dismantling the AIP artificial intelligence prosthesis without authorization, the built-in system will automatically delete all data, and start the engineering backup battery, short circuit to destroy some circuits and electronic components.

Xia Guo is indeed very bad at electronic product research and development, but Xia Guo has a trick, that is, copycat imitation. Once there are advanced finished products, the electronics manufacturers of Xia Kingdom have begun to imitate.

Although AIP artificial intelligence prosthetics are built on a behavioral dynamic simulation system, copycat manufacturers cannot imitate it. But Shi Lei still set very strict protection measures. Just in case, the tighter the better!

Near noon, Meng Xun was the host, and ordered room service to deliver all kinds of expensive dishes to the executive suite on the top floor.

Shi Lei coughed lightly. "Sorry, I'll go to the bathroom first."

in the bathroom. Shi Lei took out the phone. Press the number '5' button to contact the low-level pseudo-artificial intelligence Yishuer.

"Sir, Yishuer is at your service!" The synthetic electronic voice of Yi Zuer was quite cold. This is because the basic logic application module does not include a human emotion imitation module.

The Human Emotion Imitation Module, in addition to making the Eater imitate human emotion. There is no practical use. Moreover, the human emotion imitation module, the program code is very complex, and has great basic requirements for computer hardware.

For a feature that has no practical use. Shi Lei will not write the corresponding human emotion imitation module for the time being, that is a complete waste of time!

"Yi Zuer, control the No. 2 server, through the broiler network, launch an attack on the network of the country. Attack conditions: First, websites with more than 100,000 daily IP views and less than 1 million; second, to exclude military networks, government networks; Third, prioritize attacks on media industry networks; Fourth, the attack method is set to destroy the data, after breaking the server defense, directly wipe out all the data of the opponent's server, and control the power supply scheme, adjust the voltage of each component, and burn the hardware! ”

The so-called control power burns the hardware, which is definitely not a joke. For example, the current popular hardware overclocking, the core voltage of the CPU is generally only a little more than 1V, and the maximum cannot exceed 1.65V. If you tamper with the power supply scheme and provide 2V or even 3V to the CPU, then the CPU will be burned properly!

The black magic software written and designed by Shi Lei has an insidious design, which controls the power supply scheme, and cooperates with the motherboard BIOS information to make the power supply system unstable and cause serious damage to the hardware.

"Sir, please determine the time to execute the order, and the conditions for aborting the order." Yi Shuer reminded Shi Lei to set more specific command conditions.

"Start executing the order now! The command abort condition is to protect the server from being attacked, and when the load reaches 70%, the connection records of all broiler servers will be cleared immediately. If the records can't be cleared, discard the broilers that haven't cleaned the records! Shi Lei added the setting.

"Sir, the order is accepted. The attack target is being screened, and the broiler network is being initialized, and it is expected that after 2 minutes and 48 seconds, the attack will officially begin. ”

Shi Lei hung up the phone and deleted the call log. The contact between Shi Lei's mobile phone and Yi Zuer was not through a mobile phone signal, but through the WAP network. After Shi Lei deletes the records on his mobile phone, Yishuer will delete the records in the network synchronously. This kind of communication is far more secure than using mobile phone communication.

Coming out of the bathroom, Shi Lei accepted the invitation to lunch with a smile on his face, making an alibi for himself.

Even if the matter of Li Jianguo is finally suspected of Mr. M, there will be nothing to Shi Lei. After all, Shi Lei has a sufficient alibi, so he is completely disconnected from Mr. M's identity. But this time, Shi Lei did not plan to let Mr. M top the cylinder, but there were other candidates.

The Western General Bureau of the Cyber Security Bureau, Ling Yumo's father, and Ling Yuguo, the director of the Western Bureau, are checking the situation in Li Jianguo. Li Jianguo's network was attacked, and as the four major network security bureaus of Xia Guo, Ling Yuguo immediately received the situation.

In the online world, many websites with more than 100,000 daily IP visits and less than 1 million have been attacked by a large number of people.

Due to the time difference between Li Jianguo and Xia Guo, according to the calculation of New York time, the gap is 12 hours, and when Xia Guo is having lunch, Li Jianguo's side is exactly around the early morning.

The early hours of the morning are generally the time when hacker intrusions are high, because the security personnel on duty of the general server have 24 hours of uninterrupted guarding?

Facing a server without security personnel is definitely much easier than a server with security personnel on duty.

Although it is a low-level pseudo-artificial intelligence, it has a basic logic application module after all, and can decide some things autonomously according to the rules predetermined by the program.

For example, Shi Lei limited the conditions and asked Yi Zuer to attack the network of the Lijian Kingdom. Yi Zuer first used the black magic software to capture a large number of temporary broiler servers in the Internet world.

Although there is no quality to speak of in these temporary broiler servers, in a short period of time, Yishuer has captured more than 10,000 temporary broilers.

More than 10,000 temporary broilers are close to the control limit of Yijuer. After all, Server No. 2 is not a large-scale supercomputer, and the computing performance is not too outstanding, and it can only support Yishuer to control more than 10,000 broiler servers.

Controlling more than 10,000 broiler servers, Yishuer's energy has expanded dozens of times!

It immediately stirred up trouble in the network world of the Lijian Kingdom in accordance with Shi Lei's restricted conditions, setting off huge waves. First and foremost is the official website of CBS, the famous CBS in the country.

CBS doesn't have a lot of views, barely 200,000 IPs a day. The first round of attacks was to control more than 10,000 broiler servers, form a broiler network, and launch a wave of DDOS flood attacks.

Yishuer didn't plan to rely on a flood attack to crack the official website of CBS, after all, CBS has a professional DDOS software firewall. Yishuer just uses the huge amount of data to make the DDOS software firewall occupy a lot of system resources, so as to use the black magic software to pierce the real security firewall and enter the web server.

After entering the web server, Yishuer continues to enter the data server and application server through the internal network. With three servers in control at the same time, it was only after he finally executed the data deletion plan.

Low-level formatting takes a very long time, for example, an ordinary 500GB single-disk HDD, low-level formatting for several days is very normal.

According to the attack mode of the Moon virus, when the hard disk is in a low-level format, the power supply of the hard disk will be suddenly interrupted, so that the data in the hard disk will be lost, and even the physical damage of the hard disk will be caused.

After taking out the hard drive, continue to control the power supply scheme and tamper with the BIOS power settings to continuously destroy the CPU and memory modules!

In the server room of CBS, the disk array cabinet emitted an abnormal mechanical noise, which was an abnormal sound from the low-level format of the hard disk, which was suddenly interrupted from power supply.

In the cabin of the motherboard, there is an unpleasant burning smell, which is the reason why the CPU and memory modules are burned by high voltage!

CBS was the first to take the shot, and quickly fell under the attack of the Eaters, who left no information and shifted the focus of the attack to other websites.

In the Western General Bureau of the Cyber Security Bureau, Ling Yuguo looked at the information on the computer screen, and a chill rose in his heart, from the time CBS CBS was detected to be hacked, to the time of the fall, it did not exceed 3 minutes in total!

"Which top team is getting in trouble with CBS? Could it be CBS, what has been reported recently that upset them? Ling Yuguo muttered to himself.

However, the monitor of the Western General Administration reported to Ling Yuguo again that many websites of Li Jianguo were attacked at the same time!

"Who is it?" Ling Yuguo was puzzled, but inexplicably, a name appeared in his mind

(To be continued.) )