Chapter 61 Online Game-style Hacker Attack and Defense
Yang Tian still thought about things too simply, originally he thought that after the peace announcement was issued, no one would come to disturb the Century Server again. Who knows, the Century server is too mysterious and powerful, mysterious and powerful, and it is the favorite of hackers. Therefore, those curious hackers did not stop looking for the traces of the Century Server, and that posture was comparable to Qin Shi Huang's search for immortals.
It's a pity that these network offensive and defensive battles are all data flow code streams, and Yang Tian can't understand any of them, so he can only listen to Xiao Ran's report on the battle situation, not to mention how depressed Yang Tian is. He is still very interested in hackers, and it is estimated that every boy who likes electronic digital has had a dream of hacking!
In most people's eyes, hackers are mysterious, powerful, god-like beings. And the hacker offensive and defensive battle, there is no battlefield where you can't see the smoke of gunpowder, just like the battle of the gods, which makes people full of imagination. But in fact, ordinary people really can't understand the hacker attack and defense war, and those data codes are not professionals who can't understand them at all.
Depressed and depressed, Yang Tian had a whim, can you make the hacker attack and defense battle a game, and then when someone comes to attack, you can intuitively feel the battle situation? Thinking of this, Yang Tian told Xiao Ran his thoughts.
"Can you simulate the hacker attack and defense battle into an online game siege?" Yang Tian typed this sentence on the screen, and then a command prompt appeared on the screen: "Please enter a more detailed description." ”
Seeing this prompt, Yang Tian knew that it was probably feasible. With Xiao Ran's computing power, he is fully capable of simulating hacker attacks into a visual online game! So Yang Tian began to enter various settings.
The firewall is naturally ninety walls, and the administrator is GM. With IP as a unit, a hacker IP is simulated as a player attacking the city, the Trojan horse is the mount, the virus is the baby, and the attack method is the character skill...... Yang Tianyan has an administrator account, has the authority of GM, and sits in the main city.
After doing these basic settings, Yang Tian asked Xiao Ran to use virtual machines to simulate a thousand servers, and each server was assigned an IP address, which can be found all over the world, at the ends of the earth. Each server counts as one level, and every ten levels form a game map, with a total of 100 maps customized.
As long as you overcome the firewall of a server and leave a logo signature in the server, even if you pass one level, you will get the IP address of the next level.
After setting it up like this, Yang Tian made the abstract and incomprehensible hacker attack and defense of the data flow code flow into a game. This is an unequal contest, Yang Tian wants to fight against other hackers, as long as the mouse is pointed, release a corresponding skill is OK. Xiao Ran will automatically translate Yang Tian's skills into relevant code and data to snipe hackers.
And the various attack methods of those hackers, Xiao Ran will also be transformed into various game skills and realized in the form of special effects. So if a hacker hooks up a horse, you'll see him riding a mount, and if he drops a virus, you'll see him summon a baby. If Yang Tian wants to stop that hacker from advancing, he can release a ring of resistance fire, and that hacker will be beaten back, and if Yang Tian wants to add another firewall to a hacker, he only needs to build a wall in front of him.
The originally mysterious, high-end, foreign-style hacker attack and defense war was turned into an online game on a rotten street by Yang Tian. If those hackers knew that the hacker attack and defense war could still play like this, it is estimated that they would all cry to death. Nima, I want to attack once, knock out the code, but you point the mouse, press f1, 2, 3, 4 and it's done, is there any reason for this?
It can be said that except for Yang Tian, no one in the world can make such a game, because the amount of computing required for this game is too large. Moreover, the programming technology required is too high-end, even if there is a supercomputer on the earth that can support such a large amount of computing, I am afraid that such a program will not be possible. Only a guy like Xiao Ran, who is a program himself, can satisfy the pervert of Yang Tian, the master, and write such an evil program. The completion of this game is the day when all hackers have a nightmare. As long as you have this program, any computer novice can have an addiction to hackers around the world and fight against hackers.
After the game was completed, Yang Tian couldn't wait to start the first round of internal testing, and all the hackers who were still trying to explore the century server were all pulled into the first level of the game by Yang Tian. Those hackers were still tracking the whereabouts of the Century server in various ways, and suddenly they received a mysterious IP on their computer, and after typing this IP, they finally found the place they had been looking for.
So one by one, they took out twelve points of enthusiasm and used various tricks to overcome the firewall of this server and explore the secrets of the Century Browser.
Yang Tian looked at the computer screen, and outside the city wall of the first level, it was already surrounded by dense game characters. These people have an ID composed of an IP address and the name of the region where the IP is located on the top of their heads, looking at these IDs, Yang Tian knows which country and region these hackers are from.
At a glance, Yang Tian found that there were the most hackers in the United States, and Yang Tian directly released the big killing move "Heavenly Punishment", killing one in one move, and quickly cleaned up a lot of Mi hackers. This heavenly punishment skill is a big killer, and the effect in the game is that a thunderbolt strikes down, the red bar bottoms out, and it is killed in seconds. And when it is converted into actual results, it is the collapse of the opponent's system.
This can frighten those Mi hackers, obediently burrowing, a system that looks at itself collapses, what is the principle, how is it realized, there is no way at all, this is too terrifying!
After cleaning up the hackers of the United States, we began to clean up the hackers of the Japanese Kingdom. In the face of the Japanese hackers, Yang Tian was even more unceremonious, and directly used a skill called "Skyfall". The effect of this skill in the game is that a meteorite falls from the sky, the red bar bottoms out, and the corpse directly becomes a meatloaf. When translated into reality, the other hacker's computer directly collapses, the motherboard is short-circuited, and the hardware is damaged. Moreover, this damage is traced directly to the original IP after crossing the springboard.
At this moment, all the Japanese hackers were also dumbfounded, it had only been a long time, and many of their tricks had not yet had time to be used. As a result, the other party tracked down to the real IP, and the computer made people burn, and the real stealing of chickens was not a loss.
Then Yang Tian raised his eyes again, and the eight countries of Western Europe were also swept over by Yang Tian one by one, testing various skills. Some are computer hardware damage, some computer system crashes, and some computer systems are poisoned and paralyzed...... After playing for more than an hour, Yang Tian ended the first round of internal testing and added many low-level skills.
At the beginning, almost all of the skills were set up, which was quite fun at first, but it was not playable. The setting of these low-level skills is very necessary. In this way, when you play these hackers again, you will have the pleasure of fighting monsters PK and grinding blood a little bit.
After the adjustment, Yang Tian directly issued an announcement to the world through the Century Browser. "In view of the fact that hackers and network security in various countries are very interested in my server, I decided to open a test to the whole world, and anyone can participate. I have prepared a thousand servers, each of which is counted as a level, and these servers are distributed in the north and south of the world, all of which are broilers under my control, which are temporary loans. I will leave a signature book on it, as long as I break through the firewall of the server and sign my logo name on the signature book, it will be cleared. ”
"Every time you pass ten levels, you will get a part of the source code of the Century Browser, and the more you clear the level, the more source code you get. If you want to study the various technologies of Century Browser, you can choose it by yourself. At that time, I will set up a leaderboard in the first level to inform the ID ranking of all the passers. The number of clearances is the first sequence of rankings, and the clearance time ranking is used for the same number of clearances. Regardless of the number of playthroughs, the top 100 will receive a portion of the core source code of the Century Browser. ”
Yang Tian was originally prepared to develop, just like the Android system, which is open to the world, inviting global merchants to build a grand event. And Yang Tian will also be in this event, with first-hand information, the building near the water will get the moon first, and the largest piece of cake will be shared.
Now Yang Tian simply designed this plan into a game, which can not only make him have some fun when he is bored, but also give others a little hope, so that they will no longer regard the Century Browser as a great enemy. Isn't what they want is the advanced technology of Century Browser? Now that there is a way to obtain these technologies, the hacker network security of countries around the world is immediately divided.
Originally, the spearhead was unanimously aimed at the Century Browser, but now this temporary tacit understanding will disappear in an instant, what should have been done before, and what should be done now. Those hacker network security personnel who already have a competitive and hostile relationship will fight more fiercely. The Century Browser will quietly grow and develop during this war.
At this time, the installed base of Century Browser has reached a terrifying 2.1 billion, and the number of registered users has also reached a terrifying 900 million. Yang Tian finally stopped expanding, and now the world's PCs and smartphones are afraid that they are almost installed by their own forces. With so many users, there is no need to add more, as long as these users are digested, Century Browser will immediately become a giant that no one dares to age.
But how to digest these users has to be carefully considered. Don't look at the installed capacity is already so scary, but Yang Tian used viral propagation to force the installation to get it. Many people don't even know what's going on, and most people don't even know they have such a thing installed on their computer. Even the 900 million registered users, most of them were guided by the program to register, and they didn't know what it was for.
So in a short period of time, these people are not real users at all, and they can't bring income to Yang Tian at all. And it may be lost at any time, and in the future, retaining these users will be the most important job of Century Browser.
Century Browser stopped its viral expansion and made a new debut and was willing to publish the source code. The network security departments around the world have lifted the alarm on Century Browser, changed to covert monitoring, and then geared up one by one, preparing to get these suddenly appeared, like alien black technology-like technology!