Since I Was a Special Soldier

Chapter 493 Gods From All Walks of Life (3000 Monthly Tickets Plus More Monthly Tickets)

Jiang Yanhai took a deep breath, such an attack, to a certain extent, was a way to break through the enemy's computer.

Because of brute force attacks, server operations, etc. will inevitably be severely impacted, and network speed will also be impacted, but network speed is not a problem.

The server of a public library like this is rubbish... but its dedicated network line is still very fast. For modern dedicated Internet lines, if you want to block the network with a flood attack... You probably don't need a few servers. This is only possible with supercomputers.

Jiang Yanhai took a deep breath, and quickly began to operate on the computer with both hands. Similar access requests were cloned and removed directly. Four supercomputing assistants took over part of the server's operations. This amount of computation is a drizzle for supercomputing. .

He has found that under these flood attacks, people are constantly trying to crack his firewall, trying to break the firewall permissions.

Junk attacks such as DDOS attacks and mail bombs have been dealt with by him, and supercomputing and firewall cloning operations are enough. He directly starts to deal with these people who are trying to break through the firewall. In a powerful firewall, if you have no one to operate, just If a bunch of top hackers are allowed to attack there, sooner or later it will be broken.

I often see in the news that how many times a company's firewall has been attacked by hackers, it is all controlled by security personnel behind it. If there were no security personnel, it would have been breached long ago.

For those who tried to attack the firewall, under Jiang Yanhai's response, they had nothing to do at all.

Jiang Yanhai pondered for a while, and he couldn't do passive defense like this. It was too easy for them. After thinking about it, Jiang Yanhai simply released his anti-tracking program directly.

They constantly try to attack the firewall, which means that they must have data exchange with the server. Once there is data exchange with the server, the anti-tracking program will bite it instantly.

The anti-tracking program has already started reverse tracking and intrusion after chasing the other party's data flow, but so far they have not seen anyone find out, which makes Jiang Yanhai more confident in his program.

It seems that the strength of these hackers is currently at this level, and there is still a gap between them and the hacker who wrote the super virus.

A total of two super viruses were found. The first one was the virus found in the unmanned stealth fighter. For the time being, Academician Bai and they named it "stealth bomb". The name was based on the virus bomb set in the unmanned stealth fighter. named.

Another widely spread super virus discovered by Jiang Yanhai, code-named "Ghost Shadow", is named according to its characteristics. Anyway, it was not discovered before Jiang Yanhai discovered it.

Jiang Yanhai seriously doubts that the writers of the two viruses are the same person, because they are really very similar in some characteristics. Even if such viruses are not written by one person, they are definitely related to one person. It is possible It is similar to the relationship between master and apprentice.

So if one person is caught, it is possible to find another person, but at present, it seems that this person is not American? Otherwise, why are ghost viruses more abundant in the US?

"Ding" a bright red warning box appeared on Jiang Yanhai's screen. Jiang Yanhai was stunned when he saw the warning box. This warning was triggered by someone breaking through the first layer of the firewall, triggering the real core defense. Only the second layer firewall can prompt.

Those people just didn't even break through the first layer of firewall, and suddenly someone started to crack the second firewall?

Jiang Yanhai tapped several keyboards on the desktop in an instant, and a data stream appeared directly in his monitoring. At present, after he broke into the first firewall, he was facing the second firewall, but before the second firewall Jiang Yanhai still A virtual system is constructed.

Now that he got into this virtual system, it was as if he had got into a sandbox. Jiang Yanhai directly controlled the firewall and several locking programs, and instantly began to capture the data flow of the counterattack.

The anti-tracking program under Jiang Yanhai's operation was faster, and the breaking program was stronger. It grabbed this data stream almost instantly, and then directly tracked it out.

Jiang Yanhai followed up without hesitation. With the people in front of him as role models, he understood that those who could get into his first layer of firewall were definitely the masters of the masters.

This may be the legendary boss!

On the farm, Texas.

Cass's computer screeched loudly.

"Di Di Di..." The alarm sound made the cold sweat on Cass's forehead instantly burst out. He just quietly broke through the enemy's first layer of firewall, but he didn't wait for any action, the second layer of firewall. came directly.

"fu!" Cass uttered a foul language, and instantly began to tap on his computer with both hands. After frantically switching a few pages, he immediately activated several broiler firewalls behind him in advance.

The offensive of the enemy tracking is too fierce. If you want to run, you can't run. Hacking like this does not mean that when you find that the enemy is tracking you, you can go offline immediately and go offline. If you really do that, you will directly Was found to come to the door.

It is unavoidable to know that whether you use broiler or use other methods to log in to some computers, you will leave system logs.

If you want a clean retreat, you must clear all these system logs, etc., and then retreat, the enemy will not be able to track your location.

But if you don’t clean it up, you just go offline. All the computers you have connected to have your login information. Just search one by one, and you can instantly lock your real location in reality.

And if a hacker is known to the physical address in reality, it is really not as good as a chicken. You will either obediently work for a major security company in the future, or you can honestly and directly help the government work like an X man. .

Otherwise, everything you do will be limited in the future.

Just like the Thomas Gable that Jiang Tao said before, when he was implementing the plan, the FBI recruited hundreds of hackers across the country at least once to inquire, but some of these hackers were directly killed in advance .

And the rest that haven't been killed are those who haven't helped them, or just some insignificant characters.

Cass started to clean his ass very fast, but he found that he was not cleaning fast enough, and the cold sweat on his forehead fell instantly.

Chapter 502/1573
31.91%
Since I Was a Special SoldierCh.502/1573 [31.91%]