The Red Alert Begins in the Wasteland

Chapter 711: Cyber ​​Forces first block Tokyo

In the Cyber ​​Warfare Command of the Red Police Corps, Li Bowen sits as the commander. He is a lieutenant general. He is usually the least general. At this moment, the temperament revealed all over his body is not inferior to those of real commanders. A general with thousands of troops.

"Activate all the broilers, the virus begins to load into the mail program, and the program to pretend to be a website is executed."

In the position of the commander, Li Bowen decisively gave the order of a formal attack.

In the past few months, hackers have not done nothing. Although they have not taken the initiative to attack, they have also prepared a sufficient number of broilers for themselves.

These broilers are usually quietly controlled by implanting viruses in a large number of game programs or other small files on the Internet.

Usually these viruses have been lurking in these personal computers. The users of these computers are usually ordinary people. For this kind of virus that has no effect on the computer, it is impossible to find it.

And there are very well-disguised viruses, all of which directly replace an unimportant file in the system, thereby deceiving those anti-virus programs.

There are also some broilers that use loopholes in computer systems to directly implant them into these computers from the background. They are also disguised as system files, or simply hidden directly in the files of anti-virus programs to deceive anti-virus software in those calculations.

Even if users use anti-virus software to scan the entire disk every day, they can hardly find these viruses.

There is also a more sophisticated method, which is to directly invade the computer through the background programs of these anti-virus software, and even directly disguise and replace the anti-virus software itself, simulating an anti-virus software icon, and users cannot distinguish the anti-virus software at all. True and false.

The real anti-virus software will also be uninstalled at this time, which is directly Li Daitao Zheng.

Another method is even simpler, and that is to send emails or mobile phone text messages to control the phone and computer.

At the time when the Future Technology Group and the Apple Group launched a comprehensive cooperation. Such a move is even more convenient.

The broilers prepared in the past few months add up. It has reached the number of horror machines. Tens of millions of computers and similar mobile phones have all been implanted with this virus.

In this case, even if you have not used these controlled computers or mobile phones for anything. Just by selling these broilers, you can get a lot of money.

and so. Some hackers are also doing business in this area.

The Cyber ​​War Command, which currently has 3,000 hackers, naturally does not need to buy so-called broilers. There is no such need at all.

When the activated command is completely issued, all users are unaware of it. The attack commands and attack methods have all been communicated to these computers.

Next, many people are using computers and mobile phones. All of them discovered by accident that their mobile computer suddenly became very stuck. Especially for the Internet, some of them are even unable to access the Internet for a short time.

However, this situation is over immediately. These users also didn't care about it. It seems that such things are relatively common.

After all, sometimes, if you get stuck occasionally, no one really cares.

But even in such a short period of time, users absolutely do not know that in that short ten seconds, their computers and mobile phones have sent at least hundreds of emails or initiated continuous uploads to certain websites. Thousands of visit requests.

These emails and requests for website access were all concentrated in Israel and Japan without exception.

The powerful network data flow has reached a trillion access requests and emails in just ten seconds.

The instantaneous influx of huge data streams created a momentary stoppage of the networks of the two countries for more than thirty seconds.

If it weren't for the fact that the two countries are both big network countries, the country has very high bandwidth levels, and the network ports are all very smooth, otherwise such a huge amount of data will be crowded in an instant, I am afraid it will not be a short pause of 30 seconds.

This phenomenon will soon end, and ordinary people naturally have no feeling.

But soon, a large number of computers in many places in the two countries, and even network ports in many areas, were completely blocked.

On a large number of computers, suddenly a large number of windows popped up densely, especially mail messages. The new mail messages that popped out instantly reached the efficiency of thousands of messages per second. In just a few seconds, these computers Almost all the pictures on the monitor are down.

On the screens of these computer crashes, almost all of them were stuck by a large number of spam emails.

Every hacker in front of the computer wants to rescue his computer. It is too late to disconnect from the network. The computer has crashed.

Then, the real climax came. The mobile phones on these hackers also began to emit dense text messages.

A large number of spam messages are constantly popping up, and the content of the messages is all the same, that is, a **** olive branch, which represents peace with blood dripping on it.

This is the most obvious warning sign. The intensive text messages even made the local communications operation department almost crash the computer room because of the huge text message data.

Such an attack, as long as the IP is locked, even the most experienced hacker can only unplug the network cable, but the attack is too sudden, and even the most powerful hacker will not be able to resist. Power.

The real tragedy is that the IP addresses of those websites ~www.wuxiaspot.com~ that participated in the attack were all subjected to a large number of data stream access applications in an instant, and the intensive access applications directly paralyzed the website servers.

The effect of such an attack, the 12306 during the Spring Festival travel season, was almost like that. Almost all netizens who wanted to visit this website found helplessly that the webpage could not be opened at all.

The websites involved are almost all concentrated in Israel and Japan, and due to a large amount of network data and spam, the overall network of the two countries has a significant one-day blocking effect.

This kind of congestion allowed almost everyone to reach 1M bandwidth, and the utilization rate directly left less than 100KB. Almost all reached the speed of dial-up Internet access. Those gamers who were directly affected were because the game became odd. Extremely.

There is also a little bit of the financial industry, especially in Japan. Because the Bank of Japan just implemented a negative interest rate policy, the Tokyo stock market has fallen below the daily lower limit one after another, which has fallen by 40%. This disaster has occurred and the Tokyo stock market has been turbulent. , Intensified a lot.

This is what Cai Ruichen never expected. (To be continued.) Enable new URL

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like