webnovel

supercomputer

Chen Xu's computer was lost, so he came up with an idea. He took a thick piece of paper and wrote the following paragraph with black ink that wouldn't fade easily: "My descendants, I am your ancestor Chen Xu. The time now is September 1, 2006, Beijing time, 12:07 PM. Today, your ancestor encountered the most miserable event of his life... On the first day of my university, my laptop worth eight thousand yuan was stolen. If you are my descendants, please help your ancestor with something. If the legendary time machine has appeared in your era, then please send a laptop to the time period I am in now. The address is Room 207, Building 14, HeXie University, XX Province, XX City." One minute later, a computer from the future descended from the sky...

DaoistELiy3V · Fantasie
Zu wenig Bewertungen
71 Chs

Punish Snake!

After this news was sent out, everyone was silent, including Chen Xu.

Others felt that although Blue Baby's request was reasonable, it was not necessarily unreasonable. Chen Xu was thinking, if he gave this technology to the military, would his secret be discovered?

After all, that is technology that is eighty years ahead of its time!

In fact, Chen Xu himself would not have any objections, because this kind of firewall is just a waste for him, and he would naturally be very willing to make some contribution to the country. Of course, the prerequisite for this kind of contribution must be to protect oneself, because after all, Chen Xu is a human being and is selfish. If the country wanted to seize his supercomputer, Chen Xu would not agree.

Chen Xu couldn't make a decision on this kind of thing, so he asked Xiao Min: "Xiao Min, if I give the information about this firewall to others, will they see that this is a technology from the future?"

"No, because due to the principle of confidentiality, the firewalls and vulnerability patches installed on the two websites just now and now will all be automatically uninstalled after 12 hours. With current technological means, it is impossible to analyze and crack them. of."

"This is not the time for me. I want to give this firewall to others and show them the technical knowledge. Will this expose our identity? Reveal that these technologies come from the future?"

"Probably not," Xiao Min said, "because now I just use the data in the database to apply patches to commonly used systems. These patches were launched no later than 2015, and the core procedures also follow The current standards for PC computers and servers, so in a real sense, there is not much beyond this era. After others study, they will find that these vulnerabilities are at most they have not discovered, and they should not suspect that the computer is from the future. of."

At this time, Blue Baby and others were also worried.

How much is the price?

From the perspective of a programmer, the value of this software can be said to be immeasurable. If SMMH is willing to publish this firewall and let security companies around the world bid for it, God knows what a crazy price it can fetch... thirty million? Fifty million? And the unit should still be US dollars.

Although the Chinese military is not short of money, how can it convince them to spend such a high price to purchase this firewall? After all, it is just a firewall!

For more than 10 million yuan, this is not something Blue Baby can make the decision about. But she was really embarrassed to quote this price, so at this time, she could only call her superiors for instructions.

But the phone had just dialed a number, and before it was finished, the communicator flashed, SMMH was transmitting a compressed package to itself, a compressed package of more than 300 MB.

"No...it can't be?!" The blue baby quickly clicked on accept, is this thing, is this thing?

But her inquiry on the communicator did not receive a response... This was not because Chen Xu was deliberately trying to be a big deal, because he saw that it would take a while to transmit more than 300 megabytes, so he went to take a shower in the bathroom of the hotel room...

In Feng Gong's words, this is really out of tune!

But the problem is that no one could have imagined that SMMH would be so out of tune, just like no one could have imagined that this guy is actually a rookie. Blue Baby sent a few sentences but received no response, so she didn't dare to send more, because she knew that some hackers, the more skilled they are, the more erratic they are... Just like Kevin? Mitnick, he has been a withdrawn and unreasonable child since he was a child.

Snake's attack slowed down because after discovering that the flood attack was ineffective, they began to intercept information codes, hoping to analyze what kind of method this firewall used, so they would not launch another attack for a while.

Ten minutes later, the software was uploaded. The blue baby opened it and opened his eyes in surprise: "This is... all the programs and source codes of the firewall?!"

Source code is the core of a program and the instructions for writing a program. As long as you have the source code, it means that the program is completely exposed to you, whether it is the technology or the writing instructions!

SMMH is so generous? ! Didn't you even ask about the price? !

Comparing herself with others, Blue Baby felt that it would be difficult for her to be so generous. Because for programmers, the programs they painstakingly researched are like their own children, especially because there are many things that others have not discovered at all, and may even be discovered many years later!

Is he really the only traditional hacker left now?

The other party didn't talk about remuneration. Blue Baby felt that he couldn't be so unkind, so he quickly asked: "What about the remuneration? We can't take the things you worked so hard to research for free, so you can set a price."

Hard work? Chen Xu felt that if he said a few words, it would be too hard, and then the world would really be a group of exhausted people. As the saying goes, you don't feel bad when you spend money other than your own. Chen Xu really doesn't feel bad at all now. So he wrote righteously in the chat box: "It is my obligation and honor to contribute to the country. There is no need to mention the reward."

Seeing this sentence, Blue Baby's fingers tapping on the keyboard paused, and then he erased the line he just typed with a wry smile: "I will discuss with my superiors and try to get you a reasonable price. It is not expected that It will be less than 20 million..."

If Chen Xu knew that 20 million or more were lost just because of his own words, then he would probably be so depressed that he would bang his head against the wall at this time! This is the price of showing off! But fortunately, not knowing anything is actually a kind of happiness...

Snake finally went on the offensive again, this time using normal request server connections.

Normally requesting a server connection is a way for hackers to disguise themselves. In other words, after Snake's people scanned it, they did not find any vulnerabilities on the server that could be exploited by them, and they could not use it as quickly as possible. To resolve the battle, I had no choice but to use this method... some methods that were almost shameless.

Why is this commonly used method shameless?

Because as I said before, a firewall is just a program, and it must follow certain guidelines. This method of normal requesting a server connection may not be considered a big deal for ordinary hacker attack and defense, because under the supervision of a skilled administrator, the other party's intentions can be accurately discovered through the data flow and blocked.

But the problem is that SMMH said before that he only uses firewalls for defense, and he and others will never take action! So this method can be called shameless. As long as they use fake data packets to fool the server, they can successfully invade.

This is what I said before, a kind of defect similar to TCP/IP. It is not a vulnerability, but a defect.

The website server must be open to communicate with people. Otherwise, if a server is disconnected from the network cable, it will be impossible for even the world's top masters to invade it through the network. This is basic common sense.

Open communication, because of the exchange of data, will inevitably produce this defect. The website that Snake built before used the chaos encryption algorithm on the homepage, which did not give anyone a chance to connect to the website, so there was no way to use this method to attack. So when they discovered that Snake was using this method, almost everyone cursed: "Shameless!"

The blue baby quickly typed on the dialog box: "The other party is now using the normal request mode to connect. Are you not worried at all?"

A dialog box quickly appeared: "What are you worried about?"

This sentence really makes people vomit blood! Blue Baby feels that if the opponent is not confident in his own skills to a certain extent, he will definitely be a super electric white! Of course, she knew it wouldn't be the latter...

Super super Dianbai was also puzzled at this time, because he really didn't understand the meaning of this sentence...

Snake uses the method of registering an account to send a request. This kind of request cannot be rejected by the server... If a firewall prevents the server from working properly, then what kind of firewall is it? !

By receiving and analyzing the working status of the server, Snake's people were vomiting blood. Because the data shows that there are at least tens of thousands of IPs currently connecting to the server, which means that hackers all over the world are paying attention to the trends on the forum, and many people can freely register accounts and post questions. However, the DDOS flood attack he just carried out did not cause any abnormality to the server.

So the people at Snake quickly thought of a method... Since the information I use for DDOS flood attacks will be blocked by you, how about I just use a normal connection?

​At this time, we need to give a little introduction.

The DDOS attack method is to use many broilers to send requests to the server at the same time, but this request is false, just like a person greeting another person and extending his hand to shake his hand, and after the server sees the other person extending his hand, He would politely extend his hand to return the favor, but then the original person took his hand away again, turned around and left.

If you extend too many hands like this, the server's operation will naturally slow down. But the problem is that the other party's firewall can easily see that your purpose of reaching out is just to tease me, so I won't answer. And he can even easily judge among millions of hands which hand really wants to shake his hand (that is, register a forum account, post, etc.) and which hand is malicious teasing.

But now Snake has changed the method. The method they use is that I will stretch out ten thousand hands to shake hands with you, and when everyone shakes hands, they will shake it hard twice, trying to shake hands and you will be disabled!

This attack method changes from virtual to real! Unless all your servers refuse to shake hands, if you follow up one by one, you will be disabled even if you are exhausted!

This method is really too shameless.

Snake's people wrote a registration machine and desperately started to register an account... It doesn't matter even if there is a verification code, because even if the verification code is wrong, the server will respond: "Sorry, your verification code is wrong.", this happens instantly. If more than ten thousand accounts are registered together and attacked together, the efficiency of the server will definitely be reduced, and they will have an opportunity!

Seeing the other party using this method, everyone who paid attention to the data monitor couldn't help but feel their hearts in their throats. This method is despicable, but it is indeed effective! Moreover, it is a problem that all firewalls cannot avoid at present... For example, the pressure that a server can withstand is limited. Just like readers and classmates often find that Qidian has convulsions. The important reason is that there are too many people. , causing the server to be under too much pressure and unable to bear it, so it opens slowly or even the web page cannot be opened at all!

This is a naked conspiracy, not a conspiracy! A conspirator, even if he understands the other party's plan, he can't stop it, that's what it means.

At this time, some people couldn't help but say, SMMH master, please take action quickly, the other party is too shameless!

Some people immediately shouted in the chat room that everyone should stop posting on the forum and reduce the traffic of the forum.

Some people also scolded Snake for being so shameless, because the server they use on their website must be the best and most powerful and can withstand very powerful traffic attacks, but the SMMH master just casually found the Hongke Alliance server. It's not a powerful website, so it's really shameless to use this method.

But again, there is no fairness in the hacker war.

However, as the administrator, Blue Baby and others soon discovered in the background that although the other party submitted tens of thousands of requests to register accounts in just a few minutes, the current memory consumption and CPU consumption of the server not only did not Growth, but decreased a little!

 How is this going? !

The other party was clearly using Yangmou and had already started a conversation with the server. However, tens of thousands of conversations were initiated at the same time. Normally the server would have crashed, but now it seemed like nothing happened.

"If he is strong, let him be strong. The breeze blows on the hills. If he is strong, let him be unruly. The bright moon shines on the river."

Just when everyone was amazed, a line like this appeared below the declaration on the homepage of the Hongke Alliance website: "Tao, can be Tao, is very Tao. Name, can be name, is very famous."

This is the peerless martial arts in Jin Yong's novel "The Legend of Heaven and Sword of the Dragon", and a passage in the Nine Suns Divine Art. It means that no matter how tyrannical you are, I am just like the breeze blowing over the mountains and the bright moon reflecting the river, "He is ruthless." He is arrogant, and I am full of energy."

This sentence was typed by Chen Xu. Although it is pretentious, it is actually a true portrayal of this data communication model independently developed by the Chinese. It is also the first sentence of the programmer's introduction.

This data exchange model is different from today's flawed TCP/IP protocol. A lot of data processing is placed on the server, which can easily cause the server to collapse due to excessive pressure.

For example, before the emergence of SWF, that is, FLASH embedded video, many domestic video websites went bankrupt due to too much investment in servers. This is because watching videos online puts a lot of pressure on the server. Many people Watching movies at the same time, then the server is really finished.

Today's video websites all adopt the P2P model, that is, viewers watch movies online, and while downloading and saving the movies into temporary files, they are also being uploaded. This greatly reduces the pressure on the server and spreads it to the user's computer and network. superior.

​And this is the case with this processing model.

Instead of placing all operations on the server, they are distributed to each user's computer. Snake used tens of thousands of broilers to register accounts. When the server felt that the pressure was too high, it would disperse the data to each computer to run independently. Therefore, Snake added tens of thousands of accounts to the Honker Alliance Forum for nothing. But it just didn't have any effect on them.

When Snake's people discovered this, they were filled with admiration and at the same time going crazy.

Doesn't this method work? What else? !

It's not that Snake only has this technology, but because hackers' attack and defense methods are nothing more than the above. They can deceive the server, find loopholes, or simply use equipment and traffic to completely overwhelm the opponent!

If none of the above methods work, you can only use the last resort... viruses.

But to be honest, I really have no confidence.

Even the Fenghuo virus has been cracked by this man. Are these gadgets they have useful?

It's just that half of the time has passed. No matter whether it works or not, you have to try it.

After a short discussion, Snake finally decided to release a virus he had been researching for a long time...named "Terminator".

The concealment of this virus may be far less than that of the Fenghuo virus, but its destructiveness and transmissibility are much greater. When computers and servers are infected with this virus, the virus will desperately begin to attack third parties connected to the network and create a large amount of junk data in the computer or even destroy original data.

It can be said that this virus was created to destroy, it is a hacker'sViruses, and viruses that are despised by hackers!

Snake spread the virus quickly. The method they used was similar to the Seven Injury Fist, hurting themselves first and then hurting others! They actually implanted the virus into tens of thousands of zombie computers under their control and detonated it. For a time, the "Terminator" virus broke out crazily on the Internet!

"Fuck! Snake is crazy?!" Sister Blue Baby was the first to discover this crazy attacking virus. She was so angry that she cursed, and then sent a message to SMMH: "Snake's people actually used a very aggressive virus. The virus attacks the server. This virus is extremely contagious and aggressive. Many computers are already infected! I didn't expect them to be so crazy!"

At this time, Chen Xu, who was in front of the computer, also received a report from Xiao Min: "A virus named 'Terminator' was discovered. This virus is highly contagious and will delete the data on the user's computer. It is the most dangerous virus in the early 21st century. It is a malicious virus that will wipe out all the data in the infected user's computer."

"MB's!" Chen Xu became angry now, really angry.

Although he was Dianbai, he also understood the dangers of this virus after reading the introduction. Once it breaks out, how many people will cry at their computers? Not to mention anything else... He still has dozens of G-rated pornographic movies that he managed to collect in his own computer! Some are even out of print! Who can I cry to if I lose him? !

Soon there were people in the chat room shouting that they had been poisoned and all their data had been lost. Others reported that many members who were browsing the Hongke Alliance homepage and following the battle were poisoned. The virus was like a mad dog. It couldn't get into the firewall, so it tried its best to spread through cracks and spread to many people's computers.

Chen Xu is really popular now. For the sake of reputation, he even used such methods. Don't the people at Snake know the consequences of spreading the virus? !

A line like this suddenly appeared on the Hongke Alliance homepage:

"Snake, I didn't expect that you would use such extreme measures. It seems that I was wrong.

For degenerate hackers like you, having such powerful technology is a huge mistake and a tragedy for the computer industry.

It seems that you have not cherished the opportunity I left for you, and you have made mistakes again and again.

What you did in the past, as well as spreading this malicious virus today, have made the world unable to forgive you.

Maybe I don't have the power to judge you personally, but the judicial organs will. What you have done is enough to make you spend the rest of your life in prison repenting and pardoning your crimes. "

This passage came out quite inexplicably, and Snake's people suddenly had a bad feeling in their hearts.

In the next second, a list appeared on the web page:

"The members of Snake are:

Dr. Carmelo, a senior engineer at Microsoft and the founder of Snake...