Reborn Ace Hack

Chapter 186 Wisdom Sardines

The person in Xiao Yuan's memory is named Sardin, which means sardine. This person has a weird personality. He is best at parallel computing design, as well as large-scale computing cluster and computing grid design. His attack methods are the same.

It has distinctive characteristics. This characteristic was named ack by himself, which means smart sardine attack. The reason why it is called smart sardine attack is because this kind of attack often uses a large number of controlled computers to launch attacks on the target, starting from each individual computer.

From the attack point of view, it seems to be like a small sardine, without intelligence, but when these large numbers of individual attacks are examined together, you will find that all these attacks as a whole are intelligent.

What’s even more frightening is that this kind of smart sardine attack has a very high self-learning ability. That is to say, after a certain period of time after the attack is launched by these sardines, which are not smart at the beginning, the huge computer group composed of all these computers will become even more frightening.

To be precise, it should be called a calculation grid. By exchanging information and analyzing and summarizing this information, in addition to the collective wisdom getting higher and higher, each individual will gradually have a certain level of wisdom, so that the collective intelligence can

Fighting in groups, after being divided, they can fight independently, which is very powerful and difficult to deal with.

When Xiao Yuan came in from the beginning and listened to Gu Lang's story, he actually had doubts. However, when he saw that those IPs still only had some simple group intelligence in the second layer of protection, the individual still seemed to have nothing.

It's like a fly in the head, I'm a little unsure.

Now that he saw that each of these four IPs had a certain degree of intelligence and knew how to cooperate with each other, he was able to initially determine that the person who launched the attack on his firewall was most likely his own in blackskull.

Old friend sardin.

And judging from the current situation, although this old friend's attack method is not successful, it already has strong personal characteristics. So since it is possible that an old friend is here, shouldn't he fight with the other party?

call.

But this guy is now hiding behind a large group of dense sardines. If you want to say hello to him, you need to find him from behind the sardines first. So anti-tracking software is naturally indispensable. It will obviously take a long time to write a software now.

No, although I have never had time to write such a software, fortunately, I have such a software in my hand, and this software is written by the famous Snake Ya, so I can use it just right.

"Gu Lang, find me a piece of paper and a pen." Xiao Yuan ordered Gu Lang.

"I have it here." An employee heard Xiao Yuan's need, found a piece of manuscript paper and a pen from the bookshelf on the desk in front of him, and handed it to Xiao Yuan.

"Thanks."

Xiao Yuan took the pen and paper, expressed his gratitude to the employee, then found an empty seat, wrote an operation guide on it, and then called Jiang Hua over.

"Jiang Hua, go to my mother's house, follow the steps I wrote, and copy the software I put there on my computer. It will be useful to me." Xiao Yuan ordered.

Jiang Hua took the paper, glanced at it, and exclaimed: "It's too complicated. What kind of software are you hiding so deeply?"

"Stop asking so many questions and go quickly." Xiao Yuan patted his shoulder and said.

"Okay." Jiang Hua didn't ask again, put the piece of paper in his pocket, turned around and came to Tang Xinyu, who was still pale, and stretched out his hand to him.

"What for?" Tang Xinyu was now very dissatisfied with this guy and asked with squinting eyes.

"Car keys, didn't you hear Xiao Yuan ask me to copy the software for him?" Jiang Hua said.

Tang Xinyu took out the car key, gave it to Jiang Hua, and then warned: "Drive slowly, my car is still new, don't let me drive it and it will be scrapped."

"If you're worried, why don't you come with me?" Jiang Hua just walked to the door. When he heard Tang Xinyu's words, he stopped and asked with a smile, while there was a roar of a car in his mouth.

Tang Xinyu seemed to be allergic to the sound, and his expression suddenly changed a lot. He shook his head and waved his hands to express his rejection.

"Haha..." Jiang Hua laughed and left.

After Jiang Hua left, Xiao Yuan called his mother again and told him that Jiang Hua would go home to copy a piece of software. After the call, he returned to Gu Lang.

"The number of IPs has increased. Should we kick them all away manually?" Gu Lang saw Xiao Yuan walking over and asked. At this time, the number of IPs coming to test has increased, but a few of them are here.

The onlookers were incompatible with the IPs working together. It was easy to tell that there were twelve IPs working together. However, because these IPs were very careful, none of them touched the firewall.

"It doesn't matter, let them make trouble for a while. When Jiang Hua copies my software, I will have a chat with the owner behind these sardines." Xiao Yuan waved his hand and said, now that the previous loophole in the firewall has been blocked by him, although

He cannot guarantee that this firewall will have no loopholes, but if these IPs want to find new loopholes, it will not be possible in a short time.

"Sardine? What kind of fish is it?" Gu Lang asked.

"A kind of marine social fish..." Xiao Yuan gave a brief introduction to sardines, but of course he did not mention smart sardines.

"Haha, it's really similar." Gu Lang nodded and said after thinking about the first wave of seemingly aimless attacks, but from a group perspective, they were clearly organized attacks.

Jiang Hua didn't leave for long. He came back after about half an hour. At this time, the first level of the firewall had been gradually increased to hundreds of IPs. The joint operation found a loophole again. Through this loophole, he rushed back.

After entering, everyone fell into the second trap that had been repaired.

Since the number of IPs entering the second level of protection is not too many and the server can still hold up, Xiao Yuan reset the firewall and allowed these IPs to struggle in the second level of protection without immediately clearing them out.

, but prepare for a while of anti-tracking.

At this time, Jiang Hua came back.

"Xiao Yuan, the software you want." Adre has temporarily become the anti-tracking module of the firewall, and can work together with the second layer of protection of the firewall. Anti-tracking will also be carried out automatically in conjunction with the firewall.

Here, Xiao Yuan had to admire Sheya's programming ability and some good habits. A small anti-tracking tool was actually written as an open type, with a very flexible programming interface reserved, allowing other users to use it.

This software can be integrated into a larger software at will and become a functional module of the larger software. If the software was written by ordinary people, I am afraid that these would not be considered at all. So if Xiao Yuan wants to carry out anti-tracking, I am afraid it will cost a lot.

Things can't be automated like they are now.

Of course, Xiao Yuan also has this habit. When writing some codes, if possible, he often writes the software as open, such as the second level of protection of the firewall. Although time was limited and he did not have time to write an anti-tracking module, but

However, there is such a module insertion interface reserved. To give a vivid example, Xiao Yuan wrote the software into a structure similar to a power strip, and the software of Sheya just comes with a power strip that can adapt to this power strip.

plug, both of which are indispensable. Adre also started up, and a new window popped up on the computer monitor. A large number of network data packets began to roll rapidly in it, searching for the source of all these sardines.

Anti-tracking analysis. Adre’s anti-tracking analysis suddenly stopped. An IP address marked in red was left at the bottom of the window, and the other party’s address was found.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like