Chapter 542: All the sun and the moon shine, and the rivers reach are all Han territory, and the same is true for the Internet world


Bald eagle.

Pentagon Building, the network center office on the third floor underground.

At this moment, a group of people are busy.

The keyboard crackled and cheers came from time to time.

"It has already broken through the internal network of China University of Science and Technology..."

"It has invaded the Hada Intranet..."

"Oh, it seems that China reacted, and the network firewall has been turned on independently..."

"Let's look at China's What progress has been made in network technology! "

As a global technology overlord power, the concept of the Internet was born from the Bald Eagle and spread.

At the same time, because of the developed country of bald eagles, relevant technical research and accumulation began decades ago.

The accumulation of related talents is definitely not a small number.

The network center office in the Pentagon Building is said to be a network center, but it actually undertakes the task of cyber hacking.

The Internet world is not like the real world.

In the real world, if two countries really have one shot and one shot conflict, it will easily lead to more serious consequences.

But in the online world, it's different.

First of all, such things will be kept confidential within a limited range and will not be spread out at will, so there is no need to worry about public opinion.

Secondly, there is the conflict in the online world, and the results are controllable.

It is precisely because of these reasons that the online world has never been calm.

Attacks through network technology will happen every now and then.

There were Internet viruses in the past, which was a means in the early stages of technology.

When the technology develops, it becomes a silent hacker attack.

Directly invade the database and usurp control of the network.

Of course, there are also ways to deal with this situation.

Eily strengthen network defense means, or arrange physical isolation means, etc.

The devil is one foot taller, and the Tao is one foot taller.

Network technology has also gradually developed and evolved in such confrontations.

Scott stood in the surveillance room with his arms held in his arms, looking at the situation on the screen, with a sneer on his face.

"No one, no country, can pose a threat to the Bald Eagle Federation!"

This cyber attack was an attempt hosted by Scott.

As an important organization of the Bald Eagle Federation, the staff here are also the elites of the entire Bald Eagle Federation.

Those who can participate in this cyber attack mission are also specially selected cyber hacking experts, and also helpers drawn from CIA and NSA.

The formation was extremely large, not just attacking the University of Science and Technology of China and the Luzhou Quantum Information Laboratory.

At the same time, many key colleges and key scientific research institutions in China have also launched network invasion attacks.

However, just as Scott expressed satisfaction with the cyber attack.

Suddenly.

The alarm sounded in the monitoring room quickly.

The next second, I saw a red light on the monitoring room.

The red light flashed, which immediately made the monitoring room a little relaxed.

The tension suddenly filled the entire monitoring room and network center.

How Scott didn't know what the sirens and the flashing red light meant.

"How is this possible?"

"Fak, where is the problem?"

" Block immediately and start retreating according to Plan B!"

" Destroy the springboard immediately and destroy the broiler record..."

At this time, the leaders of the network center also began to command in an orderly manner.

The programmers who can appear here are all elites from the Bald Eagle Federation.

I don’t know how many times I have participated in such cyber attacks, but I have become familiar with them.

Faced with the situation in front of you, there was not much tension or panic.

After all, China is also a big country. It has made breakthroughs in network technology, so it is normal to be counter-tracked.

The smile on Scott's face had disappeared, and a hint of coldness appeared in his eyes.

But I didn't have much worry.

Even if Hua Guo knew that this cyber attack was launched by them, it wouldn't matter.

First of all, China cannot break through their defense systems and will not pose any threat to them.

Secondly, even if China knows, this matter will not have any impact.

In the end, their actions have achieved results and have completed the task.

Just as Scott was thinking that.

The situation changed again.

The alarm sounded harshly, unlike before, and it stopped just after a sound.

But it keeps ringing sharply and sharply.

At the same time, the red alarm light flashed overhead.

At this moment, the atmosphere in both the network center and the monitoring room became extremely serious.

The alarm just now only proved that China had resolved their cyber attack and launched a counterattack.

However, the current alarm sound is indicating that China is already following the traces of the Internet and conducting reverse traces.

Whenever you walk, there will be traces!

This is also effective in the virtual world of the Internet.

Conventional network attacks are to manipulate a large number of hosts to carry out DDOS attacks, SQL injection attacks, or buffer overflow attacks.

But no matter which one it is, it will actually preserve certain traces.

Whether it can be found depends on the technical level of the programmers on both sides.

The Bald Eagle Federation has always been the world's top network technology powerhouse, and the number of network technology hackers is also the world's largest.

In this regard, the Bald Eagle Federation has extremely strong self-confidence.

Even though the alarm sounds are coming one after another, everyone is not worried much.

At most, it's just a little more troublesome and doesn't have much impact. "In ten minutes, I will see it over!" Scott looked at the head of the network center coldly and ordered coldly.

When the white and fat person in charge heard Scott's order, he smiled confidently and said with a hint of flattery: "Mr. Lieutenant, please rest assured that I will complete the task within ten minutes! ”

After saying that, the person in charge immediately conveyed the order to his subordinates.

"I will end all this within eight minutes!"

As the order was issued.

The originally relaxed atmosphere of the network center was completely gone. "Come on, boys, let China see what real network technology is!"

"That's right, in the online world, we are God!"

"It doesn't take eight minutes at all. Give me five minutes and I can get rid of them."

"Damn fat pig, If I give me more time, I can put the worm I prepared into China and give them a little surprise..."

"Jack, don't worry, we still have a chance. , I believe that in less than two days, you can use these two days to design the little things you have prepared. "

"It's really a hard fight, there is nothing at all Challenging."

Many staff sitting in front of the computer said to others with a relaxed expression while staring at the computer screen.

They have carried out many cyber attacks in China.

A lot of results have also been achieved, so they did not take this cyber attack seriously. Even if they saw that China had solved their attacks in such a short time, they were not very nervous.

Now, I really became serious when I heard the orders of the person in charge.

The keyboard is crackling...

Delete log files, hide malware, destroy login records...

The steps are strict and orderly.

Time also passed by minute by minute.

Originally, everyone was just a little serious, but as time passed, their expressions gradually became ugly.

Because their previous methods that failed to work in a long period of time have not achieved any results.

The alarm still did not stop, and it even became more frequent.

In the monitoring room.

Scott saw it more clearly.

The most new ⊥小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小小

A huge screen is showing a map of the world.

A obvious and extremely red dot kept spreading towards the Bald Eagle Federation.

On this screen, you can clearly see the IP of the online broiler controlled by the Bald Eagle Federation.

They launched an attack on China through these layers of network IPs.

But now these broiler IPs have been found one by one.

And, following the Internet contact, we permeated towards the Bald Eagle Federation.

Even if you don’t understand technology, you can understand this through changes in the situation on the screen.

Scott's face suddenly became extremely ugly.

Even the person in charge next to him had a trace of cold sweat on his head.

"Mr. Lieutenant, please believe in our skills!"

The complex man asserted Scott. "It's better to do this. If something goes wrong, what consequences should you have!" Scott glanced at the person in charge coldly and warned.

The person in charge suddenly became firm and said, "Mr. Lieutenant, there will be no problem!"

"We are the uncrowned overlords of the online world!" >


After making the guarantee, the person in charge immediately returned to the network center.

Seeing the busy staff, the person in charge immediately arranged the task again.

"No matter what method you use, immediately block the reverse traceability of China."

Hearing the person in charge say this, someone immediately asked, "Then I can use it." Will the previous back door be blocked? "

"I have a small thing I prepared before, can I release it?"

"It's just a reverse traceability, there's no need to worry..."

The many staff members of the network center showed great confidence.

When the person in charge heard these words, he also showed a smile on his face, waved his hand, and said, "Take it now!"

However.

Just when everyone was excited to show their own secret skills and wanted to block the reverse traceability of China.

At this moment, the alarm sound of the network center became extremely shrill.

This moment.

A blood-red alarm popped up on all computer screens.

"The system is being attacked..."

When the system alarm appears, everyone's eyes widened.

You should know that they are now in the Pentagon and are one of the important institutions of the Bald Eagle Federation.

The system defense here is the most top-notch, looking at the world.

In the past, they carried out cyber attacks on other countries or regions, enjoying the pleasure of such systems being attacked and databases being randomly in and out.

As a result, such an alarm appeared in front of them now.

Scott doesn't need to show his power, and the person in charge does not need to yell.

The staff here were all in a state of tension and anger.

This alarm was like a slap, slapped hard in their faces.

How happy, proud, and proud they were before, then they are now as angry.

The crackling sound rang again, and every time I pressed the keyboard, it seemed like I was angry, and I wished I could break the keyboard.

But.

The alarm still did not stop. "Damn it, what the hell is this?" "What technology did China develop, and why the bait I released did not work at all!" >
"No, China shouldn't have such technology!"

"This is the network team of China, why hasn't it appeared before?"

"This must be the hidden cybersecurity team in China. It is actually hidden so well..."

"No, why is its learning ability so strong? It has seen through my methods..."

>
"Farke, it has invaded..."

"Damn, why is its computing power so powerful..."

As the confrontation, more and more The staff noticed something was wrong and began to exclaim.

With their exclamations, the invasion work has also reached a new stage. "No, start the security defense plan immediately!"

At this time, the person in charge suddenly thought of something and quickly exclaimed.

As this sentence sounded, the atmosphere at the Cybersecurity Center suddenly changed.

However, seeing that it was the order issued by the person in charge, the others did not hesitate and immediately started to take action.

Scott in the monitoring room looked extremely ugly at this time.

A good cyber attack operation, but it turns out to be like this now.

This is undoubtedly a huge failure!

Maybe, he will accept questions from the higher authorities later. If one does not respond well, he may have to take off his clothes.

At this moment, in Scott's heart, there was no time to think about where the strong network technology came from in China.

Instead, I am thinking about how to get rid of my responsibilities.

The eyes moved, and when they saw the fat and fat person in charge, a hint of firmness appeared in Scott's eyes.

Network Center.

As the security defense plan was launched, everyone felt relieved.

Then, afterwards, he became angry again.

They are people from the Bald Eagle Federation. They used to be called out in the Internet world, but now they are forced to open up security defense by the Chinese security team.

This is simply a great humiliation!

Just as everyone was thinking this way. "Why haven't the alarm stopped yet?"

Suddenly, someone pointed at the alarm light on his head and shouted loudly.

And the next second.

The alarm sound stopped and the light went out.

The heart that was originally raised suddenly relaxed again.

The next moment.

A sentence suddenly appeared on all the screens of the network center and monitoring room.

"Whether the sun and the moon shine, and the rivers reach, they are all Han territory, and the same is true for the Internet world!" (The end of this chapter)


Previous Details Next