host brain pain
Chapter 241 Is this a slap in the face? (Part 3)
Chapter 241 Is this a slap in the face? (Part 3)
[Reward points +1265]
Oh yo!
Didn't expect that there are points rewards for Yi Hulu Hua Piao?
Su Xiaomu knew the source of the points at a glance: he completed the compilation, installation, and deployment of the artificial mentally handicapped version of the node firewall.
Ignoring the bubbling of the little garbage, Su Xiaomu clicked a few times with the mouse and tapped a few times on the keyboard, and a background initialization management window popped up.
The backend of the firewall is designed to be limited to intranet management, and management via the public network is not allowed in principle.
Su Xiaomu complied with this point. Before he thoroughly understood this firewall, he would not modify some settings that might lead to potential safety hazards without compulsion.
In a sense, a firewall cannot protect itself from the outside but from the inside.
Who knows if there will be problems with the operation of managing the background through the public network. After all, firewalls are generally passive defenses, and they will only take effect when security risks come. Firewall tube for defense.
"This backend management page is too rough." Su Xiaomu beeped softly.
For Su Xiaomu, who has no background in art, the software he created based on gourd painting is not very good-looking.
After all, it is simply calling various background colors composed of three basic colors, without careful deployment.
"Maybe the little garbage system is also a man of science and technology? He only has the eyes to appreciate beauty, but not the ability to create beauty?"
The background management page simply arranged some operation options, and Su Xiaomu operated while looking at the explanatory text in the system bullet screen.
A few minutes later, Su Xiaomu blinked his eyes, "What does the node type mean?"
"I programmed it myself. I didn't know what to do. I was also drunk."
The node type on the prefix of the firewall means, according to Su Xiaomu's common understanding, it should mean the node cascading mode - the model discussed in the core module of Saoke.com.
In fact, it is similar to this, but with a layer of client mode equivalent to 360 and other security software.
After all, it’s 8102, and the cloud has long been a universal feature.
One of the more outstanding points is that it can use the super computing power of the background, such as supercomputing, for protection and transfer of network attacks in real time.
It is much better than the early warning firewall that Su Xiaomu made himself.
There is also a little bit of excellence, cross-platform, both Android and Apple can be used, and it does not need to be protected in the form of software, but a built-in plug-in, which perfectly covers the protection stage from shutdown to shutdown.
Of course, both Apple and Android need to add trusted to complete the plug-in installation.
Su Xiaomu couldn't wait to distribute the plug-ins to all three of his mobile phones. By the way, he gave a thumbs up, "QR code is really a great invention."
Looking at the words "artificial mental retardation" on the background management page, Su Xiaomu fell into deep thought.
"It's really... you're not welcome at all."
A few minutes later, Su Xiaomu understood the difference between the entire firewall and those coquettish sluts outside.
The meaning of artificial retardation is exactly what Su Xiaomu understood. It is a weakly intelligent module with a certain degree of subjective initiative, which is slightly better than Microsoft Xiaobing.
In addition, the artificial mental retardation module of the background management of the firewall has some built-in operation instructions to cooperate with the firewall to carry out active and passive counterattacks.
That's all...
Looking at the time, it was exactly eleven o'clock, Su Xiaomu put down the operation of testing the performance of the firewall.
An announcement was made through the background of Saoke.com, saying that the server resources will be upgraded in 10 minutes, which may affect the use, and the expected impact time is about one hour.
It happened to be back to normal when everyone wanted to swipe their phones after eating.
Although he had to write the code of the core module in the past two days, Su Xiaomu was not idle, and the background data of Yuansaoke.com had been sorted out.
The overall migration process will not be too slow.
It was estimated to be an hour, but in fact it may be 10 minutes.
Just do it, the first step is to run the new Saoke.com, the second step is to connect to the database, the third step is to migrate the original data, and the fourth step is the new Saoke.com to the outside world, and the old Saoke.com suspends the service.
carry out.
It went smoothly beyond imagination.
It really took 20 minutes in total.
After calling the supercomputing resources for a comprehensive inspection, there was no failure, any BUG, or any discomfort, so the operation was completely resumed.
Deleted all the previous announcements, released a new announcement that will be automatically deleted at regular intervals, telling users that Saoke.com's server resource upgrade is complete...
…………
…………
After finishing all this, it is exactly 11:30.
Su Xiaomu rubbed his hands and said to himself, "Come on, let me try your depth."
The breadth and depth of Chinese culture is truly unmatched by ordinary languages.
Fortunately, when Su Xiaomu said this, the expression on his face was not lewd, and there was no other person in the office.
Taking advantage of the time before lunch, Su Xiaomu plans to personally test the depth of the firewall:
Use his spear to attack his shield.
That's right, Su Xiaomu intends to use supercomputing resources to attack the supercomputing firewall.
For the 1024 trillion-level supercomputing, Su Xiaomu intends to exclude the less than 100 trillion simulation calculations submitted by others, and divide the remaining 924 trillion times into two parts.
Invoke 600 trillion times of computing resources to attack, and the remaining 324 trillion times of computing resources will not be allocated in any way, that is to say, they will be freely allocated by the firewall.
Su Xiaomu's hacking skills belong to the kind that comes with programmers, and have not been systematically refined.
Of course, the level of the full score of the algorithm is more than that, and it is still very easy to attack a certain point in a targeted manner.
Even if you don't know anything, just using 600 trillion computing resources per second to carry out the most common, most common and easiest-to-prevent DDOS attacks is terrifying.
In fact, this is what Su Xiaomu did in his first round of attacks.
This is the first wave of violence.
"If there is a wave of foreign attacks at this time, and the strength is also very strong, it will be fun..."
Su Xiaomu set the flag without realizing it.
Su Xiaomu's eyes were extremely busy looking at the various schematic diagrams on the computer screen, including supercomputer resource utilization, attack progress, and firewall feedback.
After pondering for a few seconds, Su Xiaomu said happily, "Not bad, the computing resource occupied by the firewall is less than 100 trillion times per second, which is excellent."
"It's time to show your real skills!" Su Xiaomu said cheerfully like a young man in Erha.
During the DDOS attack, Su Xiaomu's hands were not idle, but he wrote an intrusive hacking program, and in order to test the performance of the firewall more intuitively.
He suspended all protection services of the hardware firewall...
then……
Su Xiaomu was stunned:
"Treading horses, this is the rhythm of urban face-slapping novels... there is such a coincidence!"
======
3rd update, 4th and 5th update.
(End of this chapter)
[Reward points +1265]
Oh yo!
Didn't expect that there are points rewards for Yi Hulu Hua Piao?
Su Xiaomu knew the source of the points at a glance: he completed the compilation, installation, and deployment of the artificial mentally handicapped version of the node firewall.
Ignoring the bubbling of the little garbage, Su Xiaomu clicked a few times with the mouse and tapped a few times on the keyboard, and a background initialization management window popped up.
The backend of the firewall is designed to be limited to intranet management, and management via the public network is not allowed in principle.
Su Xiaomu complied with this point. Before he thoroughly understood this firewall, he would not modify some settings that might lead to potential safety hazards without compulsion.
In a sense, a firewall cannot protect itself from the outside but from the inside.
Who knows if there will be problems with the operation of managing the background through the public network. After all, firewalls are generally passive defenses, and they will only take effect when security risks come. Firewall tube for defense.
"This backend management page is too rough." Su Xiaomu beeped softly.
For Su Xiaomu, who has no background in art, the software he created based on gourd painting is not very good-looking.
After all, it is simply calling various background colors composed of three basic colors, without careful deployment.
"Maybe the little garbage system is also a man of science and technology? He only has the eyes to appreciate beauty, but not the ability to create beauty?"
The background management page simply arranged some operation options, and Su Xiaomu operated while looking at the explanatory text in the system bullet screen.
A few minutes later, Su Xiaomu blinked his eyes, "What does the node type mean?"
"I programmed it myself. I didn't know what to do. I was also drunk."
The node type on the prefix of the firewall means, according to Su Xiaomu's common understanding, it should mean the node cascading mode - the model discussed in the core module of Saoke.com.
In fact, it is similar to this, but with a layer of client mode equivalent to 360 and other security software.
After all, it’s 8102, and the cloud has long been a universal feature.
One of the more outstanding points is that it can use the super computing power of the background, such as supercomputing, for protection and transfer of network attacks in real time.
It is much better than the early warning firewall that Su Xiaomu made himself.
There is also a little bit of excellence, cross-platform, both Android and Apple can be used, and it does not need to be protected in the form of software, but a built-in plug-in, which perfectly covers the protection stage from shutdown to shutdown.
Of course, both Apple and Android need to add trusted to complete the plug-in installation.
Su Xiaomu couldn't wait to distribute the plug-ins to all three of his mobile phones. By the way, he gave a thumbs up, "QR code is really a great invention."
Looking at the words "artificial mental retardation" on the background management page, Su Xiaomu fell into deep thought.
"It's really... you're not welcome at all."
A few minutes later, Su Xiaomu understood the difference between the entire firewall and those coquettish sluts outside.
The meaning of artificial retardation is exactly what Su Xiaomu understood. It is a weakly intelligent module with a certain degree of subjective initiative, which is slightly better than Microsoft Xiaobing.
In addition, the artificial mental retardation module of the background management of the firewall has some built-in operation instructions to cooperate with the firewall to carry out active and passive counterattacks.
That's all...
Looking at the time, it was exactly eleven o'clock, Su Xiaomu put down the operation of testing the performance of the firewall.
An announcement was made through the background of Saoke.com, saying that the server resources will be upgraded in 10 minutes, which may affect the use, and the expected impact time is about one hour.
It happened to be back to normal when everyone wanted to swipe their phones after eating.
Although he had to write the code of the core module in the past two days, Su Xiaomu was not idle, and the background data of Yuansaoke.com had been sorted out.
The overall migration process will not be too slow.
It was estimated to be an hour, but in fact it may be 10 minutes.
Just do it, the first step is to run the new Saoke.com, the second step is to connect to the database, the third step is to migrate the original data, and the fourth step is the new Saoke.com to the outside world, and the old Saoke.com suspends the service.
carry out.
It went smoothly beyond imagination.
It really took 20 minutes in total.
After calling the supercomputing resources for a comprehensive inspection, there was no failure, any BUG, or any discomfort, so the operation was completely resumed.
Deleted all the previous announcements, released a new announcement that will be automatically deleted at regular intervals, telling users that Saoke.com's server resource upgrade is complete...
…………
…………
After finishing all this, it is exactly 11:30.
Su Xiaomu rubbed his hands and said to himself, "Come on, let me try your depth."
The breadth and depth of Chinese culture is truly unmatched by ordinary languages.
Fortunately, when Su Xiaomu said this, the expression on his face was not lewd, and there was no other person in the office.
Taking advantage of the time before lunch, Su Xiaomu plans to personally test the depth of the firewall:
Use his spear to attack his shield.
That's right, Su Xiaomu intends to use supercomputing resources to attack the supercomputing firewall.
For the 1024 trillion-level supercomputing, Su Xiaomu intends to exclude the less than 100 trillion simulation calculations submitted by others, and divide the remaining 924 trillion times into two parts.
Invoke 600 trillion times of computing resources to attack, and the remaining 324 trillion times of computing resources will not be allocated in any way, that is to say, they will be freely allocated by the firewall.
Su Xiaomu's hacking skills belong to the kind that comes with programmers, and have not been systematically refined.
Of course, the level of the full score of the algorithm is more than that, and it is still very easy to attack a certain point in a targeted manner.
Even if you don't know anything, just using 600 trillion computing resources per second to carry out the most common, most common and easiest-to-prevent DDOS attacks is terrifying.
In fact, this is what Su Xiaomu did in his first round of attacks.
This is the first wave of violence.
"If there is a wave of foreign attacks at this time, and the strength is also very strong, it will be fun..."
Su Xiaomu set the flag without realizing it.
Su Xiaomu's eyes were extremely busy looking at the various schematic diagrams on the computer screen, including supercomputer resource utilization, attack progress, and firewall feedback.
After pondering for a few seconds, Su Xiaomu said happily, "Not bad, the computing resource occupied by the firewall is less than 100 trillion times per second, which is excellent."
"It's time to show your real skills!" Su Xiaomu said cheerfully like a young man in Erha.
During the DDOS attack, Su Xiaomu's hands were not idle, but he wrote an intrusive hacking program, and in order to test the performance of the firewall more intuitively.
He suspended all protection services of the hardware firewall...
then……
Su Xiaomu was stunned:
"Treading horses, this is the rhythm of urban face-slapping novels... there is such a coincidence!"
======
3rd update, 4th and 5th update.
(End of this chapter)
You'll Also Like
-
Life Control Chart
Chapter 1088 3 hours ago -
A treasure map every day, I dig for treasure and revitalize my family
Chapter 549 3 hours ago -
Entering Taoism from the womb
Chapter 129 3 hours ago -
Lawyer: The bully is not guilty? I will send him to death!
Chapter 178 3 hours ago -
Our great China spans the multiverse
Chapter 843 3 hours ago -
Top level understanding: starting from basic boxing
Chapter 557 3 hours ago -
Dimension Gold List: Top Ten High-burning and Shocking Openings
Chapter 662 17 hours ago -
Check out the title King Daxiong, all the characters in the world are numb
Chapter 204 17 hours ago -
Fantasy: One point of effort, ten thousand times the critical hit!
Chapter 137 17 hours ago -
Genshin Impact: Compared with Traveler, Yingmei collapsed
Chapter 131 17 hours ago