Reborn Ace Hack
Chapter 484 Bridge Server
Frank's words also lifted the spirits of Brian and the three of them. Although they hoped that Frank would help them get rid of chn_honker, it would be good if they could catch this guy as quickly as possible, so Brian also
There is no rush to go to Thomson to verify.
Frank stared at the information on the computer screen for a long time. Then he tapped the keyboard. Another software was brought up, and the data information began to scroll again. This time, Brian and the other two understood it clearly.
, Frank is conducting a secondary analysis of the information he intercepted from the Internet. Ker's anti-tracking methods are very clever. He used a ring structure to organize some network springboards. If you use normal means to track him, you will definitely enter an infinite loop.
, want to track him, maybe
Sex is almost zero. I am very curious about what kind of person he is that can come up with such a clever method. If possible, I really want to meet him and have a chat in person. I just hope that he will not be fooled by me this time.
It’s better to catch him. It’s not a pleasant thing to go to prison and chat with him.” This time, before Brian and the other three could ask, Frank took the initiative to talk to the three of them, and his words were full of chn_honker.
Curiosity and expectation, and some feelings of sympathy.
"So Mr. Frank, how confident are you that you can track this person?" Brian asked hopefully.
"Less than 30%." Frank said.
After hearing Frank's words, the three of them were a little disappointed. Less than 30% meant that the probability of keeping their jobs was less than 30%. So Brian left the server room and went to find Thomson.
"What are your names and what are your specialties? Tell me." At this time, the analysis software was still running. Frank was free and had time to talk to the two people who stayed. Ker caused trouble and Bu
After Ryan came back, he was assigned the same task.
After sending Brian and the other three away, the secondary analysis on the computer already had the results. Frank looked at the analysis results, with an uninhibited smile on his lips, opened another software, and entered the analysis results into it.
Ker, who are you? This springboard setting method is really strange, but it is not without loopholes. I hope you can escape this time. I really don’t want to catch you this time." Frank murmured to himself.
, activated the anti-tracking module of the software, and began to contact ker and him, because he knew very well that what he was doing now was not only challenging hackers in the United States, but also challenging the bottom line of American officials. After doing this
, there is no doubt that chn_honker will become a wanted target in the United States while becoming famous all over the world. Therefore, his plan is to completely abandon this ID after doing this.
It is not very easy to completely control the White House website server. Because the White House website is very important, it has always been the focus of attacks by hackers. Therefore, the White House website server has very good security requirements, except for software.
In addition to the above guarantees, in order to ensure the security of the site, the server of the White House Station uses a bridge synchronization server.
A bridge server is a server group consisting of two identical servers. One group of servers is connected to the Internet and provides normal website services. This group of servers is called the main server. The content of the other group of servers is the same as the main server.
The content of the servers is exactly the same, but this group of servers is only connected to the main server, but not connected to the Internet. This group of servers is called a backup server.
The security protection principle of the bridge server is that when the main server is attacked, invaded, or modified, its content will inevitably be inconsistent with the backup server. Once the management software of the bridge server discovers this inconsistency, the backup server will be
The content overwrites the main server and restores it to normal. Therefore, it is very difficult to successfully invade a bridge server. Some even say that it is completely impossible to invade a mature bridge server.
Of course, according to software theory, unless a set of software theory can be mathematically proven to be complete, it cannot be called absolutely safe. What's more, even if the theory that implements the software is mathematically proven to be complete,
Yes, but in the coding process of a large system, it is necessary to ensure that the coding does not have any loopholes. From a mathematical point of view, someone has proved that this is an event with zero probability. In other words, any system will have loopholes, and a system without loopholes is
Doesn't exist.
The security of the bridge server is recognized by the industry, but it is not completely without loopholes. Although Xiao Yuan has never invaded the White House Station in his previous life, he has done in-depth research on the bridge server and also knows that the White House Station uses
This is the server structure.
Therefore, although it took a lot of effort, Xiao Yuan successfully invaded the White House station server and successfully blocked the data channel between the backup server and the main server, turning the backup server into a decoration.
After successfully invading the White House website server, he sent out the challenge post on the Xuan Nie Forum, and then began to prepare carefully. On the one hand, he was dealing with various efforts by the website to regain administrator rights, and he was also waiting for fly007.
Arrival, although he set a time in the post, he also asked fly007 to make it public in the Xuan Nie community
He posted a post to accept the challenge, but he did not foolishly think that fly007 would fully comply with his requirements and accept the challenge honestly like a European medieval knight. In fact, his prediction was correct. fly007 did not post a challenge post and was not punctual.
, less than twenty minutes after he issued the challenge, the first wave of attacks came.
fly007 obviously also knows that the White House Station uses a bridge server architecture, so the first wave of attacks targets the key point, which is to find a way to open the data channel between the backup server and the main server that Xiao Yuan blocked, and once this channel
If turned on, the backup server will overwrite the main server in less than a second. The result will naturally be that the main server returns to normal, Xiao Yuan is kicked away, and the challenge will fail.
Although fly007 mastered the key to kicking Xiao Yuan away, his attack methods were very conventional, not even as big as the trouble caused to him by the White House administrators. Several rounds of attacks were easily blocked by him. However, fly007 experienced several
After the attack failed, it temporarily stopped. At this time, Xiao Yuan discovered that another person began to attack his position.
Anti-tracking was carried out, and this person's anti-tracking method was different from anything he had encountered before. This method seemed familiar to him, as if he saw an acquaintance, but this acquaintance made him feel...
There was a hint of danger, because in the previous life, only this person had successfully broken through the protection of his circular logic lock when sparring with him.
"Long time no see, old friend, but I know you very well, but you know nothing about me. So, is it still possible for you to break through my circular logic lock and find me?"
You'll Also Like
-
Douluo: I teach and educate people at Tianshui College!
Chapter 180 3 hours ago -
Elves: Starting from Different Color Lalulas
Chapter 383 3 hours ago -
After forcibly taking the blood of the sick and delicate prince to continue his life
Chapter 290 3 hours ago -
Douluo: Tang San is my brother
Chapter 366 3 hours ago -
Doupa: More sons, more blessings, I build the strongest family
Chapter 362 3 hours ago -
People are in Douluo, but they are struck by lightning at the beginning
Chapter 103 3 hours ago -
Fighting from the opportunity of gifting
Chapter 379 3 hours ago -
I'm in Konoha, I want to be Hokage
Chapter 217 3 hours ago -
When Huo Yuhao traveled through Douluo
Chapter 160 3 hours ago -
Douluo: My nanny is Bibi Dong
Chapter 259 3 hours ago