Chapter 522 - The Great Gods of All Walks of Life (3000 Monthly Passes and Changing Monthly Tickets)
Jiang Yanhai took a deep breath, such an attack, to a certain extent, is a way when there is no way to break through the enemy's computer.
Because of brute force attacks, server computing and so on will inevitably be violently impacted, and at the same time, the network speed will also be impacted, but the network speed is not actually a problem.
Servers like this for public libraries, although garbage...... However, its network private line is still very fast, and for modern network private lines, if you want to clog the network with tidal attacks...... You don't think it's going to take a few supercomputers to do this.
Jiang Yanhai took a deep breath, and quickly operated on the computer with both hands, similar access requests were directly cloned and removed, and four supercomputers assisted in taking over part of the computing of this server, which was a drizzle for supercomputing.
He's already discovered that underneath these tidal attacks, there are people constantly trying to break his firewall, trying to break the firewall permissions.
DDOS attacks and mail bombs have been dealt with by him, and they can be operated by supercomputing and firewall cloning, and he directly starts to deal with these people who are trying to break through the firewall, in the strong firewall, if you don't have anyone to operate, just let a bunch of top hackers attack there, sooner or later it will be breached.
I often see the news that how many times a company's firewall has been hacked, it is all controlled by security personnel behind it, and if there are no security personnel, it would have been breached a long time ago.
For these people who tried to attack the firewall, under Jiang Yanhai's response, they had no way at all.
Jiang Yanhai pondered for a moment, he couldn't defend passively like this, this was too easy for them, and after thinking about it, Jiang Yanhai simply released his anti-tracking program directly.
They are constantly trying to attack the firewall, which means that they must have data exchange with the server, and once they have data exchange with the server, the anti-tracking program will bite it instantly.
The anti-tracking program has already started to reverse track and invade the other party's data flow, but at present, they have not seen anyone find out, which makes Jiang Yanhai more confident in his program.
It seems that the strength of these hackers is currently at this level, and they are still far from the hacker who wrote the super virus.
A total of two super viruses were discovered, the first virus was found in an unmanned stealth fighter, and for the time being, Academician Bai gave the code name "stealth bomb", and the name was based on the virus bomb it was set up in the unmanned stealth fighter.
Another widely spread super virus discovered by Jiang Yanhai, codenamed "Ghost", is named according to its characteristics, anyway, it was not discovered before Jiang Yanhai discovered it.
Jiang Yanhai seriously suspected that the compilers of the two viruses were one person, because they were really very similar in some characteristics, and even if such viruses were not written by one person, they were definitely related to one person, and it might be similar to the relationship between master and apprentice.
So if you catch one person, you may find another person, but at the moment, it seems that this person is not an American? Otherwise, why is there more ghost virus in the United States?
"Ding" A bright red warning prompt box appeared on Jiang Yanhai's screen, when he saw this prompt box, Jiang Yanhai was stunned for a moment, this warning can only be prompted after someone breaks through the first layer of the firewall, and triggers the second layer of the real core defense.
Just now, those people didn't even break through the first layer of firewall, and suddenly someone directly began to crack the second firewall?
Jiang Yanhai instantly tapped a few keyboards on the desktop, and a data stream appeared directly in his monitoring, at present, after he broke into the first firewall, he was facing the second firewall, but before the second firewall, Jiang Yanhai also built a virtual system.
He now got into this virtual system, as if he had drilled into a sandbox, Jiang Yanhai directly controlled the firewall and several locking programs, and instantly began to capture the data stream of the counterattack.
The anti-tracking program under Jiang Yanhai's operation was faster and the breaking program was stronger, and it grabbed this data stream almost instantly, and then tracked it out directly.
Jiang Yanhai followed it without hesitation, and with those people in front of him as an example, he understood that the one who could touch his first-layer firewall was definitely the master of the masters.
This may be the legendary boss!
Texas, inside the farm.
Cass's computer blared with a screeching alarm.
The sound of the "Didi......" alarm made the cold sweat on Cass's forehead break out instantly, he had just quietly broken through the enemy's first firewall, but before he could make any move, the second firewall came directly.
“fu!” Cass burst into a foul mouth, and his hands instantly began to tap on his computer, and after frantically switching a few pages, he directly activated several broiler firewalls behind him in advance.
The offensive of enemy tracking is too fierce to run at all, and hackers like this don't mean that you find that the enemy is tracking you, and you can go offline directly in an instant, if you really do that, you will be found directly to find the door.
You should know that whether you use broilers or other ways to log in to some computers, you will leave a system log, which is unavoidable.
If you want a clean retreat, you'll have to clean up all these system logs and so on, and then retreat so that the enemy can't track your location.
But if you don't clean it up, just go offline, all the computers you have connected to the data have your login information, as long as you look them one by one, you can instantly lock your real location in reality.
And if a hacker is known to have a physical address in reality, it is really a plucked phoenix is not as good as a chicken, and you will either obediently work in major security companies in the future, or you will honestly and directly help the government like an X man.
Otherwise, everything you can do in the future will be restricted.
Just like the Thomas Gable mentioned by Jiang Tao before, when he was executing the plan, the FBI recruited hundreds of hackers across the country at least at once to inquire, but some of these hackers were directly killed in advance.
And the rest that weren't killed were all those who didn't help them, or just some insignificant little characters.
Cass began to sweep his ass at a blistering speed, but he found that he wasn't doing it fast enough, and the cold sweat on his forehead instantly fell. 8)