HacKer
Chapter 955: Philippines capital, port problem!
The Philippines is a typical archipelago country with 7,107 islands and its capital, Manila.
Manila, the capital of the Philippines, is the most developed region in the Philippines. It has more than half of the industrial enterprises in the Philippines, and also has one-quarter of the country’s higher education institutions, as well as the largest port in the Philippines, Manila Port. .
In 2005, Manila's port throughput was 1.2 million TEU, ranking the 33rd in the world's port throughput. The so-called TEU is an international standard container of 20 feet in length, which is an important unit of measurement for port throughput and ship cargo capacity.
As the most important port of the Philippines, the government of the Philippines attaches great importance to the development of the port of Manila, and has invested more than 300 million US dollars to develop the electronic information technology transformation of the port of Manila.
As a modern port, if there is no electronic management, how to deal with the huge cargo throughput every year?
Electronic information technology provides a very convenient management method for the port of Manila. However, this information management method also provides hackers with the convenience of intrusion.
The port management system at Manila Port is not a closed management system, but a connection to the Internet. After all, the cargo information of the entire Manila port needs to be displayed to other agencies for inspection.
Although the port management system at Manila Port has very strong protection measures, it does not worry about being invaded when faced with general hackers.
Shi Shilei is not a general hacker!
Shi Lei is a world-class hacker with world-class hacking skills! The Internet electronic information system all over the world can completely resist Shi Lei, but there are really few.
Including the NSA of the National Security Agency of Lijian, if they are unattended, their defense system can't stop Shi Lei's invasion. Even DARPA's defense system is not an opponent of Shi Lei. Of course, all of this is based on the premise of unguarded. If there are security guards, Shi Lei will dare to play with the FBI FBI at most under the current hardware conditions of dream entertainment. Even the CIA CIA, Shi Lei does not like to deal with them!
Shi Lei currently likes to deal with the Philippines, especially the Manila port of the Philippines. Shi Lei put his hands on the keyboard and passed the No. 1 server to the port management system of Manila Port.
"I have taken back the harassment attack on the South Vietnam National Security Agency, integrated the IWN secret network resources, and prepared to attack the port management system of the Manila port in the Philippines." Shi Lei told the smugglers.
Although the South Vietnamese National Security Agency cut off the power attack, it also has some subordinate departments. According to Shi Lei’s instructions, Yirui harassed these subordinate departments.
"Yes, Sir, command execution." Yizhe immediately followed Shi Lei's order and began to execute.
......
Peng City.
He always hangs up Shi Lei’s phone and is forced to get up from the warm bed of the female secretary. He walks into the bathroom with his mobile phone and closes the bathroom door. After ensuring the sound insulation, he uses the mobile phone to call the broken knife group leader. .
After waiting for a while, the broken knife was connected to the phone. As a world-class hacker, the broken knife apparently did not sleep. The broken knife group led by Broken Knife has only 24 members. They are not traditional hacker organizations, but hackers who specialize in serving big penguins.
Therefore, the broken knife is only a watchful battle between the Xiaguo hacker community and the Philippine and South Vietnamese hacker circles. He did not lead the broken knife group to participate in the battle.
"Boss, what kind of emergency happened?" asked the knife cleanly.
It is already past three in the morning. If there are no important urgent matters, it is impossible for him to find him at this time. Since the twisted vine is looking for him, it means that there is an emergency.
"Broken knives, our Pengcheng traffic information management system was invaded by the Philippines. This matter, you should handle it quickly! Pengcheng is our base camp, we can't lose face!" The twisted vine ordered the broken knife.
Although the traffic information management system of Pengcheng City has been blackened by the Philippine countries, there is no relationship with the big penguin. Sometimes, people are floating in the rivers and lakes. The headquarters of Big Penguin is in Pengcheng. Within the hacker world, Pengcheng is the site of the big penguin by default. If the big penguin can't even protect his own territory, it will become a joke in the hacker world.
If it is just a joke, the twisted vine may not care, but in the hacker world, it becomes a joke, which means that the strength is weak. Big Penguin is a fat sheep, and if it shows a weak performance, it will be ravaged by countless hackers. Therefore, the twisted vine and the big penguin company cannot be the laughing stock of the hacker community!
"Understood, boss! This matter, let us deal with it!" Broken knife said affirmatively.
Twisting vine is more reassuring about the broken knife. He encouraged two sentences and promised some rewards for the broken knife and the broken knife group before hanging up the phone.
......
Shuangqing City.
Shi Lei, in conjunction with the over-computing resources provided by IWN Secret Network, is scanning the port management system at Manila Port in an attempt to find loopholes in the port management system from outside the management system.
IWN secret network gathered nearly 1000tflops under the integration of Yizheer. Shi Lei was outside the port management system of Manila port. After searching for nearly ten minutes, he still used IWN secret network for forced scanning.
The efficiency of the IWN secret network is very high. Although the IWN secret network has not scanned the system vulnerabilities, Shi Lei used the computing resources of the IWN secret network to directly enter the port management system from the official cargo inquiry channel of the port of Manila.
Within the port management system, Shi Lei did not directly go black, but analyzed the operation of the entire port management system. It is not the management operation of the port, but the operation of the data storage system of the port management system.
‘Asynchronous data backup system? ‘Shi Lei looked at the management system of the port of Manila, and he felt a sense of surprise. The system using asynchronous data backup is usually not easy to be hacked.
The data backup structure is implemented by a differential storage system and a disk array group. The backup server and the primary server are not closely connected. Once the primary server is attacked by a hacker, the backup server will automatically disconnect from the primary server. Keep the data.
If it is a general hacker, if you encounter an asynchronous data backup system, you will usually choose to abandon the intrusion, or vent your anger in the main system. Shi Lei did not give up, nor vented anger, but sneaked down in the main server.
Shi Lei is waiting for the backup server to perform asynchronous data backup. Only when the data gap between the primary server and the backup server is reached, the critical value of the design is reached, and the asynchronous data backup system will start working.
That will be the time for Shi Lei!
The process of waiting is undoubtedly very painful. Shi Lei, who is idle, has inquired about the internal information of the database in the main server, and inquires about the port management system and how many hardware facilities are controlled.
The port of Manila is the most modernized port in the Philippines, with considerable hardware and equipment that can be operated through the Port Management System. For example, the most common gantry crane in the port, which is responsible for the land part of the port, transports the container into the truck; or transports the container from the freight car to the port for land storage.
Corresponding to this is a mast crane, which is responsible for transporting standard containers, or cargo, from ships to land; or from the port to the ship.
These machines, which would otherwise require personnel operations, can be operated by the Port Management System at the port of Manila.
Shi Lei tried to crack the hardware operation subsystem of Manila port. If the crack is successful, Shi Lei can control the gantry crane, or the mast crane, or even the command center that controls the port of Manila.
Shi Lei patiently analyzed the port management system at the port of Manila. When he discovered some unusual information, he suddenly issued a reminder, "Sir, the system has tracked the backup channel of the asynchronous data backup system, is it pursued?"
"Let me come!" Shi Lei did not worry about the clothes, although Shi Lei optimized the black magic software, in the invasion of this piece, the clothes are really bad, at least compared with Shi Lei, the gap is still too obvious .
Shi Lei walked along the backup channel of the asynchronous data backup system discovered by Yi Zhuer, and peeled off the defense system of the backup server layer by layer. Shi Lei’s face showed a smile. Then quickly go back and check the information that was just found, which is not normal.
Philippines, the port of Manila.
As a large port, the port of Manila operates 24 hours a day, even at three o'clock in the morning, it is still a busy scene.
Manila in the Philippines and the capital city of Xiaguo are in the same time zone, so there is no time difference. It is now more than three o'clock in the morning of June 4th, and the Philippines is also this time.
In the busy port of Manila, a port forklift has just completed a transfer order and is now processing the second transfer order. The forklift trucks at the port land are mainly responsible for transporting some small cargo into standard containers to facilitate the next transportation.
The forklift, named Raul Hernan, took the second transfer order. Since the transfer order was collected together, the second transfer order was soaked in sweat when the first transfer order was processed. As a result, some of the transportation information is unclear. Therefore, Raul Hernan had to use the PDA that he carried with him to enter the shipping number into it and ask for a detailed list.
However, when he entered the PDA into the PDA and connected to the port management system, he hoped that the PDA did not display any data when he asked for a detailed list of shipping details.
Raul Hernan thought that the PDA had gone wrong at first. He tried it several times and still had no data. When he entered the number of the first shipping list, and still did not find the results, Raul Hernan realized that there might be something wrong with the port management system.
Raul Hernan, who discovered the problem, reported the situation to the Port Authority for the first time...
(To be continued. Please search for astronomical literature, the novel is better and faster!)
You'll Also Like
-
Douluo: I became Qian Renxue's follower and was forced to become a god
Chapter 262 6 hours ago -
Pirates: I become stronger by checking in on the plot island
Chapter 320 6 hours ago -
Naruto, the Cultivator
Chapter 462 6 hours ago -
Naruto: Lama Tobi was exposed by the sky curtain
Chapter 348 6 hours ago -
The pirates sat and forgot, and they really believed the nine truths and one lie.
Chapter 816 6 hours ago -
Hogwarts Lion Girl
Chapter 238 6 hours ago -
The original god was revealed, and I made everyone cry with my sword
Chapter 226 7 hours ago -
Pokémon Heart Journey
Chapter 198 7 hours ago -
Elf: Wanted to make money by lying down, but became a master
Chapter 201 7 hours ago -
Learn magic in Harry Potter
Chapter 386 7 hours ago