Chapter 66: Coquettish "GOD" (Part 2)
-
The Strongest Hacker
- Gu Dashi
- 1226 characters
- 2021-03-02 09:09:13
Chapter 66 Coquettish "GOD" (Part 2)
Don’t look at Blackhawk talking to GOD, it seems a little low-key, if you think Blackhawk is such a person, you’re wrong, don’t look at Blackhawk for technology, but Blackhawk is very good at doing things. Soldier style, decisiveness! The reason for his attitude to GOD is that GOD does something good for the country, and Blackhawks also admire GOD.
Secondly, where is the technical strength of GOD, such talents no matter who your opponent is. Want to face them when Kevin Mitnick black FBI? The truth is that these hackers adore people who are supreme in technology. As for your identity in reality, they don't even bird you.
So the personal relationship between Blackhawk and GOD is good, and the two people talk a lot, which is also related to GOD's work with Blackhawk.
"Forget it, don't worry about this matter, anyway, you can rest assured, I will not make any big movements, do you still worry about my work?" GOD regretted that he should not wipe this ass! But this is the end, and GOD has no choice.
S big forum
Zhangyang's firewall is not a special anti-ddos attack firewall, but there is a small function in his firewall, and if this small function is used well, it is more cattle than the general anti-ddos attack firewall. The main function of this little software is to block some useless access to the computer. It is important to know that even if ordinary users are online, the computer will be subjected to some useless data access.
These visits can be feedback visits of some websites, or some sniffer visits, or tentative visits of viruses, etc., and Zhang Yang set this function when writing his own software, that is some useless visits He will automatically refuse.
It seems that this function is the same as many firewalls denying access, but in fact the difference between them is much bigger. Ordinary firewalls reject some useless access or illegal access. It needs to analyze the data packet first, and then analyze the analysis results with itself. Database comparison, if it belongs to illegal access in the database, then it will refuse!
But in this way, the process of analyzing this data packet also occupies the computer's CPU usage. This is why some users have installed a firewall and antivirus software on the computer, and the computing speed of the computer has dropped significantly. In fact, many ordinary users Everyone turns on the unused functions, so it will cause the computer to slow down.
However, this function of access denied by the firewall set by Zhang Yang is different. The firewall is a necessary wall for the connection between the computer and the public network. All data can only be communicated through the firewall. When Zhang Yang sets this function, he can directly design The data stream sent from his computer will be "labeled" by the firewall, that is, a feature, and after the tagged data sent from his computer is responded to on the public network, the responded data Stream will also carry this label.
And the firewall will analyze the data packet after receiving the data access with this label. If there is no such "label", then sorry, it will simply refuse, even the data packet will not be analyzed, so the CPU usage is almost It is geometric times down. After all, simply rejecting the instruction does not require much CPU usage.
Just after Zhang Yang completely modified his firewall, after he hit the Enter key, countless ddos access requests sent from Baiying Security were instantly rejected by the firewall, and the pressure on the server was almost dropping at a geometric rate. .
With a click, countless hackers in front of the computer don’t know how much jaw they broke, they don’t know the mystery, but what they can
see
is that although Baiying’s safe ddos attack is still rapid, but S The processing speed of large servers seems to start to rise rapidly. Obviously, such a huge ddos attack is diverted by GOD to other servers.
In the pomegranate skirt group
Orange Nianhua: "Huh... How did you do GOD? I didn't detect that you opened a new shunt, how did their ddos attacks weaken a lot?"
Shen Yueshen: "No, it is not a server diversion, it should be similar to a firewall. How do you do it with GOD?"
Lan Mo: "Forget it, let's not ask it first, he estimates that there will be no time to return the news."
Looking at the problems in the group, GOD would like to reply. In fact, I also want to know what is going on. However, GOD is still tolerant. He feels that he is almost becoming a ninja turtle, but how does gscsd do this, and GOD is also very interested. He can almost now conclude that the one who pretends to be himself is gscsd. It has the same strength as them, but GOD doesn't know it, only this newly emerged gscsd.
outside the S forum
Server offload, this is the only way these hackers can think of, but the server that can offload such a huge ddos attack is naturally impossible to be an ordinary server. These hackers were immediately excited and began to search on the network to see if there are any in the world. No server was attacked.
Hacker circles naturally have information sources for hacker circles. Don’t look like finding a server that was attacked on the network seems to be a haystack~EbookFREE.me~ But for the hacker circle, the speed of this information flow absolutely makes you Surprised. Among the hackers watching, although there may not be higher technology than GOD, maybe there are, but there are many people who have a large circle of friends.
However, as a result of everyone's enquiries, they broke their glasses one by one. They didn't get any news. You should know that a server that can accommodate such a horrible ddos attack from Baiying is definitely not something that ordinary servers can bear. Now there is no news, but because of the inquiries of these people, more hackers who do not know this matter rushed over with interest, and the number of hackers gathered here increased further.
"What should Mr. Pan do? The other party obviously has a great diversion. At present, our server is estimated to be unable to achieve this effect." The general effect of the ddos attack is very fast, as long as it is effective, it will take only a few minutes. The server can be completely paralyzed within that time, but now it obviously has no effect. Wang Ming knew that the other party must have carried out data distribution.
"Use all of our resources." Pan Hu said with red eyes. At this point, there is no possibility of reconciliation between the two parties. Whether Baiying is safe or not, they will lose their faces today, but they want nothing. If you just admit defeat, Pan Hu can’t afford to lose it. Even if he dies, he will still be able to die.
Well, everyone is so crazy, and it won’t make sense if it doesn’t break out again-today 12,000, uh, but everyone don’t hit the ticket anymore, don’t waste it, the stone will have to adjust the next plot, update it at most next week! ! ! Ok, I'm embarrassing... Hello, it's Zhang Xueyou's song. I cry