066 This is the Immortal Forum, right?

Most of the people who mingle in the March forum are technical experts, and of course they don't all like the only moderator of the forum, and they are also the builders of the forum. But even those who hate the style of Lord March are not likely to show it on their lips, but they are still very convinced by March's superb skills and keen sense of smell.

No way, hacking is really tried.

Being able to find out the March Adults from the Internet can be said to be something that every member of the March Forum has been trying to do. And if you try it, you know how hard it is, anyone who goes online will leave a trace, but this March adult is like he has never left a trace on the Internet.

Whether this is accurate or not, it should be said that every time you track down, you will eventually reach a dead end. What makes these people feel even more unhappy is that March seems to like to deal with funeral homes very much, and 80% of the final clues are broken on the server of the official website of a funeral home in a certain place......

Some people see it as a warning, others see it as a provocation, but in any case, the anti-tracking and hacking skills of the March Adults are extremely sophisticated, and there is already a consensus among the members of the March Forum.

Such a tech guru suddenly pinned a post containing an algorithm attachment, and almost spared no effort to praise the algorithm, which naturally aroused the curiosity of almost everyone in the forum.

You must know that the March White Guest Forum is definitely one of the most active forums in the world. Even if there are 20 or 30 percent of the members, who rarely bubble up, they log in every day and peep at the screen, and even for many people, this is one of their daily jobs.

Take a salary bubble technology forum.

So naturally, after the source code was uploaded, it was downloaded more than 1,300 times within an hour with the comments of the adults in March.

Don't be afraid to know how to use it.

When together with the source code, there is also an outrageously detailed documentation, still bilingual in Chinese and English, detailing the functions and characteristics of the algorithm and how to lay out the test system environment, as for what method to test and how to test, that is the downloader's own business.

FOR EXAMPLE, THE ALGORITHM FUNCTIONS INCLUDE HELPING THE WEBSITE COMPLETELY DEFEND AGAINST MALICIOUS CRAWLERS, EFFECTIVELY PROTECTING AGAINST DDOS ATTACKS WITH AN EFFECTIVE PROTECTION RATE OF MORE THAN 95%, AND SUPPORTING A VARIETY OF NETWORK ENVIRONMENTS.

Of course, the document also solemnly reminds that the algorithm source code can be downloaded and tested and used by researchers for free, as long as it is not used for commercial purposes, it can be used for free forever. However, if it is used for commercial operations, you will need to purchase an activation code.

The prompt is in 12 major languages of the world, including Chinese, English, French, German, Korean, Japanese, Spanish, Arabic, and more......

At the same time, the document is rigorous enough to explain and define various commercial use cases in great detail.

For example, what is the price of directly using packaged software to protect your website from attacks; If the algorithm is applied to network equipment, what is the price of making network switching equipment have the ability to block malicious crawlers and defend against DDOS attacks?

Of course, I didn't forget to leave an email address at the end of the document for easy contact. The mailbox naturally uses Ning Xiao's personal mailbox, and it is also Ning Xiao's only email address. The contact email address when submitting the manuscript to the Annals of Mathematics was the same.

……

Tan Ming is carefully reading the documentation of the turbulence algorithm. As a member of the network equipment division, he belongs to the pilot system department of Huaxia Youwei Company.

The full name of the pilot system in Youwei is the intermediate trial production department, which is a department between the R&D system and the production system. This roughly means that the new product will be trial-produced first, and after confirming that there is no problem, it will be handed over to the production system for large-scale production.

In short, this is a department that does dirty work, and the treatment is definitely not as good as that of R&D posts, and even some positions are not as good as the production system.

Fortunately, the technology stored in the promising network equipment has matured over the years, and there are far fewer things than in previous years. It's just that within Youwei, less can only be said to be relative.

It's like Tan Ming, he was assigned a job to keep an eye on the March Forum.

Now it seems to be valuable, for example, this turbulence algorithm is very interesting to look at, and it can defend against more than 95% of DDOS attacks.

For people outside the industry, most people probably don't understand what this concept is.

In fact, cybersecurity risks have never stopped.

In particular, the servers of various games and financial systems are the hardest hit areas.

Tan Ming has been paying attention to various security reports released by the Cyber Security Alliance, such as the DDOS Attack Security Report, and the data is not optimistic. For example, the report for the first half of this year shows that more than 160,000 DDOS attacks have occurred in China alone, an increase of 176% year-on-year, the total number of attacks with a peak of 50-100Gbps increased by 136% compared with the first half of last year, and the number of attacks with a peak value greater than 300Gbps increased by 511.2% year-on-year in the first half of the year.

Of these attacks, 14% of the C&C controls are located on cloud hosts. The well-known cloud servers in China are involved, and they also include Youwei Cloud. Not only that, these attacks have begun to involve the field of the Internet of Things, which has begun to be laid out.

As for all kinds of malicious web crawlers, it is a headache for countless technicians.

Crawler technology is already public, and it is needed, and search engines must use this technology in order to provide services. It is nothing more than the difference between good intentions and bad intentions, and how to distinguish them is a world-class problem.

So you can imagine how intense Tan Ming's inner activity was at this time, which was reading the instruction document at this time.

If the technical parameters given in this document can really be realized, it means a real comprehensive upgrade in network security protection, and the IP/TCP protocol vulnerabilities that were almost unsolvable can finally be filled.

ACCORDING TO THE DESCRIPTION IN THE DOCUMENTATION, A HIGH-TRAFFIC DDOS ATTACK WILL ONLY CAUSE SHORT-TERM NETWORK FLUCTUATIONS, AND CAN ONLY BE SHIELDED BY THE ENVIRONMENT WITH A TURBULENT FLOW ALGORITHM. These spam messages will no longer be responded to by the server, and the three-way handshake will be cut off. The chance of a misjudgment will be kept below one in a trillion.

After finally reading the document carefully from beginning to end, Tan Ming immediately opened WeLink and prepared to shake people.

As an old man in the industry who has been in the industry for more than ten years, Tan Ming certainly understands the weight of this algorithm. In fact, this is probably the meaning of keeping him on the forum every day.

It is no exaggeration to say that this thing can directly change the current landscape of Internet security around the world. He couldn't estimate the exact value, because it was astronomical, and he couldn't even figure out why the author would just throw it on the forum......

What is this March forum, this is the fairy forum!