The Red Alert Begins in the Wasteland

Chapter 710: Red Police Cyber ​​War Force

Speaking of this, a look of contempt flashed across Li Bowen's face. For such a method, it can be said that he has no introduction to hackers.

Of course, this is from his eyes, if it is shown to other people, it is already a very magical method.

"This method is a group of beginners at best, and advanced hackers basically do not use this method. There are also some hackers who specifically control broilers and sell them to such junior hackers to achieve their own profitability. I won't get into any trouble yet."

Li Bowen further explained: "A real hacker must be able to control the Internet and use various technical methods on the Internet to obtain a large amount of information and intelligence. Just like an anonymous person, the main profit method of this organization is its subsidiary. An appraisal company, this appraisal company is specifically looking for the troubles of those companies, seeking to dig out the negative information of these companies, and further publishing the news, so that the company is questioned by everyone.

Such a method can cause the stocks of listed companies to plummet almost every time, and then get the benefits of the stock market. Judging from the previous actions of the anonymous, under such behavior, the market value of almost every listed company has at least decreased. Thirty percent, of course, the reverse is also possible. Announcing some positive news about listed companies can also attract many investors and increase the market value on a large scale.

Of course, there are even more powerful hackers. These hackers are often able to make trouble on the Internet, but the real top masters are often unknown. Such people really need to be vigilant. "

Having said that, Bowen Lee took a deep breath and continued: "At present, the hacking attacks on the Future Technology Group are all concentrated in the United States, Europe, and parts of the Middle East and Asia. The main attack origins are Israel and Japan. Next That is the United States and Europe.

The largest traffic is from Europe, but it is not concentrated. Every attacked IP. All are evenly distributed in every country in Europe, so I very much suspect that most of these attack sources from Europe are all controlled broilers.

The second largest source of attacks is in the United States. The attack pattern here in the United States is very local, and the source addresses of the attacks are also relatively concentrated. This is not like a controlled broiler, but the source of the attack is indeed from within the United States. Israel and Japan are similar to the United States.

So I concluded. The main sources of cyber attacks on the Future Technology Group are from these three countries, as well as other parts of the world. Although there are sources of attacks, they are all sparse and almost negligible. "

After listening to Li Bowen. Cai Ruichen, who doesn't know much about this line of business, only understood a little bit.

"Your fighting spirit is so high. How much confidence do you have to deal with these sources of attack?" Although Cai Ruichen didn't know the adjustments in it, he knew how he should make a decision.

Hearing this, Li Bowen hurriedly said: "At present, we can basically lock the IP addresses of most hackers. If we want to fight back, there are three ways. One of the simplest is to directly publish the addresses of these hackers, but Such behavior will attract more hacker attacks around the world.

The second method is to use his own way of humanity instead of his own body, using network broiler attacks to completely paralyze all computers that attack us. This allows the Red Queen to cooperate with us and absolutely paralyze most of the computer networks in an instant.

The third way is to let spies from all over the world go out and plant control programs on the network terminals near these hackers to intercept and remotely override these people’s networks. When they connect to the network, use the network in their computers. By implanting a new Trojan horse developed by ourselves, when necessary, we can also control their computers and get all the information in their computers. "

"At present, which method is better?" Cai Ruichen is not very proficient in this, and can only give the choice to Li Bowen.

"The results of the first method may be endless. In such a situation, it is not advisable. The third method is also too cumbersome. In terms of cost-effectiveness, it is not very worthwhile. The method is good for price comparison. At present, we have locked a large number of intruder IPs and obtained a large number of hacker information. We can start with the network and personal information, which is enough to make them bloody." In Li Bowen's heart, Weiwei weighed. , Said.

"How sure are you?" Cai Ruichen asked again.

"Ninety-nine percent. We have been defensive but not offensive for several months. This has greatly increased the arrogance of those hackers. My suggestion is that if you don’t fight, you don’t fight. If you want to fight, you must give it to those people. A severe lesson." Li Bowen said.

"Then you figure it out, I only have one request. Since I have taken the shot, I must have a thunderous blow. I will defeat the opponent completely and dare not easily invade our network." Cai Ruichen does not understand the network. Those offensive and defensive methods of the above, but his first goal of dealing with the enemy has never changed. To fight, he must fight beautifully, and he cannot give the enemy any chance to come back.

This requirement is the same no matter what field it is placed in. When dealing with the enemy, it must be used to wipe out the enemy's army or completely frighten the opponent.

"Please rest assured, the commander, I promise to complete the task." Li Bowen promised with some excitement ~www.wuxiaspot.com~ He has been preparing for the counterattack for several months, everything is for the moment of the counterattack.

Several months of preparation were just for this short counterattack, and this alone was enough to make his adrenaline soar.

After the excited Li Bowen promised that, before Cai Ruichen could say anything, he walked to his computer, and the order to counterattack was immediately transmitted to the entire Cyber ​​Warfare Command.

All of a sudden, almost every hacker was in front of his computer, raising his hands and cheering, but soon every hacker converged all his emotions and began to follow the counterattack plan that had been formulated, and the final preparations before the counterattack .

After the red queen of the central computer bent over to bid farewell to Cai Ruichen, she also began to join this group of crazy hackers.

In the entire Cyber ​​Warfare Command, only Cai Ruichen was left alone, because in the entire command, he was still at ease.

When Cai Ruichen saw this, he could only shook his head. Naturally, it was impossible for him to disturb the hackers who were fighting. (To be continued.) Enable new URL

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like