Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 1071: Husband and wife make money together

The next day,

Jiang Hao and Zhou Xinyan came to the company and looked up at her company building. The big sign "Haoran Technology" was hung on it, which was very eye-catching. Now that the company's office building has been renovated, it has officially settled in. From now on, it will be the headquarters of Haoran Technology.

Originally, Jiang Hao wanted Zhou Xinyan to rest, but Zhou Xinyan said, "I am the CEO of the company. How can I rest? You also said yesterday that this business may be worth tens of billions, so I can't bear to rest."

Jiang Hao grabbed Zhou Xinyan's hand, shook it and said, "Okay, we are the couple who work together to cheat the money of the two richest men."

"The richest man's money is not easy to cheat." Zhou Xinyan said.

Jiang Hao smiled, "Sometimes, it's also very tricky."

Entering through the side door, the yard is covered with green trees. The car stopped in front of the supercomputer building. Jiang Hao got out of the car and glanced at it. The small villa in the distance had been built and was hidden among the flowers, plants and trees. If there is an independent technical team in the future, you can move in there.

It didn't take long for Brother Ma to come first. Not only him, but also Vice President Huang, who is in charge of security in Q Teng, and their security team members, about seven or eight.

Everyone had just exchanged greetings, but before they could enter the building, two more cars came over. Alima came and only brought a few bodyguards. Everyone exchanged greetings and walked into the supercomputer building together.

After coming to the data center, everyone sat down, Jiang Hao smiled and said, "Yesterday I mentioned getting a security suit. Both Mr. Ma were very interested. Yesterday, Brother Ma called me and agreed to have an offensive and defensive battle to test the performance of my software. Alibaba is known to have the strongest hacking team. I am still a little nervous, afraid of being embarrassed in front of the two brothers."

"I don't think you are worried at all. On the contrary, if I use the software that can't break your strength, then I, Ali, will not be even more embarrassed." Alima said with a smile.

Brother Ma said from the side: "Then today I will take Q Teng's security team and open my eyes to each other. Is Mr. Ma's spear powerful or Mr. Jiang's shield strong?"

Jiang Hao looked at Alima, "Brother Ma, are you ready?"

"You're ready, there's no problem here, I'll call and let the other side start." Alima said.

Jiang Hao sat in front of a computer, but he did not call Xiao Xin, mainly because he didn't want to expose too much of the smart AI matter. After some operation, he activated the security defense system, and then sat back next to the two bosses Ma.

There is a super large LCD screen on the front of the data center. Data tables appear on the large screen, showing various data of the supercomputer and network data. The vice president and security team brought by Xiao Ma Ge can understand the current operation of the supercomputer by seeing this data.

Everyone looked at each other,

"Mr. Jiang, this is over. Isn't the security team operating protection?" Alima asked in surprise.

Jiang Hao smiled, "We are testing the defense capabilities of this software, not more than hacker attack and defense technology. Mr. Ma, you can let the people from Alibaba start."

Alima took out his cell phone and called Lao Wu. After receiving the call, Lao Wu immediately organized someone to attack Jiang Hao's supercomputer.

Alibaba headquarters,

There were two rows of dozens of hackers sitting in the data center, and they quickly found Jiang Hao's supercomputer address.

"Director, can you start?" someone asked.

Old Wu nodded vigorously, "Let's start, let's see how powerful that software is."

These dozens of white hats can rank among the experts in China, using various means, OOB attack, WinNuke attack, SSPing attack, TearDrop attack..., with a variety of methods, violent and fierce.

In Haoran Technology's data center, people saw that data on the big screen began to soar wildly in an instant, and data such as vulnerability, viruses, interception and analysis flashed on the big screen.

After everyone looked at it for a while, someone in QTeng's security team whispered: "The attack is really fierce, with more than a million attacks per minute."

Someone replied, "A million times are not too many. This is just the beginning. It should be just a test. It will be even more fierce later. Don't forget that this time it is a free attack, so don't worry about being discovered by President Jiang. You can use any means, even torrent attacks, as long as it can destroy the normal operation of the opponent's supercomputer."

"I think it's already difficult for President Jiang to defend comprehensively. It's even more difficult to ensure the normal operation of the server. And it's almost impossible when Alibaba is fully powered. Anyway, I can't think of any domestic company that can do it, and foreign companies are also in trouble."

They are all top people in the industry and very knowledgeable. Most people here also have a disbelief attitude because, based on their perception, the most powerful artificial intelligence security measures now cannot prevent such an attack.

You know, this is not a sneak invasion, but a crazy attack, and the security defense is incomparable to daily life.

The numbers on the big screen are beating wildly, and the speed is getting faster and faster. After a few minutes of testing, the speed reaches tens of millions of times per minute.

There is an electronic clock on the large screen, and 10 minutes pass.

Haoran Technology's supercomputer is still safe and sound, and has not been compromised by Alibaba's team. Various data show that the supercomputer is operating normally.

Alibaba looked at Jiang Hao and said with some admiration: "Brother Jiang, your security system is very good. I saw his potential. Our Alibaba will be invaded by more than 300 million attacks every day. The cloud shield we developed ourselves has played a very important role. I think your software is not inferior to cloud shield."

Jiang Hao smiled, "Let's keep reading."

Brother Ma didn't say anything, his eyes were always on the screen. He knew Jiang Hao more deeply than Alima. After all, the two were partners. He knew that Jiang Hao was not a big talker, but he had some confidence in Jiang Hao's attack and defense battle.

To be honest, he also hoped that Jiang Hao would win more. The reason is very simple. Now Qteng is slightly better than Alibaba in terms of security defense. If Jiang Hao wins, whether he buys this security suit or chooses to cooperate, the gap between Qteng and Alibaba in this regard will no longer exist.

Twenty minutes later, Lao Wu frowned slightly. Their team used almost all the means, but the opponent's defense was as solid as a rock and could not penetrate it at all. It seemed that they had hit the iron plate, which made many people feel very uncomfortable.

"Director, this may not work." said a team leader.

Old Wu touched his chin. He knew that he had encountered a tough and difficult problem this time, so he immediately said: "Change the strategy and try the information disguise attack. Send the normal information and the disguise information together. According to the rules, they must receive this information and send the Trojans and viruses together."

......

"Dududu~!"

A small red light flashed again on Haoran Technology's big screen, and then a large amount of information rushed in, whether it was good or bad, and it rushed into the server together.

"Automatic killing starts!"

A line of Chinese characters is displayed on the screen.

When QTeng's security personnel saw this, someone said: "Viruses and Trojans have come in. The system starts artificial intelligence to check and kill, but I don't know whether their intelligent programs are strong or not. If they kill too much wrong data, it is also unqualified. This is a test for artificial intelligence."

"A manual processing is impossible with such a huge amount of data. It can only be automatically analyzed by artificial intelligence. I remember that when Google tested Alpha, the pass rate was only 89.7%. "I said.

"Yes, I'm looking forward to Haoran's level of artificial intelligence."

Everyone looked at the screen and found that under this level of attack, the server was operating normally, and there was a message of data miss killing next to it. This message still says it is still 0.00%.

"Do you believe it?"

Someone shook his head, "I don't believe it."

There is no mistaken data generated, which makes many people unbelievable. Is the artificial intelligence used by Haoran's security system stronger than Google's artificial intelligence? If this is the case, it would be shocking.

"But it's useless to fake this thing. Just check it back and find out."

"Then keep watching."

Alibaba Center,

After more than ten minutes, Lao Wu found that the attack was still ineffective, and his brows became even tighter. He immediately ordered, "Retrieve more data resources and increase the DDOS attack at the same time, causing congestion on the other party's network. Let's see how he ensures that it runs normally."

The hacker group began to call more data resources and launched a crazy data flow impact on Haoran Supercomputer, just like a flood.

But after a while, the team leader was surprised to report: "Director, the attack is invalid. It seems that the other party directly filtered our data and let the data disappear automatically. I don't know what method was used."

Old Wu's eyes rolled,

"Use hardware vulnerability attacks to enable vulnerabilities we have searched for before," said Old Wu.

Vulnerabilities are everywhere, it depends on whether you can find them and whether you can exploit them after finding them. Some companies will not publish them after finding them, but hide them as secret weapons. If they want to use them one day, they may become a sharp sword in their hands.

Crack, Crack,

A group of hackers typing on the keyboard, and afterimages appeared on their fingers. More than ten minutes passed, and someone finally said in frustration, "Head, I tried it. The loophole here is invalid, it should be blocked."

"Hey, I can't get in here either."

"Mine is not good at the director."

The unreleased vulnerability attack can be said to be the killer's trump card of hackers. This is not possible. Old Wu breathed out a light breath, thinking that Haoran technology is so powerful that it can make up for so many unreleased vulnerabilities. It's a bit troublesome now.

"Call more data resources and increase the DDOS torrent attack. I don't believe it if I don't believe it." Old Wu gritted his teeth and said.

This is a rogue trick. He bullies people with his own supercomputer. When he was in the world of anger, Jiang Hao also used this trick, blocking Google's servers with DDOS torrent, and then attacking the Android system.
Chapter completed!
Prev Index    Favorite Next