Chapter 10: The Network Legion 2
After saying goodbye to that weird kid, I casually tried this weird thing and it's actually not bad. It can be used as a telescope, camera, or camcorder, but I don't know how much storage it has? Will it break easily? Where is the authorized repair center... (Storage card? Buy one get one free for a year! Will it break? As an alien product, it must be top-notch, how can it break? That authorized repair center? The nearest one is on Pluto, and they don't cover airfare.)
After Uncle Yu arrived, he took me directly to the IBM specialty store. Since Uncle Yu often purchases computers here, I was able to try out as many as 7 laptops, but unfortunately, there were still some differences compared to the company's computers that I'm used to. In the end, however, Uncle Yu introduced a computer that he had seen at an electronics product exhibition, and unexpectedly, this store had it in stock. It turned out that this computer was actually a portable server, with an exterior identical to a laptop, but its thickness was truly shocking - as thick as two ordinary laptops stacked together, about 50-60MM.
Ugly (Does IBM have an ugly notebook computer?). However
Capable of surpassing the crowd, it uses a dual CPU and highly integrated server motherboard.
It can surpass many desktops of the same type. Unfortunately, after seeing the price, I felt a bit embarrassed, 28,000 yuan, exactly twice as much money as I had on hand. Seeing my awkward expression, Uncle Yu spoke up:
"Xiao Xu, it's okay, if the money is not enough, there are two ways to deal with it. One is to owe it for now and pay back next month when we get our salary, or I can ask the company to advance you the payment and deduct it from your salary next month, haha, actually they're the same. Now our Xiao Xu isn't considered a rich person, but should be considered someone who earns money, right? Old Wu, I guarantee that by the end of next month when Xiao Xu gets her salary, she'll come to pay back the remaining amount."
"Cough, brother, what's the hurry, don't rush little brother, when I have money, we'll talk, take it easy, best not to pay back, then big brother will owe me"
"Then my business will also have a foothold, haha!" The boss had a smile all over his face.
Returned to the company and found out that the chairman was looking for me, so I put away my computer and went straight to the chairman's office.
"Little Xu, are you back? I've read that suggestion of yours, the thinking and creativity aren't bad. So I'll ask you, how many people do you think it will take to complete this software, and how long will it take? Can we defend against attacks from someone like a network army's upper-level officer?" As soon as I walked in, Old Sun couldn't wait to start firing questions at me.
"Just me alone is enough, it'll take about a month to debug, and I should be able to handle someone of Upper Rank's level without any issues." Thinking to himself, "At the very least, I can protect KOKO from causing trouble?" (KOKO: Do I cause that much trouble? I'm just attacking...)
It's just an official government website.
"So can we start promoting now? But this way it will put a lot of pressure on you."
"It doesn't matter, I think after it's completed, we can let the online community rate the software, that way it'll also be a bit of hype, and probably beneficial for sales."
"Alright, young man has ambition, you go ahead and do it, just give Little Qin a heads up." Old Sun looked like he was smiling slyly.
Back in the office, told Qin Ge
After that, back to the seat, take out today's harvest, computer ~~ one side installs software, this doesn't need to be reinstalled, deleted, installed, P4? 3.4 CPU two, 120G high-speed hard drive, 1G memory…… It's not necessary to save anything else at all.
One side is installing software, and the other side takes out a small recorder that was mentioned earlier to record the road outside the window, to see how long it can last. If it's less than 10 minutes, I'll be at a loss. Although the clarity of this thing is very high just now, if the time is not long, it can only be used as a fixed image recorder, which is not as good as a digital camera that can be bought for the price of two.
Then there was a card-like thing made of some unknown metal, with a row of colorful stripes on top, somewhat like a barcode, but much more complex, and it had special light refractions in the sunlight.
In the middle is a row of 18 digits, all of which are zeros, 18 zeros??. Below is a group composed of letters and numbers, somewhat like a password. This looks like a soldier's ID card? After searching online, there was no information, but on the back of that thing, I saw four words "Real Technology". YY won't be true, right? Looking at its appearance, it's not bad, so I'll just throw it in my computer bag and see if it will "resurrect" within half a year, otherwise, I'll get rid of it.
Slowly, I've been working on the framework of the defense software (it's okay to call it a firewall, just hoping this one is stronger), before I knew it, it was already time for dinner. The company apartment is actually in the same building, just not on the same floor as my office. The computer software has also been installed, and there are only a few people left in the office now. Outside, it's dark everywhere, but the streetlights are shining brightly. I've packed up my things, and I'm going to go eat dinner, then go teach those kids some stuff, and give them some discipline, or else they'll all think they're Robin Hood online.
Just as I was about to leave, I suddenly remembered that there was something on the windowsill. I don't know if it's still working, and I also forgot to ask if it's rechargeable or battery-powered. I picked it up and took a closer look... Oh my god, this is impossible! The thing in my hand can not only take pictures, zoom in (as a telescope), but also has night vision, and the clarity is many times stronger than what I saw in college. When I tried to enlarge the image, I had previously enlarged it 20X when I first got it, but this time I enlarged it to 100X and actually saw the words on the book of the person walking below! Oh my god, I'm on the 19th floor! This can't be a special military device, right? Thinking about this, I quickly put it in my pocket. Damn, this thing is scary. It's going to get me killed. When I get back, I'll hide it away. (I didn't expect that I would hide it for over half a year, and only remembered it after seeing the real technology later. But how could this thing have alien stuff? Wasn't that game not even started yet? The whole thing adds up to... he's... guess what?!)
Sneaking into the room, he hid those two things well. After coming out, he felt uneasy again. That card wouldn't be a soldier's ID, would it? He...he wouldn't be a murderer, would he...... Shaking his head, damn it, I'm not like I've never killed anyone before. Besides, it wasn't me who did the killing, what's it to do with me? There are people in the computer city downstairs who can prove that it was given by that little guy.
After being tense for nearly a month, as time passed, I gradually relaxed myself, and many big things happened in this month.
May 2, 2005 / United States Seventh
Hacker group proposes merger with cyber militia NO: 14
May 7, 2005 / The European Sea Soul hacker team proposed to join the Network Legion. NO: 5
On May 8, 2005, a Chinese hacker organization claiming to have over 400 hackers with the rank of sergeant or above in the network army proposed to merge with the network army.
May 8, 2005 / Russian cyber group "Hell" merged into NetDevil. NO: 11
May 12, 2005 / Yuan Hai's soul team captain led a team to challenge the world's second-ranked Russian Dark Dragon organization,
Dark Dragon joins Net Legion
……
As of 2005.5.28, the entire world was like a dream come true, during which nearly a hundred world-renowned hacker organizations joined the Network Legion, including 37 teams that were among the top 100 in the world.
According to the US FBI's investigation, nearly 30% of people ranked among the top 10,000 hackers in the world have joined the hacker army. The percentage is 47% for those ranked within the top 1,000 and 64% for those ranked within the top 100. Seven out of the top 10 hackers are from the hacker army. As a result, US and other countries' special agents once tried to intervene in the hacker army but were warned by numerous hackers with various methods, some even attempted to control US satellites. Therefore, the US had to put the investigation in secret and actively seek allies.
The media of various countries are making all-round reports on this suddenly emerging team. Due to the expansion of the network army's influence, the owner of its website, BOSS, had to come forward and became the spokesperson for the network army as we had planned.
Governments of various countries, stimulated by the cyber troops, also began to gather a large number of network talents in preparation for possible cyber warfare. The reason is that an official Russian network chief said: "If you give the cyber troops one day, half of the US network will be attacked."
As special agents from various countries frantically searched for members of the cyber army, many companies also issued bounties. Many software and websites lured members of the cyber army to join their companies with extremely high salaries. Soon, various countries joined this crazy competition as well. A lieutenant's annual salary was around 20 million RMB, a major's was around 80 million RMB, and a colonel's was around 150 million RMB. The entire online world seemed to have gone mad.
But on the contrary, only a few low-level members of the cyber army came forward to apply for jobs, and according to several members, the high-level members, especially those at the lieutenant colonel level, were able to achieve such success solely due to JF's long-term guidance. It is estimated that its core members are only pathologically obsessed with hacking technology.
Good, not as a means to seek benefits, some of these people have jobs that have nothing to do with computers, but in the online army, they are at the school level. Seeing this news makes me laugh, if it weren't for this, I wouldn't be so poor that I would bow down for money. Most of the people I taught had their own fixed jobs, except for a few friends I met online who were there for technical exchange, and many were their friends in real life. Many didn't even know what hacking was, let alone think about using it to seek benefits. And after nearly a year of communication and cooperation, everyone discussed network technology issues like family members, rarely leaking our results to the outside world. Also, due to my long-term role as an instructor, and because they admired my hacking skills, in this big family, I naturally became a leader-like figure. Without my statement, they wouldn't pay attention to external interference, just treating themselves as outsiders.
At the same time, a network game company called Real Tech appeared almost all over the world. The game company showed its game tools and technology to several large financial groups and let them understand it personally.
Afterwards, all the major financial groups clearly expressed their full support and hoped to be the sole partner of this company. For this reason, several representatives of the financial groups almost performed a martial arts show. Later, with the support of various financial groups, Real Tech's advertisements spread like wildfire around the world, suffocating all game companies globally. And when I first heard this news, I couldn't help but jump in surprise - Asrte Financial Group spent 2 million US dollars on advertising in Beijing alone! How much money is that nationwide? In Asia... worldwide?
At the same time, my defensive software has also been completed in these few days. After testing it myself, I can guarantee that it will be the strongest single-machine defense software and also the most extreme. Its working part is composed of three parts: First, filtering; Second, interception; Third, forced network isolation (the final resort is forced disconnection). Currently, general firewalls mainly have the first two functions, and no software has started to implement the third one yet, so I'll take the lead. Hopefully, it won't be quickly imitated.

