home

search

HK159 plots second cyber war

  Hacker HK159 plots second cyber war

  Facing Li Kun Ning's inquiry, Li Cai fell into deep thought and for a moment he couldn't make a decision.

  Li Kun Ning saw that Li Chai was unmoved and once again threw out a heavy condition.

  "Xiao Li, if you come to the Department of Mechanical and Electronic Engineering, our laboratory can be open to you. Moreover, we can also establish a research project on fuel-powered remote control helicopters, and you can personally serve as the leader of this project!"

  Li Chai's breath caught in his throat, and after this condition came out, he had no way to refuse!

  "Professor Li, you're serious?"

  Li Kun Ning nodded, "However, Little Li, your graduate school advisor can only be me!"

  After a morning of discussion, Li Kun-ning's technique was recognized by Li Cai, who nodded: "Professor Li, I agree to transfer departments!"

  Li Kun Ning burst out laughing: "Haha, okay! We'll go take care of the transfer procedures today! By the way, isn't my daughter your class teacher? That makes things a lot simpler!"

  Shi Ke's heart let out a sigh of relief for Li Chai, this was Li Chai's opportunity, with Li Chai's level, his future achievements would absolutely not be low.

  After lunch, Li Zhiyue was called by her father Li Kuning to go through various formalities together. Even Little Li was taken along the way. Shi Ke returned to Jingya Garden with a belly full of resentment.

  Jingya Garden 2003 room, Shi Ke first opened the behavior dynamic capture program of server No. 1, connected to the public server of Shuangqing University, logged in to the school's intranet forum, and took a look at the school's gossip news.

  University life is boring, all kinds of gossip in the forum, it's all those annoying people talking nonsense!

  Shi Ke browsed through the school forum and found that after a period of time, his legend had faded away, and he was already forgotten by the Jianghu.

  A recent hot topic on the school forum is the campus noon radio program, which was reorganized by Zhu Dan from the News Broadcasting Department and achieved unexpected success.

  The campus noon radio program basically invites one relatively well-known person from the school each time, not limited to students, and even teachers. For example, Ji Mingyi, the dean of the computer science department, has been on this radio program.

  After browsing the campus forum for a while, Shi Lei didn't find anything interesting and used the public server of Shuangqing University as a springboard to open the homepage of the hacker union and check out its latest developments.

  Hackers Union is a weathervane of hackers in China. Their moves, to some extent, represent the trend of Chinese hacker community.

  Shi Ke logged into the Hacker's Union forum with his ID, Blackstone. As soon as he logged in, a series of notification sounds appeared. Shi Ke opened the message system and found that he had been promoted from an official member to an internal member. In other words, he was now considered part of the inner circle of the Hacker's Union, giving him some degree of speaking power within the organization.

  The registered members of the Hacker's Union, originally over 150,000, nearly doubled after the last big riot in Tokyo, Japan, reaching 300,000! The number of formal members did not increase much, still around 33,000 people. One internal member was added, Shi Lei!

  Although the hacker union has a large number of registered members and formal members, its internal members only have 461 people, including Shi Lei's Black Stone Armor.

  From the number of internal members, it can also be seen that the rights of internal members are much greater than those of formal members.

  As an internal member, Shi Ke entered the internal forum of the hacker union openly and uprightly, without having to sneak in like before.

  Inside the forum there is an online member exchange area, Shi Ke has just entered the internal forum, several online internal members sent welcome messages at the same time, welcoming him as a new member.

  Shi Ke responded politely and humbly, expressing that he was new to the scene and hoped that his seniors would take care of him.

  One of the internal members, named Hei Ji, posted a URL of a hacker alliance on the public screen and asked: Our alliance is about to launch another attack on Wosangguo, do you brothers have time?

  The hacker alliance achieved great success in the last invasion, not only making a name for itself but also doubling its registered members, which is a real benefit. Although the hacker alliance is a non-profit organization controlled by ten core members internally, it doesn't mean it doesn't make a profit!

  In fact, hacker unions have a lot of income!

  For example, the popularity brought traffic, and some advertisers found the hacker union. On the website of the hacker union, some advertisements were placed.

  Some network security companies invite hacker unions to test their new products or system vulnerabilities, and they also need to pay a considerable fee. There are also some secret channels for profit, which allow the ten core members of the hacker union to earn a lot!

  Because of the interests driving it, and also because of the previous invasion of Wosan country, the hackers on the other side did not know for what reason they did not resist at first, and later the resistance was very small. So, the core layer of the hacker alliance prepared to launch a second network war against Wosan country.

  Shi Ke opened the webpage to take a look, and indeed it was a notice of preparation for battle. This notice could only be seen by internal members, formal members and registered members did not have permission to view it. Registered members were basically cannon fodder, before the battle, the alliance would uniformly distribute attack tools, letting them hold the tools and win with numbers.

  As for formal members, they have independent attacking capabilities, but their technical strength is uneven. When the alliance arrives, provide a sheltered server and let them mess around at will.

  The real backbone of the hacker union is the internal members!

  Shi Ke finished reading the message and secretly wondered what the hacker alliance was trying to do. Did they want to provoke a cyber war between the two countries?

  In fact, the reason for this move by the hacker alliance is still Shi Ke!

  Shi Ke initially used the pseudonym "Lucifer" and repeatedly appeared on NHK TV in Japan, even insulting Japan's sacred Atago Shrine. This made NHK furious, and they sought help from the Ministry of Foreign Affairs' International Information Bureau to track down Shi Ke and try to capture him.

  However, Shi Ke was extremely cunning and had very strong technical capabilities. He led a group of JFS tracking experts to frame the hacker alliance.

  The hacker alliance suffered a disaster, and the experts from JFS fought fiercely, finally barely repelling the JFS experts. Or it can be said that the JFS experts also knew they were being toyed with by Shi Lei after being tricked, so they withdrew voluntarily!

  After being beaten by JFS's experts, the big brothers of the hacker alliance were very unhappy and decided to launch a second war to teach those guys from Wosangguo a lesson!

  This time invading the State of Wosang, the Black Hacker Alliance did not plan to take action alone. The second generation of hacker organizations has a total of three, with the Black Hacker Alliance being the most active and representing the Xia State's hacker community. There are two others, namely the Dark Night Dynasty and the Great Xia Alliance.

  These two hacker organizations, who have learned from the first generation of hackers and are hiding in secret, do not reveal themselves to the public. Although these two second-generation hacker organizations have not appeared much, their strength is extremely powerful, and compared to the Hacker Alliance, they are only one line apart!

  Hackers' Union this time, sent an invitation to the Dark Night Dynasty and the Great Xia Alliance, letting them work together to deal with the black hacker world of Wosang State.

  The hackers in Xia Guo are not as good as those in Wo Sang Guo, but the overall strength and number of them are slightly higher than those in Wo Sang Guo. The population advantage of Xia Guo is reflected here, which cannot be compared with Wo Sang Guo!

  If three second-generation hacker organizations join forces, they can absolutely recreate the civilian internet network of Wosangguo and cause big trouble!

  Unfortunately, the Dark Night Dynasty and the Great Xia Alliance seem to have made up their minds to get close to the first generation of hacker organizations, hiding themselves in seclusion to cultivate quietly, without responding to the Hacker Union's invitation.

  The hacker alliance naturally did not want to give up, since the second-generation hacker organization was not participating, they could invite the most active third-generation hacker organization. Although the technical strength of the third-generation hacker organization was somewhat weak, their numbers were large, and there were also some technically stunning younger generations among them.

  In the third generation of hacker organizations, the four most powerful ones were contacted by the Hacker Alliance. They are Shengshi Dynasty, Shadow Assassin, Crazy Tribe and Black Phantom. These four third-generation hacker organizations accepted the invitation from the Hacker Alliance without hesitation.

  In the early days of the previous Wosangguo cyber war, they were also the main characters and got some benefits. This time the hacker alliance is at the forefront, how can they not follow to get a share?

  Representatives of the four third-generation hacker organizations announced the attack on their official websites' internal forums to members above formal membership. Moreover, these four third-generation hacker organizations also pulled in skilled hackers who were usually friendly with them, as well as other medium and small-sized third-generation hacker organizations, forming a massive hacker lineup. This is why news of the Hacker Alliance preparing for the second network war spread like wildfire!

  Shi Ke, under different pseudonyms, infiltrated the internal pages of various hacker organizations' official websites, viewing plans for a second invasion of the Wosangguo network.

  If this plan is really carried out, Wosangguo will be in big trouble!

  Of course, this is based on the assumption that the hackers of Wosan country are like last time, initially not resistant and later resistant but not strong. If they had resisted with all their might from the beginning, both sides' interconnected networks would have suffered disasters of varying degrees!

  Shi Ke didn't care about whether it was a disaster or not, but rather what benefits he could gain from this war.

  The hacker alliance and the four major third-generation hacker organizations can gain enough fame from this war to take their organization to the next level, which is their motivation for launching the war.

  Some lone wolves joined this war, perhaps because they wanted to make a name for themselves, or perhaps because they wanted to satisfy their destructive desires, or perhaps because they wanted to steal some data.

  Shi Ke thought to himself, with such a good opportunity to muddy the waters and fish in troubled waters, what benefits could he gain from it?

  Perhaps he can

Recommended Popular Novels