No. 018 Private service industry chain

The 018th private service industry chain

One is a bandwidth limit, and the other is a two-piece springboard between the two broiler springboards, and the network speed between Wei Dongsheng and this confident hacker is not very good. If the video is monitored all the time, it will definitely bring a burden on the network speed, which in turn will cause the alarm of this confident hacker. Therefore, Wei Dongsheng decisively took pictures to peek into the real life of confident hackers.

Seven low-resolution photos were sent back, and Wei Dongsheng quickly got to know him intuitively.

Cyanobacteria's cybersecurity test records show that the IP address of the confident hacker is somewhere in Chongqing, let's call him a Chongqing hacker. The Chongqing hacker has a young face, about twenty years old, and his dressing style is very sloppy. In the background of the photo, he is suspected to be staying in a narrow rental room, the bed is an inferior old wooden bed, the walls are simply whitewashed lime walls, except for the soft chair commonly used in front of the computer desk, the other wooden tables and stools are broken and dirty. The material conditions reflect the extremely poor quality of life, he is not a university student, and he is not like a normal local family.

At this moment, the Chongxingqing hacker was lying in a soft chair, playing a set of music on a loop, happily flipping through the storage data of the decoy computer, and sighing: "There are so many plug-ins, is this guy a plug-in collector?" ”

Wei Dongsheng ordered Cyanoza to tinker with the Chongqing hacker's audio track, and found that his voice had a strong Suzhou accent, which was significantly different from the local Chongqing dialect. Wei Dongsheng speculated that the heavy star hacker was either from Suzhou or lived near Suzhou for a while, and the current humble house was his temporary residence.

The Chongqing hackers did not find Wei Dongsheng's anti-intrusion and continued to rummage through the bait computer. There is no need to laugh at the sluggishness of Chongqing hackers. Cyanobacteria is a black technology that is ahead of its time, which can directly act on integrated circuits to counter computer systems, and traditional firewall mechanisms cannot detect its intrusion. No matter how powerful a hacker is, limited by contemporary computer science theories, he cannot detect the invasion of cyanobacteria in time. If necessary, spirulina can invade any internet-connected computer at will.

Taking advantage of the Chongqing hackers rummaging in the decoy computer, Wei Dongsheng quickly retrieved his computer and found clues as soon as possible.

The hacker's computer in Chongqing was minimized by a special chat room software, and there were a total of forty or fifty people in the chat room, talking to each other intermittently. Wei Dongsheng downloaded the chat information to the local area, quickly flipped through it from the beginning to the back, and slowly sorted out the clues.

It turns out that Harbin hackers, Chengdu hackers, Suzhou hackers, Yanjing hackers, etc., all belong to the same organization.

After the leak of the source code of the Italian version of the legend, a hacker Cavalry, who is active on the Internet, is optimistic about the profits of the legendary private server industry, and is not satisfied with the meager profits of setting up a few legendary private server servers, his goal is to rule the private server industry chain, rule all the legendary private servers in the country, and all legendary private servers in the future must abide by his rules. Harbin hackers, Chengdu hackers, Suzhou hackers, Yanjing hackers and Chongqing hackers are all partners he has found through various channels to manage the private server industry in various regions in the future.

Integrate the strength first, and then fight the dissidents.

Chongqing hackers and Suzhou hackers are friends in reality, and Suzhou hackers know that Chongqing hackers have been in financial difficulties recently, so they solemnly recommend Chongqing hackers to Cavalry. The Chongqing hacker's remarks show that his network security attack and defense skills are poor, but he is particularly good at DDOS attacks, which is very suitable for patrolling law enforcement and the private server industry.

In the private server industry, the technical threshold for renting servers and setting up private servers is very low, and with the support of one-stop service technology, you can basically set up private servers if you can read and write. However, the purpose of setting up a private server must be to make money, and the premise of making money is that players are willing to enter the pit.

Therefore, to operate a private server, you first need a stable source of player customers.

If you want to make a fuss at this node, you can start a private server publishing website to monopolize the entrance of player customer traffic. During the normal period of surfing the Internet, we will occasionally encounter web advertisements, and suddenly a column of simple web pages will pop up when the private server will open and when the private server will be opened, which is the so-called private server publishing station. Of course, private server owners can also post and promote by themselves, but its efficiency is definitely not as good as advertising on private server publishing stations, after all, many player customers suddenly encounter unfamiliar private servers, and the first thought in their minds is always to wonder if there is a virus Trojan installed.

As far as the private server industry is concerned, the profits of controlling the private server publishing station far exceed that of the real private server operator.

A very widely circulated chicken soup article. During the development of the western part of the United States, gold mining became a popular industry, and countless people rushed to the gold mine with overnight dreams. In the end, the gold diggers did not get rich, but the jeans sellers did. In the private server industry chain, setting up a private server to recruit players is equivalent to a gold digger, and controlling the private server release station and other upstream nodes is the real way to make a lot of money selling jeans.

And do not be verbose about the profits of each node of the private service industry chain.

To operate a private server, it is fundamental to have a certain amount of player customer traffic, and the second thing that is needed is to retain them to pay with a stable game experience.

However, the private service industry is a part of the black network, and no one is willing to compete fairly and impartially with you. How can a person who takes a step back and firmly worships the values of fair and just competition infringe on the copyright of a genuine game? How can private server owners who try to set up private servers to make profits ignore copyright laws, so how can they expect them to coexist consciously and peacefully?

Although the technical threshold of the private server is low, it is not something that can be opened if you want to.

For example, if Cavalry successfully integrates this group of hackers, it will establish a legendary private server community. If any private server owner or private server publishing station is unwilling to submit to him, a horse boy like a hacker in Chongqing will take action and constantly attack the private server server and private server publishing website in DDOS mode, the private server publishing website cannot be displayed normally, and the private server server is frequently disconnected. When a server freezes and drops frequently, will the player customers still be willing to pay?

No.

So, your private service is finished.

Private server publishing station, server leasing, one-stop technical support, etc., those who sell jeans and share the cake are hidden behind these important nodes, and the technical support fees paid by private server owners at a premium, server rental fees, and advertising fees for private server publishing stations are all protection fees in disguise. The owner of the private server unknowingly pays the protection fee, so that the private server can be operated smoothly and unharmed. Of course, this is not insurance, if the background that collects protection fees is not strong enough and not tough enough, the private server owner will usher in DDOS attacks and other stuffy sticks on the first day of opening the site.

The above are some of the unspoken rules of the private server industry chain.

Cavalry's goal is to dominate the country's legendary private service industry, and Cavalry's integration approach is to make money for everyone, he stands at the top of the food chain to provide the best quality technical support, and other important members have their own monopoly on the agency rights in their cities or provinces.

The Cavalry organization has just been established, and some of the members know each other and some don't, so how do they get along?

The unspoken rules of the black rivers and lakes on the Internet are very simple, and everyone is technically high.

If you are strong, you are awesome, and if you are weak, you will get out.

It is precisely because of this background that Chengdu hackers, Suzhou hackers, Yanjing hackers and others seem to be from the same organization, but they fight mercilessly and fiercely in Wei Dongsheng's decoy computer.

The most critical question, and the most core question, why did the Cavalry organization target Wei Dongsheng?

The truth is simple, and it's depressing.

The Cavalry group was formed during the National Day holiday and is currently recruiting, with hackers from all walks of life recommending potential partners to each other. For example, Suzhou hackers and Chongqing hackers all joined the Cavalry organization after such a layer of recommendations.

This morning, or rather, last night, a legendary copy gear bug was born. Wei Dongsheng's Internet café game studio, which has been open since September 19, has gradually won a reputation because of the large supply of high-quality equipment: "As long as you have a drum wallet, I can buy anything here; It's not that you don't have a dragon slaying knife, it's that you offer a low price. "Before today, countless players and countless plug-in makers were not only envious of the endless supply of high-quality equipment from the Internet café game studio, but also curious about where the supply came from; When the copy equipment bug appeared, these players and plug-ins immediately suddenly realized that they were thinking: "It turned out to be a copy equipment bug!" ”

Players despise the morality of Internet café game studios, and zero-cost copied equipment is also sold in the thousands; At the same time, players envy the luck or technology of the game studio of the Internet café to find such a precious bug more than ten days in advance. Wealthy players believe that the operator will quickly block the bug, there is no need to keep the existence of the Internet café game room secret, and the Internet café game studio, which has always spread in a small circle, is quickly known to the general public.

The public players were slow to be alert to why high-quality equipment appeared in batches a few days ago, and the Y organization aspired to dominate the country's legendary private server, dernet, the first Harbin hacker to invade the Internet café, nominated the Internet café game studio to Cavalry: "You might as well explore their details, if luck dictates it, it's just that, if he relies on his strength to find out the bug, it's very worthy of our wooing." ”

Yenching hacker Valofatt agreed: "Except for the three of us, the rest are just getting started with parallel goods, and we should recruit some powerful members." ”

Cavalry vetoed Valofatt's recruitment elite advice: "Private server operation is originally a zero-based low-threshold industry, if it is really strong, who will be willing to immerse itself in this industry." Of course, if the backstage of this game studio is really good and has more bugs in the hands of legends, I would agree with recruiting him as one of us. ”

Then, a group of members were not convinced, and they visited Wei Dongsheng's decoy computer in groups.

The Cavalry organization may not have malicious intentions, but if they are accommodating and conniving, it is difficult to guarantee that they will not harass Wei Dongsheng again and again. Instead of being tired of coping with it in the future, it is better to show your strength as domineering as you did to the Anal Star Network, and scare them away.

Wei Dongsheng ordered the cyanobacteria to invade the computers of the remaining forty-two members along the passage of the chat room, and routinely searched for any special findings.