Rebirth: Let's Talk About 1984

According to reports, this story begins at an entirely unscientific moment: Zhou Ziye, a designer who rose from creating counterfeit mobile phones, suddenly time-traveled back to the year 1984.

...

Chapter 460 What bad luck, things went wrong!

Chapter 460 What bad luck, things went wrong!

Knowing the attack pattern makes it relatively easy to resolve.

Whether it's disguising a virus or using email bombing to pave the way, the solution always has to be found within the server.

The server built by Xing Baohua not only hosts a food delivery website, but also other websites, and even an HK forum.

CSRF attacks are a form of disguise. No matter how it disguises itself as another website, there is always a stepping stone. Just find it and remove it.

Xing Baohua turned on several computers in the office. Two of them were monitoring viruses, which sent some monitored data to his email accounts on these two computers. When he opened them, there was no activity; they were all in silent mode.

He connected his computer to a small server but did not log into the backend of his own server.

No action was taken.

I lit a cigarette and watched the punctuation marks flashing on the screen.

Yesterday, while browsing the forum, he saw someone who wanted to buy software. Driven by curiosity, he hacked into the guy's email server, but luckily he escaped quickly.

What if he offended someone he shouldn't have, and they come to teach him a lesson?

Xing Baohua believes he took precautions and cleaned up any traces during his retreat. While he can't say it was 100% successful, at least the virus he was on guard against didn't give him any warnings, meaning he's safe.

Was the server attacked by the remnants of the previous gang or by this suspicious buyer?

There are countless experts on the internet. Even if you take precautions, some masters can easily break through your defenses without your knowledge. It's impossible to say for sure.

A computer expert posted on a HK forum asking to buy software. Is this a bait?

Pretending to be a newbie?

How can we explain that the other party's email server installed a trap? Xing Baohua guessed that he left traces when the password was entered.

So, that's why this kind of revenge happened?

This was just his wild guess; what if the buyer was a complete novice who just happened to need a particular software? But the person who designed the email server was a master; he encrypted all email users.

It's not impossible!

He took out his phone and called the server room manager, asking, "Has Shield Security notified us yet? What did they say?"

"We're cleaning up the traces, updating the firewall, and encrypting it with administrator privileges," the supervisor said.

"Isn't the source in the United States? Make them find it." After saying that, Xing Baohua hung up the phone.

Export the password package from a previous computer hard drive and import it into the small server.

After installing the cracking software and setting up a virtual space, Xing Baohua wanted to investigate the buyer's email server further.

Xing Baohua felt strongly that the recent cyberattack was related to this place, even though there was no evidence.

So he wanted to use the computing power of a small server to crack the password, hoping to find something.

Sometimes, a person's intuition is quite accurate. If you have a feeling about it, then give it a try.

Xing Baohua didn't rush to log into the email server. Instead, he first gave some instructions to the supervisor of the server room to avoid having to report everything to him later.

He was afraid of being disturbed while doing his work, and sometimes every second counted. In order to avoid disturbing others, he delegated some authority to the other party to handle things, especially how to communicate and coordinate with Grandpa Qiao's team.

Before cracking the server password, preparations must be made. Prepare two homemade external hard drives for copying data from the other party.

After preparing everything and checking the server status, I felt it was about time and accessed the recipient's email server directly using the address.

I found the buyer's email address in the backend, but instead of clicking on it, I checked the surrounding information and scanned the area with a tool to make sure there were no hidden viruses that might infect him without his knowledge.

It's alright, very clean.

I pulled out the cracking tool, entered my email address in the tool's address bar, and after it was recognized, it required a driver. Anyway, it took several steps and five or six minutes to get it working.

The remaining task is to copy the entire data of the buyer's emails from the email server to the self-made hard drive.

Emails in this era are all text-only, without images or anything that takes up space, so the total data size is only about 2.3MB.

Xing Baohua guessed that there must be other tools inside; if it was text, how many letters would that be!

Don't be fooled by the fact that the file is only a little over 2 megabytes; even with a bandwidth of 56K, it would take more than five hours to download.

With a bandwidth of 56k, the actual download speed is between 3k and 15k per second.

It's not a stable download speed; due to various factors, it can drop significantly, though it might run extremely fast for a period of time.

So we need to be patient and wait.

The wait was long, so he asked the guard who had been watching the data for him to keep an eye on the download progress bar.

He took a nap on the side.

The night passed just like that.

When Xing Baohua woke up, the download wasn't finished yet, but the progress was already 98%.

Back in the day, waiting for short videos on eMule was only a few hundred or tens of kilobytes per second. Luckily, there was something like Kuaibo (a streaming service). You could watch while waiting, delete videos if you weren't satisfied with the beginning, and download them to your hard drive if you liked them, so you could watch them properly when you had time.

But often, it stops at 98% or 99.8%.

Isn't it infuriating? I waited for several days and it's all gone now.

The current progress is reminiscent of what it was back then. Xing Baohua only breathed a sigh of relief after seeing the download was complete following breakfast.

What follows is the lengthy process of cracking. The only advantage of migrating the entire data is that it can be used for brute-force attacks in virtual space; if the cracking were done online, it would be easily detected.

This chapter is not finished, please click the next page to continue reading!