Chapter 810: Blame
In the face of the overwhelming flood attack, Feng Xiaotian's defense line was instantly overwhelmed, and he immediately turned around and fled.
There was no way, he was only one person, and he only had a computer in his hand, and in the face of such a huge flood attack, the strength of a single person was simply unable to resist.
The best way to face the flood attack is to use the flood attack to counterattack, which is commonly known as the needle point to the wheat mang, and now the examination is not pure hacking technology, but to see if the number of broilers in your hand is enough. Ordinary hackers basically have broilers, and the vast majority of these broilers are ordinary computers with very average performance.
There are very few powerful hackers, and their broilers are generally high-level computers. Of course, these computers are not theirs, but they have been secretly captured from major companies or major scientific research institutions.
Feng Xiaotian is the first person in the hacker world, how many broilers does he have? Ridiculously speaking, the answer to this is zero.
Feng Xiaotian has always been extremely disdainful of using flood attacks to defeat his opponents, preferring to use pure hacking techniques to fight his opponents. Feng Xiaotian felt that the flood attack method was too untechnical, except for the fact that it looked like a wind when attacking, the flood attack mode was no longer desirable, which is why he didn't have a broiler until now.
In order to deal with possible flood attacks, Feng Xiaotian opened the Qiankun mobile software-for-tat, in the face of flood attacks, Qiankun mobile software can take a good defense, so so far he has never been defeated by flood attacks.
However, Feng Xiaotian doesn't want to use Qiankun big transfer software now, since he became famous, Feng Xiaotian has become low-key, he is no longer the fledgling teenager, he doesn't bother to do things that are in the limelight, and he pulls hatred everywhere, Feng Xiaotian can avoid it, he feels that this is a must-have for mature hackers.
In particular, the other party has prescribed this kind of intelligent program. Feng Xiaotian is even more careful, this shows that the other party's strength is not weak, and he shows his identity for no reason to provoke a strong enemy, which is obviously not something Feng Xiaotian wants to see.
Since the other party has launched a flood attack, and Feng Xiaotian doesn't want to use the Qiankun Great Movement software, how can Feng Xiaotian deal with it? Feng Xiaotian's first thought was to capture the computers, and then control these computers to attack the flood-for-tat and kill the other party.
This is a decent way to deal with it, and countless hackers are using it, so Feng Xiaotian naturally has no worries. He kept scurrying around the network to dodge the other party's flood attacks as he began to pick his prey.
Feng Xiaotian naturally couldn't capture those ordinary people's computers, he felt that if he wanted to do it, he would do it, and the computer was definitely the best choice.
Feng Xiaotian fled while looking for a target, and soon, he appeared with a target that he could start, and this object was the American Computer Security Center.
In the beginning, Feng Xiaotian and passive intelligence programs were playing against each other on the European network. Later, under his attack, the passive intelligence program retreated, first from Europe to the United States, and then was beaten back to Seattle, the stronghold of Satan and Kevin.
The passive bot was already in the Seattle network at the time of the flood attack. Feng Xiaotian also pursued here, but unfortunately, the US Computer Security Center happened to be in Seattle, and Feng Xiaotian appeared very easily under the chaos of this prominent unit against global hackers.
Even more unfortunate. Feng Xiaotian once infiltrated the US Computer Security Center, and he was very familiar with the defense system of the US Computer Security Center, and also left a backdoor in the opponent's defense system. If Feng Xiaotian wanted to infiltrate here again, he wouldn't need to spend any effort to crack the opponent's defense system again.
Feng Xiaotian's hands tapped the keyboard at a very fast speed, and at the same time said with a smile on his face: "Let's use you as a shield, I wonder how you will feel after seeing this prominent unit?" ”
This is definitely a blame, as long as Feng Xiaotian uses the computer of the American Computer Security Center to fight the other party, the other party will definitely appear in this department, will the other party think that he is a member of this department?
After Feng Xiaotian finished speaking, he immediately rushed into the US Computer Security Center, because this department is facing hackers, so its defense system is naturally not trivial, if it is not a top hacker master, there is no need to think about invading here.
The defense system of this place is composed of five high-performance level computers, and the defense system of Fengxiao Tianguan is called "Level Computer Defense Matrix", because he has invaded this place before, so he is already familiar with this place.
Feng Xiaotian invaded one of the mastermind-level computers very lightly, and then obtained the background control rights, and then Feng Xiaotian began to write counterattack instructions.
Less than a few seconds later, Feng Xiaotian gave the order to attack, and the defense matrix composed of five computers immediately burst out with extremely violent numbers! Unleashed a ferocious flood attack on the trailing passive intelligence!
It can really be said that the tip of the needle is against Maimang, neither side is good at stubble, at the moment they just encountered, Feng Xiaotian could clearly feel that there was an extremely strict lag phenomenon on the nearby network! And as time went on, this lag became more severe, and many nearby computer users experienced mass crashes, including the big shark and Professor Vincennes' personal computers.
Originally, Professor Vincent and Big Shark were directing a thousand hackers to attack Berg's computer, and they had already determined that the other party was God, and the new hatred was added to the old hatred, which made Professor Vincent and Big Shark determined not to stop until they reached their goal.
However, thousands of elite hackers have been attacking for such a long time, and the result has made Professor Vincent and the big shark fall through the eyeballs, if you summarize the hackers' attacks in two paragraphs, it should look like this:
-- The hackers' attacks were very smooth and ferocious, they took full advantage of the strength of the number of people, adopted a brazen attack mode, and used all the methods they could think of, and the scene was very lively, which can really be called a gluttonous feast in the hacker world!
-- The hackers who are attacking are very depressed, and all their attack methods have no effect in the face of the big bad wolf and the big mobile software. If it is a single attack, the big bad wolf software will completely resolve it, and if it is a flood attack or a virus attack, the Qiankun big mobile software will immediately send them to other places, so that these hackers have a feeling of being unable to speak.
Berg's computer is like a turtle shell, which is really unimaginable for these fierce hackers!
Professor Vincennes and Shark soon found out about this situation, and the two were once again struck by the superior performance of the two pieces of software written by God, but before they could think of what to do, their computers died.
"What's going on? Why did my computer freeze? ”
The big shark looked at his computer with some confusion, and then turned his head to look at Professor Vincent.
After Professor Vincent's computer also crashed, the big shark was even more puzzled, only to see him open his eyes wide and say, "Professor, it turns out that your computer also crashed......
At the beginning, the big shark thought that the system of his computer had crashed, and then it crashed, and this situation was not uncommon, but it was relatively rare.
But after seeing that Professor Vincent's computer also crashed, the big shark felt that things were not so simple, and he just wanted to add something, only to hear Professor Vinson say in a deep voice: "This is definitely done by hackers!" ”
Worthy of being the director of the American Center for Computer Security, Professor Vinson immediately saw the essence of the matter, and after speaking, he stood up and walked out quickly, and the big shark hesitated for a moment, got up and followed him.
The two soon came to the hall outside, and as soon as they opened the security door, they heard a cacophony of voices:
"What's going on? How did my computer get so sluggish? This is the highest configuration computer of the joint software, the performance is so good, why is it so stuck? ”
"It's good that your computer hasn't crashed yet! My computer is an old IBM a few years ago, and it crashed at the first time, so it seems that it is necessary for me to apply to my supervisor for a new computer, or a computer with joint software is more reliable. ”
"Is this the time to talk about this? Hurry up, this must have been done by hackers! Damn it! They came to us to spread wild! Be sure to give him some color! ”
"Action? How to act? Now that the PCs in the entire center are either dead or just not working, what can we do? ”
"That's right, only the level computer is working normally now, let's let the people over there do their work, we can't help."
Hearing this, Professor Vincent no longer hesitated, and directly turned around and walked towards the computer control center.
The people in the control room were busy nervously, and when they saw Professor Vincent coming in, a person who looked like a supervisor immediately came over and reported: "Professor, we have suffered an extremely ferocious flood attack, and the automatic defense system has launched a counterattack, and it is still more beneficial to us at present." ”
Hearing this, Professor Vinson asked, "Are you sure no hackers have infiltrated it?" ”
The man pondered for a moment before replying, "So far, we have not seen any signs of being hacked. ”
Professor Vincent's heart was slightly relieved, and then he walked over to the level computer and looked at the display screen to observe it carefully.
After looking at it for a while, Professor Vincennes didn't show anything unusual, and he couldn't help but hesitate in his heart: Is it true that he hasn't been hacked? Who could be this guy who is flooding us? (To be continued!)
Tips: The new domain name "biquge.info" has been launched by Biquge, and the original domain name is about to be discontinued. Please tell each other, thank you!