According to reports, this story begins at an entirely unscientific moment: Zhou Ziye, a designer who rose from creating counterfeit mobile phones, suddenly time-traveled back to the year 1984.
...Chapter 468 uses a specialty dish as a metaphor
Small computer rooms suitable for office use are also easy to find.
Xing Baohua purchased the third floor of a building next to the server room at a high price. There were originally three other companies operating on that floor.
This guy brought the three bosses together and offered them a price they couldn't refuse for a quick relocation.
The deadline is 6 hours. Whoever moves the goods the fastest will receive HKD 1 million for each hour they are an hour ahead. If they are an hour late, HKD 1 million will be deducted from the total price.
The three companies finished moving the goods in three hours.
The place was a complete mess, with scraps of paper and other debris everywhere. The desks and chairs were left behind and the staff simply left.
Xing Baohua made a phone call, ordering all the guards at home and the seven people who came to learn to come and clean.
Xing Baohua led a group of technical staff from the computer room to trace the lines.
When considering transmission rate, Xing Baohua decided to use fiber optic cable. Although it was more expensive and more complicated to set up, it had significant advantages in terms of packet loss rate and line theft.
Dormitories for the seven trainees were also found, and they moved in immediately with their bags. As for other living supplies, Xing Baohua gave each of them HK$3,000 to buy, since their wages and allowances were not enough to cover their expenses in Hong Kong.
The short relocation took more than a day, and that was time that was bought with money.
After setting up all the equipment, Xing Baohua began debugging the new server in the new office space. He immediately got to work, ignoring the trainees, who, of course, stood behind him obediently, watching their boss type away on the keyboard.
One person controls one computer and two servers.
The trainees were very interested in Xing Baohua's equipment. They had seen servers before, including the Galaxy server room, but who would have thought that a server could be shrunk to the size of a desk?
Its computing speed is almost comparable to that of a supercomputer. How can one not be amazed by the advancement of technology?
Because he was busy changing venues, Xing Baohua was delayed and didn't get a chance to check out the HKU server. It's a bit deserted now, so he used the tools on his computer to scan the HKU server.
Ha!
There are too many hidden viruses, probably three or four hundred. Judging from the virus suffixes, there are at least four main types, with many sub-types. Of course, the most numerous are those evolved from worms.
Calling the HKU servers a "virus den" isn't an exaggeration at all; it's their own fault for not increasing security measures.
Even the management software released by Xing Baohua could kill half of the viruses. Pointing to these evolved viruses, Xing Baohua asked Geng Rui and the others, "Can you understand these?"
“This is a system file. I’ve studied the system and I know this file format,” Geng Rui answered first.
“A system consists of tens of thousands of different files. Judging a file's ownership by its file extension alone is not necessarily accurate. What you are seeing now is not a system file, but a virus disguised as a system file. Do you know what this kind of virus is used for?” Xing Baohua explained, pointing to the file on the screen.
Seeing that they were shaking their heads, Xing Baohua continued, "Tracking viruses are used to explore IP addresses. How do you determine that? You need to have frequent contact with them to understand."
He then pointed to the screen of another machine, which was filled with a list of IP addresses. There were hundreds of them in each row.
"See these IP addresses? This is the information returned by the virus tracking team. If the IP is not disguised, it's easy to find the location," Xing Baohua explained.
How to spoof an IP address?
"Do you know what a botnet is? It's used to evade trackers by using a large number of botnets. Actually, tracking the IP can only trace the first few botnets. The rest need to be traced manually. That means checking the IPs in the logs and registry of those botnets."
The group was completely bewildered.
"What is a broiler chicken? I know what chicken is," one of the young trainees asked.
"How do I put it? There are several names for 'zombie machines' or 'botnets,' which are machines that we remotely control. For example, the University of Hong Kong server. If I want to hack into it, I need to find many computers or servers to cover for me. I first find a few computers in Japan and then use Japanese phone numbers to find computers in the United States. I connect to computers in several continents, which makes the IP addresses a bit messy."
Seeing that they understood, Xing Baohua asked the guards to bring some computers and laptops to test their skills.
They might have had some experience with the internet, but only with local area networks. To put it bluntly, Xing Baohua was explaining some knowledge about the oceans to them, while their knowledge was only at the level of lakes. They were not on the same level at all.
They're relatively easy to teach, since they all have some basic knowledge and can program, so with a little guidance over time they'll probably be able to help.
There were no messages from Xing Baohua's dedicated hacker alliance.
Then, looking at the financial academic reports posted on the HKU server, they were updated, but the content was very short, consisting entirely of thematic elements, with no details at all.
Send a message to Suya and ask what the topics for today's talk are.
Of course, you can't send detailed messages using a pager; it's mostly just a few words, similar to the title.
Xing Baohua then sent a message to Secretary He, asking if they had taken control of the court clerk at the scene.
Secretary He replied that there was no such thing.
Xing Baohua found it a bit strange and replied that there was very little data on the HKU server.
Completely baffled, what exactly does the hacker alliance want?
Why make the University of Hong Kong's servers look like the Bright Summit, making them vulnerable to attacks from hackers worldwide?
The helper from his hometown used the server's speed to start analyzing the IP addresses that were being returned.
Organizing and filtering these addresses is indeed a huge amount of work.
This chapter is not finished, please click the next page to continue reading!