The Strongest Hacker

Chapter 66 Coquettish

Chapter 66 Coquettish "GOD" (Part 2)

Don’t think that Black Hawk is a bit humble when talking to GOD. If you think that Black Hawk is such a person, then you are very wrong. Don’t think that Black Hawk is a technical person, but Black Hawk is very good at handling things. Military demeanor, decisive killing! The reason why he has this attitude towards GOD is because what GOD does is really beneficial to the country, and Black Hawk also admires GOD.

The second is where is the technical strength of GOD, such a talent does not matter who your opponent is. Remember when Kevin Mitnick hacked the FBI, did he give them face? For a reason, these hackers worship technology-oriented people. As for your identity in reality, they don't care about you at all.

So Black Hawk and GOD have a good personal relationship, and the two of them talk a lot more casually, which is also related to the fact that GOD is more cooperative with Black Hawk's work.

"Forget it, don't worry about this matter, anyway, don't worry, I will definitely not make any big noises, don't you worry about my work?" GOD regretted a little, he shouldn't wipe this ass! But this is the end of the matter, and GOD can't help it.

S Big Forum

Although Zhang Yang's firewall is not a special anti-ddos attack firewall, there is a small function in his firewall, and if this small function is used well, it is more powerful than ordinary anti-ddos attack firewalls. The main function of this small software is to block some useless access to the computer. You must know that even when ordinary users are surfing the Internet, the computer will also receive some useless data access.

These visits can be feedback visits from some websites, or some sniffing visits, or tentative visits from viruses, etc. When Zhang Yang wrote his own software, he set up this function, that is, some useless visits He will automatically refuse.

It seems that this function is the same as many firewalls denying access, but in fact there is a big difference between them. Ordinary firewalls deny some useless access or illegal access. It first analyzes the data packets, and then compares the analysis results with itself Compared with the database, if it belongs to the illegal access in the database, then it will reject it!

But in this way, the process of analyzing this data packet will occupy the CPU usage rate of the computer at the same time. This is why the computing speed of the computer drops significantly after some users install firewalls and anti-virus software on the computer. In fact, many ordinary users Everyone has turned on the functions that are not used, so it will cause the computer's computing speed to drop.

However, the access-denying function of the firewall set by Zhang Yang is different. The firewall is a necessary wall for connecting computers and public networks. All data can only be communicated through the firewall. When setting up this function, Zhang Yang can directly design As a result, the data stream sent from his computer will be "labeled" by the firewall, which is a feature, and after the labeled data sent from his computer gets a response on the public network, the response data Streams will also carry this tag.

The firewall will analyze the data packet after receiving the data access with this label. If there is no such "label", then sorry, it will simply reject it, and it will not even analyze the data packet, so the CPU usage is almost It is a drop in geometric times. After all, simply rejecting instructions does not require much CPU usage.

Just after Zhang Yang completely modified his firewall, after he hit the Enter key, countless ddos ​​access requests sent from Baiying Security were instantly rejected by the firewall, and the pressure on the server dropped almost exponentially. .

"click" sound,

Countless hackers in front of the computer don’t know how many jaws have been broken, and they don’t know the mystery of it, but what they can “see” is that although Baiying Security’s ddos ​​attack is still fast and fierce, the processing speed of the S-big server It seems that it started to rise rapidly, and it is obvious that such a huge ddos ​​attack was diverted to other servers by GOD.

pomegranate skirt group

Orange Years: "Hey... GOD, how did you do it? I didn't detect that you opened a new diversion. How come their ddos ​​attacks have weakened a lot?"

Shenyue Kill: "No, it's not a server split, it should be similar to a firewall, how did you do it GOD?"

Lan Mo: "Forget it, let's stop asking, he probably won't have time to reply right now."

Looking at the questions in the group, GOD wanted to reply, but I also wanted to know what was going on. But GOD still endured it, he felt that he was about to become a Teenage Mutant Ninja Turtle, but how did gscsd achieve this, GOD is also very interested, he can almost conclude that the person pretending to be himself should be gscsd , has a strength similar to theirs, and GOD doesn't know it, only this newly emerged gscsd.

Outside the S Forum

Server shunting, this is the only way these hackers can think of, but the server that can shunt and handle such a huge ddos ​​attack is naturally impossible to be an ordinary server. No servers were attacked.

The hacker circle naturally has sources of information from the hacker circle. It may seem like finding a needle in a haystack on the Internet, but for the hacker circle, the speed at which this information flows will definitely surprise you. Among the hackers watching the battle, although there may or may not be any with higher technology than GOD, there are quite a few people with a wide circle of friends.

However, the results of everyone's inquiry made them shattered their glasses, and they didn't get any news. You must know that a server that can accommodate such a terrifying ddos ​​attack from Baiying Security is definitely not something that ordinary servers can withstand. There is no news now, but because of their inquiries, more hackers who don't know about this matter rushed over enthusiastically, and the number of hackers gathered here further increased.

"What should Mr. Pan do? The other side obviously has a lot of diversion. At present, our server may not be able to achieve this effect." Ddos attacks generally take effect very quickly. As long as it is effective, it takes only a few minutes The server can be completely paralyzed within a short period of time, but it is obviously ineffective now. Wang Ming knew that the other party must have diverted the data.

"Use all our resources." Pan Hu said with red eyes. At this point, there is no possibility of reconciliation between the two parties. No matter whether Baiying Security is willing or not, they will be ashamed today, but they don't want anything. If you just admit defeat if you do it, this person Pan Hu can't afford to lose, even if he dies, he will have nothing to do before he dies.

***************

Well, everyone is so crazy, it’s unreasonable not to break out—today 12,000, uh, but everyone, don’t waste your votes, don’t waste it, Stone needs to adjust the plot, at most next week’s update will be more powerful! ! ! Well, shame on me... Hello Poison is Jacky Cheung's song. I cry

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like