Revisiting Future Path

Chapter 16: Hacking

018 Private Server Industry Chain

One is bandwidth limitation, and the other is two springboards. The internet speed between Wei Dongsheng and this confident hacker is not very good. If the video is monitored all the way, it will definitely bring a burden on the speed of the network, and then arouse the alert of this confident hacker. Therefore, Wei Dongsheng decisively took photos to peep into the real life of confident hackers.

Seven low-resolution photos came back, and Wei Dongsheng quickly gained an intuitive understanding of him.

Cyanobacteria's network security inspection records show that the IP address of the confident hacker is somewhere in Chongqing, and he is called a Chongqing hacker for the time being. The Chongqing hackers are young, about twenty years old, and their dressing style is very sloppy. In the background of the photo, he is suspected of staying in a narrow rental room. The bed is an old wooden bed of poor quality and the wall is a simple whitewashed lime wall. Except for the soft chairs commonly used in front of the computer desk, the other wooden tables and stools are broken and dirty. The material condition reflects that his quality of life is extremely poor, he is not a student in the university, nor is he like a normal local family.

At this moment, the Chongqing hacker was lying in a soft chair, playing a group of music in a loop. Lezai leisurely flipped through the data stored in the decoy computer and exclaimed: "With so many plug-ins, is this guy a plug-in collector?"

Wei Dongsheng ordered Blue Algae to repair the Chongqing hacker's soundtrack and found that his voice had a strong Suzhou accent, which was obviously different from the local Chongqing dialect. Wei Dongsheng speculated that the Chongqing hacker was either from his native place near Suzhou or lived near Suzhou for a period of time. The current hut is his temporary residence.

The Chongqing hackers did not discover Wei Dongsheng's anti-intrusion, and continued to dig in the bait computer. There is no need to laugh at the slowness of Chongqing hackers. Cyanobacteria is a black technology that transcends the times. It can directly act on integrated circuits to counter computer systems. The traditional firewall mechanism cannot detect its intrusion. No matter how powerful hackers are, they are limited by contemporary computer science theories and cannot detect the invasion of cyanobacteria in time. If necessary, cyanobacteria can invade any computer connected to the Internet at will.

Taking advantage of the Chongqing hackers rummaging in the bait computer, Wei Dongsheng quickly searched his computer and found the clue for the first time.

The Chongqing hacker’s computer minimizes a special chat room software. There are a total of 40 or 50 people in the chat room, chatting with each other intermittently. Wei Dongsheng downloaded the chat information to the local area, quickly flipped through it from the beginning to the back, and slowly sorted out the clues.

It turns out that Harbin hackers, Chengdu hackers, Suzhou hackers, and Yanjing hackers belong to the same organization.

After the source code of the Italian version of Legendary was leaked, Cavalry, a hacker who was active on the Internet, was optimistic about the profits of the Legendary private server industry and prepared to do a big job. Cavalry is not satisfied with setting up a few servers with meager profits. His goal is to rule the private server industry chain and rule all of the country. In the future, all of them must abide by his rules. Harbin hackers, Chengdu hackers, Suzhou hackers, Yanjing hackers and Chongqing hackers are all partners he has found through various channels to host the private server industry in various regions in the future.

Integrate strength first, then attack dissidents.

Chongqing hackers and Suzhou hackers are friends in reality. The Suzhou hackers are aware of the recent economic difficulties of Chongqing hackers, so they solemnly recommend the Chongqing hackers to Cavalry. The Chongqing hacker's remarks indicate that his network security offensive and defensive technology is poor, but he is particularly good at DDOS attacks, which is very suitable for patrolling the law enforcement industry.

In the private server industry, the technical threshold for renting servers and setting up private servers is very low. With the support of one-stop service technology, people who are literate will basically set up private servers. However, the purpose of setting up a private server is definitely to make money. The prerequisite for making money is that players are willing to enter the pit.

Therefore, to operate private servers, a stable source of player customers is first required.

If you want to make a fuss at this node, you can open a private server publishing website to monopolize the entrance of player customer traffic. During the normal period of surfing the Internet, people occasionally encounter webpage advertisements, and suddenly a list of simple webpages about when the private server is opened and when the private server is opened, is the so-called private server publishing station. Of course, private server owners can also post and promote themselves, but the efficiency is definitely not as good as advertising on private server publishing stations. After all, many players and customers suddenly encounter strange private servers, and the first thought in their minds is always whether there is a virus Trojan installed.

As far as the private server industry is concerned, controlling the profits of private server publishing stations far exceeds that of real private server operators.

A very popular chicken soup text. During the development of the western United States, gold mining became a hot industry, and countless people rushed to gold mines with overnight dreams. In the end, the gold digger did not get rich, but the jeans seller got rich. In the private server industry chain, setting up private servers to recruit players is equivalent to gold diggers, and controlling private server publishing stations and other upstream nodes is the real jeans that can make big money.

And not to mention the profit of each node in the private server industry chain.

To operate a private server, it is fundamental to have a certain amount of player customer traffic. The second thing is to keep them paying with a stable gaming experience.

However, the private server industry is a part of the black network arena, and no one wants you to compete fairly. Taking a step back, how can people who firmly worship the values ​​of fair and fair competition infringe the copyright of genuine games? Private server owners who are trying to set up private servers to make profits have ignored copyright laws. How can they expect them to live together consciously and peacefully?

Although private servers have a low technical threshold, they can't be opened if they want.

For example, if Cavalry successfully integrates this group of hackers, a legendary private server community can be established. If a private server owner or a private server publishing station is unwilling to submit to him, a hacker like Chongqing will attack the private server and the private server publishing website in DDOS mode. The private server publishing website cannot be displayed normally, and the private server frequently gets stuck. line. When a server frequently freezes and disconnects, will players still be willing to pay?

will not.

So, your private server is over.

Private server publishing stations, server leasing, one-stop technical support, etc., selling jeans and cakes are hidden behind these important nodes. Private server owners pay a premium for technical support fees, server rental fees, private server publishing station advertising fees, etc. It is a protection fee in disguise. The private server owner has paid the protection fee unknowingly so that the private server can operate smoothly. Of course, this is not insurance. If the backend that collects protection fees is not strong enough, the private server owners will be sapped by DDOS attacks on the first day they open.

The above are part of the unspoken rules of the private server industry chain.

Cavalry's goal is to rule the legendary private server industry across the country. Cavalry's integration method is to make money for everyone. He stands at the top of the food chain to provide the highest quality technical support, and other important members monopolize the agency power of the city or province where they are located.

The Cavalry organization has just been established. Some members know each other and some do not know each other. How do they get along?

The unspoken rules of the network black arena are very simple, everyone talks about the level of technology.

You are strong and you are awesome, you are weak and you get out.

It is precisely because of this background that the Chengdu hackers, Suzhou hackers, Yanjing hackers and others seem to belong to the same organization, but they fight fiercely in Wei Dongsheng's decoy computer.

The most critical issue, but also the most core issue, why did the Cavalry organization focus on Wei Dongsheng?

The truth is simple and depressing.

The Cavalry organization was established during the National Day holiday, and it is currently recruiting troops. Hackers from all walks of life recommend potential partners to each other. For example, Suzhou hackers and Chongqing hackers joined Cavalry organization after being recommended one after another.

This morning, or last night, the legendary copy equipment bug was born. Wei Dongsheng’s Internet cafe game studio has been open for business since September 19th. Because of the large supply of high-quality equipment, it has gradually won a reputation: "As long as you have a wallet and drums, I can buy everything here; it is not that there is no dragon knife, but you offer a low price. "Before today, countless players and plug-in makers both envied the endless supply of boutique equipment from Internet cafes and game studios, and were curious about the source of the goods; when the time-value copying equipment bug appeared, these players and plug-ins immediately realized their imaginations. : "It turns out to be a copying equipment bug!"

Players despise the morality of Internet cafe game studios, and zero-cost copying equipment is also sold into the thousands; at the same time, players also envy the luck or technology of Internet cafe game studios and discovered such a precious bug more than ten days in advance. Wealthy players believe that operators will quickly close the bugs, and there is no need to keep the existence of Internet cafes’ gaming rooms a secret. Internet cafes’ gaming studios whose acquaintance economic model has always been spread in small circles are quickly known to public players.

The public players have been aware of the emergence of high-quality equipment in batches a few days ago, and jealousy mixed with envy to spread the existence of Internet cafe game studios everywhere. The Cavalry organization is determined to rule the country, and naturally will not ignore the public opinion dynamics of public players. Undernet, the Harbin hacker who first invaded Internet cafes, nominated the Internet cafe game studio to Cavalry: "Why don't you find out their details, if luck dictates it, if he finds bugs by strength, it is very worthy of us."

Yanjing hacker Valofatt agreed: "Except for the three of us, the rest are parallel import dregs who just started. We should recruit some capable members."

Cavalry rejected Valofatt’s suggestion for recruiting elites: “Private server operation is originally a zero-based and low-threshold industry. If you have real strength, who will be willing to immerse yourself in this business. Of course, if this game studio is really strong in the backstage, there will be more legends in hand. Bug, I agree to admit him as one of us."

Then, a group of members were not convinced and visited Wei Dongsheng's decoy computer in groups.

The Cavalry organization may not be malicious, but if you tolerate them, it is hard to guarantee that Wei Dongsheng will not be harassed again and again. Rather than being struggling to deal with it in the future, it is better to show their strength as domineering and frighten them away like an **** Shanda network.

Wei Dongsheng ordered the blue algae to follow the chat room channel to invade the computers of the remaining 42 members, and routinely search for any special findings.

If you like to re-take the road of the future, please collect it: (wuxiahere.com) Re-take the road of the future. The literature is updated fastest.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like