Chapter 713: Hacking Techniques Deter Xiaoxiao
This cyber hacker confrontation, which covers almost all major countries in the world, has not spread throughout the Internet as quickly as those big news.
For ordinary netizens around the world, such news is not the object of focus after all.
But such news is a bombshell news for a specific group of people and people.
Almost the whole world understands that this is a means of counterattack for future technology groups in the face of various cyber intrusions for a long time.
Compared with the general structure, which is almost defensive and secretly organized, the approach of Future Technology Group is much more open.
Soon after this hacker war, the global network monitoring company released a global attack and defense data map in this network battle for the first time.
Dense thin lines crisscross the same map, and the thin lines on it are also colorful, and only those who are truly in the know can understand them.
On this map, there is a network attack data line that occurred in just ten minutes.
The targets were mainly Israel and Japan, and a large number of thin lines on the map were connected to these two countries.
And these lines are all from all countries in the world, and there are even many Internet signals from Africa.
The rest are the United States and Europe, but the scale of the attacks here is not large, and there are no big websites or companies, so the data only points to an approximate place.
It is not clear who was attacked. However, many people in the industry have already received the relevant news.
Some people are destined to be unlucky.
However, not many people really pay attention to these unlucky people who have failed. After all, losers naturally tend to be overlooked.
And the person who launched this attack naturally attracted the attention of all the industries around the world.
In just ten minutes, such a huge data flow was launched, which not only caused a huge impact on the two countries, but also accurately killed a large number of hackers around the world.
Although these hackers who were killed were also some third-rate goods, they were able to destroy so many hacker computers at once. It's not that simple, either.
Previously, the firewall of the future technology group showed a strong defensive power. It has always been the object of rumors in the industry.
Israel claims to be the most secure cyber defense country in the world, and many of the world's top hackers are Israelis, besides. The horrors of the Mossad are not vegetarian in the whole world either.
Few hackers would dare to try to see if Israel's cyber defenses were really strong. The Pentagon Firewall of the United States is also known as the most powerful firewall in the world, which can withstand any hacker attack.
And it is not so rational to provoke the United States, and now there are very few people who will provoke the firewall of the US Department of Defense, otherwise if a bad mess is made, someone from the CIA will come to the door and face prison.
But Future Technology Group is different. In the final analysis, Future Technology Group is just a group, and there is no official background. Or in a country like Iraq.
There is not much risk in attacking such a company's network, and the firewall of Future Technology Group is indeed very strong, no matter how it is attacked, it will not move at all.
In such a situation, it is natural that many hackers with itchy skills can't help but participate, and the firewall of Future Technology Group has quickly become the most attacked firewall in the world in a single day.
The more you can't get in, the more people want to try, and with a large number of cracks, everyone wants to crack such a super firewall.
However, unfortunately, a few months have passed, and the network firewall of the future technology group has not only not shown any signs of shaking.
Even in the face of a large number of hackers around the world who keep cracking every day, they have not modified any parameters of the firewall so far, but even so, it has made one hacker after another all go home.
The firewall is like an infinitely thick titanium alloy steel plate, not only so tight that there are no gaps, even if you kick hard, the firewall will not shake in any way.
It is almost impossible to break through an enterprise firewall that can come up with a high-end artificial intelligence system like Panda, but a firewall like this kind of firewall that is so tightly defended that there is no vulnerability, even the firewall of the US Department of Defense, has no such effect.
For this reason, some hackers have even formed organizations that specialize in the firewall of the future technology group, but it still has no effect.
Therefore, in the industry, the strong defense of the network firewall of Future Technology Group has almost become one of the hottest topics.
There are even cyber departments in many countries, all of which are secretly involved, and there is no shortage of cyber security companies.
However, I'm afraid that this topic will change from today, and the future technology group, which has been under attack, has shown a strong counterattack ability this time, and the direct effect is to make many ordinary hackers a little frightened.
Such attacks can only be said to be really rare, and the correct IP of each hacker can be traced almost in depth and accurately, from which it can also be seen that in the field of network technology, the future technology group with unparalleled defense also has strong attack power.
You must know that every hacker who can mix on the world network has at least one or two brushes to create a large number of fake IPs, which is a necessary skill.
Mix real IPs in a large number of broiler IPs, hide your real IPs, and use them as cover to launch attacks.
Identifying one or more of these hackers in general may not be a big deal.
But making sure that every hacker involved in the attack has the correct IP, which is somewhat powerful, and there are definitely not many organizations in this world with such strong anti-hacking capabilities.
And every such hacker group is almost all those powerful countries that have formed national cyber forces, even if they are anonymous, they do not have the strength to determine the source of so many attacks.
In this future technology group's cyber counterattack, hackers in the industry also saw the powerful side of Israel's cyber security defense.
In the face of such a powerful data flow, Israel's national cyber defense can withstand without pressure, which is enough to remind any hacker that Israel is indeed a veteran master in the field of cybersecurity, which can be called unfathomable.
Of course, Japan's consistently poor performance is also remembered by more people. (To be continued.) )