The war of HK1391 has never been far away!

.

Near eight o’clock in the evening. ?? .

Tao Wenxian, according to Shi Lei’s command, entered the Internal Network of the FBI Federal Bureau of Investigation and successfully blocked the FBI Federal Bureau of Investigation and the Network Defensive Power of the CIA Central Intelligence Agency.

Shi Lei did not follow the Internal Network of the FBI Federal Bureau of Investigation, but when the CIA Central Intelligence Agency supported the FBI Federal Bureau of Investigation, it killed the past!

For the CIA Central Intelligence Agency, Shi Lei knows better. He knows the CIA Central Intelligence Agency’s Cyber ​​Security power. In action, there is usually an Operation ConNEC tion.

This Operation ConNEC tion usually explains the reason for the action, as well as the target of the action. Of course, this Operation ConNEC tion knows that it is automatically deleted. It will be deleted automatically if it is read or the default storage time is completed.

Shi Lei prepares to invade the CIA Central Intelligence Agency’s Internal Network to recover the relevant notification information in the CIA Central Intelligence Agency’s notification System Data Server.

As for whether it can be successful, Shi Lei does not know for the time being.

After all, CIA Central Intelligence Agency’s notification to System Data Server, in addition to a strict defense policy, the storage media they use is not Ordinary’s mechanical Hard Disk.

Under normal circumstances, the data information is temporarily stored in the memory and then written to the storage medium. But CIA Central Intelligence Agency’s notification System, which handles a lot of data every day, requires High Degree confidentiality, so CIA Central Intelligence Agency uses nandssd storage technology. This storage technology goes far beyond the read and write speed of mechanical Hard Disk storage technology. It is the next generation of storage technology and is widely used in the future.

Nandssd has many advantages over hdd mechanical Hard Disk technology. But for Shi Lei, this technology is incomparably bullshit in the current situation.

Because Shi Lei wants to restore data, read the notification information from CIA Central Intelligence Agency. The technology to recover data is very convenient on the hdd mechanical Hard Disk, even if it is data ten years ago, it may be read.

But the nandssd technology is different. The theory of storing data is different!

Want to recover data from nandssdHard Disk, this is very difficult, Shi Lei only sent Hope, CIA Central Intelligence Agency notification System Data Server, there is no implementation of the implementation data cleanup, it is possible to obtain relevant data information.

otherwise. It is also really unlikely to recover deleted data from nandssdHard Disk.

Shi Lei told Izual that after preparing for accomplish computing resources, he did not immediately invade the CIA Central Intelligence Agency’s Internal Network, but was looking for a better approach side.

“Izual, grab a CIA Central Intelligence Agency to invade the Dreamer Online PaYM ent System, using the Zombie Server.” Shi Lei thought of a good way. If you follow Shi Lei’s past habits. He likes to start directly from the CIA Central Intelligence Agency’s OffiCIA l Website and forcibly invade from the OffiCIA l Website, breaking the Internal Network’s defense.

This method seems silly, making the open and aboveboard look as if it is very easy to find. actually not. Just a little camouflage. The Security SpeCIA list of the CIA Central Intelligence Agency only thinks that this kind of intrusion is a temptation of the unknown Little Hacker and will not attract attention.

Although the method of direct intrusion is very secure. But Shi Lei doesn’t want to do that. Because, the way of invasion. The probability of failure is the greatest, and once it is seen, the Security SpeCIA list of the CIA Central Intelligence Agency will definitely track up and will create a more troublesome anti-tracking issue.

So, Shi Lei chose a more subtle anti-tracking solution, directly from the CIA Central Intelligence Agency’s Zombie Server, along the CIA Central Intelligence Agency’s intrusion route, reverse tracking, and entering the CIA Central Intelligence Agency’s intrusive computer.

This kind of scheme is more subtle, but also more dangerous!

Because the ultimate source of the intrusion is definitely the CIA Central Intelligence Agency’s Security SpeCIA list, and is operating the computer, invading Dream Entertainment Company’s Dreamer Online PaYMent System. A little bit of mishandling is detected by the Security SpeCIA list of CIA Central Intelligence Agency.

Or shouldn’t be the Security SpeCIA list of CIA Central Intelligence Agency!

Because this part of the personnel, like the mysterious temporary workers of Xia Nation, they do not have a CIA Central Intelligence Agency and no identity records.

Even if Shi Lei accurately tracked their position information, there was no way to buckle them on the hat of CIA Central Intelligence Agency employees.

Therefore, in the face of these guys who are temporary workers, Shi Lei is really only hard-hitting, rather than preserving relevant evidence, making a lot of noise.

According to Shi Lei’s command, Izual quickly grabbed an unimportant Zombie Server. The Zombie Server did not have a lot of data flow. Shi Lei smoothly tracked the data flow and traced back to the source.

After about two minutes, Shi Lei did not alert the other party, directly killing the inside of the other’s computer, and then using the other’s computer as a springboard, and naturally entered the CIA Central Intelligence Agency’s Internal Network.

In the Internal Network of the CIA Central Intelligence Agency, Shi Lei scanned the notification for information, but the CIA Central Intelligence Agency dared to be so daring to post the notification information, and also detailed the reason and target to prove their confidence in the Notification System.

Shi Lei did not find any notification information!

Fortunately, Shi Lei didn’t expect to get information directly at first. He entered a bunch of code on the keyboard with both hands. Izual immediately scanned the Data Server of CIA Central Intelligence Agency to notify System.

This particular Data Server does use the nandssdHard Disk storage technology. In just a few seconds, Izual has scanned the entire disk in view of the outstanding performance of the nandssdHard Disk.

However, there is still no residual data found in the notification information!

Shi Lei scanned it himself and found no related information. So it seems that it should be notified to the System’s Data Server, let the nandssdimplement secure.erase command, which is the Safety erase command.

This command is a special command for nandssdHard Disk. It can clean the ssd data residue very cleanly. It is not like the Ordary hdd mechanical Hard Disk. Even the data of ten years ago can be retained.

Shi Lei frowns Looking at the information displayed on the Number One Server screen, if you can’t get the information from the CIA Central Intelligence Agency’s notification system, is it only the face and the CIA Central Intelligence Agency to tear the face?

This is Shi Lei’s unwillingness!

‘Right, there is this way! ‘Shi Lei suddenly thought of a way, not for the nandssdHard Disk, but for a way of thinking.

As a World Summit Grade Hacker, you need not only excellent technology, but also a quick mind. Since you can’t get the information from the CIA Central Intelligence Agency’s notification System Data Server, why not get the required information from the computer that receives the notification, the relevant security personnel?

Shi Lei smiled back before connecting to the Zombie Server, the Security SpeCIA list computer. XeraX’s era, nandssd technology has matured and put into use, but the cost is still high, the general computer is not installed.

This Security SpeCIA list still uses Ordinary’s mechanical Hard Disk. This is not because he can’t afford the cost of the nandssdHard Disk, but it is completely unnecessary.

The notification information sent by CIA Central Intelligence Agency, if left in the CIA Central Intelligence Agency’s Internal System, and intercepted the relevant data by Hacker, is indeed a big news.

This information drift and fall is outside, nothing at all!

Can you prove the sin of CIA Central Intelligence Agency because of an information? That is simply funny! If there is such a simple thing, Shi Lei can fake 100 related structures every day to taint the CIA Central Intelligence Agency.

Although the clues were found, the feasibility was also determined. But Shi Lei suppressed the excitement and carefully scanned the computer of the Security SpeCIA list.

Because this computer has been used by the Security SpeCIA list, once there is a slight abnormality or a safety traptriggered by the other party, Shi Lei will declare the action failed.

Ordinary’s hdd mechanical Hard Disk has a big drawback, that is, whether the data is read or written, the constant light of the Hard Disk light is generated.

Shi Lei first needs to black into the computer’s motherboard biosSystem, which will fix the program fixed inside the biosSystem, and reduce the constant light of the Hard Disk light when the Hard Disk reads and writes.

This is not a simple job!

If you just let the Hard Disk light go out, it’s too simple. Can this Security SpeCIA list currently use computer, if the Hard Disk light is not lit, and he is writing or reading data again, is it not clear that there is an issue?

Shi Lei carefully modified the biosSystem’s information, which took about ten minutes and finally changed the program that controlled the Hard Disk light.

“Let me see, what is the reason!” Shi Lei scanned the Computer Hard Disk of the Security SpeCIA list, which was very slow due to fear of alerting the Security SpeCIA list.

After waiting for almost half an hour, Izual finally scanned and recovered the information that was deleted today, and matched the deleted information with the keywords ‘Dream Entertainment’, ‘Xia Nation’, ‘Mirror Science and Technology’, etc. .

After less than half a minute of screening, Izual showed an information in the Virtual transparency screen of the ipLens-type Information Processor.

Shi Lei also finally knows why CIA Central Intelligence Agency is desperately biting Dream Entertainment Online PaYM ent System !

‘Based on the latest received information, Dream Entertainment Company’s Dreamer Online PaYMent System will provide a convenient money laundering service for some of our Nation criminals. The information originated in the well-known Hacker Raphael with high credibility. Implement Task, invade Dreamer Online PaYM ent System, confirms the transaction origin of each transaction with the relevant transaction person information. ‘

Shi Lei expression startled, Raphael?

.)