LATEST UPDATES

Published at 1st of March 2022 07:31:00 PM


Chapter 506

If audio player doesn't work, press Stop then Play button again




After they found it, they found it. It's still difficult for them to clean up the program, and the encryption algorithm of the program, to tell the truth... It's not Jiang Yanhai's boast. The law of its encryption shell is made by electronic warfare program, even if it is forcibly cracked by supercomputer... It's estimated that it won't work in a few years.

Once they can't crack it, the program will directly delete itself.

So Jiang Yanhai didn't worry about his own program. He directly released his own program to track all the data streams of these hackers, and he didn't manage these servers responsible for computing.

It's been a fight with these hackers, and Jiang Yanhai doesn't know what level his strength is, but it's clear that his strength is really strong.

I don't know who is better than the inventor of the virus.

It's very simple for him to retreat. He directly sets his two firewall modes to closed mode. In this way, the firewall will automatically lock and erase all his retreat data, and then the firewall will directly reside in the server.

When the dwell time is over, it will crush itself internally. Such a closed mode firewall will not have any interaction with the outside world and close all ports. Of course, the hard disk where the firewall data is stationed cannot be accessed, leaving only an encryption shell that can be cracked.

Of course, if you can crack the encryption shell, you have no problem, but if you can't crack it, I'm sorry. There's nothing you can do about it.

As for the problem of cracking, don't think about forcibly cracking. Let alone the problem of insufficient time, the amount of computation of the current supercomputer is not enough.

In addition, it is not only a problem that can be solved by the amount of computation. If it only depends on the amount of computation, it is not simply composed of numbers. It must also have certain rules.

After finishing these two, Jiang Yanhai directly eliminated some important parts and retreated. 10 seconds after he retreated, the two firewalls instantly changed the mode, bounced back all access modes, and then refused any form of access.

Jiang Yanhai has left directly. The suddenly disappearing data flow immediately makes the other party's attacks swarm directly. Then the other party's response is also very fast and closes these attacks soon.

But after the shutdown, they soon controlled the two servers, but they couldn't find any clues. The only thing they could know was an encrypted shell that refused all access.

The problem is that when they want to crack the encrypted shell, they find that they can't crack it anyway. Tom's server rental company is better. Here is an encryption shell,

But outside the encryption shell of the public library, there is also a web page with a sentence on it.

"It's nice to meet you. I look forward to seeing you next time."

This sentence is written on this page in 22 major languages used all over the world. It is estimated that anyone can understand it.

But there is nothing else. Almost all hackers like to leave behind IDS, features and so on.

It's like this person has never appeared, and they can't find any trace of each other's existence in the whole server. It's like the other party hasn't come at all, except the encryption shell left by the firewall.

"Boss, it's not good!" the public library didn't say it for the time being, while Tom server leasing company, a security officer said directly to his boss.

"What's the matter?" boss Tom had a headache. He thought it would last for a long time, but he didn't expect it to end so soon. However, although it ended quickly, they lost a lot. These customers will certainly lose money this time.

Of course, it is impossible to lose money. At most, they are provided with server rental for free for a period of time, and their data is not lost, and the other party is obviously not aimed at their data.

They should be content.

"Our server can't be disconnected," the employee said with tears.

"What do you mean you can't solve it?" the boss Tom was a little confused. Didn't he say that the other party had retreated? What's wrong with this?

"Well, our server is locked directly, but after locking, if we want to control some programs, we have to read the data of the relevant area. Now all the data in the relevant area can't be read. Our system has problems now, except that we give up all the data in that area." the security officer is very painful.

"What's that piece of data?" the boss asked immediately.

"As for the core information of the system, if we don't want it, the whole server should remake the system. In that case, we should at least determine which hard disk data the other party occupies, dismantle these hard disk hardware first and replace them with new hard disks. On the whole, it will take a month to operate." the security officer looked ugly.

"A month?!" the boss Tom's voice suddenly raised a tone. How much will he lose if he stops for a month?

The key is that no customers can afford to stop their own database for a month. These customers are bound to use the servers of other companies. The lost customers are the most difficult to find back!

It is very difficult to remake the server system, especially if the whole server is remade, most server systems are backed up and repaired.

"What if we just stay the way we are?" the boss asked immediately.

"Well... It's still barely operational as it is now. Our customers' data will not be affected. That part of the data is just good for our company's own data, but our own data records can't be done. Moreover, it still has an impact on the performance of other customers."

"No, you can't stay for a month and maintain the current situation." the boss Tom made a direct decision. He doesn't care so much. Now any security problems are not important. Anyway, it has been invaded. Can it be worse? It's better to maintain the status quo.

"Bang Bang..." the door of his office was knocked directly. Before he could speak, his secretary directly pushed the door and came in. He said quickly: "boss, the FBI people outside came and said they wanted to take our server!"

"Don't think about it!" old Tom jumped up from his chair and rushed downstairs without thinking about it.




Please report us if you find any errors so we can fix it asap!


COMMENTS