Chapter 2312 Escape

"As expected of the Windsor family that has sent its people to settle in Rong City, Daxia. When you communicate with us now, you are able to skillfully use Daxia Mandarin's idioms and colloquialisms. Of course, I know that you, who have already planned to completely integrate into Daxia, will definitely not choose to stand up and resist Jiuzhou Technology.

But I believe that Jiuzhou Technology’s opponents are not just you and us. There are many people who want to see Jiuzhou Technology’s project fail and want to see Gu Qing fall from heaven to hell! "

"Hahaha, me too. I also want to see Jiuzhou Technology go bankrupt and Gu Qing become penniless. By the way, why don't you increase the bounty you offer on the dark web now?"

“We can choose not to stop them this time, but once we have found out the situation, as long as it is Jiuzhou Xinghai Company’s own astronauts who go to the moon next time, we can do something to make them fail. This will also deter those traitors and let them know that even if they have already lived on the moon, without our cooperation, they will only be able to stay on the moon for the rest of their lives, and even die of thirst or suffocation due to lack of oxygen and clean drinking water!”

……

Quite a lot of people harbor resentment towards this group of "traitors", and quite a few people also treat these traitors as mine-clearing engineers and experimental animals, thinking of using them to test Jiuzhou Technology, Daxia officials, and their own partners.

However, this launch mission was not so smooth.

Because the southwest launch center used by Jiuzhou Xinghai Company is located in the city of Daxia Rong, which is the core area of ​​the southwest inland of Daxia, and the surrounding area is tightly controlled, no one wants to use missiles to cross the border to cause destruction. After all, doing so will definitely anger this Eastern dragon.

So many of the attacks are cyber attacks and drone interference around the launch centers.

However, even the top international hacker organizations, when they saw the launch mission to attack Jiuzhou Xinghai Company, those hackers with real skills chose to refuse the mission, and some hackers even took the opportunity to leave the organization.

Jiuzhou Technology's security shield technology is the mainstay in the hacker circle. No one dares to displease Jiuzhou Technology.

The rest of those who accepted the task either had mental problems and wanted to compete with Jiuzhou Technology's network security engineers, or they were newcomers who were not afraid of tigers and had not seen how Jiuzhou Technology announced the IP addresses of hackers and sent them to eat from the same pot.

If these people work together to break through the firewall of some ordinary corporate projects, it will naturally not be difficult. They can directly use data torrents and crazy IP explosions to bring the project down.

But to break through the security shield of the data center of Jiuzhou Technology Southwest Launch Center?

When the JZ-001 rocket streaked across the sky, the data center's security shield still did not allow any suspicious account data to enter the server. Even while enduring massive data attacks, the security shield's prevention and control program [Jiebei] had used anti-tracking technology to skip multiple meat machines and found a bunch of hackers' real IP addresses and attack source addresses.

After all, although some hackers wanted to compete with Jiuzhou Technology's network security engineers, some individuals used physical isolation and remote control.

During this offensive and defensive battle, some ordinary user computers that were used as hostages began to become extremely slow.

Some hackers may even force a power outage to shut down the computer when they realize the problem and are ready to stop. "Oh, I just bought an Intel 13th generation i9 from a certain website and thought I'd try overclocking it, but it turned out to be a complete black screen? No, I smell a strong smell of glue."

"Dad is so annoying. Why do I need to install the [Boundary Monument] Security Shield? There are no network viruses these days. And if you install that thing, I heard that you can't log in to those learning websites to read materials. Let's install it in a few days. Let me go to a certain moon day to take a look today, hehehehe...

Hey? Why is my new computer so laggy? Damn, is it infected with a virus?! Damn, hurry up and download the next [Boundary Monument] Safety——Why is the screen black?! "

Some people successfully bought back their faulty computers after this incident, while others chose to completely leave the "junk guy" group and decided to buy Titan processors honestly and buy genuine products from flagship stores in the future.

After all, even if these genuine products really break down, they can still be repaired through official channels. If you buy N-hand goods, the seller will basically not provide subsequent repair services after the money is received.

Even if repairs are provided under pressure from the platform’s customer service, they are at most private repairs and not done through official channels.

While these users were complaining about their computers, the hackers who participated in the attack on the Southwest Launch Center server were also complaining, but while complaining, they were actually fleeing frantically in reality.

"Fuck! Fuck! Fuck!!! It's only been three minutes since they found my real IP address and put the data coordinates on the dark web. Fuck! If I don't leave here, I'm afraid my enemies will send me directly to heaven!"

"When Jiuzhou Technology was dealing with hackers, all hackers who provided real IP addresses would be prosecuted? Why didn't you tell me earlier?! I just joined the organization! I'm still a newcomer! You are deceiving me!"

"Bob! Drive faster! If we get caught by those enemies, I'm afraid we won't have the chance to eat fried chicken burgers anymore! Damn it, I just bought a basket of eggs yesterday and wanted to make egg sandwiches!"

These hackers from all over the world staged a thrilling escape, and the financiers who offered bounties and wanted to make trouble for Jiuzhou Technology, after ordering their men to clean up all traces, simply ran away to their own private villas and lived in seclusion.

Although dark web transactions use virtual currency, and although they believe that the accounts registered by their subordinates will not be easily traced to their true identities by Jiuzhou Technology, they are not willing to take the risk.

If those "perverts" at Jiuzhou Technology really cracked these encryption technologies and traced them back, then the happy days now would probably become a thing of the past...

In a private villa with a rather sci-fi shape, Mask was looking at the display screen, at the sturdy rocket that had entered orbit and was flying steadily, and a slight smile appeared on his slightly weathered face.

Of course he knew that many people wanted to take advantage of this opportunity to trip up Jiuzhou Technology, but even though he received many invitations, he did not agree to any of them.

Having been opponents for so many years, he understands the terrifying nature of Jiuzhou Technology better than anyone else.


Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like