Jiangcheng, Datang Technology Company.
Li Yun was not idle during this period of time, he also did some things in secret.
For example, support the Emperor Bar in going on an expedition.
Since domestic netizens have to climb over the Great Firewall, they are bound to be unsafe and face virus attacks, and their accounts may even be lost.
In order to ensure everyone's benefits, Li Yun naturally has to use other means.
He naturally won't appear in public.
but,
After a period of time, a group of so-called enthusiastic netizens appeared on the Internet. These netizens were quite resourceful and always used simple methods to solve some technical problems of ordinary people.
actually,
These people belong to Datang Technology Company.
They are all people from the "Zero" company. If they were placed in the outside world, they would also be powerful hackers who would perform certain bug detection on various electronic products.
All I can say is,
If you understand one law, you will understand all laws.
Among many so-called hackers, there are quite a few who are proficient in not only one field, but two or three fields and have unique strengths.
Just when Western hackers started to make trouble, Li Yun quickly got the information.
original,
The people on our side were just "enthusiastic netizens", but they ended up being like the soldiers on the beacon tower, the first to see the enemy coming.
Oh my god!
Li Yun had thought that the United States would use shameless and vulgar tricks, but he did not expect that the United States would directly use hackers to attack, as if it wanted to paralyze many facilities of Xia Country.
It would be better to create some damage so as to better guide the so-called public opinion.
This is really a bit cruel.
Li Yun first informed the national level of the news. To be honest, he knew quite a few important people, including Tang Long, who was close to him.
As the leader of the industrial survey team, he must be aware of the severity of the impact of hackers on industrial production.
A little further away are the bigwigs from various military forces.
It’s true that the so-called hackers and information attacks are also matters of special concern to the military. A truly powerful virus may paralyze the entire military command system.
If that happens, it will be a devastating blow to the command and operation.
so,
After Li Yun woke up, relevant network technicians immediately took action.
In addition to defending some important departments and facilities, they also have to try their best to launch a counterattack.
You've bullied us right to the door, and you won't allow us to fight back?
in,
I also want to set a trap so that hackers will have to invade a fake one, even if they have to. Maybe there will be a different result.
Anyway,
Everything is moving in full swing.
For the "zero-clear" companies, they are more or less ready to go. They have always been very low-key. Now that they finally have an opportunity, they naturally have to cherish it.
…
Beautiful country, the Pentagon.
After the relevant orders were issued by Congress, their relevant technical personnel took action, intending to show Xia Guo a little bit of their power.
The beautiful country is quite confident in this aspect.
Their educational method is most likely to produce computer talents, and Apple founder Steve Jobs is an example.
They began the invasion with great enthusiasm.
At the first level, they entered Xia Country's Internet. As soon as they entered, they felt that the sky was vast and the ocean was open to them. Information was readily available, and there seemed to be no obstacles at all.
I have to say,
There was a thief who broke into a house and found that the house was not locked at all. He could enter almost any part of it.
In fact,
This is a fake target specially arranged to prevent Internet intrusion, in order to induce the other party to launch certain attacks and thus cause certain losses.
Why should we let the other side attack a certain target?
This is naturally for the purpose of making the counterattack more legitimate. If the other party does not attack a certain target, where can we find a legitimate reason?
After the people from the United States began to attack, the quantum had already been formed.
actually,
Even if the military, Xia country hackers and the "zero-clearing" company work together, they cannot stop all hacker attacks. They can only protect more important scientific research institutions, hospitals, important companies, etc.
During this period, a series of garbled characters appeared on some school websites and even social networking pages.
That was the news that the Internet had been conquered.
Related news also spread on the few remaining platforms on the Internet in Xia Country.
As everyone knows, after the Diba launched the expedition, the United States actually sent hackers to attack, which is extremely shameless.
Some hospitals have not been breached now because they are guarded by some people with lofty ideals.
To be honest, netizens were very angry after hearing about this incident, and even wanted to do something about it. It was really impulsive.
certainly,
The first thing to do is to scold him.
"Beautiful Country is disgusting. There is no country more disgusting than this. You are not allowed to talk about the things happening on our own Loli Island."
"You told us not to say it, but you said it anyway!"
"He's really not a human being. However, we have hackers protecting Xia Country, so I feel a little relieved."
This chapter is not over yet, please click on the next page to continue reading!
Continue read on readnovelmtl.com