Font
Large
Medium
Small
Night
PrevPage Index    Favorite Next

Chapter 229 Attack and Retaliation(2/2)

However, they did not know that the company's website servers and supercomputers used by the research department were not physically connected. The company's core information was saved in the intranet.

Even if you are successfully invaded, it will not cause any losses to the company.

On the company's network server, the most valuable is the Huanyu Technology Network database. Most of these scientific and technological materials are paper reports written by colleges and universities.

Seven successful cyber hackers were found after the invasion and kicked out of the host system.

Another hacker downloaded a research report. When entering a higher-level database, he was discovered by technicians and drove away.

Although he was kicked out of the system, he finally got a research report and was ecstatic, thinking that he had stolen confidential information from the Universal Company. He was openly sold to an American commercial company within European and American hacking websites.

Because this hacker stole database information of ordinary user groups

The technology discussed in the paper is very ordinary.

The company obtained the information and after research, it was found that it was not of high value.

The hacker who stole a piece of information and received compensation has become famous and has been trying to break through the database of Universal Corporation.

There are dozens of supercomputers in Universal. Before the public knows, the company's website servers were generally attacked thousands of times a day. However, since the news was spread to the Internet, cyber attacks from all over the world have shown a sharp upward trend. On the most days, they were attacked by more than millions of attacks from all over the world.

Those Western technology groups used to purchase information companies that believed that Universal Corporation's technical strength was just like this. However, as Universal Corporation became more and more famous, the West's emphasis on it continued to increase.

After it was revealed online that Universal Company actually had dozens of supercomputers, they were shocked. With dozens of supercomputers, how terrifying should Universal's technological research and development capabilities be?

Looking back at the information they thought was very ordinary. Everyone would never believe it. This is the true level of a technology company with dozens of supercomputers.

They believe that they are blinded by the illusion of Universal Corporation.

As a result, a large number of Western technology groups, either taking action alone, cooperating with each other, or cooperating with the US and European governments, launched a new round of network invasions against the Universal Corporation.

Because Huanyu Company holds control of Huanyu.com, we know the source of these attacks.

Most of the network invasions of such an order of magnitude come from Europe and the United States.

Some of the network intrusions are obviously organized and purposeful, with clear division of labor among the intruders and have adopted collaborative attack methods, hoping to enter the company's database.

These organized network invaders include some Western commercial institutions, research institutions, and competitors. There are also huge numbers. They are invasions of the US and European governments and military departments for the purpose of stealing research data from Universal Corporation.

It all depends on the company's ultra-wide bandwidth of 1,000 t. This frequent attack did not cause the company's network to be blocked.

Different levels of protective nets allow intruders of different levels to be isolated one by one.

Every time a layer of network protection is passed, most intruders will be eliminated. A very small number of hackers who can invade two to three layers of protection networks will be locked in their true identities by the website technicians of Universal Corporation.

The biggest feature of Universal Network is the user binding authentication mechanism.

The true identity of each network card is recorded and passed the authentication code. The company's core technical personnel can quickly find out where each intruder is. Even if they use more broilers as springboards, it will be useless.

Just to avoid exposing the technology of Universal Corporation, we can discover the identity of the intruders and prevent hackers from attacking them from attacking them. They are all backend maintenance personnel. Unlike core technical personnel, they can know the accurate information of the intruders. Backend maintenance personnel still use conventional means to drive out the intruders. Hackers do not know that Universal Corporation has long been in the case of their identity.

Cybersecurity maintenance personnel and network intruders launched a cat and mouse game.

Invasion, protection, kick out of the system, tracking...

Such a game is staged day after day.

Without the technical means of ascertaining the true identity of the intruder, the network protection technology of the company's network security maintenance personnel is also growing rapidly.

There are hundreds of super experts in cybersecurity training.

During this large-scale network invasion, the maintenance personnel were in peace all day long, and everyone cursed.

Xiao Qiang was even more angry at the organized invasions. He decided not to simply defend, but to take the initiative to attack and teach his opponent a lesson.

Under his instructions, the maintenance personnel changed their past practice of chasing out several springboard servers and then resigning their troops to the battalion, and pursued the invaders relentlessly. They stared at an invader and refused to let go. Several maintenance personnel chased them together, and often the invaders just retreated to a server as springboard, and before they could eliminate the traces, they were chased by the security maintenance personnel.

Many hackers who are more famous in Europe and the United States have been chased by Universal Corporation to this machine. As the network security maintenance personnel seized control of their computers, they believed that they left warning documents on the computers.

Some hackers also have to unplug the power supply to prevent the unit from being exposed.

Although the technical means of directly identifying the network was not used, the maintenance personnel still found the real addresses of more than a dozen hackers through tracking.

After this battle, some European and American hackers knew that Universal Company was difficult to deal with, so they stopped slowly.

But I am fearless of those hackers from European and American government organizations: So what if you know? If you have the ability, come to the United States to arrest me!

They continued to launch tides of cyber attacks on Universal, not even pretending, and openly exposing their network addresses.

Universal held a special press conference to make the addresses of these attacks public.

Faced with the accusations from Universal Corporation, Europe and the United States responded: There is insufficient evidence and it is difficult to determine whether these attacks were from Europe and the United States. Then they buried their heads and continued to launch an attack.

When Universal posted all these attack methods, sources, and operations in detail, the European and American parties actually denied it and said in a black and white manner that this was a frame-up by Universal. They also shamelessly stated that given that China has always had a precedent for tampering with information, all evidence should not be used as evidence for the accusations from China. Only evidence confirmed by the European and American parties is true and reliable!

The implication is: I say yes, that's right, that's not, that's right; I say no, that's not, that's right, that's not!

Xiao Qiang was already angry at their robber logic.

In recent years, with the bleaching of Universal Corporation, its own technological level has also improved by leaps and bounds. Moreover, in terms of development path, Universal Corporation and Western technology have already appeared forked, and Xiao Qiang is no longer so interested in stealing Western technology.

Therefore, in recent years, he has always stayed in the company, lived in simplicity, and cultivated his mind and nature.

Many times, he thought he was a paradise who was not surprised by his favor and disgrace.

But this time, he was angry!

Xiao Qiang was very angry, and the consequences were very serious!

He immediately ordered a retaliation against Europe and the United States, and the intensity of this revenge should be as deep as possible to the other party, so that the other party should know that although the Universal Company has been obscure in Taoguang over the years, it is a terrible opponent. If you offend it, you will be extremely terrible revenge!

He personally convened a meeting, formulated retaliation measures, and dispatched them one by one.

In order to implement the policy of cracking down on opponents and protecting itself, Universal Company made preparations for up to three months.
Chapter completed!
PrevPage Index    Favorite Next