Reborn Hacker

Chapter 24

The time has come to the winter vacation of the first year of high school. He Ran has no problem in coping with the exam because he has done a lot of exercises.After the results, Qi Zhanhang deserved to be the first in the class and the first in the grade, followed closely by He Ran, the third in the second grade of the class, Zhang Sai's fifth in the class, and the twentieth grade, Liu Haoyuan was a little bit worse, the tenth in the class, and the 47th in the grade .This result is actually conceivable. Liu Haoyuan looked at his grade 47 and then at the first, third and twentieth of the other three. He felt that he was "excluded", and hid in the corner holding a broken glass heart. The mushrooms went. "Is everyone clear about homework and returning to school this winter vacation?" Tan Kai asked on the podium.

"It's clear..." The following voices replied sparsely.

"Since everyone didn't hear clearly, let me say it again..."

"Clear!!!"

"Very well, if this is the case, when I return to school during the winter vacation, I hope to see that all the seats are full. In addition, it is best not to let me catch unfinished homework when the school starts. Otherwise, you know .”

With Tan Kai's threatening voice, the first semester of the first year of high school came to an end.

Before leaving, He Ran gave Qi Zhanhang the second notebook.So far, it has been said that He Ran will teach Qi Zhanhang about programming, but Qi Zhanhang has always been self-taught. His self-esteem prompted him to follow this path by self-education as well.Hey, after all, that is a proud child.However, such a temper can sometimes be quite harmful...

In fact, during these few months, He Ran's hacker life was very fulfilling.Outside of the communication with Black on the Internet, and one month after Swagger disappeared, He Ranxin encountered two hackers.

One is code-named Tuesday, and this is definitely a top-level hacker. Although limited by the times, the other party was finally defeated by He Ran, but He Ran believes that as long as there is time, the other party will definitely become a monster-level hacker.

By the way, this Tuesday was a helper that Swagger specially recruited to challenge He Ran. After a month of hard training, Swagger still ended up miserable in the duel with He Ran, so he pulled Tuesday to find a place.Of course, on the surface, this field has not been recovered, but psychologically, He Ran feels that he won by taking advantage of it, but in fact, the opponent's field has been recovered.

Of course, He Ran would not tell Swagger that this little guy would gloat on the sidelines after losing to him on Tuesday. The relationship between these two people is really incomprehensible to He Ran.After that, He Ran also sent two copies of the CHAT software, one for Tuesday, and the other for Swagger by the way.Now CHAT has three chat rooms, one is dedicated to Black, and the other two are to these two people.However, except He Ran's CHAT, the other people's CHAT can only see one chat room.

The reason why He Ran brought Tuesday into the chat is mainly because he feels that he and Tuesday have similar interests.Both of these guys are typical tech nerds.In the subsequent chat, He Ran also learned that Swagger was actually taught by Tuesday.

He Ran asked, why did Swagger gloat so much after you lost to me on Tuesday, aren't you his master?

Only then did Tuesday know that the situation of being anti-invaded after the invasion was actually seen by Swagger who was hiding aside, and it is hateful that he dared to be lucky, disaster, joy, and disaster!Very well, the uneducated boy!

Facing the flickering display screen, with a paralyzed face, Tuesday replied word by word: I see, thank you for letting me know.

He Ran looked at this plain sentence, and for some reason, he just saw the bloody storm from the cracks in the words, is it an illusion?

The next day, He Ran, who saw the appearance of Swagger, transferred the conversation between himself and Tuesday to Swagger. He always felt that he would get the answer in this way.

Swagger: What! ! !That black belly and facial paralysis will definitely not let me go casually.You killed me! ! ! !

Transcendence (He Ran): In country Z, respecting teachers is an important etiquette.If you gloat so much, no matter whether they are your helpers or not, even if they are not your master, they will probably trouble you.I'm very surprised that it's your master, why are you so gloating?

Swagger: Ho, you don’t know, that guy always thought he was the number one in the world, and he spared no effort every time he hit me. It’s rare to see him deflated once, how can he feel sorry for my heart of always being hit.

Transcendent: ...

He Ran thought about it. During the chat with Tuesday, the other party has always been a humble and studious image, without the feeling of pride that Swagger said. Tuesday is an arrogant person?Although I heard that many people from Country Y are arrogant, He Ran really never thought that Tuesday is one of them.

In fact, LynnChad has never been an arrogant person. His indifferent attitude often makes people around him think he is an arrogant person. Since in country Y, this kind of arrogance is allowed or even praised, LynnChad never thought about it. To explain, such a misunderstanding doesn't matter in Lynn's real life. Gary is simply discrediting Lynn. In the process of learning hacking technology, Gary always likes to be ambitious, and occasionally overestimates his own capabilities. Lynn will use words like "you will never be more than me" to stimulate He, however, this sentence was twisted into Gary's words like "I am the best in the world".

Another hacker, codenamed XYZ.How did this hacker meet unexpectedly when he was looking for a new hacker website to invade.The other party was doing the same thing as He Ran at that time. As far as He Ran was concerned, as long as the other party didn't take the initiative to provoke him, He Ran would not engage in a righteous struggle with others.

At that time, the hacker website had a three-layer firewall. After He Ranxian XYZ cracked the first layer, XYZ actually wrote on the cracked webpage: Let's compete.

This is the other party's initiative to provoke, um, and the other party's hacking skills are not bad, it is worth a contest.

Using the code name of Transcendence, He Ran readily agreed, and a new round of contest followed. He Ran thought that the other party meant to crack the two firewalls behind, but the other party directly started attacking He Ran's computer.The honeypot system responded when the other party tried to take action, He Ran was deeply sorry for his own understanding.

Smiling, He Ran hit hard, the guy who doesn't follow the rules needs to be taught a little lesson.Although the other party's computer was not directly scrapped, the massive junk data packets directly pulled the other party's network speed to 0.Although the other party also used many broilers to divert the traffic, He Ran's actions were too fast and fierce, and the data flow was astonishing. The "broilers" were quickly paralyzed, and not long after, the computer network with the real IP address in their hands was also paralyzed. .Of course, He Ran still pays attention to the influence. In order not to attract the attention of other figures, He Ran just bombarded some "broilers" with data streams. The biggest head is of course the one from XYZ. The honeypot system written by He Ran and the many functions added later are by no means Gaide.

Because of the disastrous defeat, XYZ made an agreement with the Transcendent before the network collapsed to fight again, so naturally it didn't matter, and then it became a contest every half a month.Basically, this frequency is really trivial compared to Swagger at the beginning. Even the later Tuesday basically has to be compared every three to five days.For He Ran, such a contest is not superfluous, and He Ran is also a way to consolidate and deepen his understanding of his own hacking skills when dealing with the opponent's more powerful intrusions.Occasionally, the opponent's strange moves can benefit He Ran a lot, so He Ran is always open to such contests. Not to mention the contest.

XYZ was also Xiao Yize, watching himself paralyzed and dropped off the internet, he slowly put his weight on the armchair.

Tsk, it's been a long time since I met such an opponent.What a guy not to be underestimated.

There was a smile on the corner of his mouth, he didn't expect someone to have honeypot technology, and he didn't know what relationship this person had with the teacher's friend.

Or... is it related to Joe?The arc of the corner of his mouth stagnated, this guess made Xiao Yize slightly displeased. As far as Joe is concerned, he can know that his hacking skills are good so far, and he can get the honeypot system from a special channel. However, his knowledge in the computer field and his ability to develop software are unquestionable.As for this transcendent, he was able to react in such a short period of time after he invaded and found the honeypot and retreated quickly. From the behavior of cracking the second layer firewall to defend and counter the intrusion, the hacking technology is really unimaginably powerful. I don’t know. What will happen to the invasion game between two people who also have the honeypot system?Maybe be a confidant?Frowning, the thought of a confidant made Xiao Yize feel stuffy in his chest.

So putting aside those previous thoughts of comparing with Joe, Xiao Yize began to seriously think about the transcendent he met.

The code name of the Transcendor is clearly Z Wen. If there is no accident, this guy is from Z country. When did Z country have such a hacker talent.And judging from the opponent's single-handed actions, it doesn't look like someone from the ZF of country Z.Speaking of it, such a person is still in the private sector until now, which is really rare in country Z.

The author has something to say: small information:

Structure of the packet

The structure of the data packet is very complicated, and it cannot be explained clearly in a few words. It is enough to understand its key components here, which is very important for understanding the communication principle of the TCP/IP protocol.The data packet is mainly composed of "destination IP address", "source IP address", "payload data" and other parts.The structure of the data packet is very similar to our usual letter writing. The destination IP address is to indicate who the data packet is to be sent to, which is equivalent to the address of the recipient; the source IP address is to indicate where the data packet is sent from, which is equivalent to the address of the recipient. The sender's address; and the payload data is equivalent to the content of the letter.It is precisely because the data packet has such a structure that computers installed with the TCP/IP protocol can communicate with each other.When we use a network based on the TCP/IP protocol, data packets are actually transmitted in the network.Understanding packets is critical to network security for network management.

To understand the data packet, please see: baike.baidu.com/view/25880.htm Data flow:

Data stream (datastream) is a concept originally used in the field of communication, which represents a digitally encoded signal sequence of information used in transmission.

detail data

It has been able to continuously and automatically generate a large amount of detailed data.This type of data first appeared in the traditional fields of banking and stock trading, and now it also appears in geological surveying, meteorology, astronomical observations, etc.In particular, the emergence of the Internet (network traffic monitoring, clickstream) and wireless communication networks (call records) has produced a large amount of data stream type data.We have noticed that most of this kind of data is related to geographic information. This is mainly because geographic information has a large dimension and it is easy to generate such a large amount of detailed data.

complex analysis

Complex analysis of update streams is required in near real-time.Complex analysis (e.g. trending, forecasting) of data in the above domains has traditionally been done offline (in data warehouses), however some new applications (especially in cybersecurity and national security) are very time sensitive , such as detection of extreme events, fraud, intrusion, anomalies on the Internet, monitoring of complex crowds, trend monitoring (tracktrend), exploratory analyzes (exploratory analyses), harmony analysis (harmonic analysis), etc., all require online analysis.

After that, the academic community basically approved this definition, and some articles also slightly modified the definition on this basis.For example, S. Guha et al. [88] believe that a data stream is "an ordered sequence of points that can only be read once or a few times", and here the restriction of "one pass" in the aforementioned definition is relaxed.

Why in the processing of data streams, emphasize the limitation on the number of data reads? S.Muthukrishnan [89] pointed out that data flow refers to "input data arriving at a very high speed", so the transmission, calculation and storage of data flow data will become very difficult.In this case, there is only one opportunity to process the data when it first arrives, and it is difficult to access the data at other times (because it is not and cannot be saved).

To understand the data flow, please see: baike.baidu.com/view/166248.htm

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like