Super Network Manager

Chapter 19 Under the Fish in the Pool

"Good!"

As soon as he saw this guy taking the initiative to give more money, Niu Ben naturally responded quickly.

Since you, a dwarf mule, has the intention to support our educational cause, how can I accept it? After laughing several times in front of the computer, Niu Ben typed and said, "Well, since the stakes have increased, let's stop lingering and start now!"

After Inoue also responded, his fingers became busy on the computer like a butterfly.

Since the number of broilers is large, Inoue's first choice is naturally the most commonly used and well known to most hackers. It is known as the simplest and easiest to use among hackers, but it can also become the ultimate means of Ddos flood attack.

There are generally three ways to attack this kind of flood attack. One is to take advantage of your network protocol vulnerabilities, and the other is to take advantage of various weaknesses in your software stack. Finally, there is a barbaric attack commonly used by rookie-level characters.

The so-called barbaric attack is naturally not difficult to imagine. This is a method of forcibly attacking the other party purely by data advantage. Basically, most people will think that this method is very low-level.

However, Inoue uses this seemingly lowest-level method!

However, when Inouexiong uses this seemingly low-level method, its power is amazing.

High-tech hackers like Mitang found that from the beginning, Inoue's attack had exceeded the average combat index of world-class hackers. Hackers like them generally control the number of broilers, generally thousands, and the highest is generally only more than 10,000, but Inoue's attack has directly reached 20,000 from the beginning!

In a simple sentence, it is that Inoue's current attack seems to have 20,000 computers, delivering data requests to you at the same time.

The so-called "flood" comes from this. Such a powerful data flow can not only sluggish or even paralyze the target user's network. The most troublesome thing is that it can restrict the outward movement of the target user at the same time. Therefore, even if there are only a few broilers, once this attack is launched, like ordinary people's home computers, it will generally crash directly in just one second, and there is only a continuous alarm sound.

A few broilers can still reach such a level. How horrible should 20,000 be?

I'm afraid it's more frightening than the real huge flood!

So as soon as they saw the data displayed on the monitoring software, Mi Tang, Di Yao and others suddenly changed their faces. Then he secretly wondered how long he could last in the face of such a powerful attack.

But the answer made all four of them feel speechless.

Although everyone knows that firing at me once relied on a firewall to resist several times larger attacks than this number. But after all, that's in the case of relying on something. Like a sniper, he may be able to easily kill dozens of times his own troops under cover. But if the attack distance is comparable to everyone face to face, I'm afraid it will be difficult for him to kill two people.

So just thinking about it, not only Diyao and others are worried, but even the grassroots hackers onlookers whispered: "Bad"!

This is the lowest attack method, which is also the ultimate hacker weapon. Inoue's hand can be said to interpret the essence of the Ddos flood attack incisively and vividly. And this kind of attack is convenient and fast to use, and it only takes a few seconds to gather into groups. Without organizing precautions for you, I'm afraid that even the world's top hackers will make a big fall on it.

The world's top hackers are still like this. Can shooting at me trigger a miracle?

The answer is...

Can!

Just as Inoue gathered the broilers, Niu Ben also snapped his finger in front of the computer and said, "Beauty, launch your attack program and let this dwarf mule see the emperor immediately!"

"Yes!" The virtual beauty nodded, and after a few operations, she lightly clicked the return key.

So Niu Ben saw a countdown window on the monitoring software. The number on the window is constantly changing as it beats every second: "5, 4, 3, 2, 1... attack!"

When the number of this program jumps to zero, Inoue's attack suddenly melts like ice and snow, directly disappears!

No, not only him, but also inside and outside the whole battlefield, including the onlookers, all found themselves unable to monitor the situation on the battlefield. Then, everyone suddenly found that their computer suddenly ran violently after a "buzzing" sound.

What's the situation?!!!

As soon as the shocking thoughts in countless people's hearts came up, they suddenly found that their computers emitted a strong black smoke after a soft sound.

Then, about ten minutes passed. Whether in China or in the corner of the island country, including some rooms of the empire staring at the computer in the dark, there was an extremely sad scream: "Old man, wipe your sister!"

......

Niu Ben obviously did not know the situation outside, and found that everyone disappeared in an instant. He looked at the virtual beauty speechlessly and asked, "What on earth is this ultimate attack program? How can it not only kill Inoue, but also drive away all the onlookers?"

"It's not driving away, but destroying." The virtual beauty smiled and said, "This is the ultimate attack, and it is beyond the scope that it is difficult for hackers to cause damage to hardware. He used a unique operation method to invade the locked user's computer, and then completed all-round infinite overclocking of the CPU of the locked target computer in three seconds. So in the end, it will cause huge damage to a large area of destruction.

"All-round unlimited overclocking of the CPU, is this amazing?" Although Niu Ben couldn't understand the words of virtual beauty, he still grasped the point of the problem. After more than a year as a network manager, he naturally changed from an electric white to a slight understanding of hardware. So I clearly understand what the CPU is, and I also know that this thing is extremely important to computers.

But overclocking, he said helplessly that he didn't know what was going on.

Virtual beauty is so shallow about his computer knowledge that she is naturally speechless. Shaking her head, she gave a helpless look, and then said angrily, "I don't bother to explain this low-level noun to you. Isn't there a saying on your Internet that you don't have to ask Baidu about foreign affairs? Anyway, you are still idle now. Don't you know everything by asking Du Niang casually?"

"Okay!"

Niu Ben scratched his head, quickly connected to the network, and then searched for the keyword "CPU overclocking".

After a brief look, he immediately understood why everyone inside and outside the battlefield suddenly disappeared without a trace.

Yes, if the CPU is overclocked without any preparation, the result will be that the CPU will be burned. Of course, it is said on the Internet that only the CPU in the early days will burn down. Because modern CPUs have protection technology, they will automatically freeze to protect the hardware by cooling down the frequency. Generally speaking, at most, the service life becomes shorter and it is impossible to burn.

And these hackers can be said to be elites in the IT industry, and they should not use low-end products. In this way, at most, they will all be cleared out of the battlefield because of the crash, and there will be no result of destruction?!

With this question, Niu Ben asked the virtual beauty in the spirit of diligence and learning. But what he got was still a white eye of a beautiful woman: "The ultimate attack program of the system naturally has the means to remove these technologies. For you, they use high-end products, but for the system, those computers have been eliminated for many generations. Humph, so, after this attack program is used, it may not only destroy their CPU.

Niu Ben stared and said, "No, the CPU you mentioned is overclocking in an all-round way, and it also comes with the hardware of memory and graphics card?"

The beautiful woman shook his white eyes and responded with a nasal voice, "Uh-huh!"

"Wh, it's so awesome!!!" Seeing the beautiful woman's affirmative reply, Niu Ben immediately looked up to the sky and laughed wildly: "I've told you not to fight with my brother. You dead rookies must be hiding in your room now and crying! Wow, hahahaha..."

Jumping up and down happily, Niu Ben even used Latin dance after learning half of the system. After his whole body was consumed without much strength, when he lay on the chair, he still giggled from time and sang in a toneless voice: "I destroyed thousands of CPUs at once, with countless graphics card memory. You rookies, Lang Li Lang, Hold can't stop. Hey, Hold, Hold can't stop!"

In his silly singing and giggle, he staggered into the inner room of the computer room, threw himself in ** and fell asleep.

He didn't know that the Internet, especially in the hacker world of China, island countries and the sunless empire, was noisy and turbulent soon after. Some good guys even gave a name to this incident tonight, called "Burning Door"!

Yes, the hardware in the computer host is burned, which is called a burner. Moreover, according to incomplete statistics after the event, the economic losses directly caused by the burning of hardware and various problems caused by this move to fire at me turned out to be as huge as tens of millions of dollars!

Because in Inoue's computer research center alone, the burned computer hardware has reached millions.

It can be said that Inoue's tragic burden is more than half of the economic loss in this incident!

Oh no, and the two million dollars bet he promised to lose was later remitted to the account of the China Education Foundation in the second half of the night under the unanimous request and joint supervision of the hackers of the three countries.

In this battle, while Inoue lost a huge loss, it also supported the fact that the ID "fire at me" rose as strong as a comet in the hacker world!