typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 236 Is this the rhythm of slapping the face? (Chapter 3)

[Bonus Points +1265]

Oh yo!

Unexpectedly, there are points rewards for Yi Hulu Hua Di?

Su Xiaomu knew the source of the points at a glance: completing the compilation, installation and deployment of the artificially retarded version of the node-based firewall.

Ignoring the bubbling of garbage, Su Xiaomu clicked a few times with the mouse and tapped on the keyboard a few times, and a background initialization management window popped up.

The backend of the firewall is designed to be limited to intranet management, and management through the public network is not allowed in principle.

Su Xiaomu abided by this. Before he had a thorough understanding of the firewall, he would not arbitrarily modify some settings that might cause security risks.

In a sense, a firewall cannot protect itself from the outside but from the inside.

Who knows if there will be problems with the operations of the backend management through the public network? After all, firewalls are generally passive defenses and will only take effect when security risks come. If you are intercepted when logging in to the backend of the firewall from a public network, theoretically it will not be classified as passive.

Defensive firewall tube.

"This backend management page is too rough." Su Xiaomu beeped softly.

For Su Xiaomu, who has no art background, the software he created based on Hu Lu Hua Lao is not very good-looking.

After all, it is just a simple use of various background colors composed of three basic colors, and there is no careful deployment.

"Maybe the little garbage system is also a science man? He only has eyes to appreciate beauty, but no ability to create beauty?"

The background management page simply arranged some operation options. Su Xiaomu operated while looking at the explanatory text in the system barrage.

A few minutes later, Su Xiaomu blinked, "What does node type mean?"

"I programmed it myself. I don't know how to do it. I'm drunk too."

The meaning of the node type on the firewall prefix, according to Su Xiaomu's popular understanding, should be the node cascade mode, which is the model discussed before in the core module of Saoke.com.

In fact, it is similar to this, but adds a layer of client mode equivalent to security software such as 360.

After all, it's 8102, and the cloud has long been a universal function.

One of the more excellent features is that you can use the super computing power of the backend, such as supercomputers, in real time for protection and network attack transfer.

It is much better than the early warning firewall that Su Xiaomu built himself.

There is also a little bit of micro excellence, it is cross-platform, can be used on Android and Apple, and it does not need to be protected in the form of software, but has built-in plug-ins, and the protection stage perfectly covers from shutdown to shutdown.

Of course, both Apple and Android need to be added as trusted to complete the plug-in installation.

Su Xiaomu couldn't wait to distribute the plug-in installation to all three of his mobile phones, and gave a like, "QR code is really a great invention."

Looking at the words "artificial retardation" on the background management page, Su Xiaomu fell into deep thought.

"It's really...not polite at all."

After a few minutes, Su Xiaomu realized what was different about the entire firewall from the coquettish bitches outside.

The meaning of artificial retardation is exactly what Su Xiaomu understands. It is a weakly intelligent module with a certain degree of subjective initiative, which is slightly better than Microsoft Xiaobing.

In addition, the firewall background management artificial intelligence module has built-in some operating instructions to cooperate with the firewall to carry out active and passive counterattacks.

That’s it…

Looking at the time, it happened to be eleven o'clock. Su Xiaomu put down the operation of testing the firewall performance.

An announcement was made through the backend of Saoke.com, saying that server resources will be upgraded in ten minutes, which may affect usage. The estimated impact time is about one hour.

It happened to be back to normal during the time when everyone was eating and checking their phones.

Although he has to write the code of the core module in the past two days, Su Xiaomu has not been idle. The background data of the original Saoke.com has been sorted out.

The overall migration process will not be too slow.

I expected an hour, but actually it might take twenty minutes.

Just do it, the first step is to run the new Saoke.com, the second step is to connect the database, the third step is to migrate the native data, the fourth step is to expose the new Saoke.com to the outside world, and the old Saoke.com is suspended.

Finish.

It went smoothly beyond imagination.

It really took 20 minutes in total.

After calling the supercomputing resources for a comprehensive inspection, there were no faults, bugs, or discomforts, and the operation was completely resumed.

All previous announcements were deleted, and new announcements that were automatically deleted at regular intervals were released to inform users that the Saoke.com server resource upgrade was completed...

…………

…………

Finished all this at 11:30 sharp.

Su Xiaomu rubbed his hands and said to himself, "Come on, let me try your depth."

The breadth and depth of Chinese culture is truly unmatched by ordinary language.

Fortunately, when Su Xiaomu said this, the expression on his face was not obscene, and there was no other person in the office.

Taking advantage of this little time before lunch, Su Xiaomu planned to try the depth of the firewall himself:

Use his spear to attack his shield.

That's right, Su Xiaomu plans to use supercomputer computing resources to attack the supercomputer's firewall.

For the 1024 trillion-level supercomputing, Su Xiaomu planned to exclude some other randomly submitted simulation operations that accounted for less than 100 trillion times, and divide the remaining 924 trillion times into two parts.

Calling 600 trillion times of computing resources to attack, the remaining 324 trillion times of computing resources will not be allocated in any way, which means that they will be freely allocated by the firewall.

Su Xiaomu's hacking skills are those that come with programmers and have not been systematically refined.

Of course, it is still very easy to carry out targeted attacks on a certain point if the algorithm achieves a perfect score.

Even if you don't know anything, just using 600 trillion computing resources per second to carry out the most common, common and easy-to-prevent DDoS attack is terrifying.

In fact, this is what Su Xiaomu did in his first round of attacks.

This is the first wave of violence.

"It would be fun if there was a wave of external attacks at this time and the intensity was very strong..."

Su Xiaomu raised the flag unconsciously.

Su Xiaomu's eyes were extremely busy looking at the various schematic diagrams on the computer screen, including supercomputer resource utilization, attack progress, and firewall feedback.

After pondering for a few seconds, Su Xiaomu said happily, "It's not bad. The computing resources occupied by the firewall are less than 100 trillion times per second, which is very good."

"It's time to show off your true skills!" Su Xiaomu said happily like a young man.

During the DDoS attack, Su Xiaomu's hands were not idle, but he wrote an intrusive hacker program, and in order to test the performance of the firewall more intuitively.

He suspended all protective services of the hardware firewall...

Then……

Su Xiaomu was completely confused:

"Ta Ma, this is the rhythm of a slap in the face in the city...it is such a coincidence!"

The 3rd update, the 4th and the 5th will wait a moment.

Set a small goal first, such as remembering in 1 second:


This chapter has been completed!
Previous Bookshelf directory Bookmark Next