Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume 1 Chapter 77 Why are the flowers so red (2)

Previous page        Return to Catalog        Next page

    Chapter 77 Why are the flowers so red (2)

    Whether it is in his previous life or this life, he has too little actual combat experience. Although he was ranked No. 1 in the Red Territory in his previous life.  1 But it¡¯s a pity that he only won that ranking because of his silent success in invading large targets several times. In fact, although he did the invasion by himself, thanatos gave him a lot of advice and help.  At least some of the side details were handled by thanatos for him.

    Technology and experience complement each other. Only when both reach a certain height can a real super master be achieved.  Just like some new recruits may be very good at target shooting and using sniper rifles, but after going to the battlefield, I am afraid that some veterans who have not received systematic shooting training will kill more people than him. This is the importance of experience.  .

    Of course, when this recruit becomes a veteran, his strength will be horribly improved!

    The reason why this person scanned the power system was not aimless, but premeditated. The power system and the telecommunications system are similar.

    The power system in the United States has an independent power supply network. Don¡¯t underestimate these power supply networks. Although Symantec does not have many employees, it has a huge server group, so what Symantec needs  There will be dedicated people in charge of the power network.

    The power network that specifically provides power supply must be connected to Symantec¡¯s internal network and then coordinate the power supply.  It is obviously more unimaginable to make an idea from this aspect than the telecommunications network, but it is also very difficult to invade from here. After all, there are too few places where the power network and the ordinary network exchange.

    Although he didn't know the purpose of this person, Zhang Yang quickly started to hide his data flow. Because Zhang Yang came in first, Zhang Yang saw all the traps he placed and was careful not to touch these traps. Zhang Yang  Soon I followed this man into the power system.

    Soon Zhang Yang discovered that this person's goal was not to invade Symantec's network through the power system, but to first open the power management system of the neighborhood where Symantec was located. You know, the American network  The use is more comprehensive than that in China. Just like this power network system, it can be operated directly in the city management system and then shut down the power supply in each block.

    It can be easily seen from the power management system that there are three power gates responsible for Symantec, two of which are backup gates. The power supply of these large security companies must be guaranteed as soon as possible.  To another extent, it can be seen that the United States has a really strong sense of crisis.

    This can be seen in Hollywood movies. There are more than one movie about the dangers of hackers in Hollywood movies. For example, the hackers in the super blockbuster "Die Hard 4", although they are a bit exaggerated, they also react from the side.  America¡¯s sense of crisis.

    And this backup power obviously exists to deal with these emergencies.  Soon Zhang Yang saw that this person had targeted a power supply area, which was Symantec's backup server. These backup servers were usually dormant, but they were also running at any time. Once there was a problem with the main server,  The dormant standby server is automatically activated, and the network interface between them transfers traffic directly to the standby server.

    This hacker directly shut down the power supply to Symantec's backup server. It must be said that although Symantec has a data center in Cupertino, the backup server and the main server are not in the same data center.  It seems that the data center where the primary server is located is a new one built by Symantec, while the backup server is a former small data center.

    The moment he shut down the backup server, Zhang Yang figured out that there is a network interface and trigger system between the backup server and the main server, so that the traffic can be transferred to the backup server as soon as there is a problem with the main server.  First, when the backup server loses power, the system on the main server will instantly experience a shortage of data exchange.

    Even though these data exchanges are on the intranet, the system is the system. The main server will perform a self-check immediately to check what went wrong. In this way, most of the performance of the main server will be transferred to the self-check.  Above, this gives these hackers an opportunity to take advantage of.

    "Master." Zhang Yang couldn't help but admire. At this moment, he was sure that this person was definitely a domestic hacker. Otherwise, hackers from other countries would not come here to cause trouble for Symantec.  .

    Zhang Yang soon noticed that at the moment when the hacker cut off the backup server, the Symantec server monitored by Zhang Yang immediately suffered a large number of DDoS attacks. These attacks were extremely violent., although it cannot catch up with the attack launched by Baiying Security at the last moment, it is not far behind. At this time, you must know that Symantec's main server has begun self-checking.

    In this way, the huge amount of calculations causes the CPU usage of the main server to rise almost instantly.  "Let's fight as a group." Zhang Yang was happy.

    At this time, Zhang Yang had already seen that the hacker secretly started to invade Symantec's internal network from the power system just as Zhang Yang thought. He seemed to be using something similar to a virus. Zhang Yang couldn't help it.  Maybe let his data flow analyze these things, in which case he will be exposed soon.

    By this time, Zhang Yang was sure that Symantec was going to miss. Although they had prepared everything, they were still going to lose. This was the pain in the defense.  Zhang Yang quickly erased all traces of himself, left the city management system of Cupertino City, and then started to actually watch the excitement.

    "Who is this person? Is this the real God?" Zhang Yang touched his chin, thoughtfully, God also said it, this person's technical strength is definitely not bad, even though these things seem to be very complicated.  Simple, but the technology involved is not simple at all.

    Even if you show off yourself to do it, you can't do it better than this person, or even worse than others. This person's experience is very scary.

    Sure enough, the rapid DDoS attack did not last long and ended in about twenty minutes. However, after the DDoS attack ended, Zhang Yang discovered that Symantec's official website had been directly killed, and the official website  An announcement has been posted.
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report