157 New approach
Lin Feng bought the Yinhe 2 supercomputer, one of the purposes is to use it for data computing, and the other is to use hacking technology to steal those secret information and make the database of the intelligent system more comprehensive.
The means of hacker attack are generally divided into four types.
First, backdoor procedures.
Second, the information bomb.
3. Denial of service.
Fourth, network surveillance.
And the method that Lin Feng intended to use before was the second method, the information bomb.
Information bombing refers to the use of some special tools and software to send a large amount of information beyond the system load to the target server in a short period of time, resulting in overload of the target server, network congestion, and system collapse.
This is also one of the most conventional hacks.
With the help of the Galaxy 2 supercomputer, the information bomb is the best means of attack for Lin Feng, a fool-like data flow impact, low difficulty and good effect.
But now.....
"Let's still monitor traffic, I'm not used to being disturbed!"
Lin Feng sighed and had to make a compromise, but at the same time of compromise, his heart was as aggrieved as when Chixiao's backstage authority was stolen.
"Xiaofeng, thank you for your understanding...... Then I'll talk to Shi Wei later, and after the installation is completed, I'll go back to the branch! ”
Lin Guoxiang said stupidly on the phone, and at the same time reminded Lin Feng: "The commendation meeting will be held in five days, don't forget to come and participate then." ”
"Hmm!" Answered, Lin Feng hung up the phone.
Turning around, he looked at a group of workers unloading computer components and was in a bad mood.
"Lin Feng, what's wrong with you?" Zhao Feifei noticed that Lin Feng's face was wrong, so she asked with concern.
"Nothing!" Lin Feng waved his hand, "I'll go back to the office first, and think of something!" ”
"Good!"
............
After returning to the office, Lin Feng turned over the personal computer, 195M hacker learning materials, and couldn't help but slowly fall into deep thought.
Since the information bomb method cannot be used, then there are only three other ways to choose.
Backdoor, this one is unlikely.
Generally, after the program is designed, it is necessary to remove the backdoors of each module, but sometimes due to negligence or other reasons, hackers will use exhaustive search methods to find and exploit these backdoors, and then enter the system and launch attacks.
But this attack method can only be applied to ordinary servers, and it is unlikely to be possible for military servers.
Network surveillance is also not appropriate, because what Lin Feng wants to do is to steal data, not to spy on other people's computers.
Then now there is only one last option left.
Denial of Service.
Denial of service, also known as distributed DoS attack, is to concentrate a large amount of network service bandwidth to attack a specific target, so it is extremely powerful, and can exhaust the broadband resources of the attacked target in an instant, resulting in server paralysis.
A distributed DoS attack is to concentrate a large amount of network service bandwidth to attack a specific target, so it is extremely powerful, and the target can be exhausted in an instant, resulting in server paralysis.
This attack method, to put it simply, is like the target server is a restaurant that can accommodate 100 people, so two hundred people in black rush in at once, half of them occupy the restaurant position, and the other half are waiting outside the door, but these people in black don't order a single dish, so other diners can't eat when they arrive at the restaurant.
But in this way, you need to remotely control other ordinary computers to play the role of the man in black, and these ordinary computers are commonly known as meat machines.
The broadband traffic of ordinary meat machines is generally 1MB-3MB, and if tens of thousands of meat machines access a point at the same time, then the general server is prone to crash.
But the information that Lin Feng wants to steal is definitely not stored in an ordinary server, and he estimates in his heart that at least more than 100,000 meat machines are needed to achieve this goal.
However, there is still a process of assimilation between the host and the meat machine, and it would be too troublesome to break through ordinary computers one by one and obtain the superuser rights of these computers.
Or use a proxy server, a meat machine that is temporarily remotely controlled, can also meet Lin Feng's requirements, but the secrecy is too low and it is easy to be discovered by the target.
Therefore, Lin Feng is going to write a worm virus, so that this computer virus can become the lead for the host to manipulate the meat machine.
And the transmission traffic of this lead must also be below the value of traffic monitoring.
Thinking of this, Lin Feng immediately sat up straight, put his hands on the keyboard, and crackled......
.......
Five days later, the commendation meeting was held as scheduled.
Lin Feng also rushed over, went to the stage for a turn, and maintained an immature commercial smirk in the spotlight.
If he could, he really didn't want to laugh so awkwardly, so he asked the reporter to cut out the picture later and upload the news.
But the eager gaze of dozens of other branch drivers at the scene did not allow him to do so.
After a full hour, the ordeal was finally over.
After that, it's time for the driver to communicate privately.
"Hello, we are the [Raging Polar Bear] pilot, thank you for your help last time."
"Huh!" Lin Feng smiled awkwardly, he didn't know him at all.
Although he had a relationship last time, it stands to reason that Lin Feng should recognize him, not to mention that he also has the ability to never forget.
But Lin Feng has a habit of taking care of things that he doesn't care about, and after taking a look, he automatically removes his memory, so as not to occupy brain space.
This kind of memory is selective, so Lin Feng distinguishes strangers he doesn't care about, and is used to only remembering the color of their clothes, not their appearance.
This may be the legendary face blindness.
After shaking hands with the drivers of the Beihai branch, the drivers of other branches introduced them one by one.
“.... We are Australian branch drivers, nice to meet you! “
“.... We are the drivers of the Toyo Branch, hello Lin Fengjun! ”
"We are North American division drivers...."
........
Ten minutes passed, and when the introduction ended, Lin Feng didn't remember any of them, and his mind was full of writing virus code by himself.
But this exchange meeting has really begun.
"Lin Feng, can you tell me why you can make so many unexpected movements when you are piloting the mecha?"
Someone takes the lead, and someone agrees.
"That's right, like that Holy Cross Slash, there's no one in the preset program!"
"[Tiger Guard] is a third-generation mecha, a simulation system, and can make those incredible actions, is it related to the simulation system?"
"I think it's more because of the one-man operation. Tandem driving, you can't do those movements at all, it's too difficult. ”
.........
At the beginning, the exchange meeting changed its taste, more like a group of students begging Lin Feng, the teacher, to answer their questions.
"Huh!" Lin Feng showed a mysterious smile at the group of pilots in front of him, then stretched out his finger and replied seriously: "As for why I can drive the mecha to make so many unbelievable movements, the reason is very simple!" ”
Pointing to his head with his finger, Lin Feng smiled and said, "Read more books, read more newspapers, eat less snacks and sleep more!" ”
After speaking, Lin Feng squeezed through the crowd and left without looking back, leaving only dozens of other branch drivers with a confused face, as well as the three Lu Ming brothers with an indignant face.