respawn hack
Chapter 27
Ji first went outside the official website of the Ministry of Foreign Affairs.From the display of the scanner and the information sent back by Linchen, it can be seen that many people are scanning the server of the official website of the Ministry of Foreign Affairs, and the server has not been hacked yet.
Just when Baili Xuanji was hesitant to intervene, Baili Xuanji discovered a very interesting thing. When these people invaded, they didn't pay attention to any means and strategies, but were very organized. Some people used DDOS sends countless false access requests to the server of the Ministry of Foreign Affairs, occupying the PU utilization rate of the server, and some people are attacking the internal firewall through some system loopholes. , even, some people are blocking those hackers who try to come to help.
It seems that the water in the hacker world is very deep now.
Scan the website of the Ministry of Foreign Affairs again.Baili Xuanji found that although the framework of this website has been modified, the main framework is still one of the few that have been used in the world, and generally speaking, nothing has changed.
Seeing that these people are about to succeed, Baili Xuanji is not in a hurry, and it is just right for them to disturb the FBI's sight.
Seeing those people implanting some active implanted programs similar to Trojan horses, Baili Xuanji felt that a good plan was gradually forming.
Linchen, short-term antivirus.
Almost in an instant, Lin Chen, who received Baili Xuanji's order, showed his perverted strength.Selectively rejected all access information to the system, and at the same time began to automatically patch the system's vulnerabilities. Except for the normal files of the system, all other files and data streams were cleaned up by Linchen until Baili Xuanji entered, It was only then that the files were restored as if nothing had happened.
Tips (Because there is no place in the back, so Yaoshou is directly placed on top. Because I don’t want to make the article look like a professional book, so let’s just read it):
FBI: The Federal Bureau of Investigation of the United States is one of the world-renowned and most important intelligence agencies in the United States. It belongs to the United States Department of Justice. "FBI" is not only the abbreviation of the Federal Bureau of Investigation, but also represents the creed that the bureau insists on - loyal Fidelity, brave Bravery and integrity, and is the federal police.The US Federal Bureau of Investigation? According to its functions and authorization, it has extensively participated in the investigation of major domestic and foreign special agents. The existing investigation jurisdiction has exceeded 200 federal crimes. The FBI has offices around the world including Beijing (US Embassy in China).
Artificial intelligence: There are two general definitions of artificial intelligence. One is that artificial intelligence is to make the behavior of machines look like the intelligent behavior shown by humans.But this definition seems to ignore the possibility of strong artificial intelligence.Another definition refers to artificial intelligence as the intelligence exhibited by artificial machines.Generally speaking, most of the current definitions of artificial intelligence can be divided into four categories, namely, the machine "thinks like a human", "acts like a human", "thinks rationally" and "acts rationally".Here "action" should be broadly understood as taking action, or making a decision to act, rather than physical action.
This paper always adopts the second kind of strengthening.
Backdoor: A term for hacking techniques, belonging to viruses.After the virus file runs, it will create a copy of itself to the %SYSTEM% directory of the user system, and the copy file name is BRC_SERVER.EXE; the virus will start the process to realize remote control of the user system; and add the following items in the registry to realize booting Self-start.
DDOS: The full name of DDOS is Distributed Denial of Service (distributed denial of service attack). Many DOS attack sources attack a certain server together to form a DDOS attack. DDOS can be traced back to the beginning of 1996. It began to appear frequently in China in 2002, and has already appeared in 2003. Take shape.
Data stream: Data stream (datastream) is a concept originally used in the field of communication, which represents a digitally encoded signal sequence of information used in transmission.However, the concept of data flow we mentioned is different from this.This concept was first proposed by Henzinger in literature 1998 in 87. He defined a data stream as "a sequence of data that can only be read once in a predetermined order".
The author has something to say: statement, this chapter and the following chapters refer to Gu Dashi's "The Strongest Hacker" for computer-related content, not plagiarism.
Then, Yaoshou would like to thank many relatives for their support, thank you for the long comments of Bui Yunqin (for Yaoshou), Yubaqin, someone who passed by, momoxia21qin, Nanniqin for your encouragement, fake houseqin, Cheng Huan’s comfort, and the dead cat’s uninterrupted protection, your messages made Yaoshou more confident to crawl on this article O(∩_∩)O~~
Yaoshou has actually analyzed himself. Because of Yaoshou’s lack of experience in social life, this article deviates from Yaoshou’s initial thoughts. It is more like a YY work for self-entertainment. However, Yaoshou feels that this It’s nothing, self-entertainment is also very good, being able to make everyone happy while self-entertaining is Yaoshou’s greatest hope~~
In short, Yaoshou herself is a little confused now, I can only say, thank you everyone, and then Yaoshou will work harder to write articles to fill in the pits! ! !
30. The legendary invasion...
The login window popped up, and Baili Xuanji went around directly, completely treating the window as nothing.It's not that Baili Xuanji doesn't need to create a super user name to log in. If he is alone now, he might stop and take a look. When it came to Linchen's message, this window was not only a login window, but also a unique honeypot.
It is indeed the place with the strongest network defense in the century. If it weren't for Lin Chen, he would have to delay in this place.
After sighing a little, Baili Xuanji continued to move forward.
However, Baili Xuanji, who was blocked by a forum window that popped up suddenly, knew that she had not touched any traps, let alone a honeypot, Baili Xuanji immediately realized that this was passed to him by Lin Chen, and looked cautiously:
It is well known that China's scientific and technological strength is chasing the level of advanced technology in the century with a rapid era.This time the world's major portals were invaded and besieged, officially because China's leading hacker group launched a challenge to the world's hackers in order to prove their capabilities.As the leading country in network technology, the United States, as the most advanced American in network technology, our hackers are obliged to resist the invasion of these Chinese hackers. We should give them a punishment and tell them that they are not our opponents yet.At the same time, we must also be vigilant. Since Chinese hackers can invade our website today, is it true that China is about to launch a war against the world?
Many scholars who study Chinese culture tell us that the history and development history of China is a history of war.From the soldiers of the Yuan Dynasty riding horses to invade Europe, to today's hacker wars, which one does not represent China's enthusiasm for war.
We should act now, for world peace!
Before Baili Xuanji's anger flared up, another routine announcement from the White House spokesperson was excerpted by Lin Chen:
We caught a hacker from China in the melee just now - Xuelihong.This hacker has hacked into the official website of the White House many times, issued announcements defaming various decrees of the U.S. government, and forged loopholes in the U.S. financial system. He is the one who incited social unrest and will be handed over to the U.S. judicial department for public trial.
TNND, what is the United States raised.Although the theory of China threat has always been popular in the world, in the 23rd century, China has indeed become a superpower, although this Xue Lihong is a little hacker that he doesn't know at all.But there is no need for this American spokesperson to be a bitch and go to the memorial archway.
What does it mean to be launched by China's leading hackers?Fuck you, it's obviously because he was arrested, so Lin Chen made a special formation to save him. Although the source is in China, but if he remembers correctly, the root directory was placed in the United States by him, that is, Said that even if it is found, the place of registration is the United States.This kind of offensive can't hurt anything at all, and it will stop naturally after a while. There is no loss to these websites at all, and on the contrary, it helps them promote them.
And the history of China's development is a history of war?The development history of that country is not the history of war, not to mention that those European countries had already reached out to China during World War II. Why, a conquest during the Yuan Dynasty is worth repeating.Why don't they think about how they came to China to meet the Kingdom of Heaven?
The most hateful thing is the loopholes in the financial system.As far as Baili Xuanji knows, in order to get rid of the financial crisis several times, the U.S. government issued a number of wrong decrees, which made the crisis bigger and bigger and affected the whole world. At this time, in order to get rid of the major impact of the financial crisis, the U.S. , and also took advantage of the status of the US dollar as the world currency to let the US dollar depreciate significantly. After that, the US government let its sovereign credit rating
Just when Baili Xuanji was hesitant to intervene, Baili Xuanji discovered a very interesting thing. When these people invaded, they didn't pay attention to any means and strategies, but were very organized. Some people used DDOS sends countless false access requests to the server of the Ministry of Foreign Affairs, occupying the PU utilization rate of the server, and some people are attacking the internal firewall through some system loopholes. , even, some people are blocking those hackers who try to come to help.
It seems that the water in the hacker world is very deep now.
Scan the website of the Ministry of Foreign Affairs again.Baili Xuanji found that although the framework of this website has been modified, the main framework is still one of the few that have been used in the world, and generally speaking, nothing has changed.
Seeing that these people are about to succeed, Baili Xuanji is not in a hurry, and it is just right for them to disturb the FBI's sight.
Seeing those people implanting some active implanted programs similar to Trojan horses, Baili Xuanji felt that a good plan was gradually forming.
Linchen, short-term antivirus.
Almost in an instant, Lin Chen, who received Baili Xuanji's order, showed his perverted strength.Selectively rejected all access information to the system, and at the same time began to automatically patch the system's vulnerabilities. Except for the normal files of the system, all other files and data streams were cleaned up by Linchen until Baili Xuanji entered, It was only then that the files were restored as if nothing had happened.
Tips (Because there is no place in the back, so Yaoshou is directly placed on top. Because I don’t want to make the article look like a professional book, so let’s just read it):
FBI: The Federal Bureau of Investigation of the United States is one of the world-renowned and most important intelligence agencies in the United States. It belongs to the United States Department of Justice. "FBI" is not only the abbreviation of the Federal Bureau of Investigation, but also represents the creed that the bureau insists on - loyal Fidelity, brave Bravery and integrity, and is the federal police.The US Federal Bureau of Investigation? According to its functions and authorization, it has extensively participated in the investigation of major domestic and foreign special agents. The existing investigation jurisdiction has exceeded 200 federal crimes. The FBI has offices around the world including Beijing (US Embassy in China).
Artificial intelligence: There are two general definitions of artificial intelligence. One is that artificial intelligence is to make the behavior of machines look like the intelligent behavior shown by humans.But this definition seems to ignore the possibility of strong artificial intelligence.Another definition refers to artificial intelligence as the intelligence exhibited by artificial machines.Generally speaking, most of the current definitions of artificial intelligence can be divided into four categories, namely, the machine "thinks like a human", "acts like a human", "thinks rationally" and "acts rationally".Here "action" should be broadly understood as taking action, or making a decision to act, rather than physical action.
This paper always adopts the second kind of strengthening.
Backdoor: A term for hacking techniques, belonging to viruses.After the virus file runs, it will create a copy of itself to the %SYSTEM% directory of the user system, and the copy file name is BRC_SERVER.EXE; the virus will start the process to realize remote control of the user system; and add the following items in the registry to realize booting Self-start.
DDOS: The full name of DDOS is Distributed Denial of Service (distributed denial of service attack). Many DOS attack sources attack a certain server together to form a DDOS attack. DDOS can be traced back to the beginning of 1996. It began to appear frequently in China in 2002, and has already appeared in 2003. Take shape.
Data stream: Data stream (datastream) is a concept originally used in the field of communication, which represents a digitally encoded signal sequence of information used in transmission.However, the concept of data flow we mentioned is different from this.This concept was first proposed by Henzinger in literature 1998 in 87. He defined a data stream as "a sequence of data that can only be read once in a predetermined order".
The author has something to say: statement, this chapter and the following chapters refer to Gu Dashi's "The Strongest Hacker" for computer-related content, not plagiarism.
Then, Yaoshou would like to thank many relatives for their support, thank you for the long comments of Bui Yunqin (for Yaoshou), Yubaqin, someone who passed by, momoxia21qin, Nanniqin for your encouragement, fake houseqin, Cheng Huan’s comfort, and the dead cat’s uninterrupted protection, your messages made Yaoshou more confident to crawl on this article O(∩_∩)O~~
Yaoshou has actually analyzed himself. Because of Yaoshou’s lack of experience in social life, this article deviates from Yaoshou’s initial thoughts. It is more like a YY work for self-entertainment. However, Yaoshou feels that this It’s nothing, self-entertainment is also very good, being able to make everyone happy while self-entertaining is Yaoshou’s greatest hope~~
In short, Yaoshou herself is a little confused now, I can only say, thank you everyone, and then Yaoshou will work harder to write articles to fill in the pits! ! !
30. The legendary invasion...
The login window popped up, and Baili Xuanji went around directly, completely treating the window as nothing.It's not that Baili Xuanji doesn't need to create a super user name to log in. If he is alone now, he might stop and take a look. When it came to Linchen's message, this window was not only a login window, but also a unique honeypot.
It is indeed the place with the strongest network defense in the century. If it weren't for Lin Chen, he would have to delay in this place.
After sighing a little, Baili Xuanji continued to move forward.
However, Baili Xuanji, who was blocked by a forum window that popped up suddenly, knew that she had not touched any traps, let alone a honeypot, Baili Xuanji immediately realized that this was passed to him by Lin Chen, and looked cautiously:
It is well known that China's scientific and technological strength is chasing the level of advanced technology in the century with a rapid era.This time the world's major portals were invaded and besieged, officially because China's leading hacker group launched a challenge to the world's hackers in order to prove their capabilities.As the leading country in network technology, the United States, as the most advanced American in network technology, our hackers are obliged to resist the invasion of these Chinese hackers. We should give them a punishment and tell them that they are not our opponents yet.At the same time, we must also be vigilant. Since Chinese hackers can invade our website today, is it true that China is about to launch a war against the world?
Many scholars who study Chinese culture tell us that the history and development history of China is a history of war.From the soldiers of the Yuan Dynasty riding horses to invade Europe, to today's hacker wars, which one does not represent China's enthusiasm for war.
We should act now, for world peace!
Before Baili Xuanji's anger flared up, another routine announcement from the White House spokesperson was excerpted by Lin Chen:
We caught a hacker from China in the melee just now - Xuelihong.This hacker has hacked into the official website of the White House many times, issued announcements defaming various decrees of the U.S. government, and forged loopholes in the U.S. financial system. He is the one who incited social unrest and will be handed over to the U.S. judicial department for public trial.
TNND, what is the United States raised.Although the theory of China threat has always been popular in the world, in the 23rd century, China has indeed become a superpower, although this Xue Lihong is a little hacker that he doesn't know at all.But there is no need for this American spokesperson to be a bitch and go to the memorial archway.
What does it mean to be launched by China's leading hackers?Fuck you, it's obviously because he was arrested, so Lin Chen made a special formation to save him. Although the source is in China, but if he remembers correctly, the root directory was placed in the United States by him, that is, Said that even if it is found, the place of registration is the United States.This kind of offensive can't hurt anything at all, and it will stop naturally after a while. There is no loss to these websites at all, and on the contrary, it helps them promote them.
And the history of China's development is a history of war?The development history of that country is not the history of war, not to mention that those European countries had already reached out to China during World War II. Why, a conquest during the Yuan Dynasty is worth repeating.Why don't they think about how they came to China to meet the Kingdom of Heaven?
The most hateful thing is the loopholes in the financial system.As far as Baili Xuanji knows, in order to get rid of the financial crisis several times, the U.S. government issued a number of wrong decrees, which made the crisis bigger and bigger and affected the whole world. At this time, in order to get rid of the major impact of the financial crisis, the U.S. , and also took advantage of the status of the US dollar as the world currency to let the US dollar depreciate significantly. After that, the US government let its sovereign credit rating
You'll Also Like
-
Simulating The Cultivation Of Immortals, I Reached The Nascent Soul Stage In Ten Days!
Chapter 255 12 hours ago -
In Konoha, I collected corpses on the battlefield for ten years
Chapter 349 13 hours ago -
I picked up skill fragments in the demon world
Chapter 596 16 hours ago -
Yu-Gi-Oh!: Start with Ultraman Tiga! ?
Chapter 165 17 hours ago -
Top female anchor daily life
Chapter 152 17 hours ago -
Genshin Impact: Use various skills to create a romantic encounter
Chapter 204 17 hours ago -
Ultra: I got the Light of Galaxy Victory
Chapter 238 17 hours ago -
Help! I just woke up and was stabbed by a big kid
Chapter 510 17 hours ago -
Dragon Ball: I have the wrong system and I have entered the wrong world
Chapter 500 17 hours ago -
Siheyuan: Seventeen-year-old He Yuzhu
Chapter 318 17 hours ago