hk300 Premeditated SO Plan

Ps: The new best-selling list First, the best-selling list of Seventh, we won again! Angel Parliament ,hē hē [Please subscribe, measure the score of a book, accurately as stated a subscription to a book, the brothers sisters that Hope has the ability to support, can generously donate, spend a quarter of a day to Sanmao Divide money and give Mt. Hill a little support! ]

JFs’ OffiCIA l Website takes a very extreme setup, which is the one-way link extension technology, UnidIRE ctional Data transfer. The advantages of doing this are, but the disadvantages are equally obvious.

More obvious shortcomings, accurately as stated normal user browsing jfs OffiCIA l Website, want to apply for what data, webServer does not have authority to issue an application, can only passively wait for the internal Data Server to detect the application, and then give a reply.

As a result, jfs’ OffiCIA l Website, viewing speed is significantly reduced. [

If it’s other websites, browsing speed is so slow, it’s definitely a run on a similar website. But where does jfs come from?

If you have to say your peers, maybe s and count their peers. However, jfs can’t wait for everyone to browse s and OffiCIA l Website, causing them a disorder.

At the moment, jfs’ OffiCIA l Website, currentlyly attacked. And it’s a very hidden attack. If Shi Lei is not very proficient in computer technology, he probably won’t find it!

After discovering that someone attacked jfs, Shi Lei did not act rashly, but sneakily followed them to see what they had.

It is best to have something cheapto pick up!

Followed by the invasion of the personnel. Shi Lei found that they had more than a dozen offensive data flows. He guessed in the heart, these guys who invaded jfs. Could it be Dark Night Dynasty?

Shi Lei picks up one of the invading data flows and reverse tracking the other’s paddress. After breaking more than thirty Zombie Servers in a row, Shi Lei finally found the real paddress of the other party.

It is the paddress of Xia Nation, the corresponding Reality address, Shi Lei is not scrutinized, only knows in Capital!

It is rumored that Boss Dark Night of Dark Night Dynasty is precisely as stated Capital.

Confirming the conjecture in the heart, Shi Lei is more curious. Dark Night Dynasty is not Eaten a Bear’s Heart and Leopard’s Gallbladder, dare to provoke jfs?

The power of jfs, roughly and simply described, is about twenty times larger than the Hacker Union. If jfs wants to win the Hacker Union, it is estimated that in the Hacker Union, in addition to the Core Member escape, whoever wants to win will win!

Even Core Member. There are also quite a few possibilities that can be traced!

Dark Night Dynasty and Hacker Union, both of the Second Generation Hacker Organization, how dare they challenge jfs?

But now that they are invading jfs, it means that they naturally have to rely on it, otherwise it is impossible to directly kill Right?

Shi Lei is not aware of the refuge of Dark Night Dynasty, but since the other party is willing to disperse the firepower of jfs for him. Shi Lei is very happy. Last time inside the Foreign Ministry International Intelligence Agency, in the Confidential Information Server, Shi Lei deliberately moved a folder called ‘SO Plan’ in order to frame the Raphael.

That SO Plan makes Shi Lei very interested!

After all, a Robot plan. It brings an excellent foundation for the future development of Shi Lei. If in the Foreign Ministry International Intelligence Agency. I can still find what is good, then Shi Lei will definitely not be polite.

The attack of Dark Night Dynasty, jfs has not been discovered. As compatriots, Shi Lei also sorry for the inconvenience pit them. Anyway, jfsOffiCIA l Website webServer, there is a very hidden alarm mechanism, they will definitely trigger that mechanism, causing the attention of jfsSecurity SpeCIA list.

Shi Lei only needs that time, sneakily based on the previously left System Back Door, enters the jfsInternal Network and finds the thing he needs. [

Shi Lei monitors the actions of the Dark Night Dynasty while accessing the internal Data Server of the Tokyo Prefecture Earthquake Forecast Agency.

Inside the Earthquake Forecast Agency, Shi Lei’s plug-ins left in the earthquake forecasting software are still working. Through the records, Shi Lei found that the earthquake forecast for Kanagawa Prefecture has not yet appeared.

Instead, it prevented an earthquake that changed the data to tremor. The plugin works fine and everything follows the Shi Lei’s script in the implement.

Just as Shi Lei feels chatting and preparing to play Haneda Airport, the Dark Night Dynasty trigger activates the alarm mechanism on the jfsOffiCIA l Website.

Xia Nation Time, now at 6:10 pm, Wo Sang Nation time is 7:10, due to the online war’s of the two countries, the security SpeCIA list of jfs, all without a break from work, but with a breath, at any time Prepare to rescue the net world of Wo Sang Nation.

Jfs’ Security SpeCIA list, which was swayed by Mr. M, has long been a slapin the face.

When Dark Night Dynasty triggered the activation of the jfsOffiCIA l Website’s alarm mechanism, it was like a horse cell, 12 official Security SpeCIA list Little Group, Twenty-seven ready Specialist group, all killed.

The people of Dark Night Dynasty, who haven’t responded to what happened, were bitten by JFs’ Security SpeCIA list, desperately tracking their true paddress.

Shi Lei and so on is this opportunity, taking advantage of jfs’ Security SpeCIA list, bullying Dark Night Dynasty, Shi Lei immediately sneakily into the jfs internal local network.

The System Back Door, written in assembly language, sinks into the system’s bottom level, and it’s really awesome. There are many Security SpeCIA lists in jfs, all without the existence of the Discovery System Back Door.

After Shi Lei entered the internal LAN of jfs, he quickly searched for their Confidential Information Server. The last time I found the Confidential Information Server, this time Shi Lei did not spend too much effort to find the Confidential Information Server.

When entering the confidential server, Shi Lei in the heart is a little faint. Because it’s too easy to come in, like no defense at all?

Inside the confidential server, Shi Lei first discovered the SO Plan, and other all kinds Confidential Information. For example: Nanyue Forestry Plan, Indonesian Island Plan, Nanyang Plan, etc.

Shi Lei didn’t rush to open any data. Instead, first analyze the file System.

The first analysis is SO Plan, and there is no useful thing from the name of this plan. It is not like other plans. More or less can analyze some information.

For example, the Nanyue Forestry Plan can be analyzed, it is related to Nanyue Nation, and it is related to the plan of the forest aspect. Nanyue Nation’s forest resources are very rich, and perhaps Wo Sang Nation is paying attention to this aspect.

Shi Lei has seen a report before. Wo Sang Nation has a lot of native forests, but instead of developing their own forest resources, they import timber at Xia Nation. this behavior. It not only satisfies the wood needs of Wo Sang Nation, but also causes considerable damage to the forest resources of Xia Nation.

Some people at Xia Nation couldn’t see the facts and tried to sell the wood to Wo Sang Nation.

Returning to the theme, Shi Lei analyzed the SO Plan file System and found it to be restricted by the File System. Cannot be opened directly, cannot be deleted, cannot be moved, cannot be copied. In short, that is nothing!

Shi Lei is very upset about this kind of file!

It is file System. Bind to the authority of the server. To get the authority, you need to invade the authority group of the server.

In the case of the Ordinary Server, Shi Lei kills all privileged users of the authority group in minutes and becomes the only authority group member. But here is the Foreign Ministry International Intelligence Agency. Confidential Information Server ! [

Shi Lei doesn’t have to think about it, he knows Confidential Information Server. Absolutely connected to the jfs Supercomputer.

Want to get the authority of the Confidential Information Server, I am afraid to deal with the JFS Supercomputer.

The jfs Supercomputer is very powerful, and the performance is not much worse than the Supercomputer Swallow. Although Shi Lei holds Supercomputer Swallow, Shi Lei can’t dare to fight with JFs’ Supercomputer.

Shi Lei’s does have Supercomputer Swallow, but Shi Lei can only borrow some of the performance of Supercomputer Swallow. After all, Supercomputer Swallow’s System assumes all kinds of Large-scale Tasks. If Shi Lei does not restrict, casually mess with Supercomputer Swallow, which is definitely discovered by Supercomputer Swallow’s security personnel.

For this reason, Shi Lei did not dare to fight with JFs’ Supercomputer, only to think of other methods.

Looking at SO Plan, Shi Lei carefully queries the user information of the Confidential Information Server authority group.

From the authority group of the Confidential Information Server, Shi Lei found that there are only three users with the authority to mobilize the SO Plan.

After finding these three user names, Shi Lei is in the jfsInternal Network, investigate Cyber ​​Security Department, and each person’s account information.

Want to investigate their account information, the best way, exactly as stated black into the other’s computer, in the other’s computer, find the relevant data.

If you want to invade the jfsSecurity SpeCIA list from the external network, you can do it, but it is not difficult for them to find it.

But Shi Lei now, currently jfsInternal Network, from the Internal Network into the Security SpeCIA list of computers, the difficulty is not so high, and not easy to be found.

Control Supercomputer Swallow, in the Internal Network, find the connection information of the Security SpeCIA list. After entering the Security SpeCIA list’s computer, first retrieve their computer name.

Many people like to change the computer to their own username. Sure enough, in the computer name of the Cyber ​​Security Department, Shi Lei found the same username as the Confidential Information Server authority group.

Shi Lei carefully checked the computer and successfully extracted the computer Signed In password from the computer’s profile record.

With this password, Shi Lei needs to gamble now!

The password for this user name can be used as general use in the Confidential Information Server. If the password is general use, Shi Lei can naturally enter the Confidential Information Server and take the SO Plan.

If the password is not general use, according to the safety level of jfs, it should cause an alarm of the Confidential Information Server. Then the action of stealing the SO Plan failed, and Shi Lei was still smearing on the soles of his feet.

Such gambling behavior, Shi Lei is generally not willing. But if you don’t gamble, you have to face the jfs Supercomputer. Shi Lei is not sure about killing the Supercomputer in a short period of time without paying attention.

For the sake of the present, only let go!

Success or failure

(To be continued. If you like this work, you are welcome to come to the starting point, the monthly pass, your support is my biggest motivation.)