Rebirth: Let's Talk About 1984

According to reports, this story begins at an entirely unscientific moment: Zhou Ziye, a designer who rose from creating counterfeit mobile phones, suddenly time-traveled back to the year 1984.

...

Chapter 446 What goes around comes around. I can pay it back, what about you?

Any intrusion is caused by a virus. Viruses scan for vulnerabilities in the system and find backdoor channels, whether it's hardware protocols or software bugs.

Current cybersecurity practices are entirely reactive.

There are so many computer vulnerabilities, like a sieve. The only way to patch them is through time, bit by bit. Xing Baohua and his team developed a firewall software precisely because they were worried about this kind of problem.

But it was all for naught! It couldn't be blocked or prevented at all.

Xing Baohua himself had done such despicable things, and he understood the situation clearly.

They even assigned personnel to inspect the system; to hack into his server, one would need to crack advanced administrative privileges. Once these privileges were secured, the inspectors would receive a login notification when they tried to log in again, which would also serve as a manual alert.

It may seem like double insurance, but it's actually quite vulnerable.

The checks are repeated every two hours; hackers might not know this timeframe unless they are insiders.

It is very likely that there was collusion between insiders and outsiders.

But let's put that aside for now; the most urgent task is to recover the data from the hard drive.

Xing Baohua instructed the existing programmers to write code in segments, giving them direction and requirements. He was also writing a scanning program to find viruses on the server.

In fact, Xing Baohua was very grateful to the hacker for sparing his life!

If someone tries to erase all traces like him and uses a hardware-damaging virus, then Xing Baohua's server is basically useless.

Only then did he believe the saying, "What goes around comes around."

However, Xing Baohua can afford to pay back the debts, but what about these shady characters? They might not be able to afford it.

After a night and a morning, Xing Baohua finally wrote a scanning software that could only scan software that could not be removed by viruses.

As for the hard drive repair software, that will take time; he'll scan the equipment in the server room first.

You wouldn't believe it until you scanned it; what a shock! More than a hundred viruses were discovered. How many people have been targeting this place?

Have someone bring over a few new hard drives, format them, then partition them to create several separate virtual spaces.

The detected viruses and suspicious files were placed on a virtual disk, and the hard drive was removed from the server. The viruses were then dissected and analyzed using computers in the server room office.

Of course, the first step is to disconnect the computer from the internet before gradually disassembling the casing to examine the internal core structure.

It's all code, and it's very difficult to read. I don't have any specialized tools at hand, so I have to rely on my eyesight and intuition to make judgments.

They all have roughly the same structure and evolved from worm viruses.

With these virus samples, the virus database in antivirus software can be updated.

If we encounter any more than a hundred viruses like this in the future, we can eliminate them instantly.

The next step is to analyze the virus's main functions, which includes checking the pi address that the virus needs to return.

Once the virus is activated and vulnerability information is detected, it needs to send a callback message to the hacker. This address could be an email address or a temporary botnet IP address.

99% of them need to set up a temporary botnet as a springboard, and finding their true identity is like finding a needle in a haystack.

However, you still need to search. There are so many botnets; it just depends on how many botnets the other party is using. Just follow the trail.

It's just a waste of time.

Xing Baohua has the time, and most importantly, he has a lot of people. He also has a small tool that can be used to help identify fake IP addresses.

This will shorten the time and allow him to search faster.

Xing Baohua called the software park and asked them to send a few more programmers over. He needed assistants. He also called his secretary, asking for several new computers—desktops and laptops.

Once the personnel were in place, Xing Baohua had already compiled the IP addresses analyzed from the virus.

The programmer's assistant came and used the IP address to find clues.

They made use of the dedicated lines in the server room, which greatly improved the speed.

Xing Baohua connected directly to the server using his own computer, installed small tools on the server, and used the server's powerful performance and computing power to help distinguish between real and fake IPs.

With over a hundred IP addresses, each of which can split into thousands or tens of thousands of IPs, it's impossible to find them with current computer capabilities.

Using the server's performance for calculations is like having a cheat code, greatly reducing unnecessary time.

They actually found three IPs, and by tracing the leads and checking the logs on the other party's computer, they found it was very active. Analyzing the logs didn't reveal any further IP traces, so they started their investigation from here; this was the initial IP address.

Copy the other party's log; consider it evidence!

Well, it probably won't be enough to serve as evidence, since this kind of crime is new and there are no laws regulating it.

As things stand, Xing Baohua couldn't find any evidence of wrongdoing in the logs. At least there should be some transfer records or something to make things clear.

Xing Baohua glanced at the IP address and thought, "Holy crap. It starts with HK."

The three IP addresses were found, and they all showed up in HK.

Hong Kong is easy to deal with. Doesn't he know that Xing Baohua is the only internet operator in Hong Kong? This is like provoking a tiger!

Soon, the three sets of IP addresses also obtained their real addresses.

Even the account holder's name, phone number, and home address have been found. However, this information alone isn't very useful; it's all company legal representative information, meaning the company applied for the network with Huahong Telecom.

These people used the company's equipment to do their own private work.

It's easy to find. Based on the address assigned by the router, you can find out which computer it is, who is using it, and then you can find the person.

This chapter is not finished, please click the next page to continue reading!