The Technology Tree of Xueba

Chapter 61: influences

开始 The hacker attack started, and it attracted the attention of hacking enthusiasts. The announcement of Spark's suspension of services directly detonated the impact of this incident.

Netizens continue to leave messages on Xinghuo's official Weibo to support.

[One Life, One Life]: "When the Spark website was unreachable, I knew that something had happened. I did not expect that Spark was attacked by a hacker and was too serious to provide services. I hope that Spark experts will survive this attack and bless you. . "

[Smoke and rain hazy]: "Xinghuo Technology insists that the data center must not be compromised by hackers. If my data is erased, my wife Xianghua will not know me. I cultivated for many months and paid a lot of hard work to have this. Kind of tacit understanding. "

[Golden Bird in the Cage]: "I am using the Starring bracelet to write software for the Morningstar system, and the intelligent service I purchased has been suddenly interrupted, and the software writing work has been suspended. I am receiving a roar from the boss.

Xinghuo Technology, don't get into trouble. You represent my job. I don't need Morningstar system software, I will be laid off. "

The number one spot on Weibo ’s hot search list is also occupied by the topic of “hacking war”.

[Sword from the sheath]: "According to the hackers from China, some people offered a reward of 500 million U.S. dollars on the dark web to buy the artificial intelligence source code of Spark Technology, which caused such a large-scale hacking."

[Pork stew noodles]: "I hope Spark Technology can survive this hacking attack. I and they are a cooperative company. I understand Spark Technology's huge hardware strength. If they can't survive, no company in China can survive it. "

[Fat people are all beautiful]: "Huaxia's large LAN is useless. It can't prevent hackers from attacking. Does Huaxia have no hackers? Are there no network security experts? Why don't we fight back?"

[Sword out of the sheath]: "It ’s beautiful to reply to fat people. Why is there no one to resist? Our domestic hacker circle has been helping Spark Technology. Now even the third tiger and rabbit **** of the hacker supreme list has shot.

Without the restraint of the Tiger and Rabbit God, the Dark Snake, the No. 2 hacker supreme leader, has already breached the national grid system. There are now more than 5,000 people attacking Spark technology. We Chinese hackers cannot cope with so many people. More bite to death. "

With the development of the current situation, ordinary people can also feel the smoke of the silent battlefield of the Internet.

International hackers saw that Spark Technology could not break through like a tortoise shell, so they broadcast a large number of viruses onto the network, trying to destroy Huaxia's backbone network, causing chaos and invading Spark Technology.

Huaxia Networks Inc. is constantly being breached by servers.

Companies such as Pinduoduo, Douyin, Kuaishou, Today's Headline, Weibo, Jingdong, etc. have suspended their services in order, and only 360, Tencent, and Ali are the mainstream Chinese online companies.

Network engineer WeChat group.

[Jingdong Network Security Engineer]: "It's over. This attack was too fierce and the mall server was breached. We had to shut down the network urgently. Otherwise, JD Finance will be tampered with the data, and the trouble will be big."

[Weibo Network Security Engineer]: "This time the loss is very heavy, the country should take it! The hacker attack continues, and the loss is too great."

[360 Network Security Engineer]: "After the hacking incident, we were fighting with hackers. Suddenly a powerful virus invaded the server and deleted all the data directly. This virus tracked from the server to my computer and generated a little resistance. Thousands of viruses directly blew up the computer. "

[Tencent Network Security Engineer]: "Xinghuo Technology issued an announcement that mysterious hackers launched a virus. They have made a virus killing tool. The hard disk data deleted by the virus can be restored. The device damaged by the virus is powerless."

[360 Network Security Engineer]: "Everyone with a good eye can see that the virus launched by the mysterious hacker is the intelligent virus released by Spark Technology. The artificial intelligence technology represented by the virus is in the same vein as the artificial intelligence thought of Spark Technology."

Xinghuo's official website, directly released all the hacking reality data they obtained.

Park Jinsong: No. 2 Dark Snake on the Hackers Supreme List, a native of Seoul, South Korea, and a network engineer at Samsung Group.

Jamestine: No. 4 on the Supreme Hacker's List, Dark Gemini Lucifer, Californian, Network Engineer, Apple Inc.

Boli Scott: 6th in the Hacker's Supreme List, Dark Gemini Hades, Munich, Germany, Professor of the University of Berlin.

Brnovsky: The 8th sacred bear on the hacker supreme list, a Russian from St. Petersburg, and a captain of the Russian cyber warfare unit.

Li Jieke: No. 15 in the Hacker's Supreme List, Yantai, Shandong Province, Deputy Director of Computer Department, Yanjing University.

Uh ...

Weibo quickly started the backup server and resumed normal services. The topic of "hacking war" still topped the list.

[Little bird flying]: "This hacking war is fierce, government websites have been broken a lot, Weibo has stopped serving, and major domestic companies have suffered heavy losses this time."

[Blades out of the sheath]: "Xinghuo Technology showed a wave of operations. I didn't expect to explode all the well-known international hackers, but that was the 327 top hackers.

除了 These hackers have no other choice but to be safe by the relevant departments. Some criminals, such as the dark snake, can only squat in prison for a lifetime. UU 看书 www.uukanshu.com "

Not only is there a lively discussion on the Internet, the mainstream media in the world are also discussing the hacker war.

CCTV News: On August 3, due to the dark network launching a high reward, international hackers attacked the China Network, many well-known companies and government official websites were conquered. They also extended their sinister hands to the State Grid. High investment in the field has perfectly guaranteed the operation of the power system.

Global Times Weibo: Experts estimate that the hacking war will cause tens of billions of losses to the world and call for the establishment of an international network security system to jointly combat the dark web black production chain.

IT House: The hacking war caused the hard disks of more than 50,000 electronic devices in Huaxia to be erased, and more than 100 electronic devices were completely damaged, resulting in incalculable data loss.

New York Times: Huaxia releases a vicious network virus, causing a supercomputer in the United States to be completely destroyed, the data of 250,000 computers has been emptied, and more than 2,000 computers have been completely destroyed.

NNCNN: Huaxia develops intelligent network viruses, and they can completely destroy the US Internet. We must be alert to the threat of Huaxia on the network.

This hacking war destroyed two supercomputers, 10,000 electronic devices, and the data of more than 500,000 electronic devices were emptied by viruses, and the specific identities of 327 hackers were exposed.

The hacking war officially ended, Zhou Yu sharply commented: "This hacking war has won the prestige of our Spark technology and can guarantee at least 5 years of network security."

黑客 The long-term impact of this hacking war has prompted world powers such as China and Russia to step up their investment in artificial intelligence technology and build new network protocol standards. Huaxia also decided to thoroughly popularize the quantum communication backbone network in key areas such as education, finance, and military.

The short-term impact is that the Chinese programming tools of Morningstar System suddenly exploded, and a new kind of programmer was born.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like