Chapter 282 Calm Attack and Panic Defense
Hackers are mysterious and scary in most people's minds.
They hide behind virtual networks and steal other people's information as if they were searching for something.
actually not.
Hackers are people too.
They just master computer technology that most ordinary people have no access to or have not learned.
In fact, it is the same as when you encounter a mathematical problem in class during class.
Those who are difficult don’t know how to do it, and those who know how to do it are not difficult. That’s what it means.
In the well-equipped room, teachers and students Xu Jie and Liu Qingyun kept tapping their fingers on the keyboard.
On the computer screen in front of them, a series of mysterious codes were running rapidly.
"Teacher Xu, the more than 10 million broiler chickens we control are spread all over the world. If we visit the official website of the Yizhou Island puppet regime together later, will we directly blow up their servers?"
While Liu Qingyun was writing code, he could also find time to chat with Teacher Xu.
The so-called "broiler" is also called a puppet machine.
Refers to those terminal machines that can be remotely controlled by hackers.
Any Internet-connected device in the world may become a "broiler" in the hands of hackers.
It is not limited to desktops, laptops and other computer equipment.
Mobile phones, tablets, and even smart homes, etc., all have the potential to become broilers.
Skilled hackers can manipulate these smart terminal devices at will and use them to do anything.
The cyber attack launched by Xu Jie and Liu Qingyun is one of the most common cyber attack methods on the Internet:
ddos attack.
Also known as a distributed denial of service attack.
The principle of this kind of network attack is not complicated. It uses a large number of broilers under its control to imitate the behavior of real users and initiate access requests to the target website or server.
In a short period of time, perhaps one second or even less, a large number of broilers initiate large-scale access requests, thereby quickly consuming the target's host resources and preventing the other party from providing normal services.
Give an inappropriate example.
Just like in a restaurant on the roadside, a group of hooligans suddenly came.
This group of local hooligans came in large numbers and only occupied seats when they entered the restaurant without ordering food. As a result, regular customers who came to the restaurant were left without seats and unable to eat.
As a result, the restaurant cannot operate normally. They must first deal with the gangsters in the restaurant before they can continue to operate.
It consumes a lot of time, energy and even money, but it is thankless.
This is the DDoS attack method commonly used by hackers.
Although it's not completely exact, the meaning is similar.
Everyone may have encountered a situation when surfing the Internet.
If a certain website suddenly becomes popular and the number of visits surges in a short period of time, the page opening speed will slow down.
If the number of visitors in a short period of time exceeds the load of the server, the website page may not be opened at all.
This is what people often call a server crash.
Ddos attack is based on the same principle.
In a short period of time, a large number of broilers were manipulated to initiate seemingly normal access requests to the server of the same website.
The purpose is to paralyze the other party's server.
This cyber attack method may seem simple and mindless, but it is currently one of the most powerful and difficult to defend attack methods in the world.
It is a world-class problem with no fundamental solution. We can only rely on other defense methods to mitigate attacks.
Even technology giants such as Google and Microsoft do not have a complete solution to DDoS attacks.
When Xu Jie heard Liu Qingyun's words, he kept his hands on his hands, smiled and shook his head.
"Although the Yizhou Island puppet regime is hateful, it is not that simple to break into their official website just by relying on DDoS attacks."
"After all, they collect money from the public every year. Even if they only use a small part of it for network security, it will not be that easy for us to quickly break through their defenses."
"Although there is no way to completely solve the DDoS attack, there is still no problem in using relevant technical means to mitigate the attack or raise the threshold of the attack."
While the teacher and student were launching cyber attacks, Xu Jie was also teaching Liu Qingyun.
Moving teaching into actual combat is most suitable for cultivating computer technology talents like Liu Qingyun who require very strong hands-on skills.
No matter how solid the computer theory is, if you can't type out effective code, you will end up just talking on paper.
Moreover, Xu Jie's expectations for Liu Qingyun were not as simple as participating in a small information science competition.
Computer technology originated in the West.
No matter how smart the people of Longguo are, most of the underlying protocols of computers still have to use the Western ones.
Why are all the widely used programming languages in English?
Because if you create and develop a programming language in another language and penetrate to the bottom layer, you still have to use other people's inventions and technologies.
The foundation always belongs to someone else, and even the house belongs to someone else.
You only have the right to live or decorate.
Want to change the lowest level protocol?
There is no way!
When Xu Jie was training Liu Qingyun, the most common thing he said to him was:
Learn from the barbarians and develop skills to control the barbarians.
Modern science originated in the West, this is an unchangeable fact.
Then Xu Jie wondered, could there be a way to allow Longguo's computer technology to overtake others in a corner without destroying the underlying protocol?
Xu Jie doesn't know, and neither does Liu Qingyun.
But they are all willing to work hard for this great vision.
Liu Qingyun smiled and nodded when he heard Teacher Xu's words.
"Teacher Xu, I know everything."
"You have already taught me about DDoS defense methods."
"Whether it is using high-performance network equipment or deploying CDN, it is essentially to divert and divert attacks."
"The more than 10 million broiler chickens we have on hand seem to be a lot, but after heavy defenses, it is difficult to say how many will be able to break through the blockade."
"I don't know how skilled the operation and maintenance personnel of the Yizhou Island puppet regime are? Are they enough for us to fight against?"
While the two were talking, more than 10 million broilers located in more than 100 countries and regions around the world, under their control, had begun to access the official website of the Yizhou Island puppet regime.
Yizhou Island, Yibei City, Puppet Regime Network Security Department.
"Beep beep beep!"
A sharp siren suddenly sounded throughout the building.
"It's closer to the north! What happened?"
"Did you make it?"
"I don't make it."
"Oops, I'm very annoyed, someone is attacking our server again."
"Hurry up and deal with it. I'm telling you, if you don't deal with it, you will be scolded by the director and others."
…
Chapter completed!