Chapter 17 Door-to-door provocation, closing the door and beating the dog
Just in time. Pen & Fun & Pavilion www.biquge.info
There were three computers on the table, and Zhuang Chun, who couldn't even keep his eyes, heard an electronic alarm sound in his ears, short and urgent!
"Sure enough!"
Zhuang Chun looked at the computer screen that issued the alarm and muttered to himself.
The alarm sound is set when he installs a firewall on the company's server, and it will automatically alarm once there is an abnormal access, that is, hacker invention.
Zhuang Chun turned to the alarm computer with a little chair, knocked a few times on the keyboard, and the screen changed to show a real-time chart of the firewall data flow, there are a total of seven abnormal data flows, with a clear division of labor and tacit understanding, there is no doubt that it is a hacker group, one of which is extremely public, and the attack is also very strong.
Zhuang Chun, who had already dug a pit and waited for the villains to come to the door, picked up the teacup on the table and took a drink, so he could watch the play for a long time.
Speaking of this cup of tea, I have to mention Chen Yu, and I picked a suitable secretary for Zhuang Chun early, so that Zhuang Chun could drink tea and watch the play.
------
"Oh, I've been discovered, I want to leave, there's no door!" Zhuang Chun, who took a sip of hot tea, looked at the changes in the charts on the screen and smiled.
Finally it was his turn to make a move, Zhuang Chun was very excited, the last time he walked in the gray area unimpeded and did not experience enough pleasure, now there are toys sent to the door, not playing, it is a crime!
A crackling knock sounded, and lines of code quickly took shape and took effect under Zhuang Chun's hands, chasing and intercepting the hackers who wanted to escape!
After Zhuang Chun made his move, he saw that the other party was cornered, and the attack intensity increased in vain, and it turned out that the other party still had a back hand, "Ya, there is a small supercomputer!" (ps: supercomputer: supercomputer, known for its ultra-fast computing speed, this article is divided into super-large, large, medium, small and supercomputing centers according to the calculation speed, and the famous ones in reality are China's Tianhe-2. )
The hackers who were caught up in the chickens and dogs were finally able to breathe a sigh of relief, thanks to their thorough preparation before they came.
"You have supercomputing, I have pits, who is afraid of whom. Zhuang Chun in front of the computer smiled proudly.
Dozens of servers in the company's temporary computer room are not bought for nothing, they have long been configured as a complete cluster by Zhuang Chun, although the computing speed of a single machine is not as fast as that of a small supercomputer, but it is better than a large number.
The computing speed of small supercomputing is basically 1 trillion times per second, and the peak computing speed of server clusters in the future will be 0.7 trillion times per second (PS: there is an apocryphal component).
Although there is a gap between the two, it is not big, and it is difficult to say what the result will be.
Under the organization of Big Brother, these hackers use the supercomputer in their hands to plan to forcibly attack and defeat the defense of the future technological firewall with computing speed.
Just after the hand-to-hand encounter, the hacker big brother consciously has figured out the hole cards of the future technology, quite a bit I smiled at the sky, and asked who else was complacent.
------
The hackers who reorganized the attack were menacing, but suddenly found that they seemed to be lost.
It's a bit hard to understand this, how can you get lost in the online world, but when hackers attack, they suddenly find that they seem to be spinning in a maze, and they can clearly see the target, but the attack is useless.
The situation is like this, Zhuang Chun has long laid a 'honeypot' system on the company's server (ps: pseudo system, bait, temptation hacker attack), and this is not only that, but another layer of 'maze' has been arranged on the honeypot.
Zhuang Chun doesn't know if other cybersecurity experts will do this, and he doesn't know who invented it, arguing about these is meaningful, right? Okay, don't fight, the labyrinth was invented by me Zhuang Chun, no thanks, my name is Lei Feng!
These hackers don't want to know who invented this, at this moment, at this moment, they can't wait to strangle the inventor, return Lei Feng, why don't I return the detonator.
Before they came, they didn't expect that a small company that had just been established would lay a honeypot on the official website and make a maze.
Your mom blew up!
After these hackers even used small supercomputers, they were already exhausted, and now they have been lost in the server clusters of future technology, and they are fighting for the beasts.
What did you say?
Why don't you pull out the network cable? This is really not that people are unwilling, but they don't dare, when they pull out the network cable, they will leave the last IP address used, and everything will be exposed to the sun.
Hackers, hackers, can they still be called hackers if they are exposed?
Besides, maybe struggle a little more, and then escape?
Zhuang Chun felt like a big bad wolf, walking towards the trembling little sheep step by step, and he almost let out a laugh.
------
The alarm tone of "Toot, beep, beep!" sounded again.
"I'm Nima, this is Chengxiang gluttony, coming wave after wave. Zhuang Chun muttered after hearing the voice.
But, come, who's afraid of whom, seven dwarfs, you stay in the maze first, and then I'll get you after I finish cleaning up, Zhuang Chun casually gave the first wave of hackers a nickname.
There is only one hacker in the second wave of hackers, but its attack is far more powerful than the sum of the seven dwarfs and small supercomputers, and they are rampage in the server cluster of future technology.
The alarm sound just fell, and a long dripping sound came from the computer speaker in front of Zhuang Chun.
"There's a big fish. ”
Hearing this long dripping sound, Zhuang Chun touched his chin and whispered with a solemn expression.
This is Zhuang Chunbu's alarm module outside the honeypot, and it took less than five seconds for someone to break through the honeypot system!
"Super-large supercomputing!" Zhuang Chun almost immediately judged the attack vector used by the other party, and the super-large supercomputing was close to a quadrillion number of calculations per second!
Zhuang Chun tapped a few times on the keyboard, then propped his chin on his hands and quietly watched the performance of the solo hacker.
Give up?
No, it's neither, Zhuang Chun wants to try the real effect of this firewall arranged according to the [Hacker Attack and Defense Skills Elementary and High Level]!
That's right, when the seven dwarfs wanted to escape, Zhuang Chun's hands were itchy, and he crackled and drove them into the maze, feeling that it took a lot of effort, and the single hacker attacked, but Zhuang Chun only moved a few times, feeling that he had done nothing.
In fact, there is a big difference, in order to arrange this firewall, Zhuang Chun spent a whole day of effort.
The results were soon revealed, under this firewall, lone hackers were helpless, and almost all of them were returned intact by using the computing speed of super-large supercomputing to attack or disguise attacks.
And every normal access was allowed in, and the single hacker was shocked, and the target's defensive ability was quite not weak!
Theoretically, the firewall has infinite possibilities, and its ability depends on the strength of the carrier! This is the introduction of this firewall in Zhuang Chun's mind, which he casually called a 'small shell'.
Not long after, Zhuang Chun tapped the keyboard a few times, ready to close the door and hit the dog!