Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 161 Terrorist Attack

"Go back, remember, be careful of your stepmother and stop believing her." Han Feng sent Zhang Xiaoshu to the school gate and instructed.

Zhang Xiaoshu nodded: "Brother Han, thanks to you today, I don't know how to thank you!"

"Haha, it's just a little bit of work. Don't care too much, let's go." Han Feng waved casually, called a taxi and left.

Zhang Xiaoshu stood at the school gate and saw him disappear at the end of the street before walking towards the school.

Han Feng helped Zhang Xiaoshu this time, and actually helped him. At least he knew that "programming" the brain has actually existed for a long time, but the form is different. Han Feng's angle is controlled from the microscopic and is more thorough, while hypnosis is controlled from the macroscopic, using human consciousness to control people's behavior, which has great uncertainty. Despite this, it is a control method after all. Han Feng thinks this method has great reference value, and perhaps he can use the principle of hypnosis to further improve his super system.

Today, Han Feng's parents will not go home, so the family became his world. After washing up a little, Han Feng continued to write his "virtual bomb".

The "virtual bomb" must be fully controlled and must be able to be self-destructed in order to keep it confidential. This is a new virus. Han Feng himself doesn't know if there have been similar viruses before this. Anyway, it was his first time writing it.

Han Feng used a lot of new technologies during the writing process, which were thought out or exposed to after he was reborn. For example, high-performance compression technology can increase the compression rate by two to three times, and there is also information transfer technology. This technology is similar to p2p. Information transfer can be carried out between each "virtual bomb", which can greatly improve the speed, depth and breadth of information dissemination.

In the second half of the night, the "virtual bomb" was finally written. Han Feng looked at the mini program less than 512k on the computer and showed a knowing smile on his face.

"See if it works."

Han Feng had not verified it before, and he wrote it all the way according to his own design. Due to the existence of a super system, he now writes programs, and his code is almost optimized, and there will be no unexpected errors at all. The whole process is very smooth. If you want to check any professional information, just do it directly in the brain disk inside the brain. There is no need to stop and read books or use search engines. Before, he prepared all the information that might be involved in the brain disk.

The first test is carried out in a virtual machine. The virtual machine is used to simulate the hardware of the entire computer, and then an operating system is installed in the virtual machine, and the "virtual bomb" is implanted. The advantage of using a virtual machine is that programs such as viruses running inside will not have any impact on the external operating system, which is equivalent to providing a layer of protection cover that restricts the viruses inside from spreading to the outside.

Han Feng uploaded the "virtual bomb" to the virtual machine, then decompressed it and ran it. No abnormalities appeared in the entire system. The bomb was hidden silently. Han Feng manually checked it and did not find any suspicious processes and files. It is the most basic to achieve this effect. If the existence of the "virtual bomb" can be discovered directly with the naked eye, there will be no secret problem at all, and it is completely exposed. Then, Han Feng downloaded some commonly used Trojans and virus inspection tools on the Internet, but did not find any abnormalities.

Next is antivirus software detection and detection. As a virus, you naturally have to escape the detection and killing of antivirus software. Otherwise, if you have not yet worked, you will be killed by the antivirus software, which will be really "death before you succeed."

As a hacker, Han Feng has a very good understanding of the antivirus principles of antivirus software. This is the basic skill. The backdoor programs he wrote are all free of killing. If it is not particularly perverted antivirus and firewall software, it will not be found out at all.

There are many types of antivirus software on the market, and their antivirus principles are different. Therefore, Hanfeng cannot only consider avoiding one antivirus software, and must avoid the detection of all similar products.

At the beginning, Han Feng installed antivirus software directly on his machine and then tested it. However, he felt that the process was too complicated, so he simply found a broiler equipped with the corresponding antivirus software and then invaded and implanted the "virtual bomb".

Han Feng tested all the antivirus software he could find, and the result was expected. No software could detect the existence of a "virtual bomb".

And at this time, it was already dawn.

Han Feng was in a very good spirit at the moment. He did not stop. He began the last step of testing - detonating the bomb. The computers and servers he looked for were from the other half of the ball. Of course, in order to avoid alarming the snake, he did not look for the United States, but found more than a dozen illegal servers located in Canada and Mexico, and carefully detonated the "bomb"...

The target server crashed smoothly, and the next time was waiting. The first server to recover was half an hour later. Han Feng invaded in the first place and then walked around. He used the tool software specially written by Han Feng but found no traces of "virtual bombs", which shows that all "virtual bombs" have successfully destroyed themselves.

All preparations have been done, and the next step is the time to implement the plan.

※※※※※

Federal Computer Accident Response Center.

Will, the head of the center, was flirting with his secretary, Kelly, in the office, and at this time, an ignorant guy knocked on his door.

"Dear, someone is looking for you..." Kelly said panting as she was struck by Will against the wall.

Will vaguely said, "Don't care!"

The person outside the door was obviously impatient. After knocking for a few times, he simply smashed it with his fist.

"Bang bang bang!"

"Bang bang bang!"

The violent door smashing sounded like a death-seeking sound in Will's ears.

Kelly: "Dear..."

"shit!" Will reluctantly left Kelly's hot body. Before leaving, he still pinched Kelly's plump peaks.

Will opened the door and saw Robert standing outside the door anxiously, wanting to smash the door with his fist. When he saw the door suddenly opened, his body couldn't control his balance and took a step forward.

"What's the matter?" Will asked rudely. He had a lot of opinions about Robert. This guy didn't understand the world at all. He was a completely workaholic. Will even doubt whether this guy had Germanic blood and was too scheming in doing things. If he hadn't really had the ability and was a pillar-like figure in the center, Will would have let him go.

"Will, this is the latest information we have obtained, very urgent!" Robert said by Will's name. After saying that, he handed Will a document.

Will frowned, for nothing else, just because Rob called him by his name, this guy was still so rude.

After taking the document, Will read it quickly, but his brows were frowning even more violently.

“Is this information reliable?”

"After everyone's analysis and judgment, the reliability of intelligence is more than 60%!"

When Will heard that he was more than 60%, he showed a look of surprise on his face. This ratio almost showed that what was said in the information might happen? After looking at the time, Will did not dare to neglect it. He quickly returned to the office and called Michael the video call of Secretary of Homeland Security.

"Hell, Will, what's the matter with me?" Michael lay on his chair sucking a cigar and said comfortably, "I won't ask me to play golf again. I haven't had much time these days, so it seems that I'm going to disappoint you."

"Minister, intelligence shows that in the next day, the Federation will be subjected to terrorist attacks from the Internet!" Will said directly from the point of view.

Michael was startled by Will's words and almost fell from the chair to the ground. He finally sat upright and blamed him: "Will, be calm! You scared me! Tell me, what's going on?"

So Will talked for a long time but didn't make it clear, after all, he just got the document.

Michael said helplessly: "Okay, Will, I know you are not familiar with this matter, just send the documents to me."

This intelligence gathers intelligence sent by intelligence personnel from the US CIA and the FBI. All intelligence shows that within the next twenty-four hours, the United States will be subjected to a terrorist attack from the Internet. Intelligence personnel and analysts recommend that relevant departments take corresponding security measures to protect this in advance.

Since 9/11, in order to handle similar matters more quickly and accurately, the United States has specially established the Department of Homeland Security, which is the largest government agency adjustment in the United States in decades. The establishment of the Department of Homeland Security has indeed played a huge role in protecting American security.

Anyone who has something to do with terrorist attacks must be treated with twelve points to the fact that all the information this time shows that this terrorist attack is really possible.

However, the intelligence only shows that the terrorist attacks will come from the Internet, and there is no further information on which facilities and places will be attacked, which brings great difficulty and is very passive to the work of the security department.
Chapter completed!
Prev Index    Favorite Next