Light Novel Pub

Chapter 144: You can mess with anyone, but don’t mess with Turing

Chapter 144 You can mess with anyone, but don’t mess with Turing

Zheng Kaige knew Lu Shan’s plan.

If the Internet police take away all the servers soon, we will be in a passive position.

So Zheng Kaige backed up all the data in a group of servers in the fastest way.

And move this group of servers out of the computer room.

After completing this series of things, it was already six o'clock in the morning.

Zheng Kaige took the initiative to ask to stay.

Lu Shan asked Zheng Kaige to take a rest for a while.

Zheng Kaige sent a text message to his roommate, asking him to help him take a leave tomorrow.

Just like that, the two of them, one on the bed and the other on the sofa, took a nap.

2 . on day 8.

Comrades from Jiangzhou City Cyber ​​Police Detachment arrived at the scene.

Leading the team was a handsome and bespectacled police officer named Liu.

Officer Liu is obviously a technical person, and this time he also brought the backbone members of the Internet Police Brigade.

Officer Liu first inspected the situation at the scene and then asked, "Has the server's network cable been unplugged?"

Lu Shan nodded and said, "I pulled it out last night."

"After all, there are some unhealthy links, pictures and texts embedded in it. It would be bad if minors saw them."

Captain Liu was quite satisfied with Lu Shan's emergency response method.

Then the comrades from the Cyber ​​Police Detachment divided into two groups to handle the case.

A group of people searched for evidence on the server, hoping to find the specific IP address that attacked the server.

The other group recorded the confessions of Lu Shan and Zheng Kaige.

Jiangzhou City is an inland city.

There are not many developed industrial chains.

The Internet technology company founded by Lu Shan is actually one of the few IT companies in Jiangzhou City.

It also involves college students' self-employment.

Therefore, the comrades of the Internet Police Detachment still attach great importance to this matter.

But the comrades in the detachment had limited technical means.

Everyone fiddled with the server for a long time but found nothing.

Using professional tools, they found out that the number of attacking IP addresses actually reached tens of thousands.

And they are distributed in various places around the world.

This is a difficult matter to handle.

After listening to the technical staff's report, Captain Liu felt helpless.

He said to Lu Shan, "We have no choice but to seal the server here first, and then ask someone to bring it back to our detachment, and then ask the provincial experts to help analyze it."

"You can think about the operation of your company carefully."

"Either the service is suspended, or the domain name is changed and the supporting security measures are improved before providing the Jiyue Browser service."

Captain Liu suggested seriously: "But I still suggest suspending the service."

"Although we don't have any definite evidence to prove that the other party specifically attacked you, my intuition tells me that this is the case."

"Even if you change the domain name and improve the security service, the other party may not give up."

Captain Liu's suggestion is still very reliable.

Lu Shan expressed his gratitude and agreed to seal the server and asked provincial experts to help analyze it.

Zheng Kaige said: "I can ask the teachers and professors in the School of Computer Science for help."

Captain Liu nodded and said, "It would be best if there were teachers from colleges and universities to help with the analysis."

Lu Shan had no hope for this.

Since the other party has been locked on, it is UC.

Then UC must know the relationship between Lu Shan and Jiangzhou University, and also know that Jiangzhou University has a School of Computer Science.

In other words, the other party came prepared, knowing that even if the professors and teachers from Jiangzhou University's School of Computer Science came out and analyzed the specific location of the attack, what would it matter?

What does it have to do with UC?

By the time Jiyue Browser restores its server, a wave of attacks will emerge from another location.

Again.

The other party wants to put you to death.

It is not important whether you can analyze the other party's IP address and tell them the attack method.

The reason why Lu Shan chose to report the case.

In fact, it is just to express one's attitude and prove one's innocence.

There was no expectation that reporting the case would solve any problem.

After about an hour of on-site investigation.

Captain Liu left with his comrades from the detachment.

Another hour passed.

The detachment drove a van and took away all the servers that had occurred at the scene.

As the Jiyue browser incident continues to develop.

More and more people have heard or seen what happened to Jiyue Browser last night.

Lu Shan received many calls early in the morning.

For example, Professor Zhou Wei from Jiangzhou University is the head of the department at Huawei that provides servers for itself.

Everyone was asking Lu Shan if he needed help.

Warwick also hopes that Lu Shan can provide relevant data so that security engineers can analyze the situation, take countermeasures, improve the level of the firewall, etc.

Lu Shan dealt with them one by one.

Lu Shan said to Zheng Kaige, "You worked hard last night, go back and rest first." Zheng Kaige shook his head.

After something like this happened, how could he still have the mind to go back to sleep?

I didn't even have the heart to attend class.

Zheng Kaige handed his cell phone to Lu Shan.

"You're right. It must have been UC who did it. Look, the relevant news has come out."

Lu Shan browsed the news on his mobile phone.

The news comes from major portals.

These include Xinlang, Wangyi, Baidu, etc., which people usually like to browse.

The content of the news is very suggestive and the title is very shocking.

For example: Jiyue browser pops up pornographic links, and obscene and naked images are directly displayed to minors.

The news following the title focused on the news that pornographic content popped up on Jiyue Browser last night.

It also pointed out directly that Jiyue Browser would endanger the health of minors, corrupt social morals, and destroy social harmony.

The news did not indicate that the Jiyue Browser might have been attacked by hackers.

On the contrary, some people pointed out that this behavior of Jiyue Browser is intended to increase users' downloads and daily views.

This is unethical competition, and we strongly request the relevant national departments to remove this bad browser from the shelves.

The same news headline and the same news content were published on different portals.

It is absolutely impossible to say that there is no press release.

If the previous press release was for users and netizens, then there is another press release for industry insiders.

The title of the news is: How can Jiyue Browser compete if it cannot provide stable services?

This news article analyzes the technical gap between the Extreme Browser and the attack from a professional perspective.

He also pointed out very bluntly that although the algorithm of Jiyue Browser is very powerful, for a browser to be successful, it needs not only the algorithm, but also the security of the browser itself and the privacy of the user, etc.

This article also combines the attack on Jiyue Browser this time with the related issues of Jiyue Browser collecting and using user privacy.

Strongly criticized Jiyue Browser for not paying attention to user security.

Even their own servers will be attacked.

So will users' private information be easily leaked?

Will this privacy be exploited by criminals?

At the end of this article it says: Although the information is good, it should be used with caution. Perhaps a photo in your mobile phone has been leaked to the Internet under such circumstances.

The article is indeed sensational.

It will also cause many professionals in the industry who are optimistic about the Extreme Browser to question it.

The most vicious part of the article is that it seems to discuss the matter from a fair and just perspective, and generously admits that the server of Jiyue Browser was attacked.

But beneath this apparent fairness and justice, there are serious criticisms of the Jiyue Browser.

On the one hand, it will undermine users' confidence in using the browser.

On the other hand, it also sounded a wake-up call to venture capital institutions or partners who are interested in investing in Jiyue Browser.

The article does not mention UC Browser anywhere.

In fact, it is compared with UC browser everywhere.

After reading these two articles, Lu Shan laughed.

He told Zheng Kaige: "Some things are more accurate than evidence."

Zheng Kaige said angrily: "Our server just had a problem at 12:30 last night."

"And the time of these news reports was 6 o'clock this morning."

“It was published on major portals almost simultaneously.”

"It's not necessarily that the editors of these portal websites stay up 24 hours a day. With so many major events happening both domestically and internationally, they don't write news reports. Instead, they keep an eye on the relevant news reported in a timely manner by our Jiyue browser."

"We have a lot of reputation at Jiyue Browser."

Zheng Kaige from the Lushan team said, "You should go back and rest for a while, we still have to fight hard."

"I'm not giving you a day off by asking you to go back. Remember to contact the Jiangzhou Internet Police Detachment in time."

"Call me anytime if anything happens."

Zheng Kaige had no choice but to leave the company after seeing the task assigned to him by Lu Shan.

"I'll come over when I finish school."

After Zheng Kaige left, Lu Shan closed the door of the computer room.

After Turing came to Singularity Labs.

Lu Shan installed the computer network used by Poincare and Turing in the computer room.

This way, the speed at which two people can access the Internet will be faster.

Lu Shan then returned to the Singularity Laboratory with the server that had backed up the data.

After Lu Shan introduced to Turing and Poincare the relevant information about the attack on the Jiyue server.

Turing's eyes also showed excitement.

He connected the server and analyzed the data and signs of the attack.

"In fact, the other party's methods are not very sophisticated." Turing said: "First, they used DDoS attacks and maliciously used TCP/IP protocol communications, which greatly consumed the server's bandwidth resources."

"After your firewall has reacted, we will use TCP PUSH+ACK attack/TCP SYN attack again to consume resources and directly paralyze the server."

"But he had a backup plan."

"That is, they took advantage of the vulnerability that our Jiyue browser collects user behavior and feeds back server instructions."

"They provided a large number of pornographic links, pictures and texts that they had prepared in advance."

"As for why a large number of global attack IPs suddenly appeared, this can actually be analyzed."

"The other party used methods such as HTTP flood attacks to control a large number of zombie machines, or they already had a lot of zombie machines."

Turing said very easily: "The means are too crude, it is easy to deal with."

(End of this chapter)

Loading...