The Strongest Hacker

Chapter 63 Rat Crossing the Street (Part 2)

Chapter 63: Rats Crossing the Street (Part 2)

"Master, the God of God has appeared." Before the news of God came back, a line of words popped out on the screen.

With a sound of "Pfft...", GOD directly sprayed the tea in his mouth all over the computer screen, not caring about wiping the water stains on the computer screen, GOD typed quickly and asked: "What did you say?! What's going on! "

After typing, GOD directly pulled out the pillow from the chair behind him, and wiped the tea on the screen and keyboard.

"Master, the God of God has appeared. Didn't you say that the person you admire the most is the God of God? Come to the school forum of University S quickly." Zero said quickly.

"What's wrong with S University?" While opening Baidu and looking for the address of S University Forum, GOD asked quickly, and while asking, GDO was depressed at the same time, who dared to pretend to be his name, wouldn't the tiger show his power , Do you really think you are a sick cat?

After Zero explained the matter to GOD, GOD couldn't help but yelled "Damn it."

But at this moment, GOD has also calmed down, and is going to look at the situation first. Although it is said that this person is impersonating his ID, but in general, the way he does things is also in line with his style, but somehow he was impersonated, GOD Naturally, it is impossible to let this person go casually, even if it is doing good deeds.

Hackers have unspoken rules of hackers, such as impersonating someone else's ID in such a matter, it is easy to arouse public outrage. In particular, the IDs of some well-known hackers are hardly faked.

The Xiaohuamen incident quickly caused a sensation in the hacker community because of the appearance of "GOD". Countless hackers crowded the server of S University, and Zhang Yang quickly discovered this situation.

"Damn it." Zhang Yang yelled, and hurriedly turned off the anti-tracking function of the firewall. In his previous life, Zhang Yang also studied the style of GOD intrusion. Although the ID of GOD has his own meaning, but more It was called out by someone else.

It also describes that GOD is like God, invading servers are silent, giving people a feeling of omnipotence. Of course, although it is a bit exaggerated, it also has a generalization of GOD's red field technology. In fact, Zhang Yang has systematically studied the methods of GOD. GOD is different from Zhang Yang. He is quite powerful in both the red domain and the blue domain.

All kinds of intrusion methods are quite familiar. With so many hackers coming, if Zhang Yang does not turn off the firewall, it will be easy to be analyzed that Zhang Yang is not a GOD. Some people in the hacker world are not just hackers, some hackers However, various countries specialize in analyzing hacker behavior and searching for these hackers. Naturally, these people's technical strength is not too bad, and they are more powerful than most hackers in that they have huge resource support.

Because of the emergence of GOD, a large number of people began to gather on the entire S forum, and soon some people put the identities of the male and female protagonists in the post video on the S forum. Human flesh search for these things is very important for these hackers It's a simple thing to say.

Looking at the post listing Pan Wenlong's identity in detail, Pan Hu, who was also concerned about this matter in the technical department, was blinded and almost passed out. Now Baiying Security is completely famous in the circle, and this person is enough to lose Big hair. Pan Hu, who came back to his senses, became a little angry from embarrassment. In fact, Pan Hu didn't know much about computers. The reason why he was able to enter the security industry was that

It was entirely because he had a considerable amount of funds at that time, and then invested in this industry.

Although he doesn't know much about technology, Pan Hu has a very good face. Now such a loss of points is more uncomfortable for Pan Hu than killing him. Pan Hu didn't blame his son, but pushed the matter away. To GOD body.

"If you take down this server for me today, I will give each of you an extra month's salary." Pan Hu said to the technicians in the technology department with red eyes.

These technicians feel that today's incident is quite embarrassing. Although Pan Wenlong is only Pan Hu's son, strictly speaking, he has nothing to do with Baiying Security, but others don't think so. When Pan Wenlong is mentioned now, it is natural Thinking of Baiying Security, and they all work in Baiying Security, can they not be ashamed?

As one of the domestic security companies, Baiying Security's technical strength is actually good. Although these technicians are not very good at intrusion, they naturally don't know anything about it.

"Mr. Pan, our strength is definitely not comparable to GOD. You know who GOD is, so I have a way. We use ddos ​​attack, which is distributed denial of service attack. Although the server of S is also a server, but he The processing power and so on are incomparable with our company's servers. The number of our company's servers is several times more than his. Ddos attacks can minimize the technical gap between us and him, and shorten the gap between us. to the smallest." The person who spoke was a middle-aged man in his forties, who was Wang Ming, the technical director of Baiying Security.

At the same time, he was also one of Pan Hu's cooperation partners back then. Pan Hu was not mad at all. After listening to Wang Ming's words, Pan Hu was rational for a while, nodded quickly and said: "Even if he is a GOD, he is just a GOD." It’s nothing more than a hacker, and it’s an illegal intrusion into other people’s servers, and S University is a customer of our school, so you can use the company’s server resources as much as possible, and if necessary, you can use some special resources.”

Wang Ming nodded to show that he understood. Wang Ming was not surprised at all about the special resources that Pan Hu said. As for what the special resources are, unless necessary, Wang Ming would not say anything about it. Ddos attack is similar to dos attack, the difference is that it uses a huge computer cluster to initiate a request to the same computer or server, blocking the target network and server operating efficiency.

This is a kind of violent attack, and it is also one of the attack methods that many hackers scoff at. In the eyes of hackers, hackers play with technology, and in the eyes of hackers, DDOS is something played by barbarians, with no technical content at all. , so few hackers use this method unless they are conducting some destructive attacks, or when the strength gap between the two sides is large.

Because of this incident, all the hundreds of technicians in Baiying Security's technical department were mobilized by Wang Ming except for some who were in charge of the normal defense system. This is the advantage of a big company.

*******************

Ask for a ticket! ! !

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like