157 New Approaches
Lin Feng bought the Galaxy 2 supercomputer for one of the purposes of using data calculations, and the other is to use hacking technology to steal secret information and make the database of intelligent systems more comprehensive.
The methods of hacker attacks are generally divided into four types.
1. Backdoor program.
2. Information bomb.
3. Denied service.
4. Network monitoring.
The second method Lin Feng planned to use was the information bomb.
Information bombs refer to attack methods that use some special tool software to send a large amount of information that exceeds the system load to the target server in a short time, causing the target server to overload, network blockage, and system crash.
This is also one of the most common hacking methods.
With the help of Galaxy 2 supercomputer, the information bomb is the best attack method for Lin Feng, with a fool-like data flow impact, low difficulty and good effect.
But now...
"It's better to monitor traffic. I'm not used to being disturbed!"
Lin Feng sighed and had to make a compromise, but while compromising, he felt as frustrated as Chi Xiao's backstage authority was stolen.
"Xiaofeng, thank you for your understanding... Then I will talk to Shi Wei and the others later. After the installation is completed, I will go back to the branch!"
Lin Guoxiang said angrily on the phone, reminding Lin Feng at the same time: "The commendation meeting will be held in five days, so don't forget to attend when the time comes."
"Yeah!" Lin Feng hung up the phone.
Turning around, he watched a group of workers uninstalling computer components, feeling very bad.
"Lin Feng, what's wrong with you?" Zhao Feifei noticed that Lin Feng's face was not right, so she asked with concern.
"Nothing!" Lin Feng waved his hand, "I'll go back to the office first, remembering something!"
"good!"
............
After returning to the office, Lin Feng opened his personal computer and found that the 195M hacker learning materials were slowly falling into deep thought.
Since the information bomb method cannot be used, there are only three other methods to choose.
Backdoor program, this is unlikely.
Generally, after the program is designed, the backdoors of each module need to be removed. However, sometimes due to negligence or other reasons, the hacker will use the exhaustive search method to discover and use these backdoors, and then enter the system and launch an attack.
However, this attack method can only be applied to ordinary servers, and it is unlikely to be done for military servers.
Network monitoring is not suitable, because what Lin Feng has to do is steal information, not monitor other people's computers.
Then now there is only one last method left.
Denial of service.
Denial of Service, also known as distributed DOS attack, is to concentrate a large amount of network service bandwidth and attack a specific target, so it is extremely powerful. In an instant, the broadband resources of the attacked target can be exhausted, causing the server to be paralyzed.
Distributed DOS attacks are to concentrate a large amount of network service bandwidth and attack a specific target, which is therefore extremely powerful. In an instant, the broadband resources of the attacked target can be exhausted, causing the server to be paralyzed.
To put it simply, this attack method is like the target server is a restaurant that can accommodate 100 people to eat. Then two hundred men in black rushed in at once, half of whom occupy the restaurant and the other half are waiting outside the door. But these men in black do not order a single dish, so other diners will not be able to eat when they arrive at the restaurant.
However, this method requires remote control of other ordinary computers to act as the man in black, and these ordinary computers are commonly known as meat machines.
The broadband traffic of ordinary meat machines is generally between 1MB and 3MB. If thousands of meat machines access one point at the same time, ordinary servers are prone to crashes.
However, the storage location of the information Lin Feng wants to steal is definitely not an ordinary server. He estimated in his mind that at least 100,000 meat machines are needed to achieve this goal.
However, there is also an assimilation process between the host and the meat machine. If you break through ordinary computers one by one and obtain the super user permissions of these computers, it will be too troublesome.
Or using a proxy server and temporarily remotely controlled meat machines can meet Lin Feng's requirements, but the confidentiality is too low and it is easy to be discovered by the target.
Therefore, Lin Feng was preparing to write a worm virus that would make this computer virus the lead for the host to operate the meat machine.
The transmission flow of this lead must also be below the traffic monitoring value.
Thinking of this, Lin Feng immediately sat up straight, put his hands on the keyboard, and started typing...
.........
Five days later, the commendation meeting will be held as scheduled.
Lin Feng also rushed over and walked around the stage. In the spotlight, he maintained an immature commercial smirk.
If possible, he really doesn't want to laugh like this, so he lets the reporter cut pictures in the later stage and upload news.
But the eager eyes of dozens of other branch drivers at the scene did not allow him to do so.
It took an hour to end the torture.
After that, it was time for the driver to communicate privately.
"Hello, we are the [Raging Polar Bear] drivers, thank you for your help last time."
"Haha!" Lin Feng smiled awkwardly, not knowing him at all.
Although he met one last time, Lin Feng should have recognized it, not to mention that he still has the ability to remember everything he saw.
But Lin Feng has a habit of not caring about things, and after taking a look, he will automatically remove memories to avoid occupying brain space.
This kind of memory is selective, so Lin Feng distinguishes strangers he doesn't care about, and is used to only remembering the color of their clothes, not their appearance.
This may be the legendary face blindness.
After shaking hands with the drivers of the Beihai branch, the drivers of other branches introduced them one by one.
“…We are Australian branch drivers, and I’m glad to meet you!”
"......We are the drivers of the Dongyang branch, hello Lin Fengjun!"
“We are North American branch drivers…”
...........
Ten minutes passed and the introduction ended. Lin Feng didn't remember any of them, and his mind was full of writing virus code by himself.
But the exchange meeting really began.
"Lin Feng, can you tell me why you can do so many unexpected actions when driving a mecha?"
Some people take the lead, and some people agree.
"Yes, like that Holy Cross Slash, there is no preset program at all!"
"[Tiger Guard] is the third generation of mecha, the simulation system, and the incredible actions can be made. Is it related to the simulation system?"
"I think this is the reason for single-player operation. It's too difficult to drive with two people, but they can't do those moves at all."
.........
At the beginning, the exchange meeting changed, and it was more like a group of students begging Lin Feng, a teacher, to answer their questions and answer them.
"Haha!" Lin Feng showed a mysterious smile to the group of drivers in front of him, then stretched out his finger and replied seriously: "As for why I can drive the mecha and do so many incredible actions, the reason is very simple!"
He pointed his finger at his head, and Lin Feng smiled and said, "Read more books, read more newspapers, eat less snacks and sleep more!"
Chapter completed!