Chapter 521: The Storm Is Coming (2500 Monthly Passes and Changing Monthly Tickets)

Hackers go head-to-head with each other, rarely on a large scale.

Because once these aspects are involved, if the damage is too severe, it is easy to attract the attention of a country's government, and if it is not necessary, all hackers basically dare not do it.

Secondly, the network services provided by communication service providers are also the basis for hackers to exist freely on the network, if they are damaged, if their information in some broilers is intercepted, then it will be very simple to find you in the future.

In modern society, it is becoming more and more difficult for hackers to hide their identities, and many hackers can hide them because they are low-key enough, but you have to say that they are completely covered, unless they don't check you, and they really can't run away, which is different from previous years.

A few years ago, there was still a lot of information that people didn't connect to the Internet, but now all the information is connected to the Internet, and they can't run.

Of course, this result actually amplifies the power of hackers, but now there are fewer and fewer hackers who can influence the whole picture.

Thor took the Avengers' chat room offline, but quickly and carefully scanned his computer again to make sure there were no problems before he opened another separately connected instant messaging system.

"Cass, for help, are you there?" Thor sent a message directly to the dark avatar.

After sending it, he was waiting silently, the hacker world has been silent for a long time, and more and more hackers are getting older and older, and they are no longer as arrogant as when they were young, which is one of the reasons why many hackers have begun to keep a low profile.

As for the hackers in the new era, it's not that there are none, but the times are different, the values are different, these hackers in the new era are a little more high-profile, and the environment in which they have lived since childhood is linked to the Internet, so some of their outstanding experiences when they were children have already been recorded.

Although most of them are high-profile, they can't mess around, because their information is filed with these special departments of the FBI.

In fact, the more active on the Internet are still some hackers who have been active since the beginning of the century, and most of these people are in their teens and twenties at the time, and most of them are already over middle age at this moment.

"Yes, what's wrong?" After a long time, a message popped up.

"Man X asks for help, a guy stole their department's classified fighter launch data, they're tracking each other's programs, and now the two sides are facing off on a library server, and so far, all of our attacks have been blocked by the other side."

"The entire system is extremely safe to be repaired by the other party, and we don't have a good means for the time being, unless we directly use violent invasion to take advantage of our superior numbers."

Thor quickly recounted the situation he had encountered to the other party.

The other side was silent for a while, and then he spoke: "Thor, forget it, if the other party dares to confront you, he will have absolute confidence, you can't catch him, and now there is no simple hacker who dares to play like this, I'm old and don't want to participate." ”

"That's it, by the way, you can tell man X exactly what I say, and you should be careful yourself."

Leaving a sentence, Cass's figure directly dimmed, showing that it was offline.

Looking at the dialog box, Thor was silent for a moment, and then didn't speak, just copied the relevant content and forwarded it to Man X, and then he cleaned up his traces, which broke the connection with Cass.

Texas, inside an ordinary farm.

A 40-year-old middle-aged man with thin blond hair is sitting in front of the computer and pondering at the moment, saying that it is a computer, but this room of at least 30 square meters is full of chassis, monitors, etc., showing that the owner here is not an ordinary farmer.

After hesitating for a moment, the middle-aged man directly opened a program on the desktop, and then his hands quickly tapped on the keyboard, and his computer screen immediately began to change rapidly.

Jiang Yanhai didn't make much action at the moment, although these people outside were constantly testing the firewall, and even they pulled out some software to continuously simulate attacks, at this moment, this server was attacked at least tens of thousands of times per second.

If you simply use the amount of computing on the server, it will definitely not be able to calculate, but at this moment, Jiang Yanhai has a total of four supercomputers behind him, one of which is currently one of the top three supercomputers in the world.

Other hackers don't have this treatment, and they can't have this treatment, even the security personnel of some important departments can't let some supercomputers do this, because the power consumption of supercomputers every day is a terrifying number.

Therefore, it almost has computing tasks every day, and it can't be wasted.

If it weren't for the coincidence of this incident, Jiang Yanhai would not have had the opportunity to directly use the two supercomputers, and of course, if it was elsewhere, there would be no difference in his use of electronic warfare programs.

"X man, Cass refused, he said let's withdraw, the other party dared to be tough with us here, he should have been prepared a long time ago." Although Thor had already sent the chat history to Man X, he still spoke.

Man X was silent for a moment, and said with a wry smile: "I'm different from you, forget it, you can leave if you want." ”

“SH! No, today Lao Tzu will give you a face, help you decide, I don't believe it, there are still people running on our heads to spread wild, doesn't he know that this is our territory? Thor roared directly, and then started to do the same directly.

"Thanks, brother. Now I'm assigning a task, and three people on my side will launch mail bombs and DDOS attacks and other brute force attacks, slowing down the response and computing speed of the opponent's server, and you will take the opportunity to attack the enemy's vulnerabilities from multiple angles. Thor said in a deep voice.

"No problem."

Several people in the chat room spoke one after another.

As they made up their minds, everyone immediately began to do things like crazy, especially on the side of man X, with the help of several large workstations and servers that were called, a massive number of tidal attacks began to frantically rush to the servers of this public library.

Hundreds of thousands of access requests were made to the server in an instant.

"Tsk...... Sure enough, violence is a tendency in human bones, and he says he doesn't want to, but his actions are very honest. Jiang Yanhai smiled.

DDOS attacks, commonly known as tide attacks, or mail bombs, etc., anyway, in a word, it is to use countless spam information, copy access, crazy clogging your computer computing speed, clogging your network channel, that is the sentence, in the hacker world, this is a profiteering attack.

More than a decade ago, this was a practice that was despised by the hacker community...... Because hackers play with technology, this kind of crude attack method does not reflect any technology at all. 8)