Facing the overwhelming flood attack, Feng Xiaotian's defense line was instantly overwhelmed, and he immediately turned around and ran away. There is no way, he is only one person, and he only has a computer in his hand. In the face of such a huge flood attack, there is no way for a single person to withstand it. The best way to face a flood attack is to use a flood attack to fight back, which is commonly known as the tip of the needle. Now the test is not purely about hacking technology, but about whether you have enough chickens in your hand. The average hacker basically has a bot, and the vast majority of these bots are ordinary computers with mediocre performance. There are very few powerful hackers, and their machines are usually supercomputers. Of course, these supercomputers are not theirs, but they were secretly captured from major companies or major scientific research institutions. As the number one person in the hacker world, Feng Xiaotian, how many chickens does he have in his hands? Funny enough, the answer is zero. ¡°Feng Xiaotian has always disdained the use of flood attacks to defeat opponents. He prefers to use pure hacking techniques to fight opponents. Feng Xiaotian felt that the flood attack method was too untechnical. Apart from the fact that it looked cool when attacking, there was nothing remarkable about the flood attack mode. This was why he did not have a broiler until now. Here's why. In order to cope with possible flood attacks, Feng Xiaotian developed the Qiankun Great Shift software tit-for-tat. In the face of flood attacks, the Qiankun Great Shift software can take good defense, so so far he has never been defeated by a flood attack. . However, Feng Xiaotian doesn¡¯t want to use the Qiankun Shifting software now. Since becoming famous, Feng Xiaotian has become low-key. He is no longer the young boy who was just starting out. He doesn¡¯t bother to do things that are in the limelight and do things that attract hatred everywhere. , Feng Xiaotian would avoid it if he could. He felt that this was an essential quality for a mature hacker. Especially the other party has developed this kind of intelligent program. Feng Xiaotian was even more careful. This showed that the other party was not weak. Showing his identity for no reason to provoke a powerful enemy was obviously not something Feng Xiaotian wanted to see. Since the other party has launched a flood attack, and Feng Xiaotian doesn¡¯t want to use the Qiankun Shifting software, how should Feng Xiaotian deal with it? Feng Xiaotian's first thought was to capture the computers, and then control them to launch a tit-for-tat flood attack to kill the opponent. This is a standard response method, used by countless hackers, so Feng Xiaotian naturally has no worries. While constantly running around in the network to avoid the other party's flood attacks, he began to select his prey. It was naturally impossible for Feng Xiaotian to capture the computers of ordinary people. He felt that if he wanted to do it, he would do something big. Supercomputers were definitely the best choice. Feng Xiaotian ran away while looking for the target. Soon, he found a target that he could attack. This target was the United States Computer Security Center. At the beginning, Feng Xiaotian and the passive intelligent program fought on the European network. Later, under his attack, the passive intelligent program retreated steadily, first retreating from Europe to the United States, and then being beaten by Feng Xiaotian and retreating to Seattle, the base camp of Satan and Kevin. The passive intelligence program was already on Seattle's network when it launched the flood attack. Feng Xiaotian also pursued here. Unfortunately, the American Computer Security Center happened to be in Seattle. Feng Xiaotian easily discovered this prominent unit that was fighting against global hackers while running around. What¡¯s even worse is that. Feng Xiaotian once sneaked into the US Computer Security Center. He was very familiar with the defense system of the US Computer Security Center, and he also left a backdoor in the other party's defense system. If Feng Xiaotian wanted to sneak in here again, there would be no need to spend any effort to crack the opponent's defense system. Feng Xiaotian's hands were tapping the keyboard at an extremely fast speed, and at the same time he said with a smile on his face: "I'll just use you as a shield. I wonder what you will think after seeing this prominent unit?" This is definitely a frame-up. , as long as Feng Xiaotian uses the supercomputer of the US Computer Security Center to fight with the other party, the other party will definitely find out about this department. Will the other party think that he is from this department? After Feng Xiaotian finished speaking, he immediately rushed into the American Computer Security Center. Because this department deals with hackers, its defense system is naturally very important. If you are not a top hacker master, you don't even have to think about breaking into this place. . The defense system of this place is composed of five supercomputers with excellent performance. Feng Xiaotian calls this defense system the "Supercomputer Defense Matrix". Since he has invaded here before, he is already familiar with it. Feng Xiaotian easily invaded one of the master-level supercomputers and gained backend control.?, and then Feng Xiaotian began to write counterattack instructions. Less than a few seconds later, Feng Xiaotian issued the order to attack, and the defense matrix composed of five supercomputers immediately burst out an extremely violent data flow! Launched a ferocious flood attack on the passive intelligent program that followed! It can be said that they are at odds with each other. Neither side is on good terms. The moment they met, Feng Xiaotian could clearly feel that there was an extremely serious lag in the nearby network! And as time went by, this lag became more and more serious, and many nearby computer users experienced large-scale crashes, including the personal computers of Big Shark and Professor Vincent. It turns out that Professor Vincent and Big Shark are commanding more than a thousand hackers to launch an attack on Berg's computer. They have determined that the other party is God. New hatred and old hatred have made Professor Vincent and Big Shark make a plan that does not achieve their goals. Determination to give up. However, thousands of hacker elites have been attacking for such a long time, but the result was shocking to Professor Vincent and Big Shark. If we use two paragraphs to summarize the hackers' attacks, it should be like this: - Hackers' attacks It was very smooth and extremely ferocious. They took full advantage of their large numbers of people and adopted an attack mode without any scruples, using all the methods they could think of. The scene was very lively, which is really commendable. It¡¯s a gluttonous feast for the hacker community! ¡ª¡ªThe hackers who are attacking are very depressed. Facing the Big Bad Wolf and the Great Universe Movement software, all their attack methods have no effect. If it is a single attack, the Big Bad Wolf software will completely resolve it. If it is a flood attack or a virus attack, the Qiankun Shift software will immediately send them to other places, making these hackers feel like they have no choice. Berg¡¯s computer is like a turtle shell, which is really hard for these ferocious hackers to think about! Professor Vincent and Big Shark soon discovered this situation. They were once again shocked by the excellent performance of the two softwares written by God. However, before they could think of a way to deal with it, their computer died. . "What's going on? Why did my computer crash?" Big Shark looked at his computer with some confusion, then turned to look at Professor Vincent standing aside. After discovering that Professor Vincent's computer also crashed, Big Shark became even more confused. He opened his eyes wide and said, "Professor, it turns out that your computer has also crashed" At first, Big Shark thought it was his own computer. The system crashed and it crashed. It's not that this has never happened, it's just relatively rare. But after seeing that Professor Vincent's computer also crashed, Big Shark felt that things were not that simple. He was just about to add something when he heard Professor Vincent say in a deep voice: "This is definitely done by a hacker!" Professor Vincent, the director of the American Computer Security Center, immediately saw the essence of the matter. After speaking, he stood up and walked quickly outside. The big shark hesitated, then stood up and followed him. The two of them quickly came to the lobby outside. As soon as they opened the security door, they heard a noisy sound: "What's going on? Why has my computer become so laggy? This is the highest configuration of United Software The computer has such good performance, why is it so stuck? " "It's good that your computer hasn't crashed yet! My computer is an old one from IBM a few years ago, and it crashed immediately. It is necessary to ask the supervisor to change the computer. The computer from United Software is more reliable. " "Is this the time to talk about this? Come on, it must be a hacker!" We are here to show off!" "What to do? The entire center's personal computers are either frozen or not working properly. What can we do? The computer is working normally, let¡¯s let the people over there do their work, we can¡¯t help.¡± After hearing this, Professor Vincent no longer hesitated and turned around and walked directly to the supercomputer control center. The people in the control room were busy working nervously. When they saw Professor Vincent coming in, a person who looked like a supervisor immediately came over and reported: "Professor, we have suffered an extremely violent flood attack. The automatic defense system has launched a counterattack. At present, The situation is quite favorable to us." Upon hearing this, Professor Vincent asked: "Are you sure no hackers have sneaked in?" The man pondered for a moment and then replied: "So far, we have not found any traces of hackers. "Professor Vincent felt a little relieved, and then he walked to a supercomputer and looked at the display.Observe the screen carefully. After watching for a while, Professor Vincent did not find anything abnormal. He couldn't help but wonder: Is it true that there was no hacker attack? Who could be this guy launching a flood attack on us? (To be continued, please search Piaotian Literature, the novel will be better and updated faster!