Since I Was a Special Soldier

Chapter 520: All kinds of gods

Jiang Yanhai took a deep breath. Such an attack is, to a certain extent, a method when there is no way to break the enemy's computer.

Because of brute force attacks, server computing and so on will inevitably be severely impacted, and network speed will also be impacted, but network speed is actually not a problem.

The server of a public library like this is rubbish...but its network dedicated line is still very fast. For modern network dedicated lines, if you want to use a tide attack to block the network...you guess it’s not necessary to use a few Supercomputers are only possible in this way.

Jiang Yanhai took a deep breath, and quickly started operating on the computer with both hands. Similar access requests were cloned and removed directly. Four supercomputers assisted in taking over part of the server's calculations. This amount of calculations is drizzle for supercomputers. .

He has discovered that under these flood attacks, people are constantly trying to crack his firewall and are trying to break the firewall permissions.

He has already dealt with spam attacks such as ddos ​​attacks and mail bombs. The supercomputer and firewall cloning operations can be done. He directly starts to deal with these people who are trying to break the firewall. In the powerful firewall, if you have no one to operate it, just If a bunch of top hackers are allowed to attack there, sooner or later they will be breached.

I often see the news that how many times a company’s firewall has been attacked by hackers are controlled by security personnel behind it. If there were no security personnel, it would have been breached long ago.

For those who tried to attack the firewall, under Jiang Yanhai's response, they had no way at all.

Jiang Yanhai pondered for a moment, he couldn't do passive defense like this. It made them too easy. After thinking about it, Jiang Yanhai simply released his anti-tracking program directly.

They are constantly probing and attacking the firewall, which means that they must exchange data with the server. Once there is data exchange with the server, the anti-tracking program will instantly bite.

The anti-tracking program has been chasing the other party's data stream and started back-tracking and intruding, but for now, they have not seen anyone find out, which makes Jiang Yanhai more confident in his program.

It seems that the strength of these hackers is at this level, and there is still a gap between them and the hacker who wrote the super virus.

A total of two super viruses were found. The first virus was found in an unmanned stealth fighter. For the time being, Academician Bai and they named it "stealth bomb". The name was based on the virus bomb set in the unmanned stealth fighter. Named.

Another widespread super virus discovered by Jiang Yanhai, code-named "Ghost", was named after its characteristics. Before Jiang Yanhai discovered it, it was not discovered by anyone.

Jiang Yanhai seriously suspects that the authors of the two viruses are one person, because they are really very similar in some characteristics. Even if such viruses are not written by one person, they are definitely related to one person. It is possible. It is similar to the relationship between master and apprentice.

So if one person is caught, another person may be found, but at present, it seems that this person is not an American? Otherwise, why are there more ghost viruses in the United States?

"Ding" a bright red warning prompt box appeared on Jiang Yanhai's screen. When he saw this prompt box, Jiang Yanhai was taken aback. This warning triggered the real core defense after someone broke through the first layer of the firewall. Only the second-tier firewall can prompt.

Those people just didn't even break through the first firewall. Suddenly someone started to crack the second firewall directly?

Jiang Yanhai tapped several keyboards on the desktop in an instant, and a data stream appeared directly in his monitoring. At present, after he broke into the first firewall, he faced the second firewall, but before the second firewall, Jiang Yanhai still A virtual system is constructed.

He has drilled into this virtual system now, as if he had entered a sandbox. Jiang Yanhai directly controlled the firewall and several locking programs, and instantly began to capture the counterattack data stream.

The anti-tracking program under Jiang Yanhai's operation was faster, and the destructive program was stronger. It caught this data stream almost instantly, and then directly tracked it out.

Jiang Yanhai followed it up without hesitation. With those people in front as role models, he knew that those who could touch his first firewall were definitely masters.

This may be the legendary boss!

Texas, on the farm.

The cass computer made a harsh alarm sound.

"Dididi..." The sound of the alarm made the cold sweat on Cass' forehead burst out instantly. He just quietly broke through the enemy's first firewall, but he hasn't waited for any action yet, the second firewall. Just come straight.

"Fu!" Cass exploded with a swear word, and his hands instantly began to tap on his computer. After frantically switching a few pages, he directly activated several broiler firewalls behind him in advance.

The offensive of enemy tracking is too strong. If you want to run, you can’t run. Hackers like this don’t mean that if you find the enemy is tracking you, you can go offline instantly. If you really do that, you will directly. Was found to find the door.

You should know that whether you use broiler or use other methods to log in to some computers, you will leave system logs. This is unavoidable.

If you want a clean retreat~www.wuxiaspot.com~, you have to clean up all these system logs and so on, and then retreat, so that the enemy can't track your location.

But if you don’t clean it up, you just go offline. All your data-connected computers have your login information. As long as you search them one by one, you can instantly lock your real location in reality.

And if a hacker knows the physical address in reality, it really means that a phoenix is ​​not as good as a chicken. You will either work in major security companies obediently in the future, or be honest and straightforward to work for the government like an x ​​man. .

Otherwise, all your future things will be restricted.

Just like the Thomas Gable mentioned by Jiang Tao before, when he was implementing the plan, fbi recruited hundreds of hackers across the country to ask questions, but some of these hackers were directly killed in advance. .

And the rest were not killed, they were not helped, or just some insignificant small characters.

Cass started to clean his **** at a very fast speed, but he found that he was not cleaning fast enough, and the cold sweat on his forehead instantly came off.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like