Chapter 472



Chapter 472

Even with firewalls, HK Airlines' servers can't prevent Xing Baohua from accessing them for the time being.

As if entering his own home, Xing Baohua came and went freely, and it didn't take much effort for him to find Lin Jianye's flight number and departure time.

The destination is Paris, the capital of the Rooster Kingdom.

There's still half an hour until takeoff; I guess everyone's already on the plane waiting to take off.

Xing Baohua simply didn't have time to bring the person back.

They had no choice but to call Zhao Shanhai and ask him to arrange for someone to intercept them at Charles de Gaulle Airport in Greater Paris.

The task is very difficult; it's hard to find someone without any information or photos.

Xing Baohua suddenly remembered that he had some privileges at certain banks. Why not take advantage of them? He immediately called a senior manager at HSBC, saying that he urgently needed to go to Greater Paris and asked for the fastest flight to be arranged.

Trying to cram at the last minute is simply impossible, yet Xing Baohua managed to persuade the plane to wait for him for half an hour or forty minutes.

Why go to HSBC? HSBC has shares in HK Airlines. It's just a matter of superiors communicating and making arrangements, thus bypassing the rules.

It's not uncommon for super VIP clients like airplanes to experience delays. Flight delays are perfectly normal, and boarding a plane doesn't guarantee it will take off on time.

After contacting the airport, Xing Baohua handed Lin Jianye's information and work photos to the two guards. She quickly wrote down Lin Jianye's seat number on the plane and how to contact Zhao Shanhai.

Xing Baohua really wanted to go in person, but he was afraid that if he left, the company's mole would continue to use him to lure others away from their posts.

The two guards' job was simply to follow Lin Jianye closely; the arrests and interrogations were none of their business. They just needed to complete this easy task and fly back.

Xing Baohua had just finished arranging things for the two guards and was watching them leave when the programmer from his hometown quickly told him that his email had sent an alert.

He immediately threw himself back into his work, and when he opened his email, he saw hundreds of IP addresses.

The tracking virus disguised as a file has been activated, and the addresses of all the botnets used by the hacker during the download process appear on the screen.

Copy all the addresses; you can use them as your own botnets later.

"Let's see where it ends up?" Xing Baohua said to the programmer from his hometown, meaning he wanted to see where the file would eventually be downloaded.

"Boss, something's not right. The other party's download speed is a bit too fast," the programmer from my hometown said, looking at the screen.

Xing Baohua glanced at the progress bar and was somewhat shocked.

He then logged into the main server and checked the download speed, which had reached the theoretical value of 56K.

This is a full load, maximizing the network speed!

Have you already figured out the download software?

Xing Baohua was delighted by the appearance of the download software, but the other party's purpose was not righteous.

The earliest download websites were USENET and FidoNet. USENET was created in 1979, and FidoNet was created in 1984. They both had one thing in common: peer-to-peer downloads.

Xing Baohua also uses the same peer-to-peer download model, but integrating scattered and distributed files will take time to evolve. Of course, this will lead to the development of P2P technology.

Xing Baohua didn't know what download technology the other party was using, but it definitely wasn't P2P.

Being able to download the full volume of online content is beyond the capabilities of many technologies. If this technology were used to watch movies online on his video website, it would be quite impressive and would provide a great viewing experience.

Unfortunately, the other party was an enemy.

Xing Baohua told the other party to continue downloading and see where it would eventually end up.

The number of IP addresses displayed on the computer screen is also increasing.

Geng Rui, who had no work to do at the moment, also watched their operation closely. She didn't dare to ask Xing Baohua any questions, and instead asked the programmer from her hometown if she didn't understand something.

A dozen minutes later, the programmer said to Xing Baohua, "Boss, the download has stopped, and the final address has appeared, but I checked the address and something's not right!"

Xing Baohua came over again and asked, "Is there something wrong with the address?"

"Look?" he said, pointing to the screen and showing Xing Baohua the addresses of global IP region representatives.

The comparison is quite startling.

Final destination: US defense.

Yes, that's the location of that pentagonal building.

"Shifting the blame eastward?"

The first word that came to Xing Baohua's mind was this.

Just to be on the safe side, he said, "Check it several times. See if any spoofing techniques were used?"

Geng Rui interjected, "They steal information like this? Who will dare to put important data on their computer in the future?"

Xing Baohua didn't speak, as it was indeed difficult to explain to her how to save important data and how to set up a firewall.

In the eyes of an expert, there is no computer that cannot be accessed as long as it is connected to the internet.

Even with high security levels, bank vaults can still be burglarized.

Similarly, driven by profit, people will consider whether stealing something is worthwhile.

Xing Baohua knew the contents of the document; the US defense wouldn't need those things. Besides, neither the US defense nor the White House contained many important items.

After being taught a lesson by some of their country's top internet experts, they switched to single-line networking for key information.

The difference is between an intranet and an extranet; through an extranet server, you can only access other people's extranet websites.

They say someone hacked into the US defense website, which sounds impressive, but it's really just like the University of Hong Kong—anyone can get in easily. The only difference is that at least the US has designed several firewalls to increase the difficulty and keep you entertained.

Xing Baohua is currently only using virus tracking; he's not foolish enough to dive headfirst into it, especially since that place is fraught with traps.

This chapter is not finished yet. Please click on the next page to continue reading the exciting content!

Continue read on readnovelmtl.com


Recommendation



Comments

Please login to comment

Support Us

Donate to disable ads.

Buy Me a Coffee at ko-fi.com
Chapter List