Agriculture Maniac
Chapter 232 You are so outstanding, it makes me feel very stressed
Chapter 232 You are so outstanding, it makes me feel very stressed
Fort Meade, Maryland, North America.
NSA.
This is a complex of buildings that far exceeds the CIA headquarters.
Within the company, there are 6.8 people skilled in code breaking, language translation, and electronic technology.
It also has more than 4000 monitoring stations, more than 200 spy satellites, and more than 300 supercomputer systems around the world that can monitor 100 million calls simultaneously.
It can be said to be the largest monitoring center in the world today.
It is not only responsible for monitoring important targets in North America on a global scale, but also for monitoring the telephone business of the North American masses, and monitoring network activities in North America and around the world through the second key of the win system - NSAkey.
During the Klin administration.
Influenced by the Smith family, the NSA conducted large-scale monitoring and wiretapping of Sanyuan Agriculture.
For example, the technicians who accompanied Mrs. Smith on her first visit to Shiliying grafted 'eavesdropping branches' onto several large trees.
The device looks like an ordinary tree branch, but it can monitor sounds within a radius of 10 kilometers.
Another example is to remotely control some tourists to throw some bean-like eavesdropping devices into some areas that are not often cleaned, but these devices can prevent birds and animals from swallowing them.
But Yu Sanyuan seemed to know all this. He never discussed corporate strategies with think tanks and did not even set up a think tank.
In addition, certain words, such as praise the lady and thank the lady, could not be conveyed to Mr. Smith.
As a result, the NSA's monitoring and wiretapping of Sanyuan Agriculture provided very limited help to the Smith family.
Now that the Clinton government is about to be dissolved, the NSA has turned to the Bush family in advance in order to obtain more funding and resources.
And according to Lao Bu's instructions.
The NSA needs to invade, steal, and paralyze Sanyuan Agriculture’s computer system in a short period of time.
Normally, this would require the use of a large number of hackers.
However, the advent of graphics card matrix has made it difficult for traditional hackers to participate in the game of large capital.
Because hacker techniques include targeting target websites - watering hole attacks, blocking server resources - DoS attacks, forging emails or URLs - spoofing attacks, hiding codes - Trojans, and implanting codes into vulnerabilities - script attacks...
But no matter which one, even if the virus program is written, it still needs to lurk and spread.
It even requires a large number of simple and tedious operations, constantly looking for website loopholes, constantly changing IPs to prevent tracking, and constantly commanding teammates to coordinate attacks.
The graphics card matrix is made up of tens of thousands of graphics cards. If a program is written and distributed parallel processing technology is used, it is equivalent to tens of thousands or even hundreds of thousands of hackers attacking one point at the same time within a few tenths of a second.
Or.
Hackers are like a group of stock investors buying lottery tickets. If they want to win the jackpot, they need to go through massive calculations to come up with a probability value, and they may not succeed in the end.
The graphics card matrix is like tens of thousands of people buying lottery tickets at the same time.
And tens of thousands of people are buying lottery tickets at the same time.
Even hundreds of thousands of people buy lottery tickets repeatedly at the same time.
Who is faster?
Who has a higher chance of winning?
In addition, the graphics card matrix can also act as a firewall for the server, forming tens of thousands or even hundreds of thousands of lines of defense.
Even if someone organizes hundreds of thousands of hackers and spends a lot of time and effort to break through this defense, it can still reconstruct tens of thousands or even hundreds of thousands of defenses in a few tenths of a second.
Therefore, the graphics card matrix is not a product that humans can handle at all.
It can even be said that it has rewritten the history of computers.
Therefore, considering the importance of the Eastern market, North America awarded the Pingdong Science and Technology Bureau the highest honor in the computer field - the Turing Award.
When the NSA, under the instruction of Bush, attacked the Sanyuan Agriculture computer network, it must have first considered the graphics card matrix of the Pingdong Science and Technology Bureau.
Otherwise, traditional hacking methods would be used to alert the other party, and the data from the graphics card matrix would flood into the NSA headquarters. The NSA firewall without the graphics card matrix would be breached in an instant.
By then, computer systems, various databases, and various dedicated websites will collapse.
To this end, the NSA mobilized a large amount of resources to obtain backdoors reserved by graphics card manufacturers, motherboard manufacturers, chip manufacturers, etc., directly causing damage to the electronic equipment of the Pingdong Science and Technology Bureau.
After confirming that the graphics card matrix there was completely paralyzed, the NSA used hacking technology to attack the networks, websites, and servers of the three industries.
...
NSA command center.
The head of the NSA, Michael Hayden, then 56, stood in the hall wearing glasses and looked up at the dozen or so spliced screens that were constantly flickering.
"Success?"
"Yes, Director. We have obtained the encrypted data string containing characters such as ballastless track technology and steel recycling technology. We are currently attacking the internal network of Xintai City where Sanyuan Pharmaceutical is located. Perhaps we will soon be able to obtain Sanyuan Agriculture's genetic optimization technology from the server there."
"Good job!"
Michael Hayden nodded and took out a document. "Make it public."
If the NSA uses hacking technology to break through the firewall of Pingdong Science and Technology Bureau, the NSA can use the excuse of "I am not a hacker" to shirk responsibility.
However, since the NSA uses the manufacturer's backdoor, North America will inevitably have to release some sensational news in order to confuse the public without exposing the existence of the NSA and the manufacturer's backdoor.
It just so happens that since last year, hackers in the East and North America have been attacking each other due to various practical issues.
The attack on Sanyuan Agriculture can be described as "Eastern hackers attacked the website of a North American security agency, and the North American security agency fought back, accidentally injuring Sanyuan Agriculture."
As for whether to ask for compensation...
That's Bush's business and has nothing to do with the NSA.
A little bit.
NSA's superior, North American Defense Systems, disclosed the news of the 'hacker war'.
The news not only pointed out the North American hacker group headed by GP, but also pointed out the Eastern hacker group headed by the Red Hacker Alliance. At the same time, it announced that the alert level of North American network information security has been temporarily raised.
A warning was subsequently issued to Sanyuan Agriculture.
North American Defense News Spokesman: "Just now, we intercepted several messages that the hacker alliance intends to seize the graphics card matrix of Pingdong Science and Technology Bureau. Here, we hope that Sanyuan Agriculture will respond as soon as possible and make the greatest efforts for world peace and development..."
……
the other side.
The head of the Pingdong Science and Technology Bureau felt like the sky was falling when he saw the graphics card matrix with four-fifths of it damaged.
After all, this graphics card was made by someone else at great expense of his assets.
Now that so much has been destroyed, he must be held responsible.
Of course, what people living in Shiliying are most worried about is not their own future, but the fact that without the graphics card matrix, Sanyuan Agriculture’s servers would be defenseless.
The enemy's intention is obviously three-yuan agriculture.
He can be dismissed and investigated, but his wife and children cannot be without a future.
The head of the Pingdong Science and Technology Bureau hurriedly took the factory's emergency rail car and rushed to the northern suburbs of Fei City.
When he walked into the chairman's office at the International Conference Center, he looked up and saw the spokesperson of the North American Defense System crying thief.
"Damn capitalist imperialism!"
Then he looked at Yu Yang.
"Mr. Yu, according to the damage details, it should be that the North American hardware manufacturer provided a backdoor to the illegal organization. The backdoor allowed the user mode (ring 3) code to bypass the system protection mechanism, forcibly freely read and write the kernel mode (ring 0) data, and contaminated the deep embedded instruction set (DEIS), which eventually caused the hardware to overload and heat up and be damaged."
"We should protest North America's use of military resources to engage in and attack our companies."
“And demand that the hardware supplier compensate the Pingdong Science and Technology Bureau for all losses, including those of Sanyuan Agriculture.”
Yu Yang picked up the handwritten materials and handed them over. "Will protesting be useful? If it was useful, we would have protested early in the morning."
"..."
"Hold a press conference and publicize the contents of the paper as soon as possible."
The head of the Science and Technology Bureau looked down and said, "Thank you for the intelligence provided by North America? We will work closely with North America to combat cybercrime and other illegal organizations?"
"Ah."
"This, this... We suffered such a huge loss, isn't this too pathetic?"
"In terms of losses, after an hour, they were much larger than us."
"???"
The head of the Science and Technology Bureau was stunned for a moment, then hurriedly agreed. Just as he was about to turn around and leave, he suddenly stopped and said, "Director Yu, can I make the announcement?"
"Yes."
"What is my position? It doesn't match the North American Defense spokesperson."
"Yes, then how about this? You find the person in charge of the publicity system of Shiliying Sub-district Office, who was the former director of the Investment Promotion Office, and ask him to select a spokesperson with a good image from the publicity system of the Sub-district Office to read out the manuscript."
"what?"
"Your rank is too high, and the rank of the director of the investment promotion office is also quite high. We can only use this compromise method."
"..."
"They are just a makeshift team, there is nothing to be afraid of."
"..."
Fifteen minutes later.
The spokesperson of the publicity system of Shiliying Sub-district Office, a female college student who just graduated from Oriental Drama Academy, held a press conference on the hacker attack incident.
"First of all, on behalf of the Shiliying Sub-district Office and Sanyuan Agricultural Headquarters, I would like to express my sincere gratitude to the North American defense system for issuing the early warning notice."
"We also informed North America's defense system that our police station will closely cooperate with North America to combat cybercrime and other illegal activities. At present, our police station has tracked down the suspected IP address that is carrying out sabotage."
"We will launch a comprehensive hunt for hackers in 40 minutes and work hard for world peace!"
.........
at the same time.
The electronic technicians of NSA have been like a swarm of bees, breaking through the trade hall, Sanyuan Agriculture, Sanyuan Construction, Sanyuan Building Materials, Sanyuan Heavy Industry, Sany Soybean Oil, Shili Mall and a series of Shiliying headquarters enterprises with great momentum.
Now they are holding a large number of zombie computers, or puppet computers, hostage and sending them through the Tai City network to the Xintai City intranet.
The NSA's code breakers have already begun processing the three sets of encrypted data obtained from the Shiliying headquarters.
NSA director Michael Hayden sneered when he learned of the statement made by the Shiliying Sub-district Office.
"Tracking the suspect's IP?"
"What a joke, that might not be a disguised IP."
"Give you twenty years, can you track me down?"
The words are not finished yet.
The NSA electronic technicians who broke through the Xintai City firewall just cheered loudly, but suddenly, the sound stopped.
next moment.
The computers in the NSA lobby all popped up blue pages.
Then, rows of familiar codes quickly popped up...
"Report, our computer system has been hacked."
"Report, our key is being cracked, but the other party's progress is very slow. It is estimated to take... 20 years?"
"Report, our server memory is being used, but the usage rate is extremely low, about 15MB per second, which can rule out the impact of data floods..."
Michael Hayden lit a cigarette. "Tell me, what happened?"
"Report: We have discovered a very large cluster IP in Xintai City. Preliminary estimates show that it has at least 46 independent IP addresses."
"New graphics matrix?"
Michael Hayden frowned slightly.
The graphics card matrix can definitely break through the NSA firewall.
But he was not panicked because the NSA had a large number of backup servers.
Even if the graphics card matrix can be broken through one by one, it will take some time.
In addition, all NSA data is encrypted in multiple layers, and is embedded with programs that can forcibly crack keys and cause important data to self-destruct.
At this time, the hidden graphics card matrix was discovered, and it might even be the most important server of Sanyuan Agriculture...
"It's a hidden graphics card matrix. What a good opportunity. First cut off the power and the Internet, then start the emergency server and track this big guy. I want to destroy it!"
Accompanied by voice.
The characters on the blue screen jumped more frequently.
The lights above my head also began to flicker due to excessive power consumption and unstable voltage.
Immediately, the entire hall fell into darkness. Then the backup power supply started...
The computer screens that were originally off suddenly restarted, turned blue, and continued to jump code.
"Fuck!"
"Cut off all power!"
at last.
NSA headquarters, all plunged into darkness.
The only remaining light is the green warning light in the emergency passage.
for a long time.
NSA Director, Michael Hayden, "Activate emergency plan, counter tracking!"
five minutes later.
"Report, the administrator computer of the emergency system requires a password."
"Password? You ask me?"
"But it does require a password, otherwise we can't activate the emergency plan."
Upon hearing this, Michael Hayden hurried to the emergency center, found the administrator's computer, and discovered that there was indeed a prompt on the screen: Please enter your password.
He pondered for a moment, took out the handover documents of previous responsible persons, and looked for relevant records.
Unfortunately, they are all marked: No password.
Nonsense, how could the administrator computer of the emergency system be password-protected?
After all, the NSA's firewall, as well as its backup firewall, is the strongest defense for the entire agency.
If someone can break through the NSA's many firewalls, this emergency system within the NSA will be useless.
So it doesn’t matter whether you set a password or not.
Furthermore, if a password is set, important things may be delayed.
Such as now.
"password!!!"
Michael Hayden roared, calling on the elite codebreakers, "Get it done!"
Two minutes later.
The NSA's code breakers are truly talented.
Soon they came up with a set of codes that were a mixture of Japanese, Korean, Thai, and various punctuation marks, and the whole thing looked like garbled code, with more than 300 digits in length.
After input.
[Password is correct]
[Please enter password]
"???"
The NSA codebreaker was slightly stunned and re-entered the message.
[wrong password]
"???"
NSA codebreakers, enter again.
[Password is correct]
[Please enter password]
"It's a double code. We need to decipher it again."
Another ten minutes later.
[Password is correct]
[Password is correct]
[Please enter password]
"Three-level password?"
for a long time.
Technicians disassembled the hardware of the emergency system administrator's computer for testing.
"Report: The main components, especially the memory, are all set with 46 levels of encryption. It will take about... years to decipher it."
"..."
soon.
The office computers in the hall, including NSA servers and backup servers, have been tested one after another.
"The report, the status is exactly the same as the emergency system administrator's computer, and a password is required."
Upon hearing this, NSA director Michael Hayden was stunned.
"Is there still such an operation?"
But this operation is indeed the most difficult.
Or.
If Sanyuan Agriculture's hidden graphics card matrix breaks through the NSA firewall and steals data, the NSA computer system can use the self-destruct program to scrap all computers from the software and hardware layers, and then ask the gentlemen in Congress for money to purchase new computers.
In this way, Sanyuan Agriculture could not obtain any data and also helped NSA complete the replacement.
but now……
Sanyuan Agriculture used a hidden graphics card matrix to replace the NSA's firewall and built hundreds of thousands of firewalls. Is it trying to tell the gentlemen in Congress: We can't crack it?
NSA director Michael Hayden lit a cigarette with a grim face, and suddenly a group of funny pictures from the East emerged in his mind.
An office worker was worried that his bicycle would be stolen, so he bought a lock and locked it to a roadside telephone pole.
The other party thought this was foolproof, but when he returned from get off work, he found that his bicycle had been locked by dozens of others.
And even the parts are locked.
At this point, do you find a locksmith company or give up the bike?
If you look for a lock-opening company, the only one that can do that is probably Sanyuan Agriculture.
If I give up this bicycle, my family, that is, the gentlemen in Congress, will definitely scold me like a dog.
"Damn Yu Sanyuan!"
After NSA director Michael Hayden finished cursing, he suddenly remembered something, "Satellite!"
"Report, password required."
"Fuck!"
"Including the ground receiving station, a password is also required to open the door."
"F~~~"
NSA director Michael Hayden was halfway through cursing when he remembered something again, hurried to the door and pressed his fingerprints.
[Please enter password]
"Grass!"
for a long time.
More than a dozen fire trucks from North America's 911 emergency response arrived at the NSA headquarters, chattering.
Because the confidentiality standards here are too high, simple tools cannot break through the anti-eavesdropping electric doors and windows and the anti-eavesdropping steel-concrete walls, and blasting must be used to rescue the 6.8 people trapped inside, who have no electricity, no water, no food, and are even having difficulty breathing due to the shutdown of the fresh air system.
It would take time for the National Guard to arrive, so the NSA had no choice but to call the police.
(911 calls did not originate from plane crashes into buildings)
……
Texas.
Bush soon received a brief update on everything the NSA had been through.
The first thing it thought of was not to fight back, but to launch computer system protection software based on the graphics card matrix of the old Bush family.
Although few people know the NSA, and few people know the inside story of this hacker war, top capitals certainly know.
Perhaps old Morgan and the oil tycoon, who also own a graphics card matrix, would not bother to develop protective software.
But old Smith would definitely not give up such a good opportunity to make money.
Especially since the other party controls a large number of news media in North America, if they launch protection software and then expose the inside story of the hacker war...
Old Bush put the NSA aside for the moment and quickly called his assistant to discuss a plan to set up computer protection software.
He had a hunch that after this incident, all existing protection software vendors in the world would face bankruptcy.
The only remaining related companies are the large capital groups that own the graphics card matrix.
“Nasdaq is going to fall!”
After a while.
"Mr. Bu, just half an hour ago, the chairman of the Tijuana Shipyard, David Ensig, shorted the Nasdaq and bought the bottom again."
Old Bu was slightly stunned.
The Nasdaq is going to fall because computer protection software vendors are about to go bankrupt on a large scale.
But Nasdaq will continue to rise, and rise sharply, because two major capitals in North America are about to enter the market.
"Why does David Ensger have such a keen sense of smell?"
The first person Lao Bu thought of was Yu Sanyuan’s man.
But he was the one who initiated this hacker war. Even Yu Sanyuan could not have predicted it, so how could he have predicted that the Bush family and the Smith family were about to set up a protection software company?
"Amazing guy!"
……
new York.
Old Smith's reaction finally surpassed that of Old Bull.
He immediately notified the Genetic Engineering Laboratory and took advantage of the open hacker war in North America to use the Smith family's graphics card matrix to hack into Microsoft servers.
Then they recruited technical personnel to set up a protection software company, produce protection software ads, publicize the NSA encounters, and expose rescue footage...
"Sure enough, war makes mankind progress."
"After playing against Yu Sanyuan for so long, I found that I am becoming more and more proficient in business management."
Old Smith sighed, and mobilized the power of North American Jews to take the lead in launching an attack, destroying the graphics card matrix that the third brother had just built.
Almost at the same time, the old Bu family also used its own power to destroy several graphics card matrices in the European region.
When it comes to capital monopoly, the two have an amazing understanding.
……
International Conference Center, northern suburbs of Fei City.
Yu Yang searched overseas news to check what was happening in North America.
Originally, it planned to retaliate by breaking through the NSA firewall, activating the opponent's self-destruct program, and destroying all NSA computers and databases.
But the incident happened suddenly, and the new graphics card matrix was far from the level of AI hackers, and could not even be called elementary artificial intelligence.
At most, it is a server group that has powerful computing power and can find system vulnerabilities on its own, but cannot exploit the vulnerabilities to launch hacker attacks.
Therefore, he suddenly had an idea and thought of locking the bicycle.
So after finding the loophole and breaking through the NSA firewall, they did not exploit the loophole, but instead continued to help the NSA stack up armor, build enhanced firewalls, and set more secret keys.
During this process, I discovered a very interesting organization called DARPA by searching the information in the NSA office area.
If it were to be used in a science fiction film or TV show, it should be called S.H.I.E.L.D.
The other side not only has airborne laser weapons, but also has a wolf pack intelligence system.
As well as hypersonic aircraft, X-37 space demonstrator, switchblade drones, autonomous ground vehicles (unmanned vehicles), using small launchers to launch satellites in parts, and then assembling large satellites in space...
The organization's slogan is: Change the future, change the world.
Among them, the "Switchblade Drone" can be hung with a small, high-precision air-to-ground missile.
There are currently twelve deployed in the Asia-Pacific region, with the combat target being Yuyang.
But these are not the most important things.
The other party actually artificially synthesized the "polio virus" similar to the Resident Evil.
And using a secret graphics card matrix, a Terminator-like Skynet artificial intelligence defense system is being trained.
They are even training automated attack and defense systems similar to the "program killing program" in The Matrix, or situational awareness robot hacker systems.
“Art comes from life. Maybe the inspiration for The Matrix came from here?”
"Fuck, you guys are so outstanding, it makes me feel very pressured."
Yu Yang picked up a bottle of Scream, drank half of it, and thought about what else he hadn't used yet.
Otherwise, we really can’t win.
(End of this chapter)
You'll Also Like
-
Restarting the myth.
Chapter 546 3 hours ago -
The martial arts immortals in the modern world.
Chapter 632 3 hours ago -
Back to 1978
Chapter 239 3 hours ago -
All People's Abyss: My skills are infinitely enhanced
Chapter 961 3 hours ago -
Destiny is ashes
Chapter 847 3 hours ago -
This actor just wants to verify.
Chapter 1069 3 hours ago -
Uncle from a poor family
Chapter 585 3 hours ago -
I didn't want to be an actor
Chapter 845 3 hours ago -
I'm a demon cultivator
Chapter 313 3 hours ago -
Extraordinary North America: Where are the magical partners?
Chapter 378 3 hours ago