Chapter 186: Wisdom Sardines
The person in Xiao Yuan's memory, named Sardin, takes the meaning of sardine (sardine), this person has a perverse and weird personality, and is best at parallel computing design, as well as large-scale computing cluster and computing grid design, and the attack method also has distinctive characteristics, this characteristic is named intelligent-sardines-attack by himself, which means that the reason why the wisdom sardine attack is called the wisdom sardine attack, Because this kind of attack often uses a large number of controlled computers to launch attacks on the target, from the perspective of each single attack, it seems to be like a small sardine, there is no intelligence, but when these large number of single attacks are examined together, you will find that the whole of all these attacks is intelligent.
What's even more terrifying is that this kind of intelligent sardine attack has a very high self-learning ability, that is to say, after these sardines who have no wisdom at the beginning have launched an attack for a certain period of time, a huge computer swarm composed of all these computers, more precisely, it should be called a computing grid, through the exchange of information with each other, and after the analysis and aggregation of this information, in addition to the group wisdom will be higher and higher, each individual will gradually have a certain wisdom, so as to achieve a group battle, After differentiation, they can fight on their own, which is very powerful and difficult.
When Xiao Yuan came in from the beginning, after listening to Gu Wolf's story, he was actually a little suspicious, but when he saw that those IPs still only had some simple group wisdom in the second layer of protection, and the monomers were still like headless flies, he was a little uncertain.
Now seeing that each of these four IPs has a certain degree of intelligence and knows how to cooperate with each other, this allows him to preliminarily determine that the one who launched the attack on his firewall is likely to be his old friend Sardin in Blackskull back then.
And judging from the current situation, although this attack method of his old friend has not been successful, he already has strong personal characteristics, so since it is possible that an old friend is coming, shouldn't he say hello to the other party.
But this guy is now hiding behind a large group of dense sardines, if you want to greet him, you need to find him out from behind the sardines first, then anti-tracking software is naturally essential, and it is obviously not allowed to write a software now, although I have not had time to write such a software, but fortunately, I have such a software in my hand, and this software is still written by the famous snake teeth, just to use.
"Gu wolf, find me a piece of paper and a pen." Xiao Yuan instructed Gu Wolf.
"I've got it here." An employee heard Xiao Yuan's request, took out a dozen manuscript papers and a pen from the bookshelf on the table in front of him, and handed them to Xiao Yuan.
"Thank you."
Xiao Yuan took the pen and paper, expressed his gratitude to the employee, and then found a vacant seat, wrote an operation guide on top of the brush, and then called Jiang Hua over.
"Jiang Hua, you go to my mother's house, follow the steps I wrote, and copy a piece of software I put there in my computer, I can use it." Xiao Yuan commanded.
Jiang Hua took the paper, glanced at it, and exclaimed: "It's too complicated, what kind of software, you hide so deeply?" ”
"Don't ask so much, let's go." Xiao Yuan patted him on the shoulder and said.
"Okay." Jiang Hua didn't ask any more, put the piece of paper in his pocket, turned around and came to Tang Xinyu, who was still pale, and stretched out his hand to him.
"What?" Tang Xinyu was very dissatisfied with this goods now, and asked with slanted eyes.
"Car keys, didn't you hear Xiao Yuan say let me help him copy the software?" Jiang Hua said.
Tang Xinyu took out the car key, gave it to Jiang Hua, and then advised: "Drive leisurely, my car is still a new car, don't drive it for scrap." ”
"If you're not at ease, why don't you come with me?" Jiang Hua just walked to the door, heard Tang Xinyu's words, stopped, asked with a smile, and at the same time let out a roar of cars from his mouth.
Tang Xinyu seemed to be allergic to this voice, and his face suddenly deteriorated a lot, shaking his head and waving his hand again, indicating his refusal.
"Haha......" Jiang Hua laughed and left.
After Jiang Hua left, Xiao Yuan called his mother again and told him that Jiang Hua was going to his house to copy a piece of software for a while, and after making the call, he returned to Gu Wolf's side.
"The number of IPs has increased, do you want to kick them all out manually?" Gu Wolf saw Xiao Yuan coming over and asked, At this time, the number of IPs who came to test has increased a little, but a few of them are coming to watch, which is incompatible with those IPs of joint operations, and it is easy to distinguish that there are twelve IPs in joint operations now, but because these IPs are very careful, none of them touched the firewall.
"It's okay, let them make a fuss for a while, wait for Jiang Hua to copy my software, and I'll talk to the owner behind this group of sardines." Xiao Yuan waved his hand and said, now that the previous loophole in the firewall has been plugged by him, although he doesn't dare to guarantee that this firewall must have no loopholes, but if these IPs want to find new vulnerabilities, it will not be able to do it for a while.
"Sardines? What kind of fish is it? Gu Wolf asked.
"A marine social fish ......" Xiao Yuan gave a brief introduction to sardines, of course, he did not mention smart sardines.
"Oh, it's kind of like that." Gu Wolf thought for a moment about the first wave of seemingly purposeless, but it was obviously an organized attack from the group, nodded and said.
Jiang Hua didn't leave for a long time, about half an hour, and came back, at this time, the first layer of the firewall has been successively increased to hundreds of IPs to find a loophole, rushed into this loophole, and then fell into the second trap that has been patched.
Since the number of IPs entering the second layer is not too much, and the server can still hold up, Xiao Yuan re-set the firewall and let these IPs struggle in the second layer of protection, and did not clean them out immediately, but prepared for a moment of anti-tracking.
At this time, Jiang Hua came back.
"Xiao Yuan, you want the software."
Jiang Hua handed a floppy disk to Xiao Yuan, Xiao Yuan took it and put it into the computer's floppy drive, copied the spyadre written by the snake tooth to the hard disk, and then set it up in the control window of the firewall, and directly placed the spyadre on the interface of the anti-tracking module reserved on the second layer of protection, so that spyadre temporarily became the anti-tracking module of the firewall, which can work with the second protection of the firewall, and the anti-tracking will also be carried out automatically with the firewall.
Here, Xiao Yuan has to admire the programming ability and some good habits of the snake teeth, a small anti-tracking tool, even written as an open type, reserved with a very flexible programming interface, so that other users can integrate this software into a larger software at will, become a functional module of larger software, if it is software written by ordinary people, I am afraid that these will not be considered at all, then Xiao Yuan wants to carry out anti-tracking, I am afraid it will take a lot of work, and it will not be so automated now.
Of course, Xiao Yuan also has such a habit, when writing some code, if possible, often write the software as open, such as the second protection of the firewall, although the time is limited, I didn't have time to write the anti-tracking module, but there is a reservation for such a module to insert the interface, for example, Xiao Yuan writes the software as a structure similar to the plug-in board, and the software of the snake tooth just brings a plug that can adapt to the plug-in board, both of which are indispensable.
After making the configuration, Xiao Yuan activated the anti-tracking function reserved for the second layer of protection of the firewall, and spyadre also started, and a new window popped up on the computer monitor, and a large number of network packets began to scroll rapidly in it, conducting anti-tracking analysis of the source of all these sardines.
After about ten minutes, Spyadre's anti-tracking analysis suddenly stopped, and a nominal red IP address was left at the bottom of the window, and the address of the other party was found.