Since I Was a Special Soldier

Chapter 519: The storm is approaching

Hackers clash with each other and rarely affect communication service providers on a large scale.

Because once these aspects are involved, if the damage is too severe, it is easy to attract the attention of a country's government. If it is not necessary, all hackers are basically afraid to do it.

Secondly, the network service provided by the communication service provider is also the basis for hackers to exist freely on the network. If it is destroyed, if their information in some broilers is intercepted and left, it will be very simple to find you in the future.

In modern society, it is more difficult for hackers to hide their identities. Many hackers are able to hide because they are sufficiently low-key, but you have to say that they are completely covered. Unless you are not checked, you can’t get away with it, which is different from previous years.

In the past few years, there was still a lot of information that people did not connect to the Internet. Now all the information is connected to the Internet, and they can’t run.

Of course, this result has actually magnified the power of hackers, but now there are fewer and fewer hackers that can affect the overall situation.

Sol took the Fulian chat room offline, but quickly and carefully scanned his computer again and confirmed that there were no problems before he opened another separate instant messaging system.

"Cass, help, are you there?" Sol directly sent a message to the dark head.

After posting, he waited silently. The hacker world has been silent for a long time. More and more hackers are getting older and older. They are no longer as arrogant as they were when they were young. This is also one of the reasons why many hackers started to keep a low profile. .

As for the hackers in the new era, it’s not that they don’t have it, but the times and values ​​are different. These hackers in the new era are more high-profile, and the environment they live in since childhood is linked to the Internet, so some of their outstanding experiences when they were young have already Was filed.

Although most of them are high-profile, they can't mess around because their information is filed in special departments such as fbi.

And the more active ones on the Internet are actually hackers who were active as early as the beginning of the century. Most of these people were in their ten or twenties and are now over middle-aged.

"Yes, what's the matter?" After a long time, a message jumped out.

"The x man asked for help. One person stole the secret fighter launch data of their department. They are tracking the other party's program. Now the two sides are facing off on a library server. At present, all our attacks are blocked by the other party. "

"The entire system is extremely safe to be patched by the other party. We have no good means for the time being, unless we directly use violent intrusions to take advantage of our larger number of people than the other party."

Thor quickly told the other party about the current situation.

The other side was silent for a while, and then he spoke for a long time: "Sol, forget it. If the other party dares to confront you, you will have absolute confidence. You can't catch him. Now there is no simple hacker who dares to play like this. I am young. I don’t want to participate anymore."

"That's it. By the way, you can tell x man as it is, and you can be careful."

Leaving a word, Cass's figure dimmed directly, indicating that he was offline.

Looking at the dialog box, Saul was silent for a while, then did not speak, he copied the relevant content directly and forwarded it to male x, and then he cleared his traces, which interrupted the connection with cass.

Inside an ordinary farm in Texas.

A 40-year-old thin, blonde, middle-aged man is sitting in front of the computer, thinking it is a computer, but this room of at least 30 square meters is full of cases, monitors, etc., showing that the owner here is not the one An ordinary farmer.

After hesitating, the middle-aged man directly opened a program on the desktop, and then quickly tapped his hands on the keyboard, and his computer screen immediately began to change quickly.

Jiang Yanhai didn't take much action at this moment. Although these people outside were constantly testing the firewall, and even they pulled out some software to simulate attacks constantly, at this moment, the server suffered at least tens of thousands of attacks per second.

If you simply rely on the server's computing capacity, you will definitely not be able to compute, but at this moment Jiang Yanhai has a total of four supercomputers, one of which is currently one of the top three supercomputers in the world.

Other hackers do not have this treatment, nor can they have this treatment. Even the security personnel of some important departments cannot let some supercomputers do this, because the power consumption of supercomputers is a terrible figure every day.

Therefore, it has almost all computing tasks every day, and it is impossible to be so wasteful.

If it weren't for this coincidence, Jiang Yanhai wouldn't have the opportunity to use the two supercomputers directly. Of course, if it was in other places, there would be no difference in using electronic warfare programs.

"X man, Cass refused. He said let us withdraw. The other party dares to be hard with us here. He should have been prepared for a long time." Although Saul has sent the chat log to x man, he still He said something.

The x man was silent for a while, and said with a wry smile: "I'm different from you, forget it, just leave if you want."

"Sh! It! No, today I gave you a face and helped you. I don't believe it anymore. There are still people who run wild on our heads. Doesn't he know this is our site? "Solar roared directly, and then started to do it directly.

"Thank you, brother. Now I assign tasks. Three people on my side launch violent attacks such as mail bombs and ddos ​​attacks to reduce the response and computing speed of the other party's server. UU reading www.uukanshu.com, you take the opportunity to attack the enemy from multiple angles. Loopholes." Saul said solemnly.

"no problem."

Several people in the chat room all started talking.

As they made up their minds, everyone immediately started frantically, especially on the side of the x man. With the help of several large workstations and servers that were called, a massive tide of attacks frantically began to flock to this public library. server.

Hundreds of thousands of visit requests were sent to the server in an instant.

"Tsk tusk... Sure enough, violence is a tendency in the bones of human beings. He said no, but he acted very honestly." Jiang Yanhai smiled.

ddos attacks, commonly known as tide attacks, or mail bombs, etc. Anyway, just one sentence is to use countless spam, copy access, crazy block your computer's computing speed, block your network channel, that's it, in the hacker world. It is a profiteering attack.

More than ten years ago, this was a scornful practice by the hacker community...because hackers played with technology, and this kind of crude attack method could not reflect any technology at all.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like