Chapter 64: Why is it so fast!

(Ask for collections, ask for recommendation votes, ask for clicks, and I implore everyone to support me, I am grateful!) οΌ‰

When Zhizi was yelling "this is unscientific", Liu Fang's self-confidence was further strengthened, and he smiled: "This is the third time, I don't know how many springboards you have used?" If there are only two, then it's time for the final showdown. Pen, fun, pavilion www. biquge。 info”

Liu Fang didn't know that Zhizi used supercomputer resources, and even if he knew about the situation, he would probably say: "Supercomputers are not omnipotent, they are just auxiliary tools, and there is still a gap between them and humans in terms of purely technical work." ”

This is not a big deal, it stands to reason that Zhizi should be able to detect this, but unfortunately he was frightened by Liu Fang's terrifying speed, and he was already a little confused, otherwise he would not have thought of such a simple truth.

It is true that supercomputers are only auxiliary tools, and in fact it is still humans who operate them, and they operate according to human instructions.

While it can speed up the processing of information by humans, it also depends on the situation.

If you compare the speed of the operation, the result is not very easy to say, because Liu Fang has not carried out relevant verification. But if it is something more purely technical, Liu Fang can have an advantage.

For example, just now, Liu Fang was still deciphering the code of the springboard as always, and as for Zhizi, he was reinforcing the springboard, and both sides were doing technical work. Even with the help of a supercomputer, Tomoko can only improve work efficiency, but there is still a gap between the part he has improved and Liu Fang's decipherment speed.

Maybe Tomoko has never encountered this situation, so he will shout that this is unscientific, if he can calm down and analyze it a little, it is estimated that he will not think so.

After suffering blows from Liu Fang one after another, Zhizi was silent for a while, and finally he snorted coldly: "I want to see how powerful you are!" ”

After speaking, Tomoko immediately manipulated the supercomputer to launch a data stream attack on Liu Fang, he could not accept defeat, and in order to win, he did not hesitate to use the data stream attack method that he despised very much.

There are many ways for hackers to attack, and there are different ways to do this.

The top hackers are basically pure technical streams, such as intrusion through system vulnerabilities, or using virus programs written by themselves to carry out attacks.

Weak hackers only pick up their teeth, and they use technology and viruses developed by others to attack. One of the most violent, and at the same time the least technical, is the data flow attack. In the hacking world, this is often referred to as a flood attack.

The way a flood attack is very simple, that is, using a large amount of spam information, to execute a saturated access request command on your computer. The computer analyzes these access requests to determine whether there are dangerous programs, and then isolates the dangerous programs, and the computer itself cannot refuse other normal access requests.

There is a limit to the information processing power of a computer, even the most powerful supercomputer, there is a limit, once your access request breaks through the computer's processing limit, then the computer will crash, so that you have won.

Since the flood attack is relatively simple to implement and powerful, anyone who knows a little bit about hacking techniques has mastered this attack method, and Tomoko, as a master hacker, is of course no exception.

When he used the supercomputer to launch a flood attack, the computer screen in front of Liu Fang suddenly flashed, and then he found himself retreating to the first springboard.

The smile on Liu Fang's face had not subsided, his smile immediately froze when he saw this scene, and before he came back to his senses, the computer screen in front of him flashed again, and then Liu Fang found himself retreating to the data center of the network provider.

The speed of these two jumps was very fast, the interval was no more than three seconds, Liu Fang was a little blindsided, he hesitated: "What's going on?" Why did I automatically return to the data center in such a short period of time? ”

Liu Fang had deciphered the password of the data center before, he had administrator privileges, and while he was still puzzled, a large pile of disorganized code suddenly flashed on the computer screen.

Liu Fang glanced at it, and then found that these codes were alarm messages sent by the data center to the administrators, and Liu Fang couldn't help but be surprised when he saw it: "Someone is launching a flood attack on the database? What does a flood attack mean? ”

Liu Fang's words completely exposed his lack of understanding of the hackers' diverse attack methods, and in order to figure out what the flood attack displayed in the alert meant, Liu Fang quietly stayed aside and observed.

After a while, he suddenly realized: "It turns out that the flood attack is a saturation strike, which is the same principle as the instructions in the first half of the fool virus, which consumes the computer's resources through garbage programs." ”

The fool virus issued by Liu Fang has two attack methods, the first is to consume computer resources through foolish operation passwords, and the resources consumed include memory resources and computing resources.

When the first attack is successful, the fool virus automatically executes the next command - to destroy the BIOS area on the computer's hardware, so that the computer's hardware and software are all broken and it is impossible to continue working.

Through the observation just now, Liu Fang found that the flood attack was very similar to the first attack method of the fool virus, and he took a name very vividly, calling it a saturation strike, which is still very vivid.

Now that he knew the other party's attack method, Liu Fang naturally couldn't sit still, he immediately cheered up and tapped the keyboard quickly.

The Fahd family couldn't understand Liu Fang's operation at all, and the code that kept flashing on the computer screen was as dense as stars in the sky, and they were only dizzy to see.

Hearing Liu's relaxed smile at this moment, Fahd rubbed his eyes and asked, "Genius, how long will it take you to solve this guy?" The sun is about to set, should we decide on the next plan of action? ”

At the beginning, Fahd was still very curious about the battle between hackers, but after watching it for a while, he realized how boring the battle between hackers was, in order to end this boring thing quickly, he couldn't help but open his mouth to persuade: "I'm worried that the Iraqis are not fooled, in case they send armored troops to advance quickly, at most one day, they will be able to reach Kuwait City, and at that time, we will lose all hope." ”

The other three were also bored by the curiosity of the hacker battle, and when they heard Fahd's words, they immediately chimed in:

"Yes, Kuwait is too small, and at the speed of the tanks, one day is enough for them to reach us."

"Let's put the hacker's business aside for now, anyway, he can't threaten our security, what are you afraid of him doing?"

"If it really doesn't work, we just cut off the power and network of the monitoring system, so he can't think about it."