HacKer - Chapter 1673
HK1652 Fusion Attack !
.
Dream Entertainment Official Gamer Forum is very lively!
The Internet mercenary hired by the mysterious forces, in the Dream Entertainment Official Gamer Forum, posted a role that allowed some of Gamer to follow Dream Entertainment Company and whether it really deleted the Forum account of the numerous Yinjia Nation user.
To tell the truth, Shi Lei doesn’t care about the issue that Gamer is concerned about, nor does it care about the posting of internet merc.
Dream Entertainment Official Gamer Forum is Shi Lei’s domain, Shi Lei, what is it like, do you still need to report to each Gamer?
However, in order to show an enlightened attitude, Shi Lei ordered Izual to issue an announcement, indicating that the Yinjia Nation part of the user violated the rules of the Dream Entertainment Official Gamer Forum and was taken by the Dream Entertainment Company. If there is any objection to the user who is the number, you can appeal to the 7*24 hour customer service center.
Under the strong intervention of Shi Lei’s, the title incident that should have been raging was only a matter of course. However, Shi Lei did not find that the Data Server of the Dream Entertainment Official Gamer Forum has undergone subtle changes.
Dream Entertainment Official Gamer Forum’s Data Server uses a physical standalone server instead of a server using IWNMiwang computing resources Virtual. These entity-independent servers are also stored in the Basement Fifth Floor of the Emerald Building, not far from the Security Room where Shi Lei is located.
Dream Entertainment Official Gamer Forum’s Data Server, dedicated to the Data Entertainment of the Dream Entertainment Official Gamer Forum.
Previously more than 500,000 exception corpse user, implemented the Publishing Content Type Attack, corpse user uploaded the numerous picture data and text data.
Both the image data and the text data are low-danger data, not in the focus of the scope. and so. Even though the data uploaded by the exception user has also been successfully stored inside the Data Server.
However, these conventional low-danger data are undergoing subtle changes within the Data Server. They are stored together individually and have no meaning. There are no risks.
But when a part of the specific data is gathered together, it constitutes a very dangerous thing!
The network architecture of Mirror Science and Technology Group has very tight defenses and is fully protected by the Endless Defense System. This is either Jehovah or Mysterious Hacker Chaos Serpent. They are very clear.
And, they are also aware of the Endless Defense System, how much Outstanding is. The ratio of defense to intrusion has reached one to five degrees, which is an incredible proportion.
Jehovah has thought through it. A fact is determined that Amon13 is added with Amon14. It is also impossible to force the Endless Defense System to break.
So, if you want to attack the Mirror Science and Technology Group in the net world, or to fight against the Organization, you can only choose another path. Instead of using brute force to confront.
Jehovah and Organization’s three Senior World Summit Grade Hackers were discussed in detail. This time, the Publishing Content Type Attack action was designed.
Like Shi Lei, they invaded the Yinjia Nation Nation population information bureau of Statistics and mastered the Nation population information data library. Then they used the FaCIA l Projection technology. First, a small attempt to harass the Dream Entertainment Official Gamer Forum, trying to make Shi Lei relax. Subsequently, the account was registered on a large scale, and the user of the 500,000 name was exceeded, and the Publishing Content Type Attack was implemented.
However, these actions are cover up!
The Publishing Content Type Attack, which exceeds the 500,000 name user implement, is just a conspiracy of Jehovah. They have no hope that the Publishing Content Type Attack can have any impact on the Dream Entertainment Official Gamer Forum.
The so-called Publishing Content Type Attack is entirely for cover and contains some specific code. Those specific code, hidden in some seemingly garbled posts, deceive Izual.
Have to say, Jehovah their plan is successful!
Jehovah They know very well how Pseudo ArtifiCIA l Intelligence System works. If there is no direct threat, Izual really won’t find out that they are hiding specific code in garbled.
Although those specific codes, if seen by Shi Lei, 100% will be found. Jehovah They also guessed that Shi Lei would definitely not check the number of million posts one by one.
So everything goes according to Jehovah their script in the implement!
The specific code hidden in the garbled post, after entering the Data Server of the Dream Entertainment Official Gamer Forum, began to reorganize directly within the Data Server.
The reorganization of specific code is very fast and very secretive, and there is no interference to the Data Server of the Dream Entertainment Official Gamer Forum.
Everything is going on without consciousness!
Li Jian Nation, a mysterious hall.
Jehovah and Amdusias are staring nervously at the computer screen. The organization’s two other Senior World Summit Grade Hackers were not with them, but were hidden elsewhere.
“Jehovah, our plan is a success!” Amdusias still sings in the same tone, on Jehovah.
Jehovah has long been accustomed to the tone of Amdusias, only to see that Jehovah still wears a mask, does not show people in real face, and still uses a voice changer to respond with a neutral voice: “Yes, we succeeded, Shi Lei too He is arrogant, he doesn’t know what our purpose is. The title? Only Shi Lei can make such a naive thing!”
Amdusias didn’t comment, just smiled.
Amdusias knows how powerful Shi Lei is, and now Jehovah satirizes Shi Lei, just a cheaper one.
“Jehovah, what do we do next?” Amdusias asked Jehovah.
This action, led directly by Jehovah, whether it is Amdusias, Agares, or Eligor, all follow Jehovah’s orders.
Jehovah hides the face behind the mask, revealing a touch of light smile, but unfortunately Amdusias can’t see.
“We wait patiently!” Jehovah laughed.
They really only need to wait patiently, waiting for those specific code to reorganize accend in the Data Server of the Dream Entertainment Official Gamer Forum.
“How long do you expect it to take?” Amdusias asked again.
Amdusias is a diehard loyalty of Mysterious Hacker Chaos Serpent. Originally, Ambusias was seclusion in Xia Nation because of the failure of the Compass Area.
If it weren’t for the summon of Mysterious Hacker Chaos Serpent, I am afraid that Amdusias will remain hidden in Xia Nation and no longer care about Hacker World.
However, Mysterious Hacker Chaos Serpent re-released Jianghu and summon Amdusias. So, Amdusias without the slightest hesitation returned to Li Jian Nation and returned to Mysterious Hacker Chaos Serpent.
This time Jehovah promised the action to Mysterious Hacker Chaos Serpent, although Amdusias is assisting Jehovah, but there are also surveillance opinions.
So Amdusias asked for detailed information to better control the situation.
Clever Jehovah, how can you not understand the role of Amdusias?
But Jehovah pretended not to know, but calmly responded: “Amdusias, are the codes not written by us? According to our design, it takes only about ten minutes to reorganize accomplish. Once the accomplish is reorganized, Hēng! ”
Jehovah didn’t say it, what happens after restructuring accomplish.
Amdusias replaced Jehovah and said, “By using Xia Nation’s slang, then stable defense, it will also crash from the inside!”
Jehovah’s eyes flashed a bit of disdain. ‘a shame! proverb? Is there such a proverb? ‘Jehovah secretly despised Amdusias and did not understand the culture of Xia Nation.
“Yes! The Endless Defense System from Mirror Science and Technology Group is really very powerful, but any powerful Defense System is completely preventable. If you want to compromise the Endless Defense System from the outside, there is basically no possibility. But it’s a lot easier to break the Endless Defense System from the inside!” Jehovah confirmed the statement of Amdusias.
In fact, it is not just the Endless Defense System’s mechanism of prevention. In almost every Defense System, there are such defects.
The Defense System, including Supercomputer, and even the Defense System Internal Network’s Defense System of Nation’s forces, also have such flaws.
The purpose of the Defense System was originally to combat external intrusions, not defense internal intrusions. After all, external intrusion is the primary solution to internal intrusion.
This is not to say that the threat of external intrusion is greater than internal intrusion. In fact, the threat of internal intrusion is greater than the external invasion.
If we say that from the internal invasion, the original stable defense system will be broken like a blank piece of paper. At the same time, it is easier to get into the Core System from internal intrusions.
But why is the Defense System still out of the way?
Because you want to invade from within, you can only get into the enemy in person. That kind of behavior is not a preference for Hacker.
However, for the four Senior World Summit Grade Hackers in Organization, they found a way to attack from within the interior without having to physically enter the Mirror Science and Technology Group.
Inside the Dream Entertainment Official Gamer Forum Data Server, specific code hidden in several million post texts, quickly accomplished the reorganization work.
Reorganize the specific code of acccomplish, directly inside the Data Server of the Dream Entertainment Official Gamer Forum, to form a Virus – Stinger that specifically destroys the data library files!
(To be continued~^~)