Chapter 412: The Backbone
In the security department of Yijia Network, programmers come and go, and there is chaos. Pen, fun, and www.biquge.info
The attacking hackers seem to be fearless, only trying to break through the firewall of Yijia Network in a short time.
Hackers break the firewall, mainly by modifying the source, destination address and port of the packet, imitating some legitimate packets to deceive the firewall's detection. Change the source address of his datagram to the internal network address, and the firewall will let it go when it sees that it is a legitimate address.
Or a fragmentation attack, in the fragmentation packet of an IP, all fragmentation packets use a fragmentation offset field to mark the order of the fragmentation packets. However, only the first shard contains information about the TCP port number. When an IP fragment packet passes through the packet filtering firewall, the firewall determines whether to allow the packet to pass through the firewall based on the TCP information of the first fragment packet, while other subsequent fragments are not detected by the firewall and directly let them through.
In this way, the attacker can first send the first legitimate IP fragment to deceive the detection of the firewall, and then the subsequent fragmentation packet encapsulating malicious data can directly penetrate the firewall and directly reach the internal network host, thus threatening the security of the network and the host.
The firewall is essentially a program with a specific mechanism. After the hacker found the mechanism of the firewall, the number of times the firewall was broken through became more and more, and the few programmers in the security department were plugging the gaps everywhere, obviously unable to do it.
Xue Ruqian transferred all the few masters of Yijia Network and joined the defensive army.
Hackers stuff in destructive viruses and Trojans, which need to be artificially cleaned out. The virus is easy to detect and destructive, but it is obvious and easy to remove. However, Trojan horses are often an inconspicuous program mixed in packets, which is more subtle and more troublesome to clean.
"Disconnect the intranet server first, no matter what, we can't let hackers break into our core server!" Du Jiayi noticed that the programmers of Yijia Network were a little weak, and said to Xue Ruqian very decisively.
There are too many trade secrets of Yijia Network in the intranet server, and if the internal hacker breaks through, then the loss is too great.
The intranet server is only for the inside of the Yijia network, and after the external interface is disconnected, even if the hacker has great ability, he will not be able to break through the physical limitations and get the program in the server.
However, the external server of Yijia Network cannot be disconnected, otherwise users who visit normally will not be able to enter, and all the websites of Yijia Network will be paralyzed.
As a last resort, Du Jiayi is an excuse that will not allow disconnection from external servers.
"Send a statement immediately to explain the situation we encountered and the user." Du Jiayi continued.
Such a huge attack has long affected the normal use of users, and if Yijia Network does not explain it, all the anger will be sent to Yijia Network.
When many users log in to Yijia network products, they find that it takes longer than usual, and there is a stuck, and they need to refresh it many times before they can enter. Yijia Weibo is social, WeChat is technical communication, and Yijia video is watching videos, almost all of which have been greatly affected.
Except for those original stations under Yijia Literature, which are their own servers and have not been affected, users of other products are dissatisfied.
The explanation issued by Yijia Network immediately caused an uproar on the domestic Internet.
Attacked by a large number of foreign IPs, Yijia network products have been stuck, delayed, which is a big event in itself.
Some users can understand, and some users are cynical about Yijia Network.
Many Internet companies have been paying attention to the attack on Yijia Network, but most of them are indifferent.
Shenzhen, Penguin Headquarters.
Ma Huateng's eyes were bloodshot, the stubble on his chin hadn't been trimmed for many days, and when he heard the report from his subordinates, his whole face was full of banter.
"You also have today! Ha ha! ”
The launch and growth of WeChat has put too much pressure on Ma Huateng, so that he has been staring closely at the development of the penguin project and does not dare to relax at all.
Ma Huateng hesitated for a moment: "Hurry up and check if it was that idiot in our company who did it, if not, it would be great!" ”
Ma Huateng is also afraid that his subordinates will decide privately, and it is okay to make small moves behind the scenes, if they blatantly engage in hacker attacks and are caught, then public opinion will fall behind.
Lei Jun, who was far away in the capital, also made a special call to Du Jiayi and asked Du Jiayi if there was any need here. Jingshan Company is also a master of the cloud, and it can also provide some assistants through the Internet.
With the growth of Yijia Network, Lei Jun has taken him as his strategic partner. If Yijia Network suffers a major loss, it will also affect the cooperation between Lei Jun and Du Jiayi.
Du Jiayi rejected Lei Jun's kindness.
Far water can't quench the thirst of the near, and the help provided through the network is limited, so it can't relieve the siege of Yijia network. But if someone in Jingshan Company takes this opportunity to download something from Yijia's network server, Du Jiayi doesn't want to take risks.
In addition to the core programs of each product, the servers of Yijia Network also have the data of hundreds of millions of users. It's still a trivial matter for the program to be breached, and it's easy to fix, but if the data of hundreds of millions of users is breached and destroyed, then the users will definitely fry the pot!
"Prepare for both." Du Jiayi saw that the situation was becoming more and more unfavorable to Yijia Network, and immediately said to Xue Ruqian.
Disconnecting the network interface and denying all access is the last resort. Xue Ruqian is also very clear that doing so will lose some users and bring trouble to users. But if hundreds of millions of users are damaged or even stolen, then Yijia Network will lose all its users.
No one will be willing to use products that cannot guarantee their privacy and information security, and Yijia Network will fall into an image crisis.
When the interruption continues, it will be chaotic, and Du Jiayi has prepared for the worst.
Xue Ruqian personally went into battle and began to work on real-time data. If you want to break the excuse, you will inevitably lose some of the data of the real-time interaction, and you can back up as much as you can now, and when you restore it, you can recover as much as possible.
Du Jiayi couldn't help at all, so he could only calmly look at the busy employees from the sidelines.
If you don't calm down, you can't do it, Du Jiayi can't help, and being in a hurry will only make Yijia Network lose its backbone and make the already unbearable situation even more unbearable.
The reason why Yijia Group is called Yijia Group is only because Du Jiayi is the chairman of the group, and he is integrated with the image of the entire group. If Du Jia Yi is not chaotic, Yi Jia will not be chaotic. (To be continued.) )