Friends, all attacked him.
7480 kept shaking his head, his attitude becoming increasingly relaxed: "It's useless. They are no match for Zhu Jianrui."
It was not until this time that Zhuang Li posted a new post.
Thanks to that previous post, his fame on the dark web had reached its peak. Whenever he spoke, hackers from all over the world flocked to him and listened attentively. This time, he didn't praise how powerful MIK's network was, but instead pointed out two fatal vulnerabilities in the network - "Meltdown" and "Spectre".
Through the "meltdown" vulnerability, low-privilege users can also cross-border access to the system's memory and download local data.
The Spectre vulnerability allows attackers to use malicious applications to obtain user-level private data that should be isolated.
In other words, as long as these two vulnerabilities are found, the previously unbreakable MIK network will become a sieve.
After finishing his haircut, Zhuang picked up his coffee cup and sat in the afternoon sun, enjoying the comfort and tranquility of the moment.
However, a frenzy of activity erupted online. To verify the existence of the two vulnerabilities, countless hackers swarmed into MIK, and were pleasantly surprised to discover they had succeeded!
Meanwhile, Zhu Jianrui, who was sitting in front of his computer watching the hackers' defeat, was shocked. His computer screen was black, and no matter what key he pressed, it wouldn't start up, and even a forced shutdown wouldn't work.
Immediately afterwards, his secretary rushed in and said quickly, "Boss Zhu, something bad has happened! All the computers in the company have gone black!"
"Tell everyone to calm down and don't panic. I can solve this problem right away." Zhu Jianrui took out his laptop, connected to the intranet, and started fighting back.
But it was no use. The hackers had already swarmed into MIK's management backend and logged out of personal computers and servers on a large scale.
Within seconds of Zhu Jianrui turning on his laptop, more than 1,000 personal computers and 500 servers of MIK were logged off, and all backups were cleared.
Zhu Jianrui tried to recover the data, but discovered that the boot sector had also been deleted, and all internal data had been stolen and shredded. In other words, there was no way to recover MIK's system, and the lost files could never be found again.
Cold sweat instantly broke out on his forehead. Without thinking, he took out another mobile phone from the secret compartment of the drawer and sent a message: "Come to help!"
As the most powerful hacker in China, he naturally has a large group of hackers gathered around him, and he is their leader, with authority that can command the attention of all.
These people quickly joined the battle and tried their best to help Zhu Jianrui rebuild MIK's defense network.
Sitting in the afternoon sun, Zhuang Lijing watched the scene leisurely and comfortably from his laptop. He had long expected that Zhu Jianrui was not working alone, but he was surprised to find that the broker named Mima was also a hacker and completely obeyed Zhu Jianrui's orders.
This is interesting.
Mima secretly helped the Gong family do many things. If he was Zhu Jianrui's subordinate, it means that Zhu Jianrui knew his life experience a long time ago and secretly influenced the development of the Gong family. How old was he at that time?
"Zhu Jianrui is becoming more and more interesting." Zhuang Li sighed nonchalantly at the dense forest outside the window.
7480 secretly cheered Zhu Jianrui on: "Come on, protagonist! You can do it, you're so amazing, you can definitely do it! Hang in there!"
Fortunately, Zhu Jianrui's team held on. They quickly rewrote a new set of defenses, covering up the previous loopholes. MIK's network became impenetrable once again.
At this moment, Zhuang Li posted another message using the identity of an American hacker, pointing out several loopholes in the newly written defense program.
These vulnerabilities, known in the industry as "zero-day vulnerabilities," are exploited immediately after discovery. They remain largely unknown, making them vulnerable to hackers. Companies targeted by these attacks often have no idea how to defend themselves against them.
The Internet is made up of tens of millions, or even hundreds of millions, of programs, and it's impossible for every program to be seamlessly connected. When running, they will always produce some kind of calculation error, which is what the public calls a loophole.
In fact, the more programs there are, the more vulnerabilities there are. Zhu Jianrui's team boasts of their advanced technology, and their newly built defense system is actually composed of tens of millions of programs.
In the eyes of other hackers, it is impregnable.
But in Zhuang Li's eyes, it is just a big net, full of loopholes.
The zero-day attack began, another frenzied plunder. MIK's new network collapsed shortly after its construction began, and this time, even with dozens of the best hackers around him, Zhu Jianrui couldn't turn the tables and finally smashed his computer in frustration.
He roared like a madman, grabbed his hair fiercely, and finally fell to his knees helplessly.
He knew that the MIK he had just acquired was finished! Because its database not only contained all the stars' private files and scandals that could not be exposed to the public, but also all the films and TV series that MIK had invested in and produced recently.
If hackers spread the scandals of those stars to the Internet, MIK will become notorious.
If hackers make those movies and TV series into torrents for people to download for free, MIK will lose all the billions it has invested.
Zhu Jianrui faced bankruptcy just after he bought the company. It turned out that he had been in charge of this skyscraper for less than a day.
Outside the window, a blood-red setting sun slowly set, just as the brilliant life of this talented young man ended before it even began.
Continue read on readnovelmtl.com