Since I Was a Special Soldier

Chapter 492 The Storm Is Coming (2500 Monthly Ticket Plus Monthly Ticket)

Hackers fight each other, rarely involving communication service providers on a large scale.

Because once these aspects are involved, if the damage is too severe, it will easily attract the attention of the government of a country. If it is not necessary, all hackers basically dare not do this.

Secondly, the network services provided by communication service providers are also the basis for hackers to exist arbitrarily on the network. If it is damaged, if their information in some broilers is intercepted, it will be very easy to find you in the future.

In modern society, it is more and more difficult for hackers to hide their identities. Many hackers are able to hide because they are low-key enough, but if you want to completely cover up, unless you don’t check you, you really can’t escape, which is different from the previous years.

A few years ago, there was still a lot of information and people were not connected to the Internet. Now all the information is connected to the Internet, and it is impossible to run.

Of course, this result actually magnifies the power of hackers, but there are fewer and fewer hackers who can affect the overall situation.

Sol went offline in the Fulian chat room, but quickly and carefully scanned his computer again, and after confirming that there was no problem, he opened another separately connected instant messaging system.

"Cass, help, are you there?" Sol directly sent a message to the dark avatar.

After posting, he was waiting silently. The hacker world has been silent for a long time. More and more hackers are getting older and older, and they are not as arrogant as they were when they were young. This is one of the reasons why many hackers start to keep a low profile. .

As for the hackers in the new era, it’s not that they don’t exist, but the era is different and the values ​​are different. These hackers in the new era are a little more high-profile. In addition, the environment they lived in since childhood was linked to the Internet, so some of their outstanding experiences in childhood have long been was recorded.

Although most of them are high-profile, they can't mess around, because their information is recorded in special departments such as the FBI.

The more active people on the Internet are actually some hackers who were active as early as the beginning of the century. These people were in their 18, 19, 20 and 20 years, and most of them are now middle-aged.

"Yes, what's wrong?" After a long time, a message jumped out.

"Men X asked for help, one person stole their department's confidential fighter launch information, they were tracking each other's programs, and now the two sides confronted each other on a library server. At present, all our attacks have been blocked by the other side. "

"The whole system has been repaired by the other party very safely. We don't have a good means for now, unless we directly use violence to invade and take advantage of our larger number of people than the other party."

Sol quickly recounted the current situation to the other party.

The other side was silent for a while, and then he said, "Sol, forget it, if the other party dares to confront you, he has absolute confidence. You can't catch him. There is no simple hacker who dares to play like this. My age I'm too big, I don't want to join."

"That's it, by the way, you can tell X man what I say, and you can be careful yourself."

Leaving a sentence, Cass's figure dimmed directly, indicating that he was offline.

Looking at the dialog box, Sol was silent for a while, and then he didn't speak. He directly copied the relevant content and forwarded it to the X man. Then he cleaned up his traces, and then interrupted the connection with Cass.

Inside an ordinary farm in Texas.

A 40-year-old blond and thin middle-aged man is sitting in front of a computer and thinking, saying it is a computer, but this room with at least 30 square meters is full of cases, monitors, etc., showing that the owner here is not An ordinary farmer.

After hesitating for a while, the middle-aged man still directly opened a program on the desktop, and then quickly tapped on the keyboard with both hands, and his computer screen immediately began to change rapidly.

Jiang Yanhai didn't do much at the moment. Although these people outside were constantly testing the firewall, they even pulled out some software to continuously simulate attacks. At this moment, the server was attacked at least tens of thousands of times per second.

If it is purely based on the computing volume of the server, it must be impossible to calculate, but at the moment, Jiang Yanhai has a total of four supercomputers behind him, and one of them is currently one of the top three supercomputers in the world.

Other hackers do not have this treatment, nor can they have this treatment. Even the security personnel of some important departments cannot let some supercomputers do this thing, because the power consumed by supercomputers every day is a terrifying figure.

Therefore, it has computing tasks almost every day, and it is impossible to waste it like that.

If it weren't for the coincidence of this incident, Jiang Yanhai would not have had the opportunity to use the two supercomputers directly. Of course, if it was elsewhere, he would have used electronic warfare programs without any difference.

"Men X, Cass refused. He said let us withdraw. The other party dared to stand up to us here. He should have been prepared." Although Saul has sent the chat record to male X, he still Said a word.

Man X was silent for a while, then said with a wry smile: "I'm different from you, forget it, just leave if you want."

"SH! IT! No, today I'll give you a face and help you, I don't believe it anymore, there are still people running wild on our heads, doesn't he know that this is our territory? "Saul roared directly, and then also started to do it directly.

"Thank you, brother. Now I'm assigning tasks. Three people on my side will launch brute force attacks such as mail bombs and DDOS attacks to reduce the response and computing speed of the other side's server. You take the opportunity to attack the enemy's loopholes from multiple angles." Sol Shen sound.

"no problem."

Several people in the chat room started talking.

As they made up their minds, everyone immediately started frantically, especially on the side of X men. With the help of several large workstations and servers called, massive tide attacks began to flock to this public library crazily. server.

In an instant, hundreds of thousands of access requests were sent to the server.

"Tsk tsk... Sure enough, violence is a tendency in the human bones. He says no, but his actions are honest." Jiang Yanhai smiled.

DDOS attack, commonly known as tide attack, or mail bomb, etc. Anyway, in one sentence, it is to use countless spam information, copy access, frantically block your computer's computing speed, and block your network channel. It's a profiteering attack.

More than ten years ago, this was a practice that was despised by the hacker community... Because hackers play with technology, this brutal attack method does not reflect any technology at all.

Chapter 501/1573
31.85%
Since I Was a Special SoldierCh.501/1573 [31.85%]