{Time: May 6, 2003}

{Location: Germany-Frankfurt}

While Ning Zimo was planting flowers and singing loudly in the dark, attracting attention, far away at the ACS headquarters in Frankfurt, Germany, Pan Yu both loved and hated the attention others paid to ACS.

acs said that it was scheduled to be launched silently today, but in fact acs had been exposed to the Internet as early as May 1. Because the acs plan was formulated when the operational strategy was planned, the public release in the past few days was just for testing.

The anti-hacking ability of acs.

The word "cloud service" was deeply engraved in Pan Yu's mind the first time Ning Zimo mentioned it. Although he and Ning Zimo had talked about many topics related to ACS functions, what Pan Yu really cared about was

Ning Zimo proposed the profound meaning behind the concepts of cloud services and cloud computing.

Cloud services, in particular, distribute computing across a large number of distributed computers on the Internet instead of local computers or remote servers. The operation of any enterprise or individual data center will be connected to the Internet, which allows enterprises or individuals to transfer resources

Focus on the applications you need, and have access to computers and storage systems based on your needs.

This is like moving from the ancient single generator model to the centralized power supply model of a power plant. It means that the computing power and storage capacity of computers can also be circulated as a commodity, just like gas, water and electricity, and are easy to access.

, but the cost is low.

Cloud services provide scalable storage capacity, redundancy, high availability, and stable performance. For businesses and users, using cloud-based Internet services has several major benefits: easy access, and almost no server downtime or crashes.

time, not storing application accessibility issues, etc.

The current function of acs is to provide users with the required computing power, database storage, content distribution and other functions. acs provides appropriate services for such needs to help users build complex applications while improving flexibility, scalability and

reliability.

Specifically, acs provides three typical network architectures to meet different customer needs. The first is acs vpc application scenarios, the second is the basic network service architecture, and the third is acs network services;

At the same time, acs also provides six network services: dhcp & dns, dedicated instances, vpn cloudhub, direct connect, vpc peering, and elastic ncing;

These relatively flexible and convenient benefits also bring new security challenges to acs. In particular, reliability, integrity and data privacy, because users have no direct control. Although users can ensure it through encryption and tokens

Data security and confidentiality, but data integrity remains a fuzzy task.

For this reason, acs has not yet opened the third-party market as Ning Zimo said, because the security and interface issues have not been completely resolved. Otherwise, as more programmers join the acs development platform, the functions of acs will be richer.

Although from the user's perspective, these potential problems are an important reason for them to choose acs. But in Pan Yu's eyes, as long as the cloud computing proposed by Ning Zimo is in the right direction and the security issues are properly solved. As for the current acs set of calculations,

The power computing system will subvert the data center or hosting operation model of all enterprises relying on the development of the Internet.

Pan Yu only now understands why Ning Zimo chose him to be the person in charge of ACS.

Because when he was still at Beibao, he was the senior security consultant responsible for Beibao's transaction security.

The most important point of acs is safety, so having him, an experienced senior security consultant, be responsible for the operation of acs is a highly matching arrangement.

However, security work is not simple. It is not as easy to develop as the computing and storage elastic computing functions of acs.

The security of cloud services is more like that of a country's military. The military usually does not have a prominent reputation, but once there is an issue involving national security, the military must resolve all possible security issues with thunderous force.

Just like the pilot websites that have been frequently attacked in the past few days, although it was a test website that the acs team deliberately exposed to the network, it was easy for the intruding hacker to take control, which also shows that he, as a security consultant, is not

So good.

acs security issues,

There is a long way to go!

"Boss, this is already the 6th wave of people since it was made public. The level of this group of people this time is much higher than the previous waves."

Pan Yu took a look at the access log and said to the team members in skrpe, "Record it first and then slowly dig into it. Don't let these boring hackers notice it. After all, the more advanced hackers can help us more."

Test what other flaws are there in acs.”

"Understood, let's follow slowly first."

Frowning, Pan Yu added, "Don't just see those people on the surface. There are also some people who are hidden deeply and have not been discovered."

"master"

"What's wrong?"

The wheat-skinned woman shouted, which immediately elicited a response from skrpe.

The woman looked at the situation on the interface and said to the person on the other end of the phone, "Master, can your plan come true? Why do I feel that a hacker organization like x would not be interested in a rookie hacker like me?"

"

There was a chuckle from the other end of the phone, and then a clear voice came, "You underestimate your ability and attractiveness. A lone hacker like you who has grown so fast in a short period of time, has unlimited potential and an unknown identity, for a lone hacker like you,

It's a good target for hacker groups who always want to do something."

Hearing this, the wheat-skinned woman wrinkled her nose and asked again, "Master, what kind of organization is x? Why have you followed them for so many years?"

After hearing the words of the wheat-skinned woman, there was no sound on the other end of the microphone. After a long time, the male voice on the other end said in a low voice:

"The founder of

The organization’s attack~~~~At that time~~~when she was still alive, x was still a decent organization.”

Because the conversation between the two was in Chinese, when the pronoun "she" appeared, it took a while for the wheat-skinned woman to realize based on the mood of the man opposite that the person he was talking about was a woman. She had a mysterious feeling.

The bond behind this story may not be as simple as comradeship.

The voice on the other end of skrpe paused for a moment before continuing, "In 1999, the year we had known each other for 11 years and fought against Tao together, x had a new change after her sudden disappearance.

I gradually discovered that after she disappeared, the overall style of x, a technical alliance group of several people, began to converge. They were no longer technical geniuses who provided security services for network users or companies, but suddenly became profit-seeking people.

Internet extortion and blackmail have become their new style. Even when Beibao appeared in 2001, they collaborated with gangs to provide technical support and earn money from Beibao users. After that, they appeared again and again.

In various extortion cases against Internet companies and software companies.

They even once became the lackeys of the Tao organization for money!!!

You know, we once resisted the Tao organization together. But in less than a year, they actually did something that deviated from their original intention, which I cannot tolerate at all!"

The voice on the other end of skrpe revealed some excitement. The wheat-skinned woman understood that the master was already very restrained.

But no matter what, x changed from the decent organization he knew to a profit-seeking organization, which the master could not accept.

"In the past few years, x's claws have gradually extended into the country. Our major flower-growing portals and some emerging companies have been continuously blackmailed and extorted by them, and their methods have become more and more intense. Although the amount of extortion by each company is not large, but domestic

The security awareness of this group of people is so poor that they cannot resist their attacks.

I have tried my best to persuade and try to get the domestic guys to cooperate in the fight against x. However, for comprehensive reasons such as development and stability, they always meet x's unreasonable demands when defense is hopeless.

This is the case for one company, and it is the same for ten companies. Don’t they consider that x may be a devil that cannot be fed? If they are allowed to develop like this, x will be like an uninhabited country in China, and someday in the future

Will x come back one day when he is stronger and more greedy?"

The wheat-skinned woman frowned. Although she had not participated in the things the master talked about, she was also a flower grower in Germany, and with her current status as a hacker, she naturally had some disdain for what x had done.

She thought for a while and asked, "Master, how are you sure that the person who attacked ACS this time is x?"

"In 2001, Beibao updated a very creative picture human-machine verification code. It was a seemingly simple but very creative thing. Because of that verification code, I once followed Beibao for a period of time.

time.

Then I accidentally discovered that when an Italian gangster blackmailed Beibao, a subtle loophole was exposed. When I followed the loophole, I immediately realized that there was a technical support person behind them, and I secretly noticed

to some of their little habits and purposes.

When x attacked New Wolf in 2002, they mobilized a group of Godaddy's vps and vpc. Just before they attacked acs, there was a vpc that they left a backdoor in.

Although hackers rarely use the same means to ensure their confidentiality, they often don't care about DDoS attacks. In these groups of test vpcs opened by acs, the supply methods are similar to those of the new x attack in 2002.

It’s the same as the wolf. Therefore, among the people attacking ACS this time, there is a high possibility that there is x.”

"Oh~~~" The wheat-skinned woman nodded and said with a smile, "I thought, Master, you were so kind-hearted that you wanted to protect the company ACS."

"Maintenance? Hahahahaha~~~"

A hearty and hearty laughter came from the other end of skrpe.

Just when the wheat-skinned woman was curious, another voice came from the other end of skrpe:

"I have investigated it. Although acs pretends to be very careful, in fact the company's network defense mechanism is comprehensive. These groups of vpcs were deliberately exposed by them. It's just that the core team of acs is still very skilled.

x was not even aware of acs company’s intentions.”

"Then, acs, the company, doesn't need our help?"

"Well, it's not our turn for them to help." The voice on the other end of skrpe paused, and then continued after a few seconds, "It's just that acs is still a very interesting company. First of all, their elastic cloud service method

, it indeed provides the world with a good Internet service choice.

Secondly, when I applied for acs’s cloud service, I noticed a very interesting statement from them.”

"Master, what statement makes you find it interesting?" the wheat-skinned woman asked.

"It is about the life of a public welfare organization. ACS claims that anyone who registers for their cloud service can enjoy a 5% discount after joining their public welfare computing power support plan. And acs has a public welfare computing power system that will not affect the

During the time users use it, the computer computing power in the public welfare computing power system is provided to scientific research organizations."

“Providing public welfare computing power?”

"Yes, including but not limited to simulating asteroid orbits, calculating protein molecular structures to defeat cancer, simulating earth climate changes, etc. It covers fields from mathematics to biology, from medicine to astronomy.

acs even launched a dedicated website and struck a deal with the University of California, Berkeley, to create

As long as their programs are downloaded, personal computers can also join the public welfare computing system. The idle computing power added to the acs public welfare computing system will be opened to corresponding scientific research institutions, allowing humans to have more computing power in these fields as soon as possible.

Overcome more problems.”

As he spoke, another chuckle came from the other end of skrpe, "I have downloaded this program, and it will actually share part of the computing power of the downloader. And acs does it even better, directly using the ones who actively join.

In this way, the computing power of more commercial applications is also included. Therefore, this acs company has great ambitions, and we must protect it well."

"It seems that acs is a good company." The wheat-skinned woman smiled.

"Well, their founder should be Pan Yu, the former senior security consultant of Beibao. This guy will stick to the current ACS system and will definitely become the pride of our flower growers in the future."

The wheat-skinned woman nodded at the computer. At this moment, the door was pushed open from the outside, and a girl with an oriental face walked in. Seeing the wheat-skinned girl hiding behind the monitor, she asked curiously, "Shengnan

,don’t you go out for a walk?”

The wheat-skinned woman poked her head out from the monitor, revealing her charming face.

She smiled and shook her head, "No, I still have to learn something today."

"Your grades are already good enough, so you should still work hard."

The girl who came in whispered something in a low voice, then picked up her bag from where she sat, turned around and walked out the door on catwalks.

"Katsuo, while you are still young, you should go out and walk more. In college, at least find a suitable boy to fall in love with."

There was a burst of teasing from the other end of skrpe, but the girl named Shengnan sat on the other side of the monitor and shook her head.

She thought of someone, someone she had kissed two years ago.

She knew that she was not yet old enough to make active choices.

Therefore, she still needs to continue to grow and grow into a towering tree.

I don’t know what he will look like when I stand in front of him again at that time.

Or will she be completely forgotten?

However, probably not.

Because he is also a man with great ambitions.

"Boss, everyone has evacuated!"

"Um."

Pan Yu responded and sat down on the stool. Although the security defense was not dangerous this time, there were still many problems in the test. ACS still had a lot to improve.

But safety protection is like this, and it echoes the words and jokes of our ancestors that Zimo emphasized.

Those who are good at fighting have no great military exploits!

If you want to realize your lofty ambitions,

You still have to be able to survive!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like