Chapter 484: Bridge Server

Frank's words also lifted the spirits of the three Brians, although they hoped that Frank would help them get rid of chn_honker, but if they could catch this guy as quickly as possible, it would be good, so Brian was not in a hurry to find Thomson to verify.

Frank stared at the information on the computer screen for a long time, then crackled and tapped on the keyboard, another software called up, and the data began to scroll again, but this time the three Brian understood that Frank was doing a secondary analysis of the information he intercepted from the Internet.

"chn_honker's anti-tracking means are very clever, he uses a ring structure to organize some network springboards, use normal means to track him, will definitely enter a dead loop, want to track him, the possibility is almost zero, I am curious, what kind of person is he, can come up with such an ingenious method, if possible, I really want to meet him, talk to him face-to-face, just hope that this time he will not be caught by me, go to the prison and chat with him, Not a pleasant thing to do. This time, without waiting for the three Brian to ask, Frank took the initiative to talk to the three of them, and his words were full of curiosity and expectation for chn_honker person, as well as some feelings of sympathy.

"And how sure are you, Mr. Frank, that you've tracked down this man?" Brian asked hopefully.

"Less than thirty percent." Frank said.

Bryan and the three were a little disappointed when they heard Frank's words, less than 30% meant that the chances of the three of them keeping their jobs were less than 30%, so Brian left the server room and went to Thomson.

"Tell me what your names are and what your specialties are." At this time, the analysis software was still running, and Frank was idle and had time to talk to the two people who remained.

After the two men briefly introduced themselves, Frank gave them a set of software to use it to compete with chn_honker for the administrator rights of the server, causing trouble for chn_honker, and when Brian returned, he was assigned the same task.

After sending Brian away, the results of the secondary analysis on the computer had been obtained, and Frank looked at the analysis results, an uninhibited smile appeared on the corner of his mouth, and opened another software to enter the analysis results.

"chn_honker, what kind of person are you, this springboard setting method is really peculiar, but it's not without loopholes, I hope you can escape this time, I really don't want to catch you this time." Frank muttered to himself, activated the anti-tracking module of the software, and began the anti-tracking of the chn_honker.

…………

chn_honker is actually a new ID that Xiao Yuan deliberately gave himself temporarily, and the reason why he used a new ID was to not want people to associate chn_honker with him, because he knew very well that what he was doing now was not only challenging the hackers of the United States, but also challenging the bottom line of the official United States chn_honker. His plan was that when this id was done, he would abandon it completely.

It is not very easy to fully control the website server of the White House, because the website of the White House is very important, so it has always been the focus of hackers to attack, so the server of the White House website has very good requirements for security, in addition to the guarantee of software, in order to ensure the security of the website, the server of the White House website uses a bridge synchronization server.

Bridge server is a server group composed of two groups of identical servers, one of which is connected to the Internet and provides normal website services, this group of servers is called the main server, and the content of the other group of servers is exactly the same as the content of the main server, but this group of servers is only connected to the main server, but not connected to the Internet, this group of servers is called the backup server.

The security protection principle of the bridge server is that when the primary server is attacked, it is compromised. Or after being modified, it will inevitably make its content inconsistent with the backup server, once the management software of the bridge server finds this inconsistency, it will overwrite the content of the backup server to the main server, so that it can be restored to normal, therefore, it is very difficult to successfully invade the bridge server, and some people even say that it is completely impossible to invade the mature bridge server.

Of course, according to software theory, unless a set of software theory can prove that it is complete from a mathematical point of view, it cannot be called absolutely safe, not to mention, even if the theory of the software is proved to be complete from a mathematical point of view, but a large system in the coding process, to ensure that there is no loophole in the coding, from a mathematical point of view, someone has proved that this is an event with zero probability, that is, any system will have vulnerabilities, and a system without vulnerabilities does not exist.

Although Xiao Yuan had never hacked the White House website in his previous life, he had done a very in-depth study of the bridge server, and he also knew that the White House website used this kind of server structure.

Therefore, despite all the effort, Xiao Yuan still successfully hacked into the White House website server, successfully blocked the data channel between the backup server and the main server, and made the backup server a decoration.

After successfully hacking the White House website server, he sent out the challenge post on the Xuanne forum, and then began to wait for it, on the one hand, he was dealing with various efforts on the website to try to regain administrator privileges, and he was also waiting for the arrival of fly007, although he set a time in the post, and asked fly007 to post publicly in the Xuanne community to fight, but he was not stupid to think that fly007 would fully follow his requirements, like the knights of the European Middle Ages, honestly accept the challenge, In fact, his prediction was correct, fly007 did not post a response post, nor did he be punctual, and the first wave of attacks came less than twenty minutes after he issued the challenge.

fly007 obviously also knows that the White House website uses a bridge server architecture, so the first wave of attacks is aimed at the key, that is, to find a way to open the data channel between the backup server and the main server blocked by Xiao Yuan, and once this channel is opened, the backup server will overwrite the main server in less than a second, and the result is naturally that the main server will return to normal, Xiao Yuan will be kicked away, and the challenge will fail.

Although fly007 has mastered the key to kicking Xiao Yuan, the attack method is very conventional, and it is not even as much trouble as the White House administrator caused him, and several ** hits were easily blocked by him, and fly007 stopped temporarily after experiencing several attack failures, and at this time, Xiao Yuan found that there was another person who began to anti-track his position, and this person's anti-tracking method was different from any time he had encountered before, this method seemed somewhat familiar to him, It was as if he had seen an acquaintance, but this acquaintance made him feel a little dangerous, because in his previous life, only this person had successfully broken through the protection of his ring logic lock when he was fighting with him.

"It's been a long time, old friend, but I know you well, but you don't know anything about me, so is it possible for you to break through my ring logic lock and find me?"