Chapter 459 A Business Derived from a Computer Virus



Once the hardware is resolved, a professional platform software is needed to operate and use it.

To maximize the performance of a CrossFire graphics card, you need to prepare multiple software programs to work together.

This led to the development of a new series of personal computers.

workstation.

It is a more powerful device than a personal computer, especially in terms of graphics processing and multitasking capabilities.

It's like playing a game when paired with a high-resolution large screen or multi-screen monitor.

Of course, running high-quality files requires expanding internal storage and hard drive space. If the system is slightly inferior, it will take a long time to open a high-definition image. What kind of high performance is that?

Therefore, the memory capacity must also be increased.

Xing Baohua thought that if it didn't work, he would make a few sets to play with and see how they went.

Who would have thought that the workstation Xing Baohua created was actually for cracking passwords?

For high-end computers like workstations, even the motherboard design and manufacturing processes in Xing Baohua's two laboratories might not be something that the staff could handle well.

Of course, it's just a matter of time, but right now we don't have that much time to think about research and development.

Let's go through the commission process first, and have Intel make a supporting motherboard according to their requirements.

For more complex motherboards, you'll need more powerful southbridge and northbridge chips. Intel is a specialist in designing these chips.

In particular, workstations require multiple card slots, multiple tasks, and multiple interfaces, which necessitates a powerful northbridge chip for support.

This is also one of the most important chips in a computer, besides the CPU.

The Northbridge chip controls the connection of various ports, such as USB, hard drive interfaces, audio interfaces, network card interfaces, and even the total number of PCI threads on the motherboard, the battery, etc.

This was a challenge for Xing Baohua's team. The key issue was that the architects Xing Baohua hired all had their own jobs and simply didn't have the time to work on this for him.

With this idea in mind, I'll talk to someone from Intel about the commission once I'm done with this.

Xing Baohua stopped reading the forum content after that. He shut down his computer and went upstairs to Huahong Group to deal with the backlog of official documents.

Actually, this guy didn't need to go at all; he could have just made a phone call and someone would have brought him down.

This guy just wanted to make his presence known.

After finishing some work at Hua Hong, Xing Baohua returned to Master Zhou's place after get off work. She found her on the phone and didn't disturb her.

After changing out of his formal attire and taking a shower, he met with Master Zhou and said, "Aunt Mei just called and asked me to tell her to thank you for helping her artist out of a difficult situation!"

"It's nothing. I'm just feeling a bit down. I'll go for a walk on the beach. Who knows where they're taking photos? What should we eat tonight?"

"Goji Berry, Yam, and Pork Kidney Soup"

It would have been better if I hadn't asked, because it turns out this person is planning to work overtime tonight!

Humans are indeed complex; they think one thing and do another.

I was a little reluctant before meals, but I looked forward to it before going to bed at night.

The most annoying thing is when something good is interrupted, like getting a phone call just when you're about to give up.

Answer or not? Definitely not!

But if you don't answer and the phone keeps ringing, it means there must be something urgent to tell him.

When I answered the phone, I asked impatiently, "Who is this? What's up?"

The server room called to say the server was under attack again!

Xing Baohua didn't reply, hung up the phone directly, quickly pulled up his pants, and said to Master Zhou, "You go to sleep first! There's an emergency at the company, I won't be back tonight."

"Take care of yourself, don't stay up too long."

"Okay!" Xing Baohua responded and quickly ran towards the company.

He was seething with anger, perhaps because he hadn't vented it, or perhaps the relentless attacks from the hackers were causing him to get angry.

Upon arriving at the server room, I saw that the team I had previously assembled was already busy.

Xing Baohua asked the supervisor what was going on.

"Boss, the other party is showing a DDoS attack, specifically a CSRF attack. We blocked the DDoS attack in time and are handling it the same way as last time."

"Or is it an email attack?"

"Yes!"

Where does the IP address lead?

"Great American Country."

"Has the final address been found?"

"No, the other party escaped using brute force, and there have been no clues since. Now, as long as we deal with the CSRF attack, I think we can find some clues."

"Okay, you go ahead and do your thing. I'll go check the logs." With that, Xing Baohua went to the small room next door to start up his mini server as a secondary machine.

The CSRF attack that the supervisor just mentioned is a cross-site request forgery of the first letter of an English letter.

The most powerful thing about this thing is that it can use a user's logged-in identity to perform illegal operations in the user's name without the user's knowledge.

Unlike the previous method of logging into user accounts, where we obtained the customer's information and password and then logged in manually.

This time, they were posing as customers, which is similar to a phishing website.

The core of this thing is that when customers open a food delivery website, they will see an attractive image. If the image says "Click to eat for free," most people will actually open it.

This image shows a malicious website that has been attacked by CSRF. Under the instigation of the malicious page, the customer unwittingly enters a website that has nothing to do with the outside world.

Without a doubt, the customer's computer was infected with a virus at this point.

Thinking about it that way, this thing isn't that amazing, it's just so-so! But don't underestimate it.

The most lethal aspect of CSRF attacks is that they disguise malicious websites as attractive targets, making them highly dangerous because all your information can be stolen. This could involve sending emails, deleting data, modifying data, forging data, and so on.

My dear reader, there's more to this chapter! Please click the next page to continue reading—even more exciting content awaits!

Continue read on readnovelmtl.com


Recommendation



Comments

Please login to comment

Support Us

Donate to disable ads.

Buy Me a Coffee at ko-fi.com
Chapter List