Chapter 229 Attack and Retaliation
.
As soon as the acceptance team announced that the acceptance work was successfully completed, Director Zhou was in the hot position of the iron assembly department and several generals from the Air Force confirmed the projects previously agreed upon with Xiao Qiang.
The Navy and Army were not invited, and more than a dozen people gathered together.
They actually saw the effects of the flight simulator these days, and they were very envious of it. They knew that they were going to finalize the final contract, so why didn’t they run fast and come over to fight for their military service?
At the beginning, they all surrounded Xiao Qiang, hoping to open the door of convenience for them.
Xiao Qiang was very simple, just saying that all the supercomputers were booked for Director Zhou, and he was not responsible for the allocation issues, so he walked out and left the meeting to the military personnel, waiting for them to discuss the results themselves.
He waited in the lounge for more than two hours before being invited back to the conference room.
The result is the number that Director Zhou negotiated with him, which is also the most fair division that takes into account the interests of various military branches.
Flight simulator, three million per unit. The Air Force expressed excitedly that it hoped that Universal Company would develop a simulator that simulates the US military's f15, f16, f18, b52b2 and other aircraft to practice air combat confrontation.
They required ordering 120 simulators of various models, and were able to connect at least forty simulators at the same time and enter the flight platform for training.
This is also the result of mutual compromise between the military.
Due to the limited number of supercomputers rented, it can only drive up to forty simulated aircraft at the same time.
Xiao Qiang only mentioned one thing about their request: there is no relevant data. The so-called simulated confrontation is just empty talk. In other words, if the Air Force wants to simulate US military fighter jets, it must obtain relevant data of these military aircraft. Now China has a good relationship with other countries, and it is possible to quietly obtain the data of ff16 and f18, but other military leaders including early warning aircraft have presented it.
Therefore, in this aspect, Universal Company cannot achieve complete realization.
The authenticity depends on the completeness of the data collected.
He said something and poured cold water on the enthusiastic Air Force, and then he realized their thoughts, which was still too wishful thinking.
After on-site discussion, the Air Force's requirements were modified, and the number of simulated aircraft was revised to a minimum of 60, of which the J-10 simulators must not be less than 40. In other parts, the Military Intelligence Bureau will find ways to collect relevant US fighter data from all over the world and decide the final model and quantity based on the data collection situation.
The Navy saw that the Air Force had revised their requirements and quickly discussed and made significant corrections to their plans.
Because ship simulators are much more complex than flight simulators, the price is much higher, each of which reaches 10 million yuan.
The Navy has tentatively set up eight simulators, because it has been built now, only three frigates with detailed data. Others, including destroyers, cruisers, etc., are still in the design stage. Therefore, they can only be gradually increased according to the progress of shipbuilding.
For some ships, they can only wait for the design to be finalized and then provide them to Universal Company after calculating the relevant data.
Their goal is to finally build a complete ocean-going combat formation including aircraft carriers, cruisers, destroyers, frigates, and submarines. Of course, it will be many years later to complete such a formation. It will also be restricted by various factors such as politics, economy, and diplomacy.
Therefore, during the long process of building a ship, some plans may remain on paper forever and will not become reality.
Compared with the ambitious naval and air force, the requirements of the army are much more real.
After listening to Director Zhou's explanation, they also knew that the basis of the army was infantry. If you want to simulate infantry tactics, it is useless to rely on simulators. It is impossible for people to install them in a machine to simulate travel, alert, and combat movements. Even if one day, a technological breakthrough can be made, it is unimaginable to prepare a simulator for each of the infantry at the division level.
Therefore, the Army said in a very low-key manner that they only need to make relevant training simulators for a tank regiment, air defense fire battalion, missile force, and armed helicopter force.
These equipment are not very complex, only armed helicopters are the most complex.
After bargaining, the Army's equipment simulator was set to be priced at 1.1 million yuan.
However, the Army also has a proposal, which is that they provide slightly vague basic data, such as armor thickness, alloy material, transmission mechanism, engine performance, etc., and Universal Company builds a general module to imitate the relevant combat equipment of foreign troops without precise imitation.
In this way, they can use this general simulator to slightly convert some data to verify the general confrontation between their own troops and simulate the enemy under different conditions, and at the same time they can also train the troops.
The rough simulation program they proposed also greatly inspires the navy and air force.
Although rough simulations cannot allow the troops to fully grasp the strengths and weaknesses of the enemy. However, through rough simulations, our army can also use these simulators to impersonate the enemy to act as a unit, roughly simulating the same tactical characteristics as foreign troops for our army to conduct targeted and targeted training.
They immediately raised the requirement to build a universal adversarial simulator.
After internal negotiations between the three services, the supercomputers provided to the three services will be temporarily supported to the brother units when other services have no training tasks.
If the navy and army temporarily stop training, the computing power saved can support the air force to conduct more than 300 large-scale air combat exercises at most.
Similarly, the navy can also use this method to carry out a naval battle where hundreds of ships gather.
The Army can even carry out a synthesis drill on the front-scale by excluding computing power.
In this regard, Universal has no objection: as long as their simulation trainer is enough, it will be done. As for the system conversion, it will only take eight or nine hours. It can be completed in one night.
After several consecutive days of discussion, the final text of the contract was confirmed.
The total amount of naval, army and air force simulation equipment is 1.46 billion yuan, but what falls on paper is 3 billion yuan. The extra part, the contract states that it is paid to the system construction labor fee of Universal Company.
Both sides accepted such a high labor fee tacitly.
Everyone knows that the more than 1.5 billion you pay is actually the rent of 80 supercomputers provided by the Universal World. Because according to convention, the simulator support system is originally integrated into the simulator. The price of the military purchasing simulator should, in theory, include server expenses, and no additional fees should be paid.
Only Universal Corporation has used supercomputers so luxuriously to support simulation system operation.
Because its effect is really amazing, the military also defaulted to the additional pricing of supercomputers. By paying design labor fees, the rental fee for supercomputers is paid.
However, such a large amount of fees is not a one-time payment.
According to Xiao Qiang's instructions, Huanyu Company
It's only twenty-four after a year that I can build two supercomputer systems
It will take about five years to fulfill the complete contract.
The military will also accept the contract once a year according to the progress of the contract performance and pay the remuneration for the year.
The mission of Universal Company this year is to build fifteen flight simulators for the Air Force, three Navy frigates simulators, and one hundred tank training simulators for the Army.
Moreover, in the first half of the year, he was mainly responsible for the design and manufacturing of mechanical components. The six supercomputers provided will be used first for research and operation of national key projects.
When Xiao Qiang finished signing, he looked at the total contract amount. He was also very regretful.
He is fully capable of completing the contract within one or two years.
But in order to conceal the number and performance of the supercomputer at hand, he could only complete it in five years after watching such a large contract.
You can’t have both fish and bear’s paw!
Director Zhou saw him showing a bad look, walked over and said with a smile: "Why? I'm used to eating big fish and meat, and I'm not satisfied with the contract of 3 billion?"
"How could this be? These simulators are just some iron lumps. We only need to design a control system for each model. In the future, the data will be complete, and it will be more convenient to directly build functional modules based on the materials, models, and components used. Don't look at the number of them, just apply the preset system directly." Xiao Qiang naturally would not say that he regretted that he could not swallow it in one bite because he saw such a large amount of money. "I'm worried about another thing. This time, you exposed the news about us using dozens of sets of supercomputers, which made me suffer. Now the outside world is focusing on us, which is not easy!"
Director Zhou was also silent.
He also regretted whether he could do it before mobilizing public opinion this time.
In the past, Universal Corporation directly handed over all the ports rented by supercomputers to the National Defense Science and Technology Commission for distribution.
Those research units that require large amounts of calculations must write applications in advance, and after approval, they have to queue up. It is their turn to use it, and an unusually complex operation can also get results soon.
Every unit that has used supercomputers to conduct auxiliary research has a deep understanding of this.
The National Comprehensive Research Base, hundreds or thousands of units, all know that there is more than one supercomputer from Universal Corporation. But they don’t fully understand how many it is and how it performs.
After all, in the closed environment of Universal Company and its own local security measures are tight, there are also alert personnel sent by the state. In addition to the people from the National Defense Science and Technology Commission, outsiders cannot enter. Universal Company is so yelled that everyone is making speculations through the veil.
People often say "It's rare to be confused", this is indeed a good word.
If you don’t know the inside story, everyone will live a happy life and will not feel resentment because of insufficient desire.
This time, the matter of dozens of supercomputers in Universal Company immediately caused an uproar when it was disclosed.
Not to mention that domestic research institutions are jealous and uninformed netizens are fueling the fire. More importantly, they have attracted the attention of foreign countries. They have simultaneously strengthened their penetration and destruction of Universal Corporation.
Director Zhou was silent for a while and said, "Do you have a way to deal with it? Do you need our help?"
Xiao Qiang laughed and said, "You may be the one who is in their minds. After we held a press conference yesterday, Europe and the United States declared that you didn't see it. They are simply turning black and white. As soon as you come forward, they can just show that we are colluding with you in an attempt to discredit them."
"What should I do?" Director Zhou was also at a loss. "You can't let it go and let them attack at will?"
"Let me leave it alone? I, Xiao Qiang, is such a good person? If you dare to mess with me, you must be prepared to pay the price!" Xiao Qiang said gloomyly, "Don't think that I have stayed in the company honestly for the past few years and had a few days of vegetarian food. I am a Bodhisattva!"
The servers of Universal Company have been attacked hundreds of thousands of maliciously every day these days, and he has long been very popular.
The backlash from Europe and the United States aroused his anger and made him make up his mind.
These cyber attacks involve sending a large amount of spam and attempting to block the message channels of the company's website. Some of them are used to break through the firewall and modify website data to show their own hacker capabilities.
There are also some attacks with obvious intentions, hoping to invade the Universal Company database and steal data.
Speaking of which, this is not the first time that Universal Company has been maliciously hacked by hackers. Network maintenance personnel have accumulated more than ten years of network security maintenance and technology. They have accumulated considerable experience in fighting with European and American hackers.
After so many years of software design development, Universal Company's server protection is very strict. Ordinary attacks basically cannot even break through the peripheral protective wall.
In comparison, the company's local hacking measures are even more tighter than the US Pentagon and FBI databases.
Over time, it is difficult for Universal Company's servers to overcome, and it has also become a consensus in the hacking industry.
In order to show their technical strength or practice, many hackers often choose Universal's servers as targets of attack.
They all know that Universal is not the US government after all.
If you want to attack the US government website, the Pentagon, and the FBI database, you won’t say whether you can succeed. Even if the intrusion is successful and discovered by the US government, they will launch global arrests and force other countries to extradite hackers to the United States.
Those hackers either spent the rest of their lives in prison or were forced to join and serve the United States.
The risk is too great!
But the website that attacks Universal Corporation is different.
Universal's website server intrusion ranks first, and it successfully attacks and can become famous in the international hacker industry. Moreover, Universal is just a private enterprise. Even if they find the address, they are not afraid of retaliation, and the risk is extremely small.
Over the past decade, Universal's servers have been successfully invaded seven times, five of which occurred within three years of the company's establishment. In the next nine years, only two successful invasion records have been recorded.
However, they did not know that the company's website servers and supercomputers used by the research department were not physically connected. The company's core information was saved in the intranet.
Even if you are successfully invaded, it will not cause any losses to the company.
On the company's network server, the most valuable is the Huanyu Technology Network database. Most of these scientific and technological materials are paper reports written by colleges and universities.
Seven successful cyber hackers were found after the invasion and kicked out of the host system.
Another hacker downloaded a research report. When entering a higher-level database, he was discovered by technicians and drove away.
Although he was kicked out of the system, he finally got a research report and was ecstatic, thinking that he had stolen confidential information from the Universal Company. He was openly sold to an American commercial company within European and American hacking websites.
Because this hacker stole database information of ordinary user groups
The technology discussed in the paper is very ordinary.
The company obtained the information and after research, it was found that it was not of high value.
The hacker who stole a piece of information and received compensation has become famous and has been trying to break through the database of Universal Corporation.
There are dozens of supercomputers in Universal. Before the public knows, the company's website servers were generally attacked thousands of times a day. However, since the news was spread to the Internet, cyber attacks from all over the world have shown a sharp upward trend. On the most days, they were attacked by more than millions of attacks from all over the world.
Those Western technology groups used to purchase information companies that believed that Universal Corporation's technical strength was just like this. However, as Universal Corporation became more and more famous, the West's emphasis on it continued to increase.
After it was revealed online that Universal Company actually had dozens of supercomputers, they were shocked. With dozens of supercomputers, how terrifying should Universal's technological research and development capabilities be?
Looking back at the information they thought was very ordinary. Everyone would never believe it. This is the true level of a technology company with dozens of supercomputers.
They believe that they are blinded by the illusion of Universal Corporation.
As a result, a large number of Western technology groups, either taking action alone, cooperating with each other, or cooperating with the US and European governments, launched a new round of network invasions against the Universal Corporation.
Because Huanyu Company holds control of Huanyu.com, we know the source of these attacks.
Most of the network invasions of such an order of magnitude come from Europe and the United States.
Some of the network intrusions are obviously organized and purposeful, with clear division of labor among the intruders and have adopted collaborative attack methods, hoping to enter the company's database.
These organized network invaders include some Western commercial institutions, research institutions, and competitors. There are also huge numbers. They are invasions of the US and European governments and military departments for the purpose of stealing research data from Universal Corporation.
It all depends on the company's ultra-wide bandwidth of 1,000 t. This frequent attack did not cause the company's network to be blocked.
Different levels of protective nets allow intruders of different levels to be isolated one by one.
Every time a layer of network protection is passed, most intruders will be eliminated. A very small number of hackers who can invade two to three layers of protection networks will be locked in their true identities by the website technicians of Universal Corporation.
The biggest feature of Universal Network is the user binding authentication mechanism.
The true identity of each network card is recorded and passed the authentication code. The company's core technical personnel can quickly find out where each intruder is. Even if they use more broilers as springboards, it will be useless.
Just to avoid exposing the technology of Universal Corporation, we can discover the identity of the intruders and prevent hackers from attacking them from attacking them. They are all backend maintenance personnel. Unlike core technical personnel, they can know the accurate information of the intruders. Backend maintenance personnel still use conventional means to drive out the intruders. Hackers do not know that Universal Corporation has long been in the case of their identity.
Cybersecurity maintenance personnel and network intruders launched a cat and mouse game.
Invasion, protection, kick out of the system, tracking...
Such a game is staged day after day.
Without the technical means of ascertaining the true identity of the intruder, the network protection technology of the company's network security maintenance personnel is also growing rapidly.
There are hundreds of super experts in cybersecurity training.
During this large-scale network invasion, the maintenance personnel were in peace all day long, and everyone cursed.
Xiao Qiang was even more angry at the organized invasions. He decided not to simply defend, but to take the initiative to attack and teach his opponent a lesson.
Under his instructions, the maintenance personnel changed their past practice of chasing out several springboard servers and then resigning their troops to the battalion, and pursued the invaders relentlessly. They stared at an invader and refused to let go. Several maintenance personnel chased them together, and often the invaders just retreated to a server as springboard, and before they could eliminate the traces, they were chased by the security maintenance personnel.
Many hackers who are more famous in Europe and the United States have been chased by Universal Corporation to this machine. As the network security maintenance personnel seized control of their computers, they believed that they left warning documents on the computers.
Some hackers also have to unplug the power supply to prevent the unit from being exposed.
Although the technical means of directly identifying the network was not used, the maintenance personnel still found the real addresses of more than a dozen hackers through tracking.
After this battle, some European and American hackers knew that Universal Company was difficult to deal with, so they stopped slowly.
But I am fearless of those hackers from European and American government organizations: So what if you know? If you have the ability, come to the United States to arrest me!
They continued to launch tides of cyber attacks on Universal, not even pretending, and openly exposing their network addresses.
Universal held a special press conference to make the addresses of these attacks public.
Faced with the accusations from Universal Corporation, Europe and the United States responded: There is insufficient evidence and it is difficult to determine whether these attacks were from Europe and the United States. Then they buried their heads and continued to launch an attack.
When Universal posted all these attack methods, sources, and operations in detail, the European and American parties actually denied it and said in a black and white manner that this was a frame-up by Universal. They also shamelessly stated that given that China has always had a precedent for tampering with information, all evidence should not be used as evidence for the accusations from China. Only evidence confirmed by the European and American parties is true and reliable!
The implication is: I say yes, that's right, that's not, that's right; I say no, that's not, that's right, that's not!
Xiao Qiang was already angry at their robber logic.
In recent years, with the bleaching of Universal Corporation, its own technological level has also improved by leaps and bounds. Moreover, in terms of development path, Universal Corporation and Western technology have already appeared forked, and Xiao Qiang is no longer so interested in stealing Western technology.
Therefore, in recent years, he has always stayed in the company, lived in simplicity, and cultivated his mind and nature.
Many times, he thought he was a paradise who was not surprised by his favor and disgrace.
But this time, he was angry!
Xiao Qiang was very angry, and the consequences were very serious!
He immediately ordered a retaliation against Europe and the United States, and the intensity of this revenge should be as deep as possible to the other party, so that the other party should know that although the Universal Company has been obscure in Taoguang over the years, it is a terrible opponent. If you offend it, you will be extremely terrible revenge!
He personally convened a meeting, formulated retaliation measures, and dispatched them one by one.
In order to implement the policy of cracking down on opponents and protecting itself, Universal Company made preparations for up to three months.
Chapter completed!