The Technology Tree of Xueba

Chapter 59: Hacking (on)

小 "Xiao Mi, how is the data center? Is the data connection between Protoss bracelet and the data center interrupted?"

Zhou Zhouyu immediately contacted Xiaomi and asked him what he was most concerned about.

Xiaomi Mi: [The data center was attacked. The hacker did not breach the data center server firewall. The data is intact and the server provides normal network services for the Promise bracelet. 】

After reading Xiaomi's report, Zhou Yu said easily, "The data center is okay, and the service of the Starlink bracelet has not been affected.

Don't worry, our data center is very secure. Except sending people into the data center to read the data directly through the storage matrix, there is no other way to get the data. Xiaomi can directly destroy the hardware at the most crisis time. Cyber ​​attacks are completely pediatric. "

云 Zhang Yunqiang wiped the sweat on his head and said cheerfully: "This is also the first time I have encountered a full range of hacking attacks, and my heart is a little flustered. I will go back to find the cause and resolve the situation of network inaccessibility."

"I will go with you. If you encounter a difficult problem, you can also call Xiaomi to solve it. Your permissions cannot use some of Xiaomi's functions.

Xiaomi, cracked the hacking methods, and tried to fight back. Zhou Yu said.

Zhou Yu and Zhang Yunqiang came to Xinghuo Intelligent's office area together, and the R & D center was moved to the High-tech Park in Daxing District. Most of the area below this floor, even if Xinghuo Intelligent expanded its staff several times, it was enough to accommodate them.

Xiaomi Mi: [The specific cause of the problem has been found. Our company's website cannot be parsed, resulting in external inaccessibility to our company's official website. 】

[The honeypot decoy system is being deployed on the server, and the hacker information is collected through an anti-intrusion program, in preparation for finding the real location and identity of the hacker. 】

云 Zhang Yunqiang saw the analysis results presented by Xiaomi, and he speculated: "If the root server fails, all websites will be inaccessible, but now our company's website cannot be accessed.

推测 I speculated that it was a hacker who attacked the DNS server. He polluted the DNS server and made our company's domain name unresolvable.

The DNS server is the domain name of the backup root server. The DNS server arranges DNS servers in each zone, and they resolve local domain name access requests.

This attack is very easy to resolve. I immediately contacted a well-known DNS service provider and asked them to resume resolving our company's domain name. "

Zhang Yunqiang began to send multiple emails to the world's mainstream DNS service providers.

他 When he received feedback from the DNS service provider, his face changed slightly. He immediately reported to Zhou Yuhui: "General Manager Zhou, it is not a DNS problem, it is the main root server in the United States that deleted our company's domain name.

This means that our company website is deleted directly from the Internet. "

"The US authorities have done so absolutely, they are not afraid to cause a chain reaction." Lin Yun asked just after entering Zhang Yunqiang's office.

She was unable to access the official website, and the courier company could not read the information of Xinghuo Technology, and came to Zhang Yunqiang urgently to solve it.

Zhang Yunqiang immediately introduced: "The IPV4 root server is managed by the Internet Corporation for Assigned Names and Numbers. This is a private company. He is not directly managed by the US authorities.

Cancel the corresponding domain name directly according to the company's internal rules and regulations. "

"I see. With the launch of the Protoss bracelet, Apple's stock price fell slightly, and US stocks fluctuated suddenly.

International Capital took the shot and let this domain name management company directly blacklist us, create topics, and take the opportunity to blow our company's reputation.

I remember that there is no IPV6 root server in China, can he not provide us with parsing services? Zhou Yu asked.

云 Zhang Yunqiang said with a bitter smile: "General Manager Zhou, we veterans in the industry have always understood that the word Internet is not very accurate, and the exact word that accurately describes the Internet is called the 'American Internet'.

The United States is an absolute hegemon in the Internet field. More than 99% of network protocols are established by the United States. They also control all the main root servers for domain name resolution.

The domestic snowman plans to establish an IPV6 root server network. It needs to connect data from the 倭 national root server.

I'm sorry, the Snowman plan is to build a local area network with IPV6 as the core, which is not as powerful as imagined.

公司 Our company can rely on IPV6 root server in China to provide analysis services.

But the IPV6 network protocol is not popular. Most networks still use the IPV4 network protocol, and foreign netizens cannot access our official website. "

"Why didn't the network service of Xingling Bracelet be affected?" Zhou Yu responded and asked.

"Zhou, the root server resolves the domain name. Morningstar system has the built-in IP address of our server, it does not need to go through the root server to resolve.

不 An inappropriate analogy is that you need map software to guide you when you travel to other places.

But when you return to your home, you already know this direction, so you don't need to have map software to navigate.

Not only is Morningstar system accessing our company's official website, but also the Android system using our developed software, but also directly accessing the official website. Zhang Yunqiang explained.

"Is there any way to let netizens directly access our company's website through a browser, and the express data should be restored as soon as possible." Lin Yun anxiously urged.

云 Zhang Yunqiang shook his head and said: "It is definitely impossible to access without a domain name unless he directly enters our company's IP address.

Access using an IP address is very complicated. To open a sub-page, you need to enter a different IP address again. Who will access a website through such a troublesome method? "

Zhou Yu suggested: "You can develop a desktop applet. As long as you click this applet, you can directly call your browser to log in to our company's website and automatically assign an IP address to it."

"This is‘ not the way ’, it ’s easier than entering an IP address.” Zhang Yunqiang sighed.

立刻 He immediately wrote a small desktop program. UU Kanshu www.uukanshu.com only needs to run once, and this computer will always remember the IP address of any interface of the official website of Spark Technology.

On the other side of the ocean, Apple's network engineer Jemstin is staring at the computer and typing on the keyboard from time to time. He also has another identity, the captain of the dark web famous hacker team Dark Gemini Lucifer.

[Lucifer]: "Hadis, have you breached the firewall of the Spark Technology Data Center server?"

[Hardys]: "I have all cracked the 100th layer firewall and still have not cracked the server.

I have now been discovered by Spark Technicians and I am dealing with them.

How do I feel that the firewall is endless and I can't find a chance to start. "

[Lucifer]: "As long as you have the source code of the artificial intelligence technology of Spark Technology, it will be $ 5 billion."

[Hades]: "The dark web reward is blocked by us. Now it seems that the money is not easy to make. We directly remove the reward block.

It directly caused hackers from all over the world to attack Spark Technology. We stirred the water and waited for the opportunity. I do n’t believe that Spark Technology can resist attacks from hackers around the world. "

[Lucifer]: "This idea is really good, but not all hackers are as lawful and evil as we are, only attacking the task target and not actively harming others.

Many of the hackers who are the same as ours are violent, and their shots can definitely cause a big wave of Xuanyuan. I don't believe that Spark Technology will not show vulnerabilities at that time. "

The world famous dark web has announced a huge reward.

"Xinghuo's artificial intelligence source code, valued at $ 500 million."

悬 This reward is guaranteed by many well-known institutions on the dark web. It is absolutely true and credible, and the bonus is guaranteed to be redeemable.

The high price of the reward immediately made international hackers smell the wind.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like