The end of technology.

Chapter 67 This is the Fairy Forum, right?

Chapter 67 This is the Fairy Forum, right?
Most of the people who hang out on the March Forum are technical masters. Of course, they will not like the only moderator of the forum, who is also the builder of the forum - Mr. March.But even those who disliked the style of Lord March, although they may not reveal it, they are still convinced by March's superb skills and keen sense of smell.

No way, this kind of hacking technology is really tried out.

It can be said that every member of the March forum has been trying to find out Mr. March from the Internet.And if you try it, you will know how difficult it is. Anyone who goes online will leave traces, but this March adult seems to have never left traces on the Internet.

It might be inaccurate to say this, but it should be said that every tracking will eventually lead to a dead end.What makes these people feel quite uncomfortable is that March seems to like dealing with funeral homes, and 80.00% of the final clues are traced to the server where the funeral home's official website is located...

Some people see it as a warning, and some people think it's a provocation, but in any case, Mr. March's superb anti-tracking and hacking skills have already reached a consensus among the members of the March forum.

Such a technical master suddenly pinned a post containing an attachment to the algorithm, and he spared no effort in complimenting the algorithm, which naturally aroused the curiosity of almost everyone in the forum.

You must know that the March Baike Forum is definitely one of the most active forums in the world.Even if there are so [-]% or [-]% of the members, they rarely bubble up, but they log in every day, and then spy on the screen. Even for many people, this is one of their daily jobs.

Get paid bubble technology forum.

So naturally, after the source code was uploaded, it was downloaded more than 300 times within an hour with Mr. March's comments.

Don't be afraid of not knowing how to use it.

Along with the source code, there is also an outrageously detailed description document, which is bilingual in Chinese and English. How to test it is up to the downloaders themselves.

For example, the algorithm function includes helping the website to completely defend against the intrusion of malicious crawlers, the effective protection rate against DDOS attacks is over 90.00%, supports multiple network environments, and so on.

Of course, the document also solemnly reminds that the algorithm source code is free for researchers to download, test and use. As long as it is not used for commercial purposes, it can be used for free forever.But if it is used for commercial operation, you need to purchase an activation code.

This prompt uses [-] mainstream languages ​​in the world, including Chinese, English, French, German, Korean, Japanese, Spanish, Arabic, etc...

At the same time, the document is also rigorous enough to provide extremely detailed descriptions and definitions for various commercial use cases.

For example, what is the price of directly using packaged software to protect one's own website from attacks; if this algorithm is to be applied to network equipment, what is the price of making network switching equipment capable of shielding malicious crawlers and defending against DDOS attacks.

Of course, the document did not forget to leave an email address at the end for easy contact.The mailbox is naturally Ning Yu's personal mailbox, which is also Ning Yu's only e-mail.The contact email address when submitting the manuscript to "Annuals of Mathematics" is the same.

……

Tan Mingzheng is carefully reading the documentation of the turbulence algorithm.As a member of the Network Equipment Division, he is a member of the Pilot System Department of Huaxia Youwei Company.

The full name of the pilot system in Youwei Company is the Intermediate Trial Production Department, which is a department between the R&D system and the production system.It probably means that the new product will be trial-produced first, and after it is confirmed that there is no problem, it will be handed over to the production system for mass production.

In short, this is a department that does dirty work, and the salary is definitely not as good as that of R&D positions, and even some positions are not as good as the production system.

Fortunately, the technology stored in the promising network equipment over the years has been extremely mature, and things are much less than in previous years.It's just that within Youwei, there are few things that can only be said in relative terms.

Just like Tan Ming, he was assigned a job to keep an eye on the March Forum.

It seems to be valuable now. For example, the description of this turbulence algorithm is very interesting, and it can defend against 90.00% of [-] or more DDOS attacks.

People outside the industry probably don't quite understand what this concept is.

In fact, cybersecurity risks never stop.

In particular, the servers of various games and financial systems are the hardest hit areas.

Tan Ming has been paying attention to various security reports released by the Network Security Alliance, such as the DDOS attack security report, and the data is not optimistic.For example, the report in the first half of this year shows that more than 16 DDOS attacks have occurred in Huaxia alone, an increase of 176% year-on-year. The total number of attacks with an attack peak of 50-100Gbps increased by 136% compared with the first half of last year, and the peak value is greater than The number of 300Gbps attacks increased by 511.2% year-on-year in the first half of the year.

Of these attacks, 14% of the C&C consoles were hosted on cloud hosts.All well-known cloud servers in China are involved, including Youweiyun.Not only that, these attacks have begun to involve the Internet of Things field that Youwei has begun to deploy.

As for all kinds of malicious web crawlers, it is a headache for countless technicians.

The crawler technology has already been disclosed, and it is indeed needed. To provide services, search engines must use this technology.It is nothing more than the difference between good intentions and malicious intentions, and how to distinguish them is a world-class problem.

So you can imagine how intense the inner activity of Tan Ming, who was reading the documentation at this time.

If the technical parameters given in this document can be realized, it means a real comprehensive upgrade in network security protection, and the IP/TCP protocol loopholes that were almost unsolvable have finally been filled.

According to the description in the documentation, large-traffic DDOS attacks will only cause short-term network fluctuations, which can only be shielded by the environment where the turbulence algorithm is deployed.These spam messages will no longer be responded to by the server, and the three-way handshake will be cut off directly.The odds of misjudgment will be kept below one in a trillion.

After finally reading the document carefully from beginning to end, Tan Ming immediately opened WeLink, ready to shake people.

As an old man who has been in this industry for more than ten years, Tan Ming certainly understands the weight of this algorithm.In fact, this is probably what makes him guard the forum every day.

It is no exaggeration to say that this thing can directly change the current pattern of Internet security in the world.He couldn't estimate the specific value at all, because it was an astronomical figure, and he couldn't even figure out why the author would just throw it on the forum...

Where is this March forum, this is a fairy forum!
(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like