Rebirth in 1985
Chapter 901 Hacker Attack
Chapter 901: Hacker Attack
Lu Shaohua's perfect plan is the three-step elimination. It seems that the three-step elimination is very simple, but who can be as closely linked as Lu Shaohua thought! In addition, Lu Shaohua still relies on the strength of the Tiger Roar Base. For example, when hunting down other strongholds of terrorist organizations, Lu Shaohua uses the strength of the Tiger Roar Base as a benchmark.
Just imagine, if Lu Shaohua didn't have the Tiger Roar Base, could Lu Shaohua still come up with such a plan? The answer is very clear. Without the strength, Lu Shaohua naturally wouldn't think about it.
But then again, if Lu Shaohua didn't have the support of the Tiger Roar Base, he wouldn't be able to come up with such a foolproof plan, because without the strength of the Tiger Roar Base, it wouldn't be a foolproof plan, and there wouldn't be this trilogy of annihilation.
The problem lies here. Precisely because Lu Shaohua has this ability, Lu Shaohua successfully came up with a plan and ordered Qian Qian to cooperate with the second prince. The two sides should take joint action to try to eliminate all terrorist groups in Saudi Arabia as soon as possible.
Of course, necessary arrangements are still needed before taking action, and arrangements take time. It is destined that the action cannot be started in a short period of time. At least, the action cannot be launched within a week.
But Lu Shaohua can wait. He has waited for so many years. Why bother about this little bit of time? It will pass in the blink of an eye.
Yes, time passed in the blink of an eye, and Lu Shaohua really didn't need to be in a hurry. However, when Lu Shaohua thought he could have some free time, trouble arose again, and Lu Shaohua could no longer have some free time.
Phoenix Bank’s network system was attacked!
Yes, it was just an attack, and it was not breached, but even so, it was enough to make Lu Shaohua less serious. Phoenix Bank has been established for more than ten years. In the past, there was no network system, but with the development of the Internet, Phoenix Bank's network system was also established.
But Phoenix Bank's network system has never been attacked after being established for so long. Oh! No, it's not that it has never been attacked, but the intensity of the previous attacks was not great, unlike this time, which was a large-scale attack.
What does it mean when a bank's network system is attacked? If it is breached, the user information in Phoenix Bank may be obtained, and the money in the account may be transferred at will.
Fortunately, by the time Lu Shaohua received the news, the bank's network had not been hacked and was still being defended desperately.
Without further ado, Lu Shaohua took out his cell phone and made two calls. Then, without caring about anything else, he asked Li Shangkui to prepare the car and quickly rushed to the headquarters of Phoenix Bank. Lu Shaohua wanted to see for himself what was going on.
In his previous life, Lu Shaohua became the technical director of an Internet cafe. Although he was self-taught, it did not mean that Lu Shaohua knew nothing. You have to know that a formal and large Internet cafe has competitors. It is normal for competitors to attack each other through various means and make the other party's Internet cafe unable to operate.
Intrusion and destruction are common occurrences, so Lu Shaohua, the technical director of the Internet cafe, naturally has to be able to deal with them and defend against them. Therefore, Lu Shaohua knows a little bit about hacker intrusions.
Soon, Lu Shaohua arrived at the scene in person and asked the staff to switch the bank's host display to the large screen. Looking at the streams of data constantly impacting the defense line of the Phoenix Bank system, Lu Shaohua couldn't help but feel angry.
"Track them for me. Track the real IP addresses of these people." Lu Shaohua ordered fiercely.
That's right, Lu Shaohua was talking about tracking "this group of people", not tracking this person. Judging from the attack intensity of the data stream, Lu Shaohua quickly determined that the people involved in the attack were not one person, but a large group of people.
Lu Shaohua knew very well that this group of people were very powerful as they dared to blatantly attack the network system of Phoenix Bank. However, they would be wrong to underestimate the security department of Phoenix Bank. As staff members of the network security department of a bank, how could they be incompetent!
Moreover, Lu Shaohua was a person who traveled from the future, so he naturally knew how powerful the profession of "hacker" was. How could Lu Shaohua not be prepared? Therefore, when the network system of Phoenix Bank was opened, Lu Shaohua had already summoned many powerful technical backbones to join the network department in order to prevent the bank's network system from being attacked.
Furthermore, Phoenix Bank’s network system is installed with Phoenix Security Company’s latest firewall, which is a very powerful firewall. If you want to enter Phoenix Bank’s network system, you must break through this firewall.
However, judging from the current situation, the defense line named Phoenix Firewall is still very solid and stable, with no signs of being breached. However, Lu Shaohua knows that if it is still attacked by such a strong data flow, it is only a matter of time before it is breached.
However, Lu Shaohua was not worried at all. His order was not to defend, but to track the other party's real IP and try to find out the other party's true identity.
Not defending? Tracking instead?
This order seemed ridiculous, but since Lu Shaohua had issued such an order, it was not a joke, nor was it ridiculous, because Lu Shaohua had already made two phone calls when he received the news, one to Shenzhen and one to Africa, ordering computer experts in these two places to gather and participate in this action.
Comparing hacker skills? If you want to compare hacker skills with Lu Shaohua's Phoenix Group, you are totally wrong. Not to mention that there are many hacker experts working in Phoenix Network Company under Phoenix Group in Shenzhen, the hacker experts of Huxiao Intelligence Network alone are all awesome.
Now, Lu Shaohua ordered both places to take action. It seems that Lu Shaohua wants to make a trap and make the other party unable to return. By the way, he wants to investigate the true identity of that group of people and see if there is anyone behind the scenes.
As Lu Shaohua's order was issued, the staff of Phoenix Bank's security department worked quickly, constantly tracking the other party's real IP.
However, the group that attacked Phoenix Bank's network system did not stop and continued to attack the firewall. However, this time, no matter how they increased the data flow or used other means, they could not cause any trouble to the Phoenix firewall.
On the contrary, with their impact, the Phoenix Firewall has become more and more consolidated. Don't get me wrong, it's not that the firewall has intelligence and can evolve on its own, but that people from Shenzhen came in and joined the defense, strengthening the defense of the Phoenix Firewall.
"Chairman, the other party seems to have realized that they can't break through our firewall and seems to want to evacuate." said a young man wearing glasses, who looked gentle but looked a little weird because of his messy hair.
This person is none other than the director of the security department of Phoenix Bank. He is also a computer expert who is proficient in both hacking and red hacker techniques.
"Hit them, try to buy time, don't let them escape." Lu Shaohua gave the order fiercely, and then added, "The people in charge of tracking, speed up, and make sure to find them before they evacuate."
In Lu Shaohua's opinion, if anyone dared to attack the network system of Phoenix Bank, they would be enemies with Phoenix Group and him, Lu Shaohua. Since he was on the other side, Lu Shaohua didn't need to be polite to them.
However, Lu Shaohua also knew that it would be difficult to track such a large group of people relying on the manpower of Phoenix Bank's security department at this time. So, after giving the order, Lu Shaohua called Li Zhijie and asked him to order his men there to participate in the tracking.
Catch them all in one fell swoop. That's right. What Lu Shaohua wanted was to catch them all in one fell swoop, so that none of the people involved in the attack could escape. If possible, he would also counterattack the other party's computer to see if he could find anything valuable so as to find out if there was someone behind the group of people.
……
Time passed by bit by bit, and the Phoenix Firewall no longer issued an attack alarm, which meant that the attacking group had stopped attacking, but it did not mean that they had evacuated.
In fact, it’s not that they don’t want to evacuate, but they have been entangled, and there is no other way to evacuate except to disconnect from the Internet directly.
As a hacker, it seems a bit unreasonable to disconnect from the Internet to evacuate when you cannot defeat the enemy. What's more, the time they disconnect from the Internet will leave some traces, and these traces can be tracked back to them. Therefore, under normal circumstances, a hacker will not disconnect from the Internet to evacuate during the invasion.
"Chairman, we have tracked down the other party's real IP." It was the supervisor who reported again.
"Are you sure it's not a broiler chicken?" Lu Shaohua asked back.
This sentence seems to be a question, but in fact it is not. Instead, Lu Shaohua is confirming whether the IP address being tracked is real and not a springboard for the other party.
"It has been confirmed that it is a real IP address, from New York, USA."
"Counterattack, counterattack, I want to break into their computers." Lu Shaohua issued another order.
Lu Shaohua was already furious. After finding the other party's real IP address, he didn't care about anything else. The only thing on his mind was to fight back, break into their computer, and find some valuable information.
Afterwards, Lu Shaohua called Li Zhijie again and asked him what the result was.
Phoenix Bank headquarters tracked down the other party's real IP, but they only tracked one. You have to know that the other party is a group of people. If that group of people are not in the same place, but scattered, then only one person would be caught!
Therefore, Lu Shaohua asked Li Zhijie to see if he had tracked down the opponent. If so, he would compare the IP addresses to see if they were the same and confirm whether the group of people were in the same place.
……
You'll Also Like
-
I'm shooting anime in another world
Chapter 324 10 hours ago -
Great Sword Master
Chapter 1901 10 hours ago -
The hidden demon king, the empress brought her child to ask for responsibility
Chapter 675 10 hours ago -
Being too ferocious because of caution
Chapter 873 10 hours ago -
Mysterious World Tour
Chapter 510 10 hours ago -
Reborn Wild Boar: What's wrong with eating a few single people?
Chapter 138 10 hours ago -
Lurking in Konoha, part-time Hokage
Chapter 149 10 hours ago -
Chat group: People in Douluo bring disaster to the world
Chapter 95 10 hours ago -
Man in Pirates: Starting with a Connor
Chapter 339 18 hours ago -
Naruto, my Madara is a girl
Chapter 275 18 hours ago