Revisiting Future Path/C18 Private service industry chain
+ Add to Library
Revisiting Future Path/C18 Private service industry chain
+ Add to Library

C18 Private service industry chain

018th Privacy Industrial Chain

Firstly, the bandwidth was limited, and secondly, there were two meat chicks between them. The speed of the internet between Wei Dongsheng and the self-confident hacker was not that good. If the video is fully monitored, it will certainly bring the burden of network speed, causing the self-confident hacker to be alarmed. As a result, Wei Dongsheng decisively took out the photo method to peep at the real life of the self-confident hacker.

With the seven low resolution photos sent back, Wei Dongsheng quickly gained an intuitive understanding of him.

The cyan algae network security detection record shows that the self-confident hacker's IP address is some place in Chongqing, to call him at least Chongqing Hacker. Chongqing Hacker was young, around twenty years old, and his clothing style was slovenly. In the background, he might have been living in a cramped rented room. The beds were old, shoddy wooden beds, the walls were simple whitewashed walls, and the wooden desks were worn and dirty except for the soft chairs commonly used at computer desks. Material conditions reflected his poor quality of life, and he was not a college student, nor did he resemble a normal family.

At this moment, Chongqing Hacker was lying on a soft chair and playing a set of music on loop. He was happily flipping through the information stored in the Decoy computer as he sighed in admiration, "There are so many external devices, is this guy a collecting maniac?"

Wei Dongsheng ordered the blue algae to repair the sound track of the Chongqing Hacker, and found that his voice had a strong Suzhou accent, which was clearly different from his local Chongqing language. Wei Dongsheng conjectured that the Chongqing Hacker was either located close to Su Zhou or had lived in the vicinity of Su Zhou for a period of time.

Chongqing Hacker did not discover Wei Dongsheng's counterattack and continued to look through the decoy computers. There was no need to laugh at Chongqing Hacker's dullness. Cyanobacteria are the most advanced black technology, which can directly affect the integrated circuit anti-computer system. The traditional firewall mechanism can not detect its invasion at all. Even the most powerful hackers, limited by contemporary computer science theories, were unable to detect the invasion of cyanobacteria in time. If necessary, cyanobacteria can hack into any computer connected to the Internet at will.

Taking advantage of the moment that the Chongqing Hacker was flipping through the Decoy's computer, Wei Dongsheng quickly searched his computer and immediately found a clue.

Chongqing Hacker's computer, a special chat room software that minimized the number of people in the chat room, had a total of forty to fifty people talking to each other. Wei Dongsheng downloaded the chat information local, quickly flipping through it from the beginning, slowly comprehending the clues.

Originally, Harbin hackers, Chengdu hackers, Suzhou hackers, Yanjing hackers, etc. belong to the same organization.

After the Italian version of Legend's source code was leaked, a hacker named Cavalry, who was active on the internet, was ready to take action. He had high hopes for the profits of the Legendary Private Service industry. Cavalry's goal was to rule over the Privacy's industrial chain, rule over all the Legendary Private Service in the country, and in the future, all the Legendary Private Service would follow his rules. Harbin's hackers, Chengdu hackers, Suzhou hackers, Yanjing hackers and Chongqing Hacker hackers were all partners he had found through various channels, and would be in charge of the Privacy industry in various regions in the future.

First, he had to consolidate his power, then he would attack others.

The Chongqing Hacker and the Suzhou hackers were good friends in the real world. The Suzhou hackers knew that the Chongqing Hacker was facing financial difficulties recently, so they recommended the Chongqing Hacker to Cavalry. The Chongqing Hacker's note stated that although his network security was poor in offensive and defensive techniques, he was particularly good at DDOS attacks, and was very suitable for patrolling the law enforcement industry.

In the Privacy industry, the technology needed to rent servers and set up Privacy s was very low. However, the reason for setting up Privacy was to earn money, which was only if there were players who were willing to fall into the pit.

As a result, first of all, running the Privacy required a stable source of customer.

If you want to do some work at this node, you can start the Privacy Publishing Site and monopolize the entrance to the players' customer traffic. During normal times when everyone was online, they would occasionally encounter web ads and suddenly post a list of Web pages that Privacy would open at any time, which was known as the Privacy's release station. The Private Owner could of course advertise it by himself, but the efficiency was definitely not as good as advertising at the Privacy Publishing Station. After all, many players would suddenly run into strange Privacy and their first thought would always be to check if there was a virus horse installed.

In terms of the Privacy industry, the profits from controlling the Privacy distribution station far surpassed the true Privacy operators.

A very popular piece of chicken soup. During the Great Development of the American West, gold mining became a hot industry, with countless people dreaming of gold mining overnight. In the end, the gold digger didn't make a fortune, but the jeans seller did. In the Privacy Industry Chain, he established the Privacy and worked hard to recruit players to be equivalent to a gold digger, and the only way to control the Privacy release station and the other upstream nodes was to sell the jeans that could earn a lot of money.

And do not long-winded Privacy industrial chain each node profit.

In order to operate the Privacy, a certain amount of customer traffic was essential. What was more important was to use a stable game experience to keep them paying.

On the other hand, the Privacy industry was a part of the black web, no one would be willing to compete with you fair and square. To put it bluntly, how could a person who firmly worshipped the values of fair and fair competition violate the copyright of a genuine game? Private Owner who was trying to establish Privacy s to earn a profit disregarded copyright law to begin with. So how could he hope for them to coexist harmoniously?

Although the Privacy's skill threshold was low, it wasn't something that could be opened just by thinking about it.

For example, Cavalry, if successfully integrated with the hackers, created the Legendary Private Service community. If any of the Private Owner s or Privacy s were not willing to submit to him, then the lackeys like the Chongqing Hacker would make their move and continuously use DDOS to attack the Privacy server and the Privacy website. The Privacy s website would not be able to show that the Privacy server had lost its line. When a server is disconnected frequently, would the customer be willing to pay for it?

No.

Therefore, your Privacy is finished.

Privacy Publishing Station, Server Lease, Dragon Technical Support and so on. Those who sold the jeans and shared the cake were all hidden behind these important points. The technology support fees that the Private Owner offered, the server rental fees, the advertising fees for the Privacy Publishing Station, were all disguised protection fees. Unknowingly, the Private Owner had to pay a protection fee in order to operate the Privacy safely. Of course, this was not guaranteed. If the backers that collected the protection fees were not strong enough, Private Owner would welcome the attacks from DDOS on the first day.

The above are all part of the unwritten rules of the Privacy s industrial chain.

Cavalry's goal was to rule over the Legendary Private Service industry throughout the country. Cavalry's method of integration was to make money for everyone. He stood at the top of the food chain to provide the best technical support.

Cavalry had just been established, and the members did not know each other well. How could they get along with each other?

The unwritten rule of the internet Black Jianghu was very simple.

You're strong, you're strong, you're weak, you scram.

Because of this background, Chengdu hackers, Su Zhou hackers, Yanjing hackers, and others who seemed to be from the same organization, were actually mercilessly fighting in Wei Dongsheng's bait computer.

The most critical and central question, why did the Cavalry Group set their sights on Wei Dongsheng?

The truth was simple and depressing.

Cavalry, founded during the National Day holiday, is recruiting and hackers from all walks of life recommend potential collaborators. For example, Suzhou's hackers and Chongqing Hacker's all recommended this layer after layer before joining Cavalry.

This morning, or perhaps last night, the legendary duplicate equipment bug was born. Wei Dongsheng's Internet Cafe, Game Studio, had been open for business since September 19. Because of the large amount of fine equipment being supplied, he had gained a good reputation gradually. "As long as you take a purse and drum, I can buy anything. Before today, countless players and external producers were envious of Game Studio's superior equipment, but were also curious about where he got the equipment from. With the appearance of the duplicate equipment, these players and external players immediately realized something, "So it's a duplicate equipment bug!"

Players despised the morals of the Internet Cafe's Game Studio, which sold equipment that didn't cost anything. At the same time, players envied the Internet Cafe's Game Studio's luck and technology to discover such a precious bug ten days ahead of time. Wealthy players believed that the Operator would quickly seal off the bug, so there was no need for them to keep the existence of the Internet Cafe's game room a secret.

The majority of players were still on guard as to why a few days ago, such a large amount of high-quality equipment had appeared. Amidst their jealousy, mixed feelings of envy and jealousy were spreading to the entire Internet Cafe. Cavalry's determination to rule over the Legendary Private Service of the entire country naturally wouldn't ignore the public's public opinion. Undernet, the first Harbin hacker to invade the Internet Cafe, nominated Cavalry's Game Studio: "Why not investigate their background? If it's just luck, then it's fine. But if he can find the bug by relying on his strength, then it would be worth it for us to recruit him."

Valofatt, the Yanjing hacker, agreed. "Other than the three of us, the rest are all trash that just entered the school. We should recruit some powerful members."

Cavalry rejected Valofatt's proposal to recruit elites: "Privacy is a zero-based, low-threshold industry. If they had the ability, who would be willing to immerse themselves in it? Of course, if this Game Studio is really powerful and has more Legendary Bugs, I would agree to take him as one of us. "

Afterwards, a group of unconvinced members came to visit Wei Dongsheng's Decoy computer in droves.

The Cavalry Group might not have any malicious intentions, but if they were to condone it, it would be hard to ensure that they wouldn't harass Wei Dongsheng time and time again. Rather than being exhausted in the future, it would be better to display power like the Enormous Network, and scare them off.

Wei Dongsheng ordered the blue algae to attack the computers of the other 42 members via the chatroom entrance.

See More
Read Next Chapter
Setting
Background
Font
18
Nunito
Merriweather
Libre Baskerville
Gentium Book Basic
Roboto
Rubik
Nunito
Page with
1000
Line-Height
Please go to the Novel Dragon App to use this function