Chapter 63: The Rats Crossing the Street (Part II)
Chapter 63: The Rats Crossing the Street (Part II)
"Master, the god has appeared." Before the god message came back, a line popped up on the screen.
With a "poof......" sound, God directly sprayed the tea in his mouth on the entire computer screen, and didn't care about wiping the water stains on the computer screen, God quickly typed and asked, "What did you say?!" What's going on! ”
After typing, God pulled the pillow out of the chair behind him and wiped the tea on the screen and keyboard.
"Master, the god god has appeared, didn't you say that the person you admire the most is the god god? Come to the school forum of S University. Zero said quickly.
"What's wrong with S big?" While opening Baidu,Find the address of the S big forum,God asked quickly,Ask,GDO was depressed in his heart,Who,Dare to pretend to be his own name,Isn't the tiger powerful?,I really think I'm a sick cat?
When Zero explained the matter to God, God couldn't help but shout, "Damn." "This man is so damaged, how can this evil thing be piled on his head.
But at this moment, God also calmed down, ready to take a look at the situation first, although this person is impersonating his ID, but in the end, it is in line with his style to do things, but he was impersonated by someone for some reason, and God naturally can't let this person go casually, even if it's a good deed.
Hackers have unspoken rules for hacking, such as casually impersonating someone else's ID in this kind of thing, which can easily cause public outrage. In particular, the IDs of some well-known hackers are almost impossible to impersonate.
The school flower gate incident quickly caused a sensation in the hacker community because of the appearance of "god", and countless hackers crowded the server of S big, and Zhang Yang soon discovered such a situation.
"Holy." Zhang Yang screamed,Hurriedly began to turn off the anti-tracking function of the firewall,In his previous life, Zhang Yang also studied the style of god invasion,Although the id of god has his own meaning,But more people call it out。
It is also described as God like God.,Invading the server is silent.,Give people a sense of omnipotence.,Of course,Although it's a bit exaggerated.,But there's also a summary of God's red-domain technology.。 In fact, Zhang Yang has systematically studied God's methods, and God is different from Zhang Yang, he is quite strong in the red domain and blue domain.
All kinds of intrusion methods are quite familiar, so many hackers are coming, if Zhang Yang does not turn off the firewall, it is easy to be analyzed that Zhang Yang is not God, there are some people in the hacker world who are not just hackers, some hackers are specialized in various countries to analyze hacker behavior, search for these hackers, these people's technical strength is naturally not too bad, and they are more powerful than most hackers, they have huge resources to support.
Because of the appearance of God,A lot of people began to gather on the entire S big forum.,And soon someone put the identity of the male and female protagonists in the post video on the S big forum.,Doxing these things are the easiest things for these hackers.。
Looking at the post detailing Pan Wenlong's identity, Pan Hu, who was also concerned about this matter in the technical department, was black, and almost fainted. Pan Hu came back to his senses and became a little annoyed, Pan Hu actually didn't know much about computers, and the reason why he was able to enter the security industry was entirely because he had a lot of money at that time, and then invested in this industry.
Although he doesn't understand technology, but Pan Hu is very good-looking, and now such a loss of points is more uncomfortable for Pan Hu than killing him, Pan Hu did not blame his son, but pushed the matter on God.
"If you give God this server for me today, I will pay each of you an extra month's salary." Pan Hu said with red eyes to a technician from the technical department.
These technicians feel that today's incident is embarrassing enough, although Pan Wenlong is just Pan Hu's son, strictly speaking, it has nothing to do with Baiying Security, but others don't think so, when they mention Pan Wenlong, they will naturally think of Baiying Security, and they are all working in Baiying Security, can they not be ashamed?
As one of the domestic security companies, Baiying Security's technical strength is actually good, although these technicians are not very good at intrusion, but naturally they will not understand it at all.
"Mr. Pan, our strength is definitely not comparable to God, you also know who God is, so I have a way, we use DDOS attacks, that is, distributed denial of service attacks, although the big S server is also a server, but his processing power and so on can not be compared with our company's server, the number of servers in our company is more than several times his, DDoS attacks can minimize the technical gap between us and him, and shorten the gap between us to a minimum." The person who spoke was a middle-aged man in his forties, and this person was Wang Ming, the technical director of Baiying Security.
At the same time, he was also one of Pan Hu's partners back then, Pan Hu was not mad, after listening to Wang Ming's words, Pan Hu was also sensible, nodded quickly and said: "Even if he is God, he is just a hacker, and it is an illegal invasion of other people's servers, and S University is a customer of our school, so you can call the company's server resources as much as possible, and if necessary, you can use some special resources." ”
Wang Ming nodded and said that he knew, Wang Ming was not surprised at all about the special resources in Pan Hu's mouth, as for what the special resources were, if it was not necessary, Wang Ming would naturally not say it. DDoS attacks are similar to DOS attacks, except that they use a large cluster of computers to make requests to the same computer or server, blocking the target's network and server efficiency.
In the eyes of the hacker community, hackers play with technology, and DDOS is something that belongs to barbarians in the eyes of hackers, and there is no technical content at all, so few hackers use it, unless it is to carry out some sabotage attacks, or when there is a large gap in strength between the two sides, this method will be used.
Because of this incident, hundreds of technicians in the technical department of the entire Baiying Security were all mobilized by Wang Ming, except for some who were responsible for the normal defense system, and this is the advantage of a large company.
*****************
Ask for a ticket!!