"Sir, are we heading towards the arms dealer?"

When Yan Yi left with Deng Qingshu, Zhang Xiao, who dared not speak at the side, couldn't help but speak. As a former soldier, he knew very well what an arms dealer meant.

"More or less, we are cooperating with China anyway." Lu Li shrugged, but did not deny it.

"But the people from Tianwei Security Company also need to be strengthened."

Lu Li took a deep look at Zhang Xiao and Peng Hao. After all, these two people are currently in charge of this company, and they are also responsible for the security work of the entire Immortality Department.

"Sir, we want to break up the secret team and integrate them into our security company."

Peng Hao suddenly said at this time.

In terms of the current number of members of the secret team, there are actually more than 20,000 people, and only half of the 20,000 people now only have missions.

Most of them can only stay at the base for their own training. Instead of letting this group of people train, it is better to come directly to the Tianwei Security Company.

Not only can it replenish the security manpower, but it also eliminates the trouble of retraining.

If a task is assigned at that time, they can just run out and do their own tasks.

Hearing this, Lu Li tapped his fingers on the table, then smiled and nodded: "Just leave it all to the two of you to decide. Give me a document when the time comes."

? , "yes!"

But then, he received a call from Morris, but this call made him frown.

"Our supercomputer was attacked."

Lu Li glanced at Peng Hao and Zhang Xiao, said something casually, and then stood up. However, the moment he stood up, Peng Hao had already trotted out, and Zhang Xiao also pushed open the rest door. Waiting for Lu Li to walk out.

He needs to go back.

The car was speeding on the road, heading towards Morris's location. This time, the hacker's attacks were quite frequent, and it might not even be possible for one or two people to do it.

Even Morris was a little overwhelmed.

"What attack?"

Shen Youchu was beside Lu Li with a little doubt on his face.

"D.O.S."

Lu Li said something, but felt it was inappropriate, so he added: "A type of distributed D.O.S attack called denial of service."

"It was a little trick more than 20 years ago, but this time it was too big and it was a bit troublesome."

What Lu Li didn't expect was that an organization would choose to attack their supercomputing system when they were finishing their press conference.

However, Lu Li would not believe that these attacks were just to paralyze their system. There must be a deeper reason for this.

As for what it is, we still need to wait until he arrives to know.

A decentralized D.O.S attack is actually a common hacker attack method that causes a large number of data packets to occupy the memory, processing system and bandwidth resources of the target system and then paralyzes the target network.

It's just that this method is somewhat outdated at present, but among the outdated methods, there must be new methods hidden.

Now the official website of the Immortality Club may have been hacked. This website is built on the 'Immortality' supercomputer, and the supercomputer can be attacked by distributed D.O.S., which means that their official website has been breached.

Just because this attack uses conventional hacking methods to control a website, and then uses the installation command on the server to install a control process on the server that allows the attacker to issue special instructions.

There is no more suitable attack target than the official website of the Changsheng Club. They will directly find the IP address of the target they want to attack on the official website, and then use this installed entry to attack the host, which is the Changsheng'super server they are currently attacking. Calculate.

After all, even a supercomputer needs to be connected to a high-bandwidth network. A supercomputer is just an extra-large computer. Strictly speaking, it is not much different from a computer.

It's just that the operating system of this kind of computer is self-structured and is not consistent with the systems on the market.

If the bandwidth and server host are relatively weak, this attack may paralyze the target in an instant.

The bandwidth and host used by the ‘Eternal Life’ supercomputer are not something that ordinary people can chew off.

It also takes time to overwhelm the server host with garbage resources.

However, in the face of this kind of attack, we can only continuously increase bandwidth resources and host storage at the beginning to ensure that the server host will not be paralyzed.

They then use this time difference to find the attacker behind them and conduct a reverse tracking attack.

When Lu Li came to Morris's computer room, Morris was already typing on his keyboard frantically, and the DOGS beside him was Liz. At this time, there was sweat on her cheeks, and she was staring at the screen in front of her, her hands Flying across the keyboard, collaborating with Morris.

They need to catch the person behind this in the shortest possible time.

The fact that these two programming geniuses ended up in this situation further proves that they are facing a team, and they are attacking deliberately.

"How is the situation?" Lu Li asked.

Morris stopped what he was doing and looked a little ugly: "We can't find it out. There's too much junk data thrown over at once. We still need to scan the junk data to find out the data in it, and then use this data to Find out who’s behind it.”

"But this is too slow. Maybe these hackers have crashed our servers before we can find out."

Hearing this, Lu Li frowned. The official website of the Changsheng Club is still running, and the supercomputer host of the architecture server cannot have any problems.

After all, if something goes wrong, their official website will crash.

It would be fine if it was normal, but the problem is that they have just held a press conference and a lot of people are browsing their official website. If the official website crashes now, they will need to explain this to the public. "Sure enough, the only way at present is to increase the running storage and bandwidth."

Lu Li was a little helpless. He didn't expect that a new system language would be targeted by hackers, or it should be said that it was targeted by some organizations. "Hold on first, I'll find a way."

Lu Li rubbed his forehead. The only way now is to increase manpower, use the advantage of the sea of ​​people, find the opponent's traces from these garbage data, and then directly catch the opponent.

This is the best and safest way at present.

"Sir, you'd better hurry up. With our current bandwidth and space, we can only hold out for another half an hour."

Morris said, and at the same time, his hands started to move again. It was very difficult to handle it with just the two of them.

"You guys..."

Lu Li looked at Peng Hao and Zhang Xiao, touched his chin, it seemed that he could only use the fastest speed to improve some people's programming level. .

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like