Light Novel Pub

Chapter 145: Become famous in one battle

Chapter 145 Become famous in one battle

Turing quickly began to develop a counterattack plan.

The first solution is server defense measures.

Warwick's server firewall looked like garbage in Turing's eyes.

Although time in the real world is too short, time in the Singularity Laboratory is infinite.

Therefore, Lu Shan and Turing worked together to upgrade the technology of Warwick server firewall using C++ and Python.

In Turing's words - airtight.

After the firewall is launched, it can ensure that the Jiyue browser can run smoothly on the Internet without being attacked.

Turing, who was born into the field of security and cryptography, was so confident.

Lu Shan felt that he must have recruited a monster.

Turing, who passed away with deep regrets for many reasons in his previous life, has an extremely strong desire to perform.

The second measure is countermeasures.

Defense alone is not enough.

Defense only prevents you from getting hit.

But you have already been beaten, so of course you have to fight back.

This is Turing's attitude and the character he developed during the war.

During World War II, Turing worked in the British Foreign Office's Communications Department for military purposes, mainly deciphering enemy codes.

At that time, if the Germans cracked one of the Allied codes, Turing would have to find a way to crack ten German codes to make up his mind.

Turing established a complete attack mechanism.

The purpose of the attack is to give the other person a taste of your own medicine.

Turing believes that if the other party sees that the server of Jiyue Browser has returned to normal, they will definitely use the method they used to attack Jiyue Browser last time to launch a new round of attacks.

Turing will use the same method as the opponent and use the opponent's zombie computer to attack the opponent.

The same is true using zombie computers.

In this way, the attacking IPs will come from all over the world.

Even if the other party could guess that it was Ji Yue who did it, they had no definite evidence to prove it.

Its situation is the same as Ji Yue’s current situation.

As long as the other party activates a zombie computer, Turing will use some methods to follow the zombie computer to find out who the real attacker is.

Turing also had a way to find out who the real instigator was from the clues from the real attacker.

At that time, the pornographic pictures and links that have appeared on Jiyue Browser in the past few days will naturally appear on UC.

Turing explained the relevant methods in detail.

These attacks involve SQL injection attacks, MITM, DDoS attacks and many other methods.

During this period of time, Lu Shan has been studying the attacks on the application service area with Turing, and he has roughly understood the principles behind it.

But knowing the principle is one thing, and actually doing it is another.

Lu Shan couldn't help but give Turing a thumbs up.

Turing's understanding is really not to be underestimated.

Turing had just arrived at the Singularity Lab, but he was able to catch up with the most advanced computer technology in the world today.

The future is expected.

Lu Shan handed Turing a bottle of Coke he brought from the real world.

Maybe, in the next ten years or even several years.

With the addition of Turing and Poincare, Lu Shan can build a strong computer software and hardware team.

Not only can we design and develop Xia people's own PC and mobile phone systems, but we should also have breakthroughs in hardware.

Turing opened the Coke and took a sip.

His eyes looked out the window, outside which was an endless forest.

The sunlight hitting the windows cannot bring any more temperature to the laboratory.

Outside the window is a world that the heroic spirits cannot touch.

Turing didn't know what he was thinking.

Perhaps it is the memory of past life, or perhaps it is the confusion after becoming a heroic spirit.

Lu Shan firmly believes that day will come.

When both computer hardware and software disciplines have developed to extremely high levels.

There must be a way to let Turing experience the real world outside in some way, by letting him go to the places where he used to live, study and work.

After obtaining Turing's defense and attack methods, Lu Shan prepared to leave the laboratory.

Turing shook the empty Coke cup in his hand and said to Lu Shan, "Bring some happy water next time. Oh, and some wine!"

When it comes to wine, not only Turing's eyes light up, but also Poincare's.

After the two became heroes, this was what they craved the most.

Lu Shan agreed.

As for whether the heroic spirit needs to excrete after drinking.

Where have the most basic laws of the universe, the law of conservation of mass and the law of conservation of energy gone?

Who cares?

If you have enough food at home, you won't be worried.

Similarly, Lu Shan had a way to deal with the situation, so he was no longer panicked.

After returning to the real world, there are a lot of topics and news about Jiyue Browser in the technology columns of Tianya Forum, Xinlang, Sohu, Wangyi and other portal websites.

On the Tianya Forum, many people were frantically @陆山’s account to ask what was going on.

Some computer experts even took the initiative to send private messages to Lu Shan, expressing their willingness to provide technical support to Lu Shan.

Although Lu Shan did not provide everyone with the specific details of the attack on the Jiyue Browser server, many bigwigs have roughly analyzed the means and purpose of the attack.

"Be careful, Jiyue Browser. It's obvious that the other party is targeting you."

"At present, there are ways to prevent this kind of DDoS attack and TCP SYN attack from consuming resources, but the trouble is that the other party is always watching, and it will be troublesome to change the disguise at that time." "Yes, the biggest loophole of Jiyue Browser now is that the user's browser behavior must be fed back to the server, which forms a two-way information channel between the server and the user."

"The best solution for Jiyue is to not collect data about users' browser usage for the time being."

"To reply to the above, if Jiyue does not collect and analyze the data of users' browser usage, then there will be no way to accurately push relevant services. At that time, Jiyue will not be Jiyue anymore."

Lu Shan was very grateful when he saw everyone's concern.

In fact, Lu Shan and these technical giants on Tianya have no interests or intersections at all, but everyone is willing to help you.

That’s why technology brings us together.

Lu Shan responded to these posts using his own account, "Thank you for your concern. We have found a solution. As early as tomorrow morning, the Jiyue browser machine will be back to normal."

Most people don’t believe the post that Lu Shan replied to.

They also learned from multiple channels that Jiyue Browser was the work of a college student startup with limited technical capabilities and funds.

Large Internet companies would have to invest at least millions to find a third party or form their own professional Internet security team. Can Lu Shan do it alone?

Early the next morning, Lu Shan and Zheng Kaige first went to the Jiangzhou Internet Police Detachment and promised that they had perfected the security measures and could operate normally.

The detachment then returned the server to Lu Shan.

In fact, the detachment has limited technical skills, so there is not much point in them taking the server into their own hands.

This kind of case probably won't be solved in the end.

After returning to the server.

Lu Shan informed Zheng Kaige of the firewall upgrade plan and asked Zheng Kaige to implement it according to the plan.

This plan left Zheng Kaige dumbfounded.

It had only been one day, so how could Lu Shan find such a firewall upgrade solution?

Zheng Kaige can understand some of the techniques and knows how difficult they are.

There are many techniques that Zheng Kaige can understand but finds difficult to implement.

Such a large server firewall upgrade plan would be difficult to implement without a team of seven or eight people and one or two months, even if we asked Warwick's security team for help.

Looking for a team to achieve it?

Zheng Kaige didn't hear Lu Shan say this.

So what did Lu Shan do?

possible.

Zheng Kaige admired Lu Shan even more.

He was convinced that he was following such a boss.

After upgrading the firewall, Zheng Kaige restored the Jiyue browser.

It actually took less than forty-eight hours for Jiyue Browser to recover from the attack.

Tianya Forum, the technical experts immediately became excited.

"Back to normal!"

"Jiyue Browser has returned to normal. Let's see how long it can be supported this time."

Wu Xiaodong from UC is currently writing a technical report.

The technical report is to be provided to the external publicity department, which will use some of the contents of the technical report in its own publicity materials and finally hand them over to the news media for release.

The content of the press release is obvious. It is to build momentum for UC and also to prepare a fatal blow to Jiyue Browser.

Just at this time, Wu Xiaodong received an urgent call from the technical department.

The technical department informed Wu Xiaodong that the Jiyue Browser had returned to normal.

Not only can it be used normally, the other party seems to have also optimized the browser.

Wu Xiaodong's face suddenly turned dark.

He took out his mobile phone and opened the Jiyue browser. Sure enough, it worked normally.

After Wu Xiaodong put down his phone, he sent an email.

It seems that Ji Yue is not completely dead.

But it's not a big problem.

The other party replied to the email quickly.

Wu Xiaodong put his mind at ease and continued writing the report in his hand.

At this time, Wu Xiaodong received a call from the External Propaganda Department.

The External Propaganda Department contacted a reporter from Xinlang Technology to interview Wu Xiaodong specifically on issues related to mobile Internet network security and user privacy.

This is part of UC's external publicity, and it was also arranged by Ke Xiaopeng in advance.

As the person in charge of the company's technical security, Wu Xiaodong has the most say in technical security and user privacy.

"Okay, I'll be right over."

The conference room on the third floor of UC headquarters is a carefully arranged interview location.

The color atmosphere of the entire conference room is UC's favorite orange, and there is also a huge LOGO on the wall of the conference room.

The reporter from Xinlang Technology was sitting in front of Wu Xiaodong.

Because both parties have agreed in advance on what questions to ask and how to answer them.

So both of them are more relaxed.

Xinlang reporter: "Hello, Minister Wu. As the head of UC's technical department, what do you think about the fact that some mobile Internet applications not only fail to protect users' privacy after collecting their privacy, but also their servers have been attacked?"

Wu Xiaodong said: "UC has always put user privacy first. At the same time, as a large content service provider in the mobile Internet, we also have a very strong technical team, blah blah blah."

"Mobile Internet is a blue ocean market, and various new startups have emerged in recent years."

"I still recommend that users be cautious and put their privacy and security first when choosing mobile Internet applications."

Xinlang reporter: "We heard that UC has recently launched a consultation function that is very consistent with user habits. Minister Wu, can you explain it?"

Minister Wu smiled and took out his mobile phone, saying, "Our newly launched information function can meet the user's usage habits and push content that they are interested in to users. I will use my mobile phone to explain it to you."

Minister Wu opened the UC browser on his Nokia phone, and suddenly everyone at the scene was stunned.

(End of this chapter)

Loading...