There's no other way; the main lines in the server room are fast and have high bandwidth. Using a computer to find and control a chicken (a type of virtual machine) wastes a lot of time and causes frequent freezes.
Therefore, Xing Baohua could only use the server to attack other chickens as a springboard.
Utilizing the bandwidth of the main line will save more time.
Chicken is easier to find during the day, but most companies close at night, so Xing Baohua can only search during the day.
Servers are multi-functional machines that can be used as computers, but they cannot utilize the full performance of a computer.
A computer can also be used as a server, but it lacks the computing power required for a service.
Moreover, they run on the same CPUs, and most server CPUs are high-performance CPUs.
In later years, some businesses sold retired server CPUs as game consoles.
The price is cheap, and you can play high-end games, which opens up another market channel, but it is easy to fail.
When George came to tell Xing Baohua that the company's server was connected to the main line and could be used, he even provided a backend address.
Xing Baohua put George in charge of the company website construction, finding people or something else, to get the company website up and running first; he was the new head of this department.
George happily went to do it.
Xing Baohua glanced at the backend address and password, which was again TM's admin.
It's not surprising that Xing Baohua complained. At that time, very few people knew how to manage the backend, and the passwords given were the initial passwords. Some people felt that there was no need to change them.
This is why all the initial passwords were the same.
Just like when you buy a new router, the initial password for over 90% of the time is "admin".
There are even fewer like the basic ones.
Xing Baohua stored all the IP addresses of the computers he controlled for the chickens on the server, then allocated space for them, creating a hidden space, and encrypted it using a small tool he wrote.
To crack his system, you would have to do it directly on the server; if you try to do it over the network, it would take three to five months.
Internet speed alone limits the time available.
In this way, Xing Baohua used his computer to control his server, and then used the server to find and crack chickens to use as a springboard.
Xing Baohua didn't dare to grab too many chickens; he felt that thirty-odd chickens were enough. Any more would slow down the main network, and the network engineers would be busy troubleshooting.
In a game where card games are generally played at a slow pace, a brief pause is normal and will not raise any suspicion.
Xing Baohua controlled most of the chickens from various states in the United States, using them as cover to launch attacks on the websites of banks such as Citibank, Lehman Brothers, Morgan Stanley, Wells Fargo, U.S. Bank, and Goldman Sachs.
Although their website was just a promotional poster with no real functionality, Xing Baohua changed it to a satirical cartoon depicting capitalists herding and eating sheep, all to disgust them.
After changing the image, Xing Baohua began to carefully exit the machine, cleaning up any traces after each chicken dish was removed.
At the same time, a pre-written virus program was placed on the computer's hard drive after the chicken was removed.
Continue read on readnovelmtl.com