Chapter 236: Is This the Rhythm of Slapping the Face? (Part 3)

【Bonus Points +1265】

Oooh!

I didn't expect that there are also points rewards for drawing scoops with gourds?

Su Xiaomu knew the source of the points at a glance: to complete the compilation, installation, and deployment of the node-type firewall artificial retardation version.

Ignoring the bubbling of the little garbage, Su Xiaomu clicked a few times with the mouse and tapped a few times on the keyboard, and a background initialization management window popped up.

The backend of the firewall is designed to be managed only over the internal network, and in principle, it is not allowed to be managed over the public network.

Su Xiaomu complied with this, and before he thoroughly understood this set of firewalls, he would not modify some settings that might lead to security risks without force.

In a sense, the firewall is difficult to defend against the outside.

After all, the firewall is generally a passive defense, and it will only play a role when the security risk comes.

"This backend management page is too rough. Su Xiaomu beeped quietly.

For Su Xiaomu, who has no art foundation, the software made by drawing a scoop from the gourd is not very good-looking.

After all, it is just a simple call for various background colors composed of three basic colors, and there is no careful deployment.

"Maybe the little garbage system is also a science and engineering man? He only has eyes that appreciate beauty, but he has no ability to make beauty?"

The background management page is simply arranged with some operation options, and Su Xiaomu is operating while looking at the explanatory text in the system barrage.

After a few minutes, Su Xiaomu's eyes blinked, "That's what does the node form mean?"

"I made up my own program, I didn't force the count, and I was also drunk. ”

The meaning of the node type on the firewall prefix, Su Xiaomu should be the meaning of the node cascade mode according to the popular understanding - the model discussed in the core module of the Saoke network before.

Actually, it's pretty much the same as this, but with a layer of client mode equivalent to 360 and other security software.

After all, it's 8102, and the cloud has long been a universal feature.

There is one thing that is excellent, you can borrow the super computing power of the background such as supercomputing in real time for protection, as well as the transfer of network attacks.

It is much better than the early warning firewall that Su Xiaomu made himself.

There is also a little bit of micro-excellence, cross-platform, Android, Apple can be used, and it does not need to be protected in the form of software, but built-in plug-ins, and the protection stage is perfectly covered from shutdown to shutdown.

Of course, both Apple and Android need to add trusted to complete the plugin installation.

Su Xiaomu couldn't wait to distribute plug-ins to his three mobile phones to install, and by the way, he liked it, "QR codes are really a great invention." ”

Looking at the four words of artificial retardation on the background management page, Su Xiaomu fell into deep thought.

"Really...... You're welcome at all. ”

A few minutes later, Su Xiaomu understood that the entire firewall was different from those bewitching sluts outside.

The meaning of artificial intellectual disability is no different from what Su Xiaomu understands, that is, weak intelligent modules with a certain degree of subjective initiative, which are slightly better than Microsoft Xiaoice.

In addition, the firewall background management artificial intelligence disability module has built-in some operation instructions, and cooperates with the firewall to actively and passively counterattack.

That's it......

Glancing at the time, it was exactly eleven o'clock, and Su Xiaomu put down the operation of testing the performance of the firewall.

An announcement was made through the background of the Sao Ke network, saying that the server resources will be upgraded in ten minutes, which may affect the use, and the impact time is expected to be about one hour.

It just happened to be back to normal during the time when everyone was eating and wanted to swipe their phones.

Although he had to write the code of the core module in the past two days, Su Xiaomu was not idle, and the background data of the original Saoke Network was sorted out.

The overall migration process isn't too slow.

It was expected to be an hour, but it could actually be twenty minutes.

Just do it, the first step is to run the new Saoke network, the second step is to connect with the database, the third step is to migrate the native data, and the fourth step is to the new Saoke network to the outside world, and the old Saoke network will suspend the service.

Finish.

It went more than expected.

It really took 20 minutes.

After a comprehensive inspection, the supercomputing resources were called without any faults, bugs, or discomforts, and the operation was completely resumed.

All the previous announcements were deleted, and a new announcement was issued that was automatically deleted on a regular basis, telling users that the upgrade of the server resources of the Saoke network was completed......

…………

…………

I was busy with all this, and it was 11:30 sharp.

Su Xiaomu rubbed his hands and said to himself, "Come on, let me try your depth." ”

The breadth and profundity of Chinese culture is truly incomparable to that of ordinary languages.

Fortunately, when Su Xiaomu said this, the expression on his face was not obscene, and there was no second person in the office.

Taking advantage of this time before lunch, Su Xiaomu planned to try the depth of the firewall himself:

Fight the shield of the other with the spear of the other.

That's right, Su Xiaomu plans to use supercomputing resources to attack the firewall on supercomputing.

At the 1024 trillion level of supercomputing, Su Xiaomu plans to exclude less than 100 trillion simulations from other random submissions, and divide the remaining 924 trillion into two pieces.

600 trillion computing resource attacks are invoked, and the remaining 324 trillion computing resources are not allocated in any way, that is, they are freely allocated by the firewall.

Su Xiaomu's hacking skills belong to the kind that comes with the program ape, and they have not been systematically refined.

Of course, the level of the algorithm with a full score is more than enough, and it is still very easy to attack a certain fixed point in a targeted manner.

EVEN IF YOU DON'T KNOW ANYTHING, JUST USING 600 TRILLION TIMES PER SECOND COMPUTING RESOURCES TO CARRY OUT THE MOST COMMON, COMMON AND EASIEST TO PREVENT DDOS ATTACKS IS TERRIFYING.

In fact, Su Xiaomu's first round of attacks was just that.

This is the first wave of the violent pattern.

"If there is a wave of foreign attacks at this time, and the strength is also very strong, it will be fun......"

Su Xiaomu stood up unconsciously.

Su Xiaomu's eyes were too busy looking at the major schematic diagrams on the computer screen, including the utilization rate of supercomputing resources, the progress of attacks, and the feedback from the firewall.

After pondering for a few seconds, Su Xiaomu said with a smile, "It's not bad, the computing resources occupied by the firewall are less than 100 trillion times per second, which is very good." ”

"It's time to show the real skills!" Su Xiaomu said happily like a young man from Erha.

During the DDOS attack, Su Xiaomu's hands were not idle, but he wrote an intrusive hacking program, and in order to test the performance of the firewall more intuitively.

He suspended all protection services for the hardware firewall......

And then......

Su Xiaomu was stunned:

"Stepping on a horse, this is the rhythm of the city's slap in the face...... What such a coincidence!"

======

The 3rd update, the 4th, the 5th, etc.

Set a small goal first, such as 1 second to remember: Book Keju mobile version reading website: