Send a large number of useless data packets to occupy the limited network resources of the Sea God Data Fortress, and submit a large number of invalid requests to keep the Voodoo Gang server in a fully loaded state.They can be called "bandwidth attack" and "connectivity attack" respectively.

No matter which mode it is, it can overwhelm the sea god fortress, so that it is completely unable to handle the requests of the voodoo gang who really need the data fortress.

In this way, they fell into an absolutely backward situation of relying on the access warehouse in their heads to fight against the server monsters with terrifying performance.

When V was chatting with Luo Qi, he once mentioned such things as access warehouses.

Simply put, this is a "personal portable mini server".

The performance is extremely limited, and the function depends on the product design. Those who are capable of doing things on this small chip are basically at the data level.

Because the chip is made by a lithography machine, it is impossible to paste two chips with 502 to obtain double performance, and it cannot be inserted.

The access warehouse can play its greatest role in a suitable scenario.

It's like a tiny pistol that's extremely easy to conceal.

As long as you use it properly, no matter what kind of emperor you are, you will die directly with one shot.

And the huge server cluster is a space fleet soaring above the nine heavens.

The Star Destroyer and the small pistol are essentially "bang bang bang" things, but they are different in size.

If the Voodoo gang loses Sea God, then they really can only use the access warehouse to fight against the server of the violent mobile team.

Pure dead end.

Sometimes, technology is important, but when the opponent's technology is stronger than yours and the equipment is strong, it is the most sensible choice to hold your head like a grandson and hide to save your life.

So in the cyberspace, when encountering an attack, the voodoo gang not only did not have the slightest thought of resisting, but immediately began to flee.

So, a good show of you chasing after me was staged.

"Oh? Oh~oh!"

Paul was still concentrating on typing the code, watching his colleagues start rounding up the voodoo gang, but the information from the alarm plug-in made him make an interesting sound.

"what happened?"

Hearing Paul make such a strange sound, someone asked curiously.

"You may not believe it, but we were attacked."

Paul lost the job at hand and started to call the visualization panel of data monitoring.

"DOS... no, it's a DDOS attack."

He quickly confirmed the source of these data packets, and then watched them go through a series of repetitions on the intermediate network node as a springboard, showing an interesting smile.

"Reflector architecture, interesting, or NCART (Night City Urban Rapid Transit) network."

"The voodoo gang treats this as a chicken? What are you doing online surveillance for?"

At the same time beside him, he complained.

Many official networks in Night City are contracted by network monitoring, and they are established and maintained by themselves.

Unexpectedly, once the hacker war broke out, the voodoo gang would give these explosive barrels some points first.

"Never, never, superstition, authority."

Paul spoke word by word, his hands moving non-stop.

"Don't worry, I'll take care of it."

The server load of the violent mobile team gradually increased, and it was about to be blocked under the attack of data streams sent by IPs that sprung up like mushrooms after the rain, but Paul still did not panic.

The performance of the server was divided by him in advance. If it is really stuck and cannot be moved, it will be no problem to lift the restriction. Anyway, this thing only has a physical switch. The Voodoo Gang is a god, and there is no way to change the physical structure through the network.

"It really opened my eyes."

The other hackers listened to Paul's guarantee, so they continued to attack with confidence.

"So what are you going to do? Oh shit, what are you doing?"

Although I think Paul's personality is a bit weird, everyone actually has a good style, so they are far from being annoying to him, and they trust his character and ability more.

But the colleague who took a moment to watch his brother's operation almost fell off the hacker's chair.

"It's nothing, just solve the problem from the root."

As Paul said, his hands kept moving, and he sent out a lot of code packets with a rattle.

In less than half a minute, the load on the server dropped visibly to the naked eye.

Search and plug loopholes?

How can it be so fast, especially when fighting, it is better to take the initiative to attack.

Of course, this is what Paul thought.

So his approach is very simple.

Find those big broilers who launched attacks, rank them according to network traffic, and send viruses one by one.

In less than half a minute, a bunch of public facilities in Night City experienced huge failures.

The subway management system is chaotic. People on the road don't know when they will arrive at the station, and those who stop at the station don't know when they will leave.

The aisle was pitch black, and the service robot carrying the plate began to navigate around with the plate headless.

The official website of the city government was directly inaccessible, and the street lights on the street began to flicker in broad daylight.

And the citizens suddenly discovered that many of the websites they often use have started an infinite loading mode.

Fortunately, they didn't treat the power station as a broiler.

Otherwise, there will be another power outage in Santo Domingo, and the power grid will be damaged, which is a good thing done by the violent terrorist mobile team.

"The voodoo gang is outnumbered. They decisively abandoned the chickens and used the virus to attack us in an attempt to interfere with our attack."

Don't look at Paul Aldrich like a crazy Frankenstein.

When I really work, my brain is very bright.

With just a few words, he directly threw the blame on the Voodoo Gang.

"Are you sure you won't leave anything behind?"

Colleagues are still a little concerned.

"What's the handle? It's the voodoo gang's virus that destroyed their network. What's the matter with me?"

Paul said shaking his head.

"Is the voodoo gang virus really that powerful?"

"It's alright, I added some ingredients, and it looks good."

"..."

Well, the virus of the voodoo gang is not the point at all, the ingredients are the key.

With Paul's personality, he probably saw that their code was not good enough, so he made a shell of the feature code himself, and then overturned and rewritten everything in it. Maybe it was his pile of "Hacker Paul's King's The stuff stored in the treasure house.

This guy is different from others, he seems to have endless things in his mind.

The messy programs written are not needed, so they are all saved. When you need them, you can reach out and swipe a few times, and you will be able to find what you want, just like Doraemon's treasure bag.

Blacken all your broilers, so what are you using to attack me?

The difference between DDOS and DOS is the "Distributed" represented by the "D".

A large number of broilers act as agents to attack the target.

And the main control terminal that actually operates all these is hidden behind the shady, without consuming any resources.

The Poseidon of the Voodoo Gang is not enough in size but more than exquisite, so setting up a large number of broilers is indeed the best choice to give full play to its advantages.

It’s just that they sacrificed a large wave of high-quality broilers, only to get a weak block of less than 1 minute.

Subnets are quite restrictive, unlike deepnets.

This is also one of the reasons why they seek to go beyond the black wall.

"I think I'm almost at their old home."

Paul's hands were restless, and his movements were fast.

"confident?"

asked a colleague.

"Unfortunately, there are so many chickens in the Voodoo Gang, and they are also my chickens by accident."

Paul flashed his trademark evil grin.

As he spoke, he took out a data file and waved it in front of his colleagues.

"Their order activation document was sent to me."

"Oh, what are you going to do?"

"Call the server for network monitoring."

"Then?"

"It's time for them to eat a wave of DDOS."

Chapter 490 The Concrete Forest of Death

"Huh? Strange."

A hacker was lying back on the hacker chair when he suddenly made a strange sound.

"what happened?"

asked the man next to him.

"It's nothing, I just suddenly feel a little stuck... Uh, here it is again, what's the matter?"

For the delay of data feedback, hackers who have been dealing with these things all year round are extremely familiar and sensitive.

There is a slight difference that is different from usual, and it can be distinguished.

However, this seems to be no longer a "minor difference", but an obvious lag and lag.

"The server is down again?"

Another hacker said in a strange way, "Maybe they are doing some kind of test again, and they tune it every day, but they haven't seen any tricks yet."

"Ah, okay."

The hacker, who felt that the operation was extremely awkward, was not in a hurry after hearing it, and simply typed two lines of code, selected the file directory he wanted to check, and then entered the automatic queue, waiting for the server to queue up.

Although the computing power of the supercomputer for network monitoring is powerful, it is actually not very rich to support a giant AI of the size of the "black wall".

However, after the intelligent distribution of computing power, they only need to wait patiently.

Everything has a sequence.

Especially in departments such as network monitoring, where codes are produced at every turn, and it takes half a day for the server to count.

It will be even more torturous to catch up with the time period of distributing computing power, reducing load, and then maintaining without stopping.

However, after less than ten seconds, the door of their room was opened.

He rushed in aggressively.

"Yo, so urgent, what happened?"

The hackers are not detached from the connection, but in cyberspace, using the camera's picture to look at the perspective of the room.

A group of people on my side lay leisurely, and a colleague came outside who was a little anxious to see his posture.

"What are you doing? Why is the server stuck again?"

What came oncoming was a question they had never imagined.

"what?"

"Oh?"

"what?"

Several doubtful voices of different pitches and sequences came out.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like