Reborn Ace Hack
Chapter 161 Public Opinion Orientation
(New book issue, please give me flowers and collect it!) "Xuan Nie Firewall Intelligent Defense DDos Attack Strategy In-depth Evaluation Report." This is the name of the post posted by Gu Lang.
Even without looking at the content of the post, just the title and the ID of the lone wolf are enough to attract attention.
After this post was posted, it quickly attracted a lot of people's attention. Probably the moderators of the major hacker forums were all awake. Five minutes after the post was posted, it was pinned to the top and ranked first on the forum homepage.
For the convenience of everyone, some IRC chat rooms have become lively again after experiencing the hustle and bustle of celebrating the successful denial of service attack on Xuannie Firewall.
Full channel announcement of "In-Depth Evaluation Report on Attack Strategies".
The titles of the posts and announcements are very attractive, and the content is even more surprising, because in it, Gu Lang actually disclosed Xuannie Firewall’s strategy to resist denial of service attacks, which was exactly the purpose of thunder launching this large-scale denial of service attack.
one.
Gu Lang first summarized Xuannie Firewall's strategy for resisting denial of service attacks, and then focused on the surge in access traffic to Xuannie servers in the early morning of January 1st, as well as the planned and organized deliberate denial of service attack just now, Xuannie Firewall faced
The performance under large flow pressure was tested.
A very in-depth analysis. During the analysis process, the traffic data from two large-traffic denial-of-service attacks were also cited. The entire analysis was very objective and did not include any subjective factors. The credibility was higher than that of the previous thunder article.
Analysis mixed with a lot of subjective speculation is much higher.
"To sum up, under the condition that the network bandwidth resources are extremely limited and the normal response speed of the server is not affected, Xuannie Firewall has achieved a utilization rate of more than 90% of network resources and server CPU idle resources, and the overall performance is good.
, Moreover, according to the previous analysis, if the network bandwidth and server resources can be expanded, the Xuannie firewall's ability to resist DDoS will be even more outstanding..."
"Finally, I would like to thank all the friends who participated in solving service attacks. Because of your enthusiasm, Xuannie Firewall was able to have this rare test opportunity to withstand large-scale denial of service attacks, and Xuannie Company was able to discover flaws in the firewall.
There are still many problems, which we will gradually improve in future versions. Thank you again!”
The above is the final conclusion of Gu Lang's analysis report. In the conclusion, Gu Lang pointed out that the reason why this DDoS attack was successful was not because the Xuanni firewall or the server crashed, but because the Xuanni firewall found that the network traffic had exceeded
exceeds the limit that the network bandwidth can bear, and actively cuts off the network connection, and
He further pointed out that the firewall has its own set of judgment strategies and will actively reconnect to the network at the appropriate time without manual intervention. At the same time, it also frankly admitted that the server failed in this large-scale denial of service attack and stated that it would
Learn lessons from it and analyze deficiencies in order to further improve the firewall algorithm.
After Gu Lang's evaluation report was released, all places where the evaluation report could be seen quickly became lively again, with many people commenting on the evaluation report.
"Ghwolf is making excuses. Failure is failure. Why don't you dare to admit it?" This was a comment made by someone who participated in the attack on the second floor after Gu Lang's post on a forum was reposted. It is obvious that this guy has no idea.
Read the report.
"Upstairs, are you sure you have read the report?" This is a question from the second floor.
"The guy on the second floor is just here to cause trouble. I strongly recommend that the poster delete it!"
"Please look at this matter calmly, read the post carefully, and then speak. I have to say that Lone Wolf's post is very technical and I can't understand it."
"..."
After a lot of debate, under the deliberate guidance of some people, the focus of discussion began to shift to the analysis and discussion of the performance of Xuannie firewall.
"Theoretically speaking, as long as the scale of DDoS attacks is large enough, there is no solution. No firewall in the world can absolutely resist it. So, there is a question of the strength of defense capabilities between different firewalls.
, it can be seen from the evaluation report that the Xuannie firewall is really powerful."
"What you said upstairs is good. I dare say that when the network bandwidth is limited, the firewall on a single server can resist denial of service attacks to such an extent that when the network bandwidth occupancy rate reaches more than 90%
, and can also ensure the normal response of the network server. I think this is the ultimate. Apart from Xuannie Firewall, I don’t know which other company’s firewall can do this. You know, theoretically speaking, Ddos only needs to be scaled
Once it reaches a certain level, it is unsolvable."
"Yeah, it's like a road. It can only accommodate a hundred cars. If hundreds or thousands of cars pass by at once, the firewall may coordinate one by one to let them pass smoothly. But if a few cars rush in all at once, it's like a road.
Tens of thousands, hundreds of thousands of cars, not even gods can do anything about it!"
"..."
…………
Tang Xinyu looked through the discussions about the evaluation report issued by Gu Lang in several of the most popular hacker forums, with a relaxed smile on his face and said: "Haha, it seems that the overall trend has begun to change in our favor.
.”
"The so-called blessing is a blessing in disguise. Bad things can be turned into good things if they are taken advantage of!" Gu Lang said, and then glanced at several other employees in the room. In the end, the direction of public opinion in the forum was biased towards Xuan Nie and them.
The efforts of these people are inseparable, so he said, "The fact that things can develop in our favor is inseparable from everyone's efforts. Everyone has worked hard today, so Xinyu, I suggest giving everyone twice as much."
Overtime pay, reward me!”
"No problem." Tang Xinyu agreed readily.
The decision of the two people immediately aroused cheers from everyone. Naturally, no one would object to sending more money.
"The strength is still a bit weak. There are still some people in the forum who are singing against us. But when the people arranged by Sister Sa work hard, I believe that those objections will disappear completely. At that time, the first battle of Xuannie Firewall Challenge will be considered
It's really successful." Gu Lang said.
"Well, it ranks first in denial-of-service attack defense capabilities. It is the first time in history that a firewall has won such a reputation and reputation before it has even been launched on the market." Tang Xinyu said with a smile.
…………
Different from their situation here, in another place, Tianlong Technology Headquarters, Zhang Dalong also did not sleep. His face was livid, and he no longer looked at the post, but turned to Lei Lianghang aside, and said in a deep voice: "How could this happen?
In this way, after all our hard work, we made a wedding dress for Xuan Nie!"
Lei Lianghang smiled awkwardly. This large-scale denial of service attack was initiated by him. He is thunder. When he was studying abroad, he always used this word as his name. The reason why he used this word is
It's because his surname is Lei, and thunder means thunder and lightning. Not only does it match his surname, but more importantly, he likes this word very much. He feels that thunder and lightning are extremely powerful and can turn everything into powder wherever it goes.
But he didn't expect that when he returned to China and used this name in the domestic hacker community for the first time, he would cause such a big mistake. Half an hour ago, he was still complacent about the large-scale denial of service attack he launched, but
The situation reversed so quickly, which really caught him off guard and made him a little embarrassed when facing Zhang Dalong.
"Well, I hope Mr. Black Jack can find the loopholes in Xuannie's firewall as soon as possible, and we can't let Xuannie continue to be so rampant, otherwise it will become more and more disadvantageous for us." Zhang Dalong said solemnly.
Elsewhere in Jiangzhou, Gu Xiaodong was sitting on the bed, his face darker than the night outside the window. The woman next to him shrank into a ball in fear, with tears in her eyes, but she didn't dare to say anything, with a high five on her fair cheeks.
There was a finger mark, which was made by Gu Xiaodong, but all this was because of a phone call Gu Xiaodong had just received. The call was made to him by Tang Sa.
You'll Also Like
-
Douluo: I teach and educate people at Tianshui College!
Chapter 180 3 hours ago -
Elves: Starting from Different Color Lalulas
Chapter 383 3 hours ago -
After forcibly taking the blood of the sick and delicate prince to continue his life
Chapter 290 3 hours ago -
Douluo: Tang San is my brother
Chapter 366 3 hours ago -
Doupa: More sons, more blessings, I build the strongest family
Chapter 362 3 hours ago -
People are in Douluo, but they are struck by lightning at the beginning
Chapter 103 3 hours ago -
Fighting from the opportunity of gifting
Chapter 379 3 hours ago -
I'm in Konoha, I want to be Hokage
Chapter 217 3 hours ago -
When Huo Yuhao traveled through Douluo
Chapter 160 3 hours ago -
Douluo: My nanny is Bibi Dong
Chapter 259 3 hours ago