Chapter 629 Paranormal Event
The super worm was soon discovered, and the computing power of the United States was positioned.
"The computer room of California Institute of Technology?"
Seeing this result made Lin Hong a little relieved.
Judging from this result, the other party is definitely either a teacher or a student. At least you can think that the other party has no malice, and may just want to verify your ideas.
In fact, Lin Hong had expected this result. After all, only in this kind of place can there be so many computers that can provide computing power. In addition to schools, there are also Internet cafes.
Lin Hong invaded and checked according to this address and found nothing worth paying attention to. He did not disturb the other party, so he retreated directly.
Judging from the operation logs in these computers, there should not be many people involved in this operation.
Then, Lin Hong invaded the log server of the computer room of the California Institute of Technology and found that there was only one user in the computer room today, named Charles Warren.
Taking this name as a clue, he found the record about the student on the server of the Government Affairs Office.
The next step is the database of the U.S. government's Social Security Agency...
Lin Hong has long been used to doing this kind of thing. He doesn't even need to look for loopholes again to invade many places, because he has invaded similar servers before and can just "open the door" directly.
In just a while, Lin Hong knew the information about Warren clearly, and even the information that he was the "Blue Beard" of "Mask Island" was available. Lin Hong found it from the FBI's database.
Due to the increasing number of cybercrime activities, especially after the emergence of Kevin Mitnick's case, the monitoring of hackers in the United States has been greatly strengthened. The FBI has a list of hackers who focus on monitoring. Basically, the more famous hackers in the country are within their scope of monitoring.
In this way, once something important happens. They can quickly locate these hackers.
And Warren is one of the list.
This sudden change in computing power is caused by Warren.
Lin Hong doesn't know what his motive is, but now it seems. His operation has failed, and the total computing power in the computer room is no longer enough to exceed half of the current computing power of the whole network.
It's fast. The super worm captured another computational power in the United States.
After seeing the intrusion into several machines, Lin Hong smiled.
Several of them are quite familiar with him. He is a member of the "Password Punk" organization, including the founder Eric.
These people are all organized to defend the protection of the Bitcoin network.
Although their own computer computing power is limited, they have many supporters. Under their call, many people have joined the army of mining, not for Bitcoin, but purely to protect Bitcoin from the control of others.
"It seems that Eric and others also know the weakness of Bitcoin's 51% attack."
For this. Lin Hong was not surprised.
After all, all the algorithms and software source code of Bitcoin are open source, and everyone can basically see that so many people will always find this loophole.
There are no secrets in the open source world.
The two computing power of the United Kingdom and Russia have never had any clues. It seems that these two are masters of computer networks. Even the super worms failed to break through their computer defense line, and they are also very cautious. They usually pay great attention to the confidentiality of their information and leave no trace of revealing their identity on the Internet.
As for the scattered computing power hidden behind it, Lin Hong finally followed the clues left by the other party in the broiler. I found the master.
However, this person surprised Lin Hong a little, because the other party was just a teenager, younger than Lin Hong, and what made Lin Hong feel a little kind was that the other party was actually a Chinese.
"Chen Jian, male, 14 years old, his father is currently a computer engineer at Hewlett-Packard..."
Lin Hong looked at the information about Chen Jian in the display.
His father is also an awesome man. At the beginning, he smuggled to Hong Kong alone, then traveled to many countries, and finally settled in the United States. He also self-taught computers and was admitted to a private university. Later, he married a Chinese girl from the Chinese community. At present, he has become a middle class in the United States.
Chen Jian also seems to have inherited his father's ingenuity, showing extraordinary IQ at a very young age. I have shown great interest in electronics and machinery since I was a child, starting with ore radio, then contacting the radio station, and then the computer...
What he likes most now is to stay alone in the room and surf the Internet, but in fact, he is constantly invading and invading again.
Lin Hong also saw him on the FBI's key monitoring list, and he ranked very high. The FBI's comment to him was "extreally destructive, key monitoring objects".
On Liu Jian's file, there have been many records of being summoned by the police station, and once he was sued to the court. In the end, he was not only fined, volunteered in the community, but also banned from contacting computers and the Internet for three months.
Lin Hong looked at his resume and became interested in this teenager.
From him, Lin Hong saw his shadow in those years.
Lin Hong saw some abnormalities from some of his recent behaviors. His medical records show that his mother had taken him to see a psychologist three times in the past month. The doctor's diagnosis was "preliminary judgment of depression".
At this moment, Liu Jian is flying in front of the computer. He continues to install mining programs in his chicken.
Lin Hong thought about it and finally decided to contact him.
He did not choose to communicate with him directly in Liu Jian's computer, but used the broiler he was operating by the other party as a medium, and sent a sentence directly to the other party's terminal in English... Night Devil, thank you!)
Liu Jian, who was so busy, saw the sudden words that suddenly appeared, and his pupils suddenly shrank. He suddenly stood up from his seat, and then took a few steps back, as if he was afraid that something would crawl out of the computer.
Liu Jian was scared like this. He completely saw that the other party called himself "Night Devil", because when he usually invaded other computers, he always named him at will, and there was no rule. "Night Devil" is a common ID he usually uses when he contacts his friends.
Now, there is a person who suddenly contacted himself with this ID. What's more difficult to accept is that now the other party contacts him on one of his own broilers, which makes Liu Jian think that he has encountered a supernatural event. ( To be continued. If you like this work, you are welcome to vote for recommendation and monthly ticket. Your support is my greatest motivation.) RQ