The Strongest Hacker

Chapter 63: Crossing rats (below)

   Chapter 63: Rats Crossing the Street (Part 2)

   "Master, the God of GOD appeared." Without waiting for the GOD message to go back, a line appeared on the screen.

"Poof..." GOD sprayed the tea in his mouth directly on a computer screen, not to wipe the water stains on the computer screen. GOD quickly typed and asked, "What are you saying?! What's going on!" "

  After typing, GOD pulled the pillow directly from the back chair and wiped the tea on the screen and the keyboard.

   "Master, the God of GOD has appeared. Didn't you say that the person you admire most is the God of GOD? Come to the school forum of S." zero said quickly.

"What's wrong with S?" While opening Baidu to find the address of the S forum, GOD asked quickly and asked, GDO was depressed at the same time. Who dared to pretend to be his own name? Didn't the tiger not show his power? , Really thought he was a sick cat?

  After zero explained the matter to GOD, GOD couldn't help but yell, "I rely on it." This person is too bad. How can this wicked thing pile on himself.

But at this moment, GOD has also calmed down, ready to look at the situation first, and although it is said that this person is impersonating his ID, in general, doing things is also in line with his style, but somehow impersonated by someone, GOD Naturally, it is impossible to let go of this person casually, even if it is good.

  Hackers have unspoken rules for hackers. If they pretend to be someone else’s ID on such things, it is easy to cause public outrage. Especially the IDs of some well-known hackers, almost no one is posing.

  The school gate incident caused a sensation in the hacker world because of the appearance of "GOD". Countless hackers crowded into the big S server, and Zhang Yang quickly discovered such a situation.

"I rely on it." Zhang Yang shouted, and started to turn off the anti-tracking function of the firewall. Zhang Yang had also studied the style of GOD invasion in his previous life. Although the ID of GOD has his own meaning, it is more It was called by others.

   also describes that GOD is like God. The intrusion servers are silent, giving people a omnipotent feeling. Of course, although a bit exaggerated, there is also a summary of GOD's red domain technology. In fact, Zhang Yang has systematically studied the methods of GOD. GOD and Zhang Yang are different. He is quite powerful in the red and blue domains.

Various intrusion methods are quite familiar. So many hackers are coming. If Zhang Yang does not turn off the firewall again, it will be easily analyzed by others. Zhang Yang is not a GOD. There are some people in the hacker community who are not so simple as hackers. Some hackers However, each country specifically analyzes the hacking behavior and searches for these hackers. The technical strength of these people is naturally not too bad. And they are more powerful than most hackers. They have huge resources to support them.

Because of the emergence of GOD, a large number of people started to gather on the entire S forum, and soon some people put the actor and heroine in the post video on the S forum, and human search for these things for these hackers That is a simple matter.

Looking at the post detailing Pan Wenlong’s identity in it, Pan Hu, who was also concerned about this matter in the technical department, was black and almost passed out. Baiying Safety was completely famous in the circle, and this person was enough to lose. Dafa. Pan Hu, who has come back, was a little angry and angry. Pan Hu actually didn’t know much about computers. The reason why he was able to enter the security industry was because he had a lot of money at that time, and then invested in this Industry only.

Although he did not understand the technology, Pan Hu was very good-looking. The loss of such a point is harder for Pan Hu than killing him. Pan Hu did not blame his son, but pushed everything. To GOD.

   "If you give me the server today, I will give each of you a month's salary." Pan Hu said with red eyes to a technician in the technical department.

These technicians feel that this matter is shameful today. Although Pan Wenlong is only the son of Pan Hu, strictly speaking, it has nothing to do with Baiying safety, but others will not think so. Will think of Baiying safety, and they all work in Baiying safety, can you not be ashamed?

   As one of the domestic security companies, the technical strength of Baiying Security is actually good. Although these technical personnel can't talk about how good they are at intrusion, they naturally don't understand at all.

"Mr. Pan, our strength is certainly not better than GOD. You also know who GOD is, so I have a way. We use DDOS attack, which is distributed denial of service attack. Although the server of S is the same server, he Compared with our company's servers, the processing capacity of our company is more than several times that of our company's servers. The ddos ​​attack can minimize the technical gap between us and him. UU Kanshu www.uukanshu.com Shorten the gap between us to the minimum." It is a middle-aged man in his forties who is Wang Ming, the technical director of Baiying Security.

At the same time, it was also one of the objects of Pan Hu’s cooperation. Pan Hu was still not mad. After hearing Wang Ming’s words, Pan Hu was also sensible. He nodded quickly and said, "Even if he is a GOD, he is just one. It’s just a hacker, and it’s illegally hacking into someone else’s server, and S is a customer of our school, so you can use the company’s server resources as much as possible. If necessary, you can use some special resources.”

   Wang Ming nodded his head to show that he knew nothing about Wang Ming's special resource in Wang Hu's mouth. As for what the special resource is, Wang Ming would not say it unless it was necessary. Ddos attacks are similar to dos attacks. The difference is that it uses a huge computer cluster to initiate requests to the same computer or server, blocking the target network, and the efficiency of the server.

This is a kind of brute force attack, and it is also one of the sneer attack methods of many hackers. From the hacker's point of view, hackers play with technology, and DDOS in the eyes of hackers is something that the barbarians play, without any technical content. Therefore, it is rarely used by hackers unless it is used for some destructive attacks or when the strength of the two sides is large.

  Because of this matter, hundreds of technicians in the entire Baiying Security Technical Department except for some responsible for the normal defense system, all others were mobilized by Wang Ming, which is the advantage of large companies.

  *

   Ask for votes! ! !

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like