Rebirth of the Tech Madman

Chapter 691: This order is no longer needed, wait and see

Tang Huan’s disciple was named Rich Skrenta. He was very young and was still in university. However, after careful training, his knowledge in the field of computer security can still be unique. , Access to the latest chapter: ШШШ..СоМ.

I think at the beginning, Rich Skrenta was a bear kid. When he was in middle school, he dared to think of a way to fly from Pittsburgh to Las Vegas to visit COMDEX. He even took advantage of the opportunity to experience the product. The edited ElkCloner virus was copied into the latest Fangyuan personal computer to observe the reaction, and it turned out to be a mess.

Due to media attention, Tang Huan did not deal with this little thing. Instead, he sent him to Cupertino, Silicon Valley for a visit while notifying the parent leader.

However, after Tiancai and Xiongzi became one body, their thinking became more and more different from ordinary people. Rich Skelenta, who was overwhelmed by the dazzling technology of the Cupertino R&D Center, clamored to worship Tang Huan as his teacher.

It must be admitted that the numerous beings in the technical field are divided into different categories and have their own positioning. Even if most people can be called smart, they are still only suitable for being blue-collar workers on the assembly line. The minority of "sex", m. is suitable to stand in the front as the team leader, turning creativity and execution into development.

Tang Huan saw that Rich Skrenta had the latter's aptitude, coupled with the media's incitement, so he half-pushed and half-situated it.

It is conceivable that due to chance and the Silicon Valley tycoon and the richest man, Rich Skelenta’s life path has naturally undergone a major turning point. The most important point for young people’s struggle is opportunity, so you don’t have to worry about it ever since. Up.

Tang Huan didn't look away. Rich Skrenta is indeed a manufacturable. He has honed his skills in the emerging field of computer security.

The story of this bear kid quickly degenerating into a real technology ‘pretty’ English, just reflects a phenomenon in the IT industry-whether the aspirant is not young, the unwilling is a hundred years old, and many accomplished people are too young to be jealous.

The team led by Rich Skrenta also includes two researchers from Symen's Tech Company. One of its special features is the “exquisite” and abundant energy. After arriving at the Pacific Telecom’s computer room, they immediately entered the work. Status, night battles, system logs and other clues to launch investigations.

Because it was clear that his teacher wanted to know the extent of the misconduct that Pacific Telecom had committed during this safety incident, Rich Skelenta turned the sky around and sent the results of the preliminary judgment.

The computer system has this advantage. No matter how'extensive' the concealment is on the surface, the binary data inside will not lie-Pacific Telecom does not dare to delete the text and disguise, if it really does that, the accident will be'sex'. The quality has changed again, and nothing has happened!

According to Rich Skelenta’s judgment, Pacific Telecom is indeed a bit wronged. Its engineers are actually very serious. But the problem is that the transition from the old mainframe system to the more advanced Fangyuan server system requires a complicated Although the security strategy is similar in the process, there are still obvious differences in the specific implementation methods.

The compromised mainframe is about to be decommissioned, and the data involved is being migrated to the Fangyuan server in phases. It may be for the convenience of work to make this inherently short-board difference system connection authority configuration leaks ‘holes’. Then the hacker took advantage of the loopholes.

After seeing this result, Tang Huan couldn't help grinning. Because he was not far from the outside world, he might have to be used by some competitors to make a big fuss.

Since AT&T was split into "one big and seven small", Pacific Telecom has become the most noticeable one of the seven gourds.

Compared with Bell in the other six places, Pacific Telecom is much more radical in its development. One of its major manifestations is that it actively explores new businesses and has tasted great benefits.

For example, Pacific Telecom overcame various technical difficulties and took the lead in implementing the caller ID function, which immediately scratched the user’s itch. The previous investment was rewarded generously. Even other telecommunications companies did not hesitate to save time. Spend a high price to introduce this set of applications that proved to be successful.

Caller ID is just a small test of Pacific Telecom. Its bigger action is to introduce the most advanced digital communication technology in an all-round way, and then cooperate with banks, insurance companies, public service companies and other units to provide users with information inquiry services.

In terms of network construction, Pacific Telecom is also significantly faster than its peers, especially the speed of data connection services. In just a few years, it has spread from a large range of 300 bit rates to 1,200 bit rates and 2,400 bit rates in just a few years. The central area even reached a bit rate of 4800, and even the test area reached a bit rate of 9600.

You know, although the demand for data services is increasing day by day at this stage, telecommunications companies tend to prefer a solution-don't you dislike the slow network speed, then apply for more wires.

As a result, telecommunications companies are increasingly making a lot of money.

However, Pacific Telecom does not use the ready-made gold method, and always strives to achieve the fastest speed on a line, which makes the peers very difficult to handle, as if they are not kind to the users.

According to the assessment of telecommunications industry observers, although Pacific Telecom claims to be intensively upgrading, after the initial investment in equipment, it is more concentrated on the software level at the bureau end, and the cost control is relatively reasonable, but hundreds of millions of investment are definitely there. .

More importantly, the current communication technology represented by ISDN is in the ascendant, and even the European side is ready to implement it in full, which makes the industry have been cautious about the future direction of network development. But Pacific Telecom went down and desperately expanded the traditional network. Are you not afraid that it will be difficult to turn the ship's bow at that time and lose your wealth?

In addition, Pacific Telecom rushed into the cellular phone business at full speed early, which was also regarded as an unstable risky behavior.

However, the western United States is the territory of Pacific Telecom. People can toss as they want, ignore such doubts at all, and still do their own way as a distinctive star in the telecom industry.

Now Pacific Telecom can't play high cold. Your system has been compromised by hackers. Why are you holding a shelf? The guy who feels that Pacific Telecom breaks the rules and makes everyone very passive can't help but gloat.

Of course, as a listed company, Pacific Telecom's share price is inevitably affected.

Seeing this, the board of directors of Pacific Telecom could not sit still, and quickly suggested to Tang Huan: "Mr. Chairman, you should go back to the headquarters in San Francisco. Let's have a meeting and discuss it."

How could Tang Huan want his rhythm to be disrupted? So he calmly asked Chuck Smith, CEO of Pacific Telecom, to pass on: "You are responsible for the specific work, and don't make any mistakes. As for investors' doubts about our future development direction, wait for me to go to Hannover Messe. After playing on the court, it will disappear."

The members of Pacific Telecom's board of directors, who had already gathered in the San Francisco headquarters, were not so comfortable. Seeing that Tang Huan was unwilling to move in New York, they flew to the eastern United States one after another and sent the meeting persistently.

Tang Huan was a little dumbfounded, can't wait for a few months? Okay, everyone sits together, drinking tea and drinking melon seeds while chatting.

In fact, it is impossible to be a director of a large company with a market value of tens of billions of dollars without the city government. The reason they ran all the way up was to see with their own eyes whether Tang Huan was really so stable.

However, when I saw my chairman of the board of directors, calmly playing bowling with a group of dolls in a club, everyone was still shocked-what a nerve!

In this way, the board meeting, which was originally planned to be serious and intense, became a lively and interesting leisure activity.

Soon, another piece of fun came over. Rich Skelenta, who went to Pacific Telecom to investigate and evaluate the security incident, unexpectedly met the hacker who compromised Pacific Telecom's mainframe on AOL's BBS, and then got involved.

It can only be said that the hacking thoughts of these years are still relatively simple-if you don't show off, you will feel uncomfortable, if you don't show off, you will die. Maybe this person is more extreme, and he talked about it in the original forum section, and even put it down arrogantly. In the words: "I know, maybe Pacific Telecom, or even the FBI guys, are already here. If you have the ability, you can follow me. I also heard that the richest man is very skilled, I don’t know if it has changed. Became'once'. I have captured your telecommunications company, so why don't you show up in person, and the two of us have fun."

Seeing that the other party dared to provoke his own teacher, Rich Skelenta quit, and immediately said: If you kill the ‘chicken’ with a sledgehammer, it is enough for me to accompany you, you are not qualified enough to challenge my idol.

The two people were making such a quarrel in the forum, which immediately attracted the attention of a large number of users who are using other services of AOL. People are not distressed by the expensive network connection fees, and their eyes are widened. I stared at the scrolling text on the screen, fearing to miss such a fun new thing.

In fact, Rich Skrenta and the hacker with the ID Condor spit on each other in the forum, not boring, but also a kind of battle.

Just like last year in the popular American Kung Fu movie "Jing Wu Hero", Fumio Funao played by Yasaki Kurata and Chen Zhen played by Li Lianjie deliberately verbally'excited' generals in an attempt to disrupt'disruption'. The mood of the other party.

The same is true for the “fighting” on the Internet. After you come and go, you can guess the thinking and behavior habits of the opponent to a certain extent, and then help the next step on the target host agreed by both parties. Competition.

The cyber security game, in the final analysis, is a fight between people, so it is an extremely complex system engineering, only knowing the technology will fall into the bottom.

Rich Skrenta took the lead in throwing'decoy' bait to Condor: "Presumably you also understand that the mainframe you entered before belongs to the mainframe that is about to be eliminated. So even if you get control of it, you won't see it. You must have the skills. It is most likely that you happened to meet you during the "handover" of the system change. Now, we have chosen a host of the Fangyuan server system as the battlefield. Do you dare to compete?"

Under the "live broadcast", Condor was obviously unwilling to back down, so after setting some conditions, he accepted Rich Skelenta's invitation, and the two people officially started to attack the wheat field-Condor is an offensive spear. , Rich Skrenta is the defensive shield.

After Tang Huan got the news, he felt'quite' funny, but he didn't stop Rich Skelenta's approach. The quality of Gein's **** is too important for people who are alone, and his own is cheap. It is a rare opportunity for students to practice their hands through actual combat.

In addition, Tang Huan also hopes to catch this lawless hacker-Nima. Now there are so many telecommunications service providers in the United States, and there are only seven local Bell companies. Why do you only focus on Pacific Telecom? Now that everyone has forged a beam, it's time to discuss the Dao well.

"How did you'touch' the other party's bottom?" Tang Huan asked in a relaxed tone on the phone.

"Not many, but not too few." Rich Skelenta replied maturely. "According to my judgment, this hacker with ID Condor should be about the same age as me, and his position is very likely to be In Los Angeles. I have already set up the'honeypot', and it depends on the other party's actions."

Los Angeles is one of the top three metropolises in the United States~www.wuxiahere.com~ If you want to find someone in this range, it is not an exaggeration to find a needle in a haystack.

Tang Huan didn't say much, just reminded: "Remember, you are not fighting alone. There is a strong backing behind, and you need any resources, just ask them."

Rich Skrenta finally couldn't suppress the excitement of eagerness in his heart, and said quickly: "I have used the latest computer security research results. Although Condor is arrogant, My feeling is to watch a restless guinea pig arching around."

"You have maintained a good mentality." Tang Huan hung up the phone after encouraging his disciples a few words, and asked John Chambers, who walked in with a grim face, "What happened?"

"Due to the negative impact of the information leak of Pacific Telecom, where the Fangyuan server was widely used, we were out of the computer system order competition of the securities exchange." John Chambers replied solemnly.

After listening to the other party’s explanation, Tang Huan smiled coldly, “It’s not a big deal, we don’t want this order, it’s a long time in Japan, wait and see!”;

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like