LATEST UPDATES

Published at 1st of March 2022 07:31:13 PM


Chapter 497

If audio player doesn't work, press Stop then Play button again




Hackers fight each other, rarely affecting communication service providers on a large scale.

Because once these aspects are involved, if the damage is too severe, it is easy to attract the attention of a government. If it is not necessary, all hackers basically dare not do so.

Secondly, the network services provided by communication service providers are also the basis for hackers to exist wantonly on the network. If they are damaged, if their information in some broilers is intercepted, it will be very easy to find you in the future.

In modern society, it is more and more difficult for hackers to hide their identity. Many hackers can hide because they are low-key enough, but you have to say that they can completely hide it. Unless you don't check you, you really can't run away, which is different from that in previous years.

A few years ago, there were many information people did not connect to the network. Now all information is connected to the network and can't run.

Of course, this result actually amplifies the power of hackers, but there are fewer and fewer hackers who can affect the overall situation.

Sol went offline to the reconnected chat room, but quickly and carefully scanned his computer again. After confirming that there was no problem, he opened another separately connected instant messaging system.

"CASS, help, are you there?" Sol sent a message directly to the dark avatar.

After sending, he waited silently. The hacker community has been silent for a long time. More and more hackers are getting older and older, and they are not as arrogant as when they were young. This is one of the reasons why many hackers began to keep a low profile.

As for the hackers in the new era, they are not without, but different times and different values. These hackers in the new era are more high-profile. In addition, their living environment has been linked to the network since childhood, so some of their outstanding experiences as children have long been recorded.

Although most of them are high-profile, they can't mess around, because their information is filed in special departments such as the FBI.

In fact, the more active hackers on the network are still some hackers who were active as early as the beginning of the century. Most of these people were in their eighteenth or twenties, and now they are over middle-aged.

"Yes, what's the matter?" a message jumped out after a long time.

"X man asked for help. A man stole their department's confidential fighter launch data. They were tracking each other's programs. Now the two sides have confronted each other on a library server. At present, all our attacks have been blocked by each other."

"The whole system is extremely safe to be repaired by the other party. We don't have good means for the time being, unless we directly use violent intrusion and borrow our advantage of having more people than the other party."

Sol quickly told the other party about the current situation.

The other side was silent for a long time before he said, "sol, forget it. If the other party dares to confront you, he will have absolute confidence. You can't catch him. There is no simple hacker who dares to play like this now. I'm old and don't want to join in."

"That's it. By the way, you can tell x man as it is. In addition, be careful yourself."

In a word, CASS's figure darkened directly and showed that he was offline.

Looking at the dialog box, sol was silent, then didn't speak. He copied the relevant content and forwarded it to x man. Then he cleaned up his traces, which interrupted the connection with CASS.

In an ordinary farm in Texas.

A 40 year old blonde and thin middle-aged man is sitting in front of the computer, meditating, saying it is a computer, but this room with at least more than 30 square meters is full of chassis, monitors and so on, which shows that the owner here is not an ordinary farmer.

After hesitation, the middle-aged man directly opened a program on the desktop, and then quickly knocked his hands on the keyboard, and his computer screen immediately began to change rapidly.

Jiang Yanhai doesn't have much action at the moment. Although these people outside are constantly testing the firewall, they even pull out some software to constantly simulate attacks. At the moment, the server suffers at least thousands of attacks per second.

If you simply use the amount of computation of the server, you can't do it. However, there are four supercomputers behind Jiang Yanhai, one of which is still one of the top three supercomputers in the world.

Other hackers don't have this treatment, and they can't have this treatment. Even the security personnel of some important departments can't let some supercomputers do this, because the power consumption of supercomputers every day is a terrible number.

So it has computing tasks almost every day, and it can't be so wasteful.

If it hadn't happened this time, Jiang Yanhai wouldn't have the opportunity to directly use the two supercomputers. Of course, if it was in other places, there was no difference in his use of electronic warfare programs.

"X man, CASS refused. He said let's withdraw. The other party dared to be hard here with us. He should have been ready long ago." although sol had sent the chat record to x man, he still said.

X man was silent for a moment, smiled bitterly and said, "I'm different from you. Forget it, you can go if you want."

"Sh! It! No, today I'll give you a face and help you decide. I don't believe it. There are still people running wild on our heads. Doesn't he know this is our territory?" Sol roared directly, and then started to do it directly.

"Thanks, brother. Now I assign tasks. On my side, three people launch violent attacks such as e-mail bomb and DDoS attack to reduce the other party's server response and computing speed. You take the opportunity to attack the enemy's vulnerabilities from multiple angles." Sol said in a deep voice.

"No problem."

Several people in the chat room spoke one after another.

As they made up their mind, everyone immediately began to do it crazily, especially x man. With the help of several large workstations and servers called, a large number of tide attacks began to rush to the server of the public library.

Hundreds of thousands of access requests were sent to the server in an instant.

"Tut tut... As expected, violence is a tendency in people's bones. They say no, but they act honestly." Jiang Yanhai smiled.

DDoS attacks, commonly known as tide attacks, or e-mail bombs, etc. in a word, it is to use countless junk information, copy access, crazy block your computer computing speed and block your network channel. That's the word. In the hacker community, this is a profiteering attack.

More than ten years ago, this was a practice despised by the hacker community... Because hackers play with technology. This crude attack means can not reflect any technology at all.




Please report us if you find any errors so we can fix it asap!


COMMENTS