Chapter Seventy-Five: Tool Technology

After knowing the ins and outs of the matter, Lin Yu was also a little speechless

Didn't this little kid look for his own death, and dared to snipe the peripheral members of the Yaqi Group alone, and sniped twice.

The most important thing is that she sniped others, and even knew that she didn't find someone to answer her, so she wanted to be a lone wanderer.

And a lone wanderer like her, who has no backing, specifically provokes the arrogant behavior of a hacker group, and no hacker organization can bear it, and will definitely chase her frantically.

If she is tough, others can't do anything about her, so she can only run away after she provokes her.

But the problem is that with her skills and escape speed, she also dares to provoke a hacker group.

I have to say that this little brat's head is really iron.

However, with her age and temperament, it is normal to do such hot-headed and reckless things.

After all, they are young and frivolous, young people who don't know the height of the sky, and compared with those adults who have experienced social beatings, they naturally lack a sense of sophistication and stability, and they are frizzy no matter what they do.

Retracting his divergent thoughts, Lin Yu glanced at Su Muxin and said lightly: "Next time, learn to be smart before provoking the Baqi Group, remember to say hello to the members of the Edge Group or other hacker friends in advance, and let them pick you up, so as not to happen again today." ”

In fact, Lin Yu has no objection to her participation in the green war between hackers.

Because he knows that there are only two ways for ordinary hackers to improve their level and technology.

The first is to be like an ascetic, endure loneliness, and constantly delve into hacking techniques in the 26 boring English letters.

The second is to experience the green war between hackers, and break through their own technical bottlenecks by constantly fighting with others.

Of course, in fact, there is an alternative way, that is, there are hacker masters who teach each other one-on-one, and teach each other all their technical understanding and experience without reservation.

However, even this method does not guarantee that the taught person will be able to become a hacker 100% like a master hacker.

Because everyone's talent is different, for example, some hackers are born with strong mental arithmetic ability.

This ability allows them to easily do things that ordinary hackers simply can't.

It is precisely for these reasons that there are only a handful of highly skilled hackers in the hacking world, and basically, the skills of most other hackers are relatively sparse and ordinary.

That's why in the green war between hackers, it doesn't matter if there are too many people, only strong technology is king.

After listening to Lin Yu's words, Su Muxin couldn't help but look at him with a stunned face.

She originally thought that Lin Yu would say that she was in trouble today, and she might even reprimand him in a stern tone.

However, she never dreamed that Lin Yu not only didn't say anything about her, but carefully told her to pay attention next time?

Oh, my God! I guess I heard it wrong!?

When did Uncle become so good?

Seeing Su Muxin in a daze, Lin Yu raised her eyebrows, thinking that she hadn't heard what she said at all.

And just as Lin Yu was about to speak again, a familiar alarm sound came from his computer.

Seeing this, Lin Yu's face was a little surprised, and he immediately turned his gaze to the screen.

With just one glance, Lin Yu found that someone on the other side was connected to each other's system, and then launched an attack on his firewall together.

According to the intensity of their attacks, the time interval, and the changes in the number of data flows, the analysis tools connected to the firewall in the computer have preliminarily determined that there are about 20 people on the other side.

And their attack method is a hybrid attack, which means that there are not only DDOS attacks, but also the attack patterns of the old hackers.

These people should all be members of the Baqi Group that Su Muxin said, and they should all be external members in this situation.

Because if it's an internal member, it's basically an old bird-level hacker.

When it comes to hacking into other people's servers, they generally use their own attack patterns.

Because their attack patterns are far more powerful than DDOS, which sends malicious packets all the time.

Of course, this only refers to some special aspects, and it is not to say that DDOS attacks are inferior to the attack patterns of veteran hackers.

It can only be said that each has its own advantages, in simple terms, one is to cover the fire with quantity, and the other is to use quality to carry out a nuclear attack.

Well, very vivid.

Lin Yu glanced at the green data bar in a certain program on the screen, and it was showing that the security level of the firewall was 99%.

In addition to this, another program shows that two old bird hackers have broken into the second line of defense,

The alarm just now was made because of these two intruders.

Just when Lin Yu checked the situation of the firewall, Su Muxin on the side also came back to her senses, panicked and didn't even have time to put on her shoes, stepped on the sofa barefoot, and ran over quickly.

She also heard the alarm just now, which means that the leader of the Yaqi group who was chasing her just now was attacking the uncle's firewall.

Once the uncle's firewall is breached, their real IP address will still be exposed, which is just the difference between a faster and a slower.

Soon, Su Muxin came to Lin Yu's side, she hurriedly leaned her little head over, and looked at the computer screen with a nervous expression.

It's just that when she saw the dense and nearly twenty shrunken program windows on the screen, she couldn't help but be stunned for a moment, and then subconsciously burst into a foul language: "I'm grass!" Uncle, why did you open so many tools! ”

"With so many tool windows, how can you be busy organizing a counteroffensive, if the firewall is breached, we will die!"

At the end of the words, Su Muxin's tone became even more anxious.

She didn't expect that it was already such a moment of crisis, and the uncle didn't focus on the main tools such as attack and defense, but turned on all the tools on the computer.

You must know that doing this kind of thing at this time is no different from looking for death!

Hearing this, Lin Yu just glanced at this little kid who couldn't hold his breath at all, and then calmly picked up the teacup from the table, and said slowly: "Didn't you find that they are all running autonomously, and you don't need me to give any instructions at all." ”

Hearing this, Su Muxin also reacted, she looked at the various tool windows running on the screen, and then looked at Lin Yu, who was drinking water without any operation, and was a little stunned for a while.

At this moment, she only felt that her cognition of hacking tools seemed to collapse in an instant.

The reason why a tool is a tool is that it needs the user to use it in order to perform its proper function.

Just like a person holding a pistol, when facing the enemy, when to load, when to load, when to fire, someone needs to give instructions.

But now, Lin Yu's tools can run automatically, just like an intelligent pistol, they don't need to be controlled by people at all, and they can make the best choice according to the enemy's situation.

Such a powerful tool, Su Muxin has seen it for the first time.

After a while, Su Muxin came back to her senses, and immediately seemed to think of something, looked at Lin Yu with glowing eyes, and said with a smile: "Uncle, I ......"

"What, want to learn?"

Before Su Muxin could finish speaking, Lin Yu chuckled and said what she wanted to say later.

"Uh-huh! I want to learn! ”

Su Muxin nodded hurriedly, staring at Lin Yu with blazing eyes.

This kind of tool technology that can run autonomously is something that any hacker wants to learn, how could she not want to.

Looking at her impatient appearance, Lin Yu hesitated for a moment, and then said slowly: "At present, this self-running program can only be used on the firewall, because it still has shortcomings in attack after all, and it is impossible to be flexible and changeable like a human, which is also the only shortcoming. ”

Saying that, Lin Yu was also a little emotional.

The related programs and codes contained in this tool technology were all completed after opening the [Super Brain] to reach the near-god-level computer technology, so it is flawed.

If Lin Yu's computer technology reached the god level, then he would be able to completely perfect this tool technology.

Regarding what Lin Yu said, Su Muxin not only did not feel lost, but was even happier.

Because what she is not good at is defense, and this new tool technology is a perfect match for an offensive hacker like her!

It's just that Su Muxin seemed to think of something, and hurriedly asked: "By the way, uncle, your firewall composed of self-running programs is not powerful, it shouldn't be a half-finished product." ”

Hearing this, Lin Yu just smiled, and then controlled the computer to display a certain program on the screen separately.

In the program, the two can clearly see that the four data streams are playing against each other.

It's not so much a battle as a one-sided crush.

Because two of the data streams are overwhelmingly dominant, the attack data streams are divided into different attack patterns, and the other two data streams are constantly bombarded.

The other two data streams were hit without a backhand, and could only barely defend against the opponent's menacing attack, looking precarious, like a ship that could be overturned at any time in a stormy sea.

"Uncle, I know these two data streams are hackers from the Yaqi Group, but what are the other two data streams?"

Su Muxin pointed to the two data streams codenamed "1" and "2" in the program, and asked curiously.

"These are the slaves, I connected them to the tools on my computer, and once they found an intruder, they would run automatically until the intruder was destroyed." Lin Yu explained simply

Su Muxin: "?! ”

These two data streams turned out to be slaves?!

It is said that it can only be used on the firewall to defend it, but how can it become an attack all of a sudden!

The most important thing is that if she is not mistaken, the attack strength of these two secondary machines can crush the old bird hackers!

This is too strong!!