Reborn on the Internet: Starting with Games

Chapter 468 Leader, do you want to cooperate?

Chapter 468 Leader, how about cooperation?

"In addition to mobile phones, do you want to do other things?" Lei Jun couldn't keep up with the other party's divergent thoughts. He just smoothed out the mobile phone thoughts, and now the other party drifted to other places.

"Now you have a thorough understanding. I have built an ecological platform for gaming and e-commerce. As you heard just now, your mobile phone is only an important part of it. You use mobile phones to break through at fixed points to break through the surface. This platform is as big as a computer , TVs and other digital products, as small as power banks, data cables, plugs, electric toothbrushes, backpacks, etc.

The ultimate goal is to create a high-quality brand produced by Orange, just like Century Online Games.

Now the World Research Institute has begun preliminary research on televisions, computers, etc. If nothing unexpected happens after a while, Yu Chengdong will come over to relieve some of the pressure. "

Looking at Lei Jun's shocked expression, Chen Hao smiled and said, "Why are you working so hard? I, the boss, can't stand by and watch. I have to do something, right? Okay, that's all. Go to bed quickly." .”

After saying that, Chen Hao drove people away directly.

After looking at my schedule, it was Xiao Wu's turn for the safety of the century in the afternoon.

One day in late April, the network monitoring hall under the jurisdiction of the Cyberspace Administration of China.

"Report, anonymous information received, in 1 minute, there will be a large-scale cyber attack, remind us to pay attention."

The technical person in charge thought about his experience during this period, and went from doubting to believing. He rather believed that he had issued an order, "Continue to maintain detection, and at the same time, the super defense system is on standby."

Sure enough, one minute later, a large number of illegal requests hit the public network monitoring system, which is a national-level firewall, and the super-defense system was turned on at the same time.

The scale of this attack is unprecedented. The QPS (requests per second) reaches nearly million times. You must know that a few years later, the QPS after midnight on Double Eleven will only be at this level and the peak will only last a few minutes. But this time, it seems that the other party has hidden threats. Loulan vowed not to pay him back until he was broken.

Illegal attacks of this scale are far beyond what private citizens can launch spontaneously. There must be support from overseas officials behind the huge network resources.

The Internet is a different kind of battlefield. Behind the quiet years of surfing the Internet, invisible smoke often fills the air. This is a protracted conflict.

The national firewall is like a moat on the periphery of a city. Behind it is the normal Internet life of countless Chinese netizens. Once it is breached, information will be leaked, and systems in various fields such as people's livelihood, technology, and business will be exposed to the other party's view. The consequences will be Unthinkable.

This is a war that cannot be defeated!

As time passed, the entire technical center came into operation to resist this illegal attack. The pressure of this attack was so great that with the current technical reserves, we could only passively defend, and had no time to trace the enemy's whereabouts and origin, let alone think about it. Fight back.

When the situation reached a fever pitch, a mysterious new force suddenly emerged from the diagonal attack. The defender seemed not surprised. They didn't know whether it was an enemy or a friend, but the attacker was frightened and the offensive seemed to freeze for a moment.

After a while, the situation became clear and new forces joined the defenders and took over the task of tracking the enemy.

The newly added opponents this time are very powerful. If they don't move, they will continuously break through several pre-arranged defense lines and destroy everything.

One plus one is greater than two. According to this efficiency, it is possible to find the base camp in a few minutes. This frightened the forces behind the attacker, and they immediately lost their soldiers to protect their vehicles and retreated hastily to avoid leaving any clues.

Seeing that various data and indicators were stabilizing, and that there was no danger this time, the person in charge of the defense wiped the sweat from his forehead.

The national Internet is in the ascendant and is far behind Western countries. In the past, the ignorant were fearless.

Invisible state-level covert cyber attacks, their hackers come and go as they please, but it is this invisible attack that is the scariest. From once being unconscious and invisible, to today being able to see but can only passively defend. Although the source and direction of the attack can be vaguely known, there is no evidence.

Not to mention counterattack, China Internet’s network security still has a long way to go

Half an hour later, he compiled the relevant explanation of the incident and reported it to the superior.

"report!"

"Enter!"

"This is a detailed review report of this attack. This time there is still support from mysterious allies, and a very useful data and a graphic mark are left behind."

"What data!"

"The results of the other party's traceability are corroborated with our analysis results. It can be confirmed that the source of this attack came from the other side of the ocean. However, the other party escaped too quickly and there is no more specific result."

The office director adjusted his glasses and looked at the report in his hand, the other side of the ocean? Then there is only one target. As for the FBI, CIA or NSA, they are all on the surface. There are more than a dozen shady intelligence agencies and organizations secretly. However, it is not important who they are, but who the enemy is.

Since the end of last year, mysterious allies have often appeared in attacks in the past few months, providing early warning or support, which has played a very important role in making the situation here much better, and has left a mark every time.

After analysis, it was found to be the pattern of the constellations in the sky. The previous ones were Aries, Taurus, Gemini, and Cancer, and each constellation corresponded to a different behavioral style. It seemed that each constellation corresponded to a technical team.

Thinking of this, the leader raised his eyes and asked, "What is the graphic mark this time? Leo?"

"The leadership is wise. After the opponent's action this time, it was like a lion fighting a rabbit, with overwhelming momentum."

"Oh? So ferocious?"

"So ferocious! Their strength should not be underestimated. I suggest that it is best to contact these teams and use them for your own use, otherwise people will be unpredictable, I'm afraid."

Understanding the concerns of his subordinates, the leader nodded, "Yes, I understand, let's get down."

Zodiac sign? He had heard before that Chen Hao's subordinate Century Security had a network security team composed of black shells and white hackers called the Zodiac.

Thinking about the chat at that party years ago, could it be them?

At this time, his personal mobile phone rang a pleasant ringtone. After the call was connected, a familiar voice came from the mobile phone, "Leader, do you want to cooperate?"

Really talking about Cao Cao, Cao Cao to "Chen Hao?"

"The leader is still interested. There is a meeting gift in your work mailbox. Please accept it. Cooperation between the government and the people is a traditional virtue. We are waiting for good news from the leader."

After saying that, the other party hung up the phone for the first time.

The leader frowned slightly and opened the mailbox hesitantly. After seeing the content, his pupils shrank. This is

A few minutes later, the technical person in charge of the Cyberspace Administration of China was called to the director’s office and was confused.

I was called back not long after I left. What was the boss doing?

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like