You can search for “Beginning From Transformers” in 100 degrees to find the latest chapter!

Nandu, National Security Agency, Headquarters building.

After being notified, the current director of the National Security Bureau, Liu Zhenhei, who was originally holding a regular meeting of the senior officials of the National Security Bureau at the Conference Hall on the 8th floor, with a sullen face, joined the personal-in-charge of ten sections of the National Security Bureau directly through the dedicated elevator. Came to the data center located on the 3rd basement of the Headquarters building.

As soon as their person walked in, they opened the door and heard the alarm of the data center.

Liu Zhen’s face was even more ugly. He walked 2 steps and came to a blushing face. He was commanding the technical staff near the busy tall and thin man, who was brow beaded with sweat. He asked politely, “Little Wu, the virus has been cleared. Is it? What is the situation? How can the National Security Bureau’s internal network make people buried? What do you do with technology? “

Despite being promoted from an executive position to the head of the National Security Bureau, Liu Zhen is not very knowledgeable about many techniques.

But it has been almost two years since he took over the National Security Bureau. Two years is enough for him to learn a lot.

For example, he seldom surfs the Internet at home, and now he knows the difference between intranet, extranet and darknet.

The internal network of the National Security Bureau is a self-built local area network, and does not open the access port to the outside world. Only some computers in the Headquarters building that have been encrypted can access it.

The internal network is safer than the external network out of vulnerability 100. It is incomparable. As the headquarters internal network of China’s only 2 intelligence agency, the National Security Bureau’s internal network pays more attention to security and confidentiality. Not only special technical staff have built several sets for it. Strictly guarded firewalls will be regularly maintained and inspected by every computer, server and other equipment linked into the National Security Bureau’s intranet.

Therefore, in the past ten years since the establishment of the intranet of the National Security Bureau, there has never been any data leakage on the intranet, or a record that an overseas hacker invaded the intranet by infecting the Headquarters computer of the National Security Bureau as a chicken.

However, this record is now clearly broken.

Just over half an hour ago, a group of technical staff responsible for the maintenance of the internal network of the Internet Technology Section of the Technical Office of the National Security Bureau discovered that they were buried in the internal network of the National Security Bureau during routine maintenance and inspection of the internal network. Suspicious files like trojan horse and virus.

Not to mention how the National Security Bureau’s intranet, which has always paid great attention to safety, was easily broken by people?

It took more than half an hour for the technical team alone to resolve the file that was inserted into the intranet by outsiders. I do n’t know if it was a trojan horse or a virus file. It was enough to shake the entire National Security Bureau up and down.

Although as a national intelligence agency, the confidential information and information of the National Security Bureau are still kept in paper records and will not be stored in the internal network, but many daily tasks are to use the internal network for transmission and processing. There is no guarantee that the leaked data will contain documents that allow foreign intelligence agencies to guess clues.

Just thinking about it, Liu Zhen was going to scream out a cold sweat.

The young Wu who was held accountable by Liu Zhen was named Wu Qingyuan, and was a person-in-charge in the Internet Technology Section of the Technical Office of the National Security Bureau.

As soon as he saw the stinky face of BOSS, Wu Qingyuan could not care to wipe the oily sweat on his face, and his voice was replied in a dry voice: “Director, the files suspected of trojan horses and viruses have not been processed yet … We are used to build in the National Security Bureau The operating system used by the computers on the intranet is based on open source software-linux … Intruder is obviously mastering the root vulnerability of a linux system that we do not know, so the technology can not be deleted or shielded from this for the time being Access to intranet information by suspected trojan horse and virus software … “

To put it bluntly, they are actually paying off debts for their predecessors.

Linuxsystem is an open source software. It was created by Finnish programmer Linus Tovaz at the end of the last century. It is a Unix-like operating system.

Since Linux’s founder shared the system source code relationship with the world, anyone can use it.

And because linuxsource code is all publicly shared with everyone, after decades of continuous improvement and deduction by 10000 computer engineers from all over the world, linux has produced hundreds of different versions, all countries, enterprises and individuals According to the needs, we can develop an operating software that meets the needs of governments, research institutions, and defense agencies in various countries.

It is far more difficult to develop an operating software than ordinary people think.

This is difficult, not only reflected in the huge amount of code of an operating software, far beyond ordinary software.

The rarest thing is the compatibility, the compatibility between software and hardware, and the compatibility between software and software. After all, some compatible technologies can be solved, and some are not solved by technology.

It is no exaggeration to say that if you want to develop a new operating system from scratch, you can’t see anything at all with an investment of less than 10 billion Chinese yuan.

When Microsoft promoted Vista to replace XP, it was reported by foreign media that this system cost Microsoft nearly 200100000000 USD, so the failure of Vista caused Microsoft’s stock price to plummet to 1000.

There must be moisture in it, but the development cost of an operating system for the public is high, and the peep spot can be seen in the tube.

The National Security Bureau has its own technical team, and there is a special national appropriation every year. However, even if this appropriation is even higher, it is impossible that some senior executives will allocate a huge sum of money to develop their own operating software.

The operating system used by the intranet of the National Security Bureau was purchased from a domestic professional software development company.

After obtaining the outsourcing project, the company with the qualification for national defense military procurement deleted a large number of unused items on the basis of linuxsystem, and focused on improving and upgrading security and protection.

In a sense, they are actually qualified. Although the operating system sold to the National Security Bureau is far inferior to Microsoft products in terms of comprehensive functions, it still has merits in terms of safety and protection.

However, linuxsystem is never a perfect operating system.

Because of the open source code relationship for everyone, the different versions shared on the internet community do not know how many programmers have participated in the development.

Limited by their technical strength, some of the malicious people have left some vulnerability and backdoors in the source code that only they know, so it is difficult to say which version of linuxsystem does not have vulnerability.

Once the vulnerability exists, especially the root vulnerability hidden deep in the millions of code, no matter how strong the system is, there is the possibility of being hacked.

After being briefed by Wu Qingyuan on the popular science, Liu Zhen’s face was not that good-looking.

“… Can’t delete it or prevent it from accessing the intranet? Can the technology track where the data was gone? Can you determine where the other party invaded the intranet?”

The person in question is the person-in-charge of the Security Department, his name is Zhang Qinglin.

Wu Qingyuan shook his head, but his face was a little better than before: “… our intranet does not have the permission to access the internet, so this suspicious file that suddenly appeared in our intranet can only be accessed through the National Security Bureau, and a certain station can log in. The computer port of the intranet is transmitted to the intranet … Just now I have temporarily disabled the base station in the Headquarters in advance, so the data stolen from suspicious files should only be transmitted a small part, overwhelming majority are all Also saved on a computer in this building … “

“At present, one group and two groups are working on this unknown file. Groups 2, 3, and 4 have been accompanied by the personnel of the Security Department, and they have started to check all the servers and computers linked to the intranet one by one. The news came! “

While speaking, there was a rush of footsteps outside the door.

Soon after, a tall and fat young man wearing thick glasses slammed open the door, rushed in and rushed in loudly shouted: “… Section Chief … find … found …”

The tall and fat young man did not care to wipe the sweat off his face, holding a silver USB flash drive in his hand.

Wu Qingyuan hearing this, and hurriedly stepped forward, “Liu Jun, what did you find?”

The tall fat young man is a technician in his internet technology group 4 named Liu Jun.

Seeing him handing the silver USB flash drive to himself, Wu Qingyuan quickly took it, but asked.

Liu Jun gasped for 2 breaths, and then noticed that there were dozens of real bigshots in the data center, and suddenly his mouth was a bit unfavorable.

“… this … this is a USB flash drive that uploaded … uploaded files … yes … was found on machine 3rd floor 45 …”

Liu Zhen hearing this had a darker face, glanced at Zhang Qinglin, and Zhang Qinglin, who was also not very good-looking, went out.

The Security Department is responsible for the security section of the National Security Bureau, and also shoulders the work of reversal.

Zhang Qinglin is a person-in-charge of the Security Department. Nowadays, suspicious files are implanted on the intranet of the Ministry of National Security, and it is found that it is uploaded to the intranet through an internal computer. This is already an extremely bad case. The secret mastermind must be caught as soon as possible. .

Wu Qingyuan waved and called 2 technical staff, and gave them the U disk cautiously, “Go to the security room to check, be careful …”

They have their own security room in the technical department. They are not connected to the Internet and have all kinds of testing equipment. Even if the U disk is formatted, the previous data can be restored.

After sending them away, Liu Zhen and the two Deputy Directors and several directors from various places have gathered together and whispered.

“… This is an extremely bad enemy invasion, what do you think?”

“Liuju, do you want to report to Presidential Palace first?”

“… I don’t think it’s necessary for the time being. Waiting for the investigation report of the Security Department to come out, it is not yet possible to determine how many documents were leaked from our intranet …”

“… Is it related to the CIA side? Last month they lost a lot of people in Nandu. Lao Mei’s side has always suspected that we did it, and recently arrested many of our expatriates …”

“possible……”

Seeing that no one took care of herself, Wu Qingyuan slightly sighed in relief and took a few steps back to facilitate the communication between bigshots.

Not wanting to go far, I saw a bang not far away, and instantly attracted the sight of the quietly communicating here.

Wu Qingyuan also followed it and saw that a few meters away, a young man holding a custom-made thick laptop accidentally hit the desk next to it.

Seeing that he was a technical staff under his hand, he was about to yell at the sentence for two sentences, and he saw that the young man twisted a face, apparently it was just a bit hurt.

But the balding young man still limped and limped over, “Section … Section Chief, Director, suspicious file opened …”


Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like