If you are asked to take charge of the specialty class, how can you become a top student?
Chapter 243 Offense and Defense
Chapter 243 Offense and Defense
Fortunately, Wang Xu's original intention was good, and he had not yet officially entered the National Security Bureau, and he was a key protection target. He had indeed established great achievements, and the merits and demerits were balanced. Anyway, there was no reward without punishment.
Otherwise, one violation would be enough for him to bear.
While Chen Chu and Wang Xu were waiting for the news, the technical department was already very busy.
Lu Chao handed all the drones and data he brought back to the technical department for secondary analysis, but soon the people in the technical department were shocked by the drone Liu Yuchen disassembled.
"Who removed this? The chip was not damaged?"
Several people from the technical department gathered around and looked at the chip that had been removed. Naturally, they were amazed.
Lu Chao naturally had no idea about this, and he only realized it now.
yes!Who took it down! ?
It was definitely not Wang Xu who disassembled the drone. Wang Xu didn't have such ability, so he must have found someone for help and then disassembled the drone.
But at that time, Lu Chao's attention was all focused on the data he read, and he forgot to ask.
"Even the hidden protective lines were found!"
"Is it that great?"
"Lu Chao, where did you hire such a powerful engineer? We have sent people here to look for it, but no one can guarantee that the chip can be removed without damaging it. We almost lost it. Report this matter!”
"I don't know who it is." Lu Chao said, dumbfounded, "Now is not the time to express emotion!"
"Don't worry, the engineer you hired has already found the protection line. Then the next work is basically not difficult. We just need to follow the diagram and follow it."
"Well, originally the most difficult thing was to find the hidden protection lines. Now that we have found them all, it will be easier if we know which one it is!"
The people in the technical department did not continue to say anything, and quickly took the remaining drones to process. After struggling for about ten minutes, all the drone chips were quickly removed. After technical processing, Immediately forward it to the Program Technology Department.
The program technology department is the real battlefield. Earlier, it had analyzed the disassembled chip data. Later, by activating the motherboard to track the data signal, it began to determine the website server where the data was uploaded. As more and more chips were sent, Over here, the ever-changing data signal finally had a general direction. After half an hour of searching, the destination of the signal was finally confirmed to be a terminal server abroad, and nearly four servers were built under this server. Fifty websites.
These websites are all selling fake information. On the surface, they are even some advertisements or game websites. They are just to confuse the public. In fact, the real purpose is to intercept data.
After determining the target, the Program Technology Department naturally conducted investigations and evidence collection immediately and began to try to penetrate into the backends of these websites.
Time passed minute by minute, but what no one expected was that during the process of investigating and collecting evidence, one of the program technicians suddenly changed his face and exclaimed: "The other party is actively attacking, everyone should be careful! "
When everyone heard this, their expressions changed. As expected, these websites shut down the backend immediately, and directly stole the address of the technology department by unknown means, and started to reverse infiltrate the National Security Program Technology Department.
A large amount of information bombardment swept across the sky. Everyone in the Program Technology Department felt as if they were facing a formidable enemy. They immediately organized a defensive barrier to block all these junk messages. Once these information bombardments caused the system to collapse, then You can take advantage of this momentary vulnerability to instantly invade the backend of the Program Technology Department.
"What happened? How did the other party find us?"
Everyone in the Program Technology Department was blocking the opponent's attack, but they were also confused. After all, their addresses had been encrypted by technical means, and for the sake of caution, the addresses were disguised in multiple layers, and they ran from Southeast Asia to Europe. Turning to America, according to this situation, it is impossible for the other party to find him directly.
"It's a drone!" Someone immediately shouted: "The other party must have directly locked onto our position through the drone's signal."
Everyone suddenly came to their senses and secretly cursed for being careless. However, the signal of the drone must not be cut off now, otherwise the data intercepted with great difficulty will definitely be destroyed by the other party, and there will be no evidence at all.
Obviously, the other party had considered the backup plan at that time, so they were already prepared.
The enemy is in the dark, and I am in the light.
The Programming and Technology Department directly suffered a big loss, but they didn't dare to think too much now. They had to block the opponent's attack no matter what.
The process of investigation and evidence collection immediately turned into an offensive and defensive battle!
Sun Chong waited for a while but saw no news from the Program Technology Department. He frowned and immediately called to ask what was going on.
"The fight is on!" An anxious voice came from the other end of the phone: "Sun Chu, their drone also set up a tracking signal. We were careless and the other party accidentally found our hometown!"
Sun Chong's eyes widened and he couldn't help but yell: "What do you do for food?" There was no explanation on the other end of the phone. After all, he never thought that the other party would do so many tricks on the drone, so he hurriedly said: "Sun Chu, we have manpower It’s not enough, the other side is already prepared, we need support!”
"We should be facing a professional technology group. They attacked us tens of thousands of times in 5 minutes. There are at least hundreds of people on the other side, maybe even more."
"The opponent's attack is too fierce. There are only about ten of us, and the keyboards are almost smoking!"
"You have to block it no matter what, even if your hand is broken, I have to block it!"
"Yes!"
Sun Chong hung up the phone, without saying a word, directly dialed the number of Jiangnan Internet Security. As soon as the call was connected, Sun Chong hurriedly said: "Old Ke, the situation is urgent. It's too late to explain. How many people do you have?" Give it to the Program Technology Department! I will report it to the superiors later."
"No, Old Sun, are you kidding me?" A voice that didn't know whether to laugh or cry came from the other end of the phone: "Everyone here is busy! I don't have anyone to lend you!"
Sun Chong said hurriedly: "I'm fighting with someone from abroad!"
"Ha!?" The person on the other end of the phone was startled: "Why did you suddenly start a fight with someone from abroad?"
"I'll explain to you later. Lend me the person quickly. If this is breached, we'll be in big trouble!"
"Okay!" I saw a shouting voice coming from the other end of the phone: "Immediately contact all those who are on duty with the National Security Program and Technology Department. Those who are not on duty should contact me immediately. Those who are on a business trip and off duty should also contact me immediately with the National Security Department. The situation It’s urgent, there’s no need to delay!”
"Yes!"
Then I heard someone say on the other end of the phone: "There are only about ten people here..."
"Don't worry about how many people there are, just take the lead first and then talk about it!"
"OK, OK!"
After Sun Chong hung up the phone, he immediately made a few more calls.
Jiangbei, Jiangchuan, Jiangdong...
In just ten minutes, Sun Chong called out everyone he could. Seventy or eighty people were all connected to the Program Technology Department, and the situation was finally stabilized.
But before they could take a breath, the attack suddenly became fierce again.
The information bombardment soon turned into an invasion, and the situation that had finally stabilized became tense again.
The other side seemed to have sent a large number of additional manpower at the same time.
Sun Chong felt dizzy for a moment. It was obviously just a simple investigation and evidence collection work, but he didn't expect that it suddenly turned into a cyber war.
And the situation is getting more and more tense now. Although these seventy or eighty people are not many, it is already the limit.
After all, the national security manpower in each place is limited, especially the program and technology department. Except for developed areas, no province or city can fill the basic establishment of 30 people. After all, there is indeed a shortage of relevant talents in this area, even if it is Yes, most of them have been poached by capital.
Seeing that the situation was becoming more and more complicated, Sun Chong naturally reported it immediately and requested support.
After all, the other party bullied her into the house?
It can be tolerated! ?
We don’t cause trouble, but we aren’t afraid of it either!
beat!
Overnight, the fighting became more and more intense.
Technical personnel from more than 70 counties and cities in the three southwestern provinces immediately participated in this network offensive and defensive battle centered in Jiangnan.
(End of this chapter)
Fortunately, Wang Xu's original intention was good, and he had not yet officially entered the National Security Bureau, and he was a key protection target. He had indeed established great achievements, and the merits and demerits were balanced. Anyway, there was no reward without punishment.
Otherwise, one violation would be enough for him to bear.
While Chen Chu and Wang Xu were waiting for the news, the technical department was already very busy.
Lu Chao handed all the drones and data he brought back to the technical department for secondary analysis, but soon the people in the technical department were shocked by the drone Liu Yuchen disassembled.
"Who removed this? The chip was not damaged?"
Several people from the technical department gathered around and looked at the chip that had been removed. Naturally, they were amazed.
Lu Chao naturally had no idea about this, and he only realized it now.
yes!Who took it down! ?
It was definitely not Wang Xu who disassembled the drone. Wang Xu didn't have such ability, so he must have found someone for help and then disassembled the drone.
But at that time, Lu Chao's attention was all focused on the data he read, and he forgot to ask.
"Even the hidden protective lines were found!"
"Is it that great?"
"Lu Chao, where did you hire such a powerful engineer? We have sent people here to look for it, but no one can guarantee that the chip can be removed without damaging it. We almost lost it. Report this matter!”
"I don't know who it is." Lu Chao said, dumbfounded, "Now is not the time to express emotion!"
"Don't worry, the engineer you hired has already found the protection line. Then the next work is basically not difficult. We just need to follow the diagram and follow it."
"Well, originally the most difficult thing was to find the hidden protection lines. Now that we have found them all, it will be easier if we know which one it is!"
The people in the technical department did not continue to say anything, and quickly took the remaining drones to process. After struggling for about ten minutes, all the drone chips were quickly removed. After technical processing, Immediately forward it to the Program Technology Department.
The program technology department is the real battlefield. Earlier, it had analyzed the disassembled chip data. Later, by activating the motherboard to track the data signal, it began to determine the website server where the data was uploaded. As more and more chips were sent, Over here, the ever-changing data signal finally had a general direction. After half an hour of searching, the destination of the signal was finally confirmed to be a terminal server abroad, and nearly four servers were built under this server. Fifty websites.
These websites are all selling fake information. On the surface, they are even some advertisements or game websites. They are just to confuse the public. In fact, the real purpose is to intercept data.
After determining the target, the Program Technology Department naturally conducted investigations and evidence collection immediately and began to try to penetrate into the backends of these websites.
Time passed minute by minute, but what no one expected was that during the process of investigating and collecting evidence, one of the program technicians suddenly changed his face and exclaimed: "The other party is actively attacking, everyone should be careful! "
When everyone heard this, their expressions changed. As expected, these websites shut down the backend immediately, and directly stole the address of the technology department by unknown means, and started to reverse infiltrate the National Security Program Technology Department.
A large amount of information bombardment swept across the sky. Everyone in the Program Technology Department felt as if they were facing a formidable enemy. They immediately organized a defensive barrier to block all these junk messages. Once these information bombardments caused the system to collapse, then You can take advantage of this momentary vulnerability to instantly invade the backend of the Program Technology Department.
"What happened? How did the other party find us?"
Everyone in the Program Technology Department was blocking the opponent's attack, but they were also confused. After all, their addresses had been encrypted by technical means, and for the sake of caution, the addresses were disguised in multiple layers, and they ran from Southeast Asia to Europe. Turning to America, according to this situation, it is impossible for the other party to find him directly.
"It's a drone!" Someone immediately shouted: "The other party must have directly locked onto our position through the drone's signal."
Everyone suddenly came to their senses and secretly cursed for being careless. However, the signal of the drone must not be cut off now, otherwise the data intercepted with great difficulty will definitely be destroyed by the other party, and there will be no evidence at all.
Obviously, the other party had considered the backup plan at that time, so they were already prepared.
The enemy is in the dark, and I am in the light.
The Programming and Technology Department directly suffered a big loss, but they didn't dare to think too much now. They had to block the opponent's attack no matter what.
The process of investigation and evidence collection immediately turned into an offensive and defensive battle!
Sun Chong waited for a while but saw no news from the Program Technology Department. He frowned and immediately called to ask what was going on.
"The fight is on!" An anxious voice came from the other end of the phone: "Sun Chu, their drone also set up a tracking signal. We were careless and the other party accidentally found our hometown!"
Sun Chong's eyes widened and he couldn't help but yell: "What do you do for food?" There was no explanation on the other end of the phone. After all, he never thought that the other party would do so many tricks on the drone, so he hurriedly said: "Sun Chu, we have manpower It’s not enough, the other side is already prepared, we need support!”
"We should be facing a professional technology group. They attacked us tens of thousands of times in 5 minutes. There are at least hundreds of people on the other side, maybe even more."
"The opponent's attack is too fierce. There are only about ten of us, and the keyboards are almost smoking!"
"You have to block it no matter what, even if your hand is broken, I have to block it!"
"Yes!"
Sun Chong hung up the phone, without saying a word, directly dialed the number of Jiangnan Internet Security. As soon as the call was connected, Sun Chong hurriedly said: "Old Ke, the situation is urgent. It's too late to explain. How many people do you have?" Give it to the Program Technology Department! I will report it to the superiors later."
"No, Old Sun, are you kidding me?" A voice that didn't know whether to laugh or cry came from the other end of the phone: "Everyone here is busy! I don't have anyone to lend you!"
Sun Chong said hurriedly: "I'm fighting with someone from abroad!"
"Ha!?" The person on the other end of the phone was startled: "Why did you suddenly start a fight with someone from abroad?"
"I'll explain to you later. Lend me the person quickly. If this is breached, we'll be in big trouble!"
"Okay!" I saw a shouting voice coming from the other end of the phone: "Immediately contact all those who are on duty with the National Security Program and Technology Department. Those who are not on duty should contact me immediately. Those who are on a business trip and off duty should also contact me immediately with the National Security Department. The situation It’s urgent, there’s no need to delay!”
"Yes!"
Then I heard someone say on the other end of the phone: "There are only about ten people here..."
"Don't worry about how many people there are, just take the lead first and then talk about it!"
"OK, OK!"
After Sun Chong hung up the phone, he immediately made a few more calls.
Jiangbei, Jiangchuan, Jiangdong...
In just ten minutes, Sun Chong called out everyone he could. Seventy or eighty people were all connected to the Program Technology Department, and the situation was finally stabilized.
But before they could take a breath, the attack suddenly became fierce again.
The information bombardment soon turned into an invasion, and the situation that had finally stabilized became tense again.
The other side seemed to have sent a large number of additional manpower at the same time.
Sun Chong felt dizzy for a moment. It was obviously just a simple investigation and evidence collection work, but he didn't expect that it suddenly turned into a cyber war.
And the situation is getting more and more tense now. Although these seventy or eighty people are not many, it is already the limit.
After all, the national security manpower in each place is limited, especially the program and technology department. Except for developed areas, no province or city can fill the basic establishment of 30 people. After all, there is indeed a shortage of relevant talents in this area, even if it is Yes, most of them have been poached by capital.
Seeing that the situation was becoming more and more complicated, Sun Chong naturally reported it immediately and requested support.
After all, the other party bullied her into the house?
It can be tolerated! ?
We don’t cause trouble, but we aren’t afraid of it either!
beat!
Overnight, the fighting became more and more intense.
Technical personnel from more than 70 counties and cities in the three southwestern provinces immediately participated in this network offensive and defensive battle centered in Jiangnan.
(End of this chapter)
You'll Also Like
-
A noble son from a poor family
Chapter 81 288 days ago -
Entertainment: Take advantage of Tianxian’s youth and give her a boss’s license
Chapter 63 288 days ago -
I am Wen Zhong!
Chapter 54 288 days ago -
Industrial Survey: Are you a private enterprise engaged in black technology?
Chapter 52 288 days ago -
In the mixed martial arts adventure, all the heroines are broken
Chapter 61 288 days ago -
Let you write about a small character's counterattack, and you write about the Hongwu Emperor
Chapter 53 288 days ago -
Super God: Knock out Hua Ye and drag Kesha into the woods
Chapter 61 288 days ago -
Siheyuan: I, Qi Tongwei, started in 1980
Chapter 50 288 days ago -
Xuanxian Supreme
Chapter 190 288 days ago -
Siheyuan: I am a fool, and I show off to the audience
Chapter 53 288 days ago