HacKer

Chapter 693: plug-in is invalid, fight back!

On the 23rd, at 10:30 in the evening.

Shi Lei is adjusting the core framework of the IWN secret network. The flaws of the IWN secret network are still very obvious. The IWN secret network based on the distributed network computing structure is not well handled in terms of integrating computing resources.

At the very least, the computing resources provided by the IWN secret network will be greatly reduced in terms of hacking attacks. Even for defense, there is a high rate of wear and tear.

"Sr official player forum, detected that the player released the brave world plug-in. The user who posted the information, there is no first sequence of test and control permissions." Yizher did not deal with the player forum, about the brave world plug-in posts, and the system analysis corresponding plug-in There is no danger, but the situation is reported to Shi Lei.

"External?" Shi Lei gave a slight glimpse. The situation in the forum was displayed on the screen of the first server. When Shi Lei saw the external name of "Wulin King", he couldn't help but laugh.

"Wang of the Wulin? Is this a funny thing?" Shi Lei only looked at the name, and he knew that the plug should be something from the twisted vine of the big penguin.

"Sr has not found the source of the plug-in for the time being." Yizheer independently analyzed the source information of the plug-in, but Yan Liangtao handled it very seriously, leaving no clues.

"You don't have to trace it. This is a masterpiece of twist vine!" Shi Lei snorted. "He always, he always, why are you so naive?"

The anti-plug-in measures of the brave world are very strict, or it is impossible to use plug-ins at all. The brave world is a game that uses somatosensory operation. It needs to be used with the camera. The camera can't detect the action, and naturally it can't control the player's character.

Including low-end mode, players who use ordinary computers, keyboards and mice, also need camera support. This is because the account login of the brave world must be verified using the behavioral dynamic feature verification.

This kind of measure can effectively prevent hacking! The behavior of acting on behalf of others can also be effectively eliminated. After all, the practitioners cannot be verified by behavioral dynamic features.

Assume that the situation is more extreme. The player and the agent are similar in the same city. The player himself verifies the landing through the behavioral dynamic feature and then hands it to the agent. Such extreme methods cannot escape the verification of the brave world.

Because, during the game, players using the keyboard and mouse mode will occasionally accept behavioral dynamic feature verification. Once the dynamic feature verification is not possible, the game master system will immediately impose severe penalties.

Dream entertainment official player forum, a small number of players who have the first sequence of test and control permissions. According to the post posted by Yan Liangtao, the linked webpage link, downloaded the "Wulin King" plug-in on the relevant website.

This part of the players, including the local super player Mufeng in Shuangqing City.

Mu Feng is not planning to use plug-ins to cheat, but to verify the authenticity of the plug-in. If the plug-in is really useful, Mu Feng will quickly contact the Dream Entertainment official to inform the official plug-in.

Mu Feng is a player who really likes the world of brave. He does not want the brave world to be destroyed by the plug.

However, when Mu Wind downloaded and installed the king of martial arts and landed in the brave world, the main system of the brave world immediately gave a warning.

"The player has detected that the system is running an illegal program, does it automatically end the illegal program, and automatically cleans up the illegal program? Warning. If you do not end and clean up the illegal program, you will not be able to log in to the brave world."

The main system of the brave world is the clothes of the sorcerer, the advanced pseudo-artificial intelligence system, and a plug-in procedure. How can you get through the clothes?

Mu Feng heard the prompt of the main system, and he sighed with relief. He nodded and responded: "System · You look at it, I want to land in the brave world!"

"Please wait later. I am suspending the illegal program. I am cleaning up the illegal program and cleaning it up. The player is getting a wind, please log in to the game normally, I wish you a happy game."

Mufeng's hands, compared to a complicated movement, did not enter any account and password, directly into the brave world.

Like Mu Feng, the internal test players who downloaded and installed the king of martial arts were all warned by the main system and cleared and removed the king of martial arts.

The king of martial arts made by Yan Liangtao is really only taking his own insults! Even the most basic stealing account function can not be achieved!

Pengcheng.

Yan Liangtao was in the secret server, waiting for the feedback data of the king of martial arts. After only ten minutes, Yan Liangtao grabbed the keyboard with a depressed face and fell to the ground.

In the feedback message of the king of martial arts, there were originally more than 3,000 installations, but this number was rapidly reduced, and it quickly became a zero installation. This represents the player who installed the king of martial arts, and no one successfully entered the brave. world.

This result shows that Yan Liangtao’s plug-in plan, a complete failure, has no impact on the brave world at all.

Yan Liangtao hardened his scalp, picked up the phone and called it to the twisted vine. After the call was connected, the voice of the twisted vine came over. "What?"

"Ma Ma, the big surprise plan, failed!" Yan Liangtao's voice is hard to report.

The twisted vine was silent for a while, and the voice was cold and said: "I know!" After that, the twisted vine hangs up directly.

At the headquarters of Big Penguin, the office of the twisted vine, after hanging up the phone, a fire of the nameless in the heart of the twisted rattan, grabbed the teacup on the table, and fell to the ground, the precious purple sand teacup, turned into Fragmentation.

‘Damn 褚良涛, no use at all! In the heart of the twisted flower, the dissatisfaction of Yan Liangtao’s action failed, and only hoped that the action of the Broken Knife Group was successful.

However, the action of the Broken Knife Group was equally unsuccessful!

The main server of the Brave World is the origin of the super-server of Dream Entertainment, the parent server of the company, or the node-centric server of the IWN secret network, and is protected by the endless defense system.

Although the hacking technology of the broken knife is very powerful, it has reached the level equivalent to the black knives of the hacker alliance boss. It can be nothing in Shi Lei’s eyes. The broken knife group fights the endless defense system and cannot achieve any effect at all. Even, instead, he was caught by the clothes!

Shuangqing City, Jingyayuan.

In the case of the intrusion of the broken knife group, the clothes were sent to the screen of the No. 1 server, and prompted: "Sir found that the person who invaded us was tracking the IP address of the other party."

The last time the broken knife group sneaked into dream entertainment, although it did not cause any big trouble for dream entertainment, it does not mean that dream entertainment will forgive the invasion.

After seeing the specific data, Shi Lei showed a sneer in his eyes. "Ready to calculate resources, cooperate with me to track these people!"

Shi Lei personally went on to track the real IP addresses of these invaders. In the cooperation of Yizher and IWN secret network, only two minutes later, Shi Lei found the real IPN address of all intruders in a silent situation.

According to the real IPN address, Shi Lei then inquired about the corresponding real address, but the result of querying the user information of the network service according to the actual address is not very satisfactory.

"Hey! It turned out that there were organizations with premeditated intrusions, and obviously used the false service to handle the network services!" Shi Lei sneered in his heart.

These intruders, all in Pengcheng, Shi Lei is thinking with their toes, but also want to get these people are all running dogs of the Big Penguin company.

However, Shi Lei knows the real addresses of these people, but they can't help them. This is the difference between private and state machines. If the state machine knows the real address of these people, what police uncles, armed police brothers, and even the national grandfather, rushed to send express and check the water meter!

‘Don’t think that you can use fake identification, I can’t help you! Shi Lei thought for a moment how to clean up these invading hackers.

Shi Lei can't do the same as the national machine to check the water meter, but can let the state machine do the work to check the water meter!

There are a total of five cyber security agencies in Xiaguo. The top cyber security department is the Ministry of National Security, and the cybersecurity information department, referred to as CNS.

CNS has led four local regional network security agencies, namely the Northeast and Northwest, and the four major network security bureaus.

Pengcheng belongs to the Southern Bureau of the Cyber ​​Security Administration. Shi Lei has nothing to do with them. Naturally, they can't directly help them to deal with the broken knife group.

But Shi Lei can frame the broken knife group!

Shi Lei's hands on the keyboard, combined with the clothes, temporarily simulated all the IP addresses of the 24 people in the broken knife group. With these twenty-four IP addresses, the attack was launched against the National Security Bureau of Pengcheng.

Shi Lei’s choice was for the National Security Agency, and it was not the Southern Bureau of the Cyber ​​Security Bureau. This was because it was very unreasonable to directly invade the Southern Bureau of the Cyber ​​Security Administration.

Pengcheng’s National Security Agency, the cyber security defense, is also the responsibility of the Southern Bureau of the Cyber ​​Security Administration. It is more reasonable to invade them, and it can also attract the attention of the Southern Security Administration of the Cyber ​​Security Bureau.

The twenty-four intrusion information simulated by Shi Lei and Yi Zhuer seems to be the same as the invasion of twenty-four people. Although the Southern Security Administration of the Cyber ​​Security Bureau has some masters, it takes a lot of effort if they really want to seize the broken knife group.

However, what they have to deal with is not the broken knife group, but the broken knife group simulated by Shi Lei and Yi Zhuer. The tracking staff of the Southern Bureau of the Cyber ​​Security Bureau did not consume too much energy, and passed a vulnerability that was easily overlooked. It was also the vulnerability that Shi Lei deliberately let go, and directly traced the real IPN address of the 24 members of the Broken Knife Group. .

The Southern Bureau of the Cyber ​​Security Bureau found the actual address, and sent the real address of the 24 people in the broken knife group to the Pengcheng National Security Bureau, so that the grandfathers went to the water meter.

The National Security Agency's response was very rapid. It took only ten minutes to complete the perfect encirclement in the real position of all members of the Broken Knife Group!

Waiting for the broken knife group, only check the water meter one road, the secret weapon in the hands of the twisted vine, was killed by Shi Lei ingeniously, and removed the left arm of the brother.

However, Shi Lei is clearly not out of breath, he is planning a thing, ready to completely suppress the cross-fire line of the big penguin...

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like