The Strongest Hacker

Chapter 77: Why are flowers so red (middle)

   Chapter 77: Why are flowers so red (Part 2)

Regardless of his last life or this life, his actual combat experience is too little. Although he was ranked No. 1 in the red domain in the last life, it is a pity that it was only because of the silent success of his large-scale target of several invasions. The ranking is just that, although the invasion was actually done by himself, thanatos gave him a lot of advice and help. At least some of the details of the side branch were handled by him.

   technology and experience complement each other, and only two of them reach a certain height is the real super master. It's like some recruits may be very good when shooting at targets, and they will be very good when they use sniper rifles, but after entering the battlefield, I am afraid that some veterans who have not been trained in system shooting will kill more people than him. This is the experience. importance.

   Of course, when this recruit becomes a veteran, then his strength will be horrified!

   The reason why this person scans the power system is not aimless, but premeditated. The power system and the telecommunications system are similar.

The power system in the United States has independent power supply networks. Don’t underestimate these power supply networks. Although there are not many Symantec employees, Symantec has a huge server group, so Symantec needs A dedicated person will be responsible for the power network.

   The power network dedicated to power supply must be connected to Symantec's internal network, and then coordinate the power supply. In this respect, it is obviously more unthinkable than telecommunications networks, but it is also very difficult to invade from here. After all, there are too few places for the power network to exchange with ordinary networks.

Although I don’t know the purpose of this person, Zhang Yang quickly began to hide his data stream. Because Zhang Yang came from the advanced, all the traps he placed were seen by Zhang Yang, and he was careful not to touch these traps. Zhang Yang Soon followed this person into the power system.

Soon Zhang Yang discovered that this person's goal did not seem to be to invade Symantec's network through the power system, but to first open the power management system of the block where Symantec is located. You must know that the US network The use is more comprehensive than in China, just like this power network system, which can be operated directly in the city management system, and then shut down the power supply of each block.

It can be easily seen from the power management system that there are three power gates in charge of the Symantec block, two of which are backup gates. The power supply of these large security companies is guaranteed in the first place. From another point of view, the American crisis awareness is really strong.

This can be seen from Hollywood movies. The movie about hacker damage in Hollywood movies is not a two-part movie. For example, the hackers in the super blockbuster "Golden Dragon 4", although a bit exaggerated, but also reacted from the side American crisis awareness.

   And this standby power obviously exists to deal with these emergencies. Soon Zhang Yang saw that this man hit the target to a power supply area. This is Symantec's backup server. These backup servers are usually dormant, but they are also running at any time. Once the main server has problems, The standby server in the dormant state will be automatically activated, and then the network interface between them will directly transfer the traffic to the standby server.

This hacker directly shut down the power supply of the Symantec backup server. It must be said that although Symantec has a data center in Cupertino, the backup server and the main server are not in the same data center. It seems that the data center where the main server is located is newly built by Symantec, and the backup server is the former small data center.

At the moment when he shut down the backup server, Zhang Yang wanted to understand that there is a network interface and trigger system between the backup server and the main server, so that the traffic can be transferred to the backup server the first time there is a problem with the main server. As a result, at the moment when the standby server is powered off, there will be a shortage of data exchange in the system on the side of the main server.

Even if these data exchanges are on the intranet, the system is the system, and the main server will perform a self-test at the first time to check what is wrong. In this way, most of the performance of the main server will be transferred to the self-test Above, this gives these hackers an opportunity.

"Master." Zhang Yang couldn't help but sigh. At this time, he was already sure that this person is definitely a domestic hacker. Otherwise, hackers in other countries will not come here to find Symantec. .

Zhang Yang soon noticed that at the moment when the hacker cut off the backup server, the Symantec server monitored by Zhang Yang was immediately subjected to a large number of ddos ​​attacks. These attacks were extremely violent, although they could not keep up with Baiying Security’s launch at the last moment. Attack, but it's almost the same, and it's time to know that Symantec's main server has started self-test.

   In this way, the huge amount of calculation almost instantaneously increased the CPU usage of the main server ~ www.wuxiahere.com ~ or group operations. "Zhang Yangle had.

At this time, Zhang Yang had already seen that this hacker secretly began to invade Symantec's internal network from the power system as Zhang Yang thought. He seemed to use a virus similar to that, Zhang Yang did not Maybe let his data flow to analyze these things, then he will be exposed soon.

   By this time, Zhang Yang was already sure that Symantec was about to miss. Although they were ready for everything, they still lost. This is where the defense hurts. Zhang Yang quickly erased all traces of himself, left from the city management system of Cupertino, and then began to watch the bustling.

"Who is this person? Is this the genuine GOD?" Zhang Yang touched his chin. If he thought about it, it was the same as GOD said. This person's technical strength is definitely not bad. Don't look at these things. Simple, but the technology involved is not simple at all.

   is to publicize yourself, and it is impossible to do better than this person, or even worse than others. This person's experience is very terrible.

Sure enough, the violent ddos ​​attack did not last long, probably over twenty minutes, but after the ddos ​​attack ended, Zhang Yang found that the official website of Symantec had been directly killed by the official website. An announcement has been posted.

  

   I am speechless, and some people brush reader comments, who I offend again, brothers, it’s okay to have a little reader comments! ! My egg hurts. The new book list was chrysanthemum, 5555, ask for votes!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like