The Technology Tree of Xueba

Chapter 60: Hacking (below)

下降 After the hacking intensity dropped, Zhou Yu and Zhang Yunqiang led the backbone team to the Yanjing Data Center together with the data center's network security experts to defend the server.

Zhou Zhouyu encouraged the network security team: "We have determined that the other party does not have a supercomputer by analyzing the attack methods of the other party.

I want to use my laptop to defeat supercomputers. This only happens when the king beats bronze. We are not so different from hackers.

Your task now is to teach hackers a lesson and let them know that our Spark Technology is not a mess.

Let future hackers avoid our company when they see us, otherwise they will stick to us like kraft sugar and it will also involve our energy. "

"Everyone knows what Mr. Zhou means. I will lead you to stop hackers, and our teamwork will be more efficient.

Artificial Intelligence Xiaomi can also develop corresponding tools to help us according to the real-time situation of the online battlefield, and the final victory will definitely belong to us. Zhang Yunqiang said confidently.

Data center security experts issue instructions according to the situation, and Xiaomi constantly mobilizes supercomputers to perform corresponding actions or write programs.

云 While managing the security team, Zhang Yunqiang also reported the situation on the cyber battlefield like Zhou Yu.

"There are two hackers attacking us. Their technology is much higher than mine. They should be internationally renowned hackers. One hacker is mainly responsible for defense and the other hacker is mainly responsible for attacking."

"We have dragged the hacker responsible for the attack and are tracking his IP address."

不好 "No, the server is experiencing increased attacks. It is not a regular broiler attack. There are thousands of hackers trying to attack our server. The number is still growing."

At this time, Xiaomi also knew: [Someone who has searched the dark web for a reward of US $ 500 million rewarded our company's artificial intelligence source code. 】

Zhou Yu looked stunned and said: "Sure enough, they are not afraid of hackers in Xinghuo Technology. Xiaomi can block them with the Pangu No. 1 supercomputer, but this company's $ 500 million reward will definitely be tempted by some employees.

Fortunately, he has no confidence in the human heart and never tries to test it. The artificial intelligence source code is only known to him and Xiaomi. Xiaomi itself is an artificial intelligence that will never leak. "

Zhang Yunqiang smiled bitterly: "I did not expect that the artificial intelligence source code is so valuable. 500 million US dollars is a huge amount, enough to make all hackers rush.

Mr. Zhou Zhou, I applied for a data center to launch a Class A defense solution, suspend all artificial intelligence services, and concentrate all resources to survive this fierce attack. "

Zhou Yu nodded and agreed: "This situation can only ensure our data security as much as possible, and I agree to start a Class A defense program."

"Xiao Mi, the data center has launched a Class A defense solution and pushed the message to all smart devices." Because of a large number of hacking attacks, in order to protect your data security, Spark Technology has temporarily stopped network services for you and has stored your ongoing processes. " . "

Xiaomi: [Enable the super permission function, please verify the permission. 】

Zhou Yu verified the biological data of the iris and electromagnetic field of the human body through the Xingling bracelet.

Xiaomi: [Verification passed, a data center Class A defense solution is being launched. 】

[Take over all computing resources to write programs that respond to intrusions. 】

Dark web hacker gathering place.

"There have been more than 3,600 hackers attacking Spark Technology, but Spark Server's servers remain motionless. Artificial intelligence is really so advanced."

"It's worthy of being a company that can receive 500 million rewards. It can prove the strength of Spark Technology only by relying on it to survive the attacks of most hackers in the world."

圣 [Sacred Bear]: "I conquered the intranet of the Huaxia Ministry of Science and Technology and found an interesting piece of information. How can we, the skirmishers, conquer Spark Technology?"

He immediately released the stolen data, which showed the performance of the Pangu No. 1 supercomputer, and the number of supercomputers configured in each data center of Spark Technology.

"I rely, how can we fight so many supercomputers with our laptops, and the computing resources are not in the order of magnitude. No wonder Spark Technology has defeated us."

[Dark Snake]: "Baga, so many of us were blocked by the company Xinghuo Technology. Even Google can't stop our attack. This is too shameful. You are too wasteful. Below is my performance. Moment. "

"Idol, the darkest snake in the hacker rankings."

"Dark Snake Great God is best at attacking from sideways, walking through power networks, creating fires, and releasing hugely destructive network viruses."

Spark Technology Data Center.

Xiaomi: [Alarm, it was found that the attacker edited the weak electric signal attack through the wire, and it had been intercepted. It was suspected that the other party had invaded the national power grid system and was alert to the power supply. 】

Wu Zhouyu immediately commanded: "Contact the State Grid immediately and their system was attacked and asked if technical support was needed.

Engineers have prepared emergency backup power, and must ensure data security. "

Xiaomi Mi: [Broken chicken that has been attacked by hackers has been traced through the network and is searching for his IP address. 】

首 Seoul, South Korea, a bald middle-aged man with glasses, seeing information displayed on a computer, his broiler is about to be broken.

"Forced me to zoom in for Smeda."

放在 Place your right index finger on the Enter key and press it down.

警报 "Alarm, Yanjing Data Center lost power supply, emergency power supply was started to maintain storage matrix operation, super computer minimum power standby, is using Shanghai Data Center and Bayu Data Center to resist."

"The feedback from the State Grid has been received, and the system has been cracked, causing the transformer in the Daxing District Hi-Tech Park to be damaged. They have activated a backup emergency system. The repair team needs 5 minutes to restore power."

Xiaomi Mi: [Discovered supercomputer admission, through network packet analysis, supercomputers are located in New York and Tokyo. 】

Zhang Yunqiang anxiously said: "The number of hackers has reached 13,000, the number of broilers has reached 500,000, and supercomputers have joined.

Only with the remaining supercomputers, the risk of us being attacked has reached 30%. Hackers have begun to attack the websites of governments and major companies, the national grid system, and telecommunications network systems.

When the National Grid was breached, they immediately disconnected the network interface with the outside world. They now have no problems. Companies such as Pinduoduo and Weibo can no longer provide services. "

Zhou Yu's eyes became sharp, and he was determined: "You can't let these hackers be too embarrassed, let the smart virus sweep the stars out."

云 Zhang Yunqiang said unwillingly: "General Manager Zhou, the power of the broom star is too great, and it is not good to release it. When the Yanjing data center resumes power supply, and give me a period of time, we can definitely determine their identity."

"We can afford to wait, others can't wait. When the hacker breaks through the national grid system, the loss will be terrible." Zhou Yu waved his hands.

"Xiao Mi, release the smart virus broom star." Zhou Yu issued a command. UC Reading www.uukanshu.com

Xiaomi Mi: [Releasing smart virus broom star. 】

Dark web hacker gathering place.

"This is a feast for hackers, we haven't acted together for a long time."

不好 "No, why are there fewer and fewer people attacking Spark Technology?"

"Oh my God, a stream of data is following me, my computer is poisoned, and I'm finished."

[Dark Snake] "How can this be, someone has broken my laptop firewall, oh my god, why are there so many diseases ..."

云 Zhang Yunqiang saw the hackers attacking the server disappear one after another, and he sighed: "The broom star is indeed an intelligent virus. Action on the network will inevitably leave traces. It can track all data streams.

Whether it is a camouflaged broiler or a real hacker, it directly attacks all devices without distinction.

The broom star can automatically analyze software and hardware vulnerabilities, and now there is no way to protect it.

It instantly formats all data on the hard disk through software loopholes and generates junk data to interfere with data recovery of the hard disk.

If someone prevents the broom star from executing this program, it directly starts generating various virus attack devices, which can generate hundreds of new computer viruses in one second.

让 The CPU and hard disk are directly scrapped by hardware viruses, and the data in the hard disk is also sent to the outside.

再 No matter how sophisticated a hacker is, the computer won't work. "

Zhou Yuzhizhu shouted: "Being killed by the broom star is only a small fish and shrimp. A hacker who can temporarily block the invasion of the broom star is the big fish.

Xiaomi, sorted the data returned by the broom star, and published the information of those well-known hackers.

Let all those who walk in the black zone be exposed to the sun. I want to let hackers worry about hearing the name of Spark Technology in the future. "

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like