Chapter 148 : Whole network inspection system!

So, what is the purpose of this hacker? Chu Hao did not think about it. Hackers often cannot speculate with common sense.

Maybe it was his whim, maybe he was stimulated by something, maybe he saw that the government of the M Empire was not pleasing to the eyes. Everything is possible.

Why hackers should leave their own traces in the target of the attack? This question has been included in the research category by many sociologists in the “Five-Five-Three” since the birth of hackers.

After a successful hacking, you usually like to modify the homepage of the website. Some hackers answered this: “Modifying the homepage is just announcing to people: I have occupied this website. It’s like a banner, this is just a message to others.”



Many people support this view, because if the homepage is not modified, some webmasters will not know that hackers have broken into their systems.

Fishing boats all regard the modification of the homepage as a kind of destruction. They demonize hackers, or more tolerant people regard this behavior as a kind of “prank” by children.

Of course, there are some people who are not interested in modifying the homepage. Usually, these people are veterans.

What they enjoy is the process of intrusion, and they are interested in completely controlling other people’s accounts. They don’t want others to know that they have successfully hacked into the system, but only one person or a few people secretly share this secret.

In addition, there are some strange reasons. It is not unreasonable for hackers to be called “unreasonable”, “geek”, “madman” and so on. But hackers don’t mind this, they still go their own way.

Seeing that the hacker’s skills were fairly sophisticated, Chu Hao became interested in him, so he began to pay attention to information about him.

Chu Hao didn’t find this hacker on his own. That would be too remote. The vast sea of ​​nets is like finding a needle in a haystack.

His method is to keep staring at the Hexagon Building, as the so-called “Mantis catches the cicadas and the oriole”. After several contacts, Chu Hao already knows that the Hexagon Building has an organization that specializes in dealing with cybercrimes. I believe they will definitely not behave this time. Will stand idly by.

Kevin organizes personnel to establish a monitoring system on the WELL website, so that if the hacker acts on the WELL website again, he will be spotted and recorded. This is a “waiting for nothing”.

The statement issued by the Ministry of Foreign Affairs of the People’s Republic of China this time was also applied and suggested by Kevin to his superiors. The purpose was to provoke the opponent and make him react.



Kevin believes that based on what the other party has done in the past, he will certainly not ignore this statement.

Over the past week, the surveillance system recorded a lot of computer crimes, but most of them were innocent intrusions, and they didn’t find anything suspicious.

Until Professor Martin received an anonymous e-mail: “Haha, idiot! You stabbed this to the FBI. You disappointed me so much that you even held a press conference at 0.8. It’s not just stupid. Let the world see how stupid you fools who take taxpayers money are so stupid!”

Professor Mick was sent into the hospital by this email on the spot.

After receiving this letter, the investigation made further progress. Because the sending record of this letter was found in the monitoring record, that is to say, the other party sent the letter through the WELL network. .

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like