Rebirth: Let's Talk About 1984

According to reports, this story begins at an entirely unscientific moment: Zhou Ziye, a designer who rose from creating counterfeit mobile phones, suddenly time-traveled back to the year 1984.

...

Chapter 478

"So they didn't stop you from installing the program, and watched you restore the files they deleted until they fully understood your intentions before disconnecting and stopping you?" Geng Xin continued to ask.

"It should be? They should be following the trail to find me now," Xing Baohua said with a hint of pride.

If it's a strategic retreat, Xing Baohua dares to say he's number one, and no one in the world dares to say they're number two.

This is a great trick, but it's incredibly wasteful of other people's computers, which is really unethical.

In life-or-death situations, the saying "If a person doesn't look out for themselves, they'll be punished by heaven and earth" must be firmly remembered.

Xing Baohua then controlled multiple botnets to transfer the data packets he received to his own hard drive.

The task of recovering the hard drive was left to the programmer from his hometown, while he busied himself with cleaning up the traces.

The program written by Geng Xin had now made contact with the other party's tracking system.

The hidden performance was revealed, not only without the other party noticing, but also exposing the real IP address.

In an emergency defense situation, it is impossible for the other party to hide their IP address using a botnet, as starting a botnet takes time.

Xing Baohua took advantage of this to get the powerful tracker to keep up.

The recipient's address is located in Florida.

Xing Baohua believed that the other party was not a single person, but definitely a small team, perhaps even equipped with a dozen or so computers or small servers.

After completing the cleanup work, I taught the trainees how to clean up the traces. Basically, it involved finding the logs, deleting the contents of the logs, and then formatting the logs again.

Regardless of whether those compromised computers contain important files, just format them and that's it.

This is still Xing Baohua's relatively elegant approach; if the program driver were blocked, the botnet machine would be rendered useless.

After handing over the follow-up cleanup work to the trainees, Xing Baohua began making preparations again.

First, they used botnets to infiltrate the servers of a Florida internet service provider. At that time, the telecommunications company was called Ricard Telecommunications.

It was only later that it developed into the massive Vodafone Group.

The servers of Ricard Telecom had firewalls. Xing Baohua took one look and realized it was a firewall they had developed themselves. He had the key and could easily bypass it.

But after a short while, he closed it on his own and re-entered it.

He's a disruptor; if he could get in too easily, it wouldn't be good for S.H.I.E.L.D.'s security. So there needs to be some trace of his disruptive power.

By deliberately leaving some clues, and using the data from the branch office's server backend, they were able to find the real-world address of the person controlling the email account.

It even includes phone numbers and names.

They attacked the other party's IP on the Ricard branch's server, not cautiously, but openly and brazenly.

During the intrusion, one obstacle the attacker used was a network distributor.

Seeing 192.168 on the distributor...

Log in, which means, in layman's terms, hacking into the other party's router. There is only the manufacturer's firewall here, and no physical firewall chip has been artificially installed.

At this point, the main protection is on the computer.

By checking the IP addresses assigned by the router, you can determine how many machines the other party is using.

The other party used a device with port 16, but it showed that only 12 addresses were allocated, which means that there are currently 12 computers working.

The router's cache was too small to store the software program written by Geng Xin, so Xing Baohua had to use his previously made small tracker to monitor the other party's data.

Xing Baohua came up with a plan: to detect and monitor the other party's data packets. He decided to target the Ruikaer server, where the hard drive had enough space to temporarily store files.

Treat this server as a small cloud platform. No need for any protection. Just transfer the cached data to a controlled botnet and use the botnet to send the data out via email.

The process involves many steps and is indeed troublesome, but the safety is guaranteed.

"Old Huang! I've found a few hackers in the US who are targeting us. Didn't you know you hired a private investigator beforehand? I'll give you an address. Have your private investigator investigate and find out who they are. Tell the private investigator not to alert them."

Once you have the other party's information, have the private investigator sign a confidentiality agreement and increase the penalty for breach of contract. Yes, handle it through import.

After saying that, Xing Baohua sent an email to Huang Xingyao.

I worked until evening and finally finished the layout. As for the data recovery, it's still a bit slow. A lot of the recovered data is showing as empty.

However, the fact that there is still some capacity indicates that the recovery software does not support a certain file format.

It requires gradual collision testing and increasing the number of supported file formats before it can be displayed; this takes patience and time.

Xing Baohua glanced at his watch and said, "I'll treat you guys to a big meal tonight. The software you co-wrote is very useful, but it's a bit too large, so it can't be installed directly on the other person's computer, which greatly reduces its effectiveness. Using remote access makes it easy for someone to track you down."

"Boss, I think we should forget about it. We're here to learn, so it's only right that we contribute. There's no need to waste money on a fancy meal."

"It was said by a bespectacled, somewhat refined young man."

Xing Baohua waved his hand and said, "With current prices, you can eat delicacies for a hundred years and I won't go broke. Alright, let's not dwell on these things. Everyone, pack up and we'll continue the work we haven't finished tomorrow."

As he spoke, Xing Baohua came out first and made a phone call to the seafood restaurant to reserve a table.

When the group arrived at the place, they were first asked to sit down. Xing Baohua asked if they wanted some baijiu (Chinese liquor) or beer, and if they preferred red liquor, he suggested they drink red liquor.

A group of intellectuals all shook their heads and said they didn't want to drink. Fine, Xing Baohua didn't insist. He made himself a bottle of baijiu and drank it himself, since he was fine anyway.

This chapter is not finished yet. Please click on the next page to continue reading the exciting content!