Light Novel Pub

Chapter 254: Stealing the limelight

Chapter 254 Stealing the limelight

There are roughly several ideas for existing firewall technologies. One is packet filtering technology, which monitors and filters the packets flowing in and out of the network and refuses to send suspicious packets.

This method cannot effectively distinguish different users boycotted by the same IP address and has low security.

One is the proxy service technology, which mainly involves running application proxy programs on the application gateway.

On the one hand, it can replace the original client to establish a connection, and on the other hand, it can replace the original client program to establish a connection with the server.

Users can use network services securely through the application gateway, and non-user requests will be ignored.

The last one is multi-level filtering technology, with three levels of filtering measures: packet, application gateway, and circuit gateway. The packet filters out fake IP addresses, and the application gateway controls and monitors general services. The circuit gateway realizes transparent connection between internal hosts and external sites, and strictly controls the services.

Obviously, 306 used a combination of measures to cover various needs as much as possible and enhance its own security.

"Can you understand it? This is the latest knowledge, which seems a little difficult for an old guy." Poincare gave a wicked smile and went to provoke Turing. There were only the two of them here, and it would be boring if they didn't find something to do.

Turing's face suddenly changed. He had actually figured out a clue, but was interrupted and almost blushed. He adjusted his mentality and retorted: "Aren't you also an old guy? How much of the current mathematics can you keep up with?"

"Huhuhu, that's different! Computers come from you, so you are just an old guy in the computer industry. But mathematics has a long history, and I am always young, haha!" Poincare's logic sounds correct.

Turing couldn't find a response at once, so he could only get angry - after being angry for a while, he decided to think of a counterattack to choke the hateful Poincare, but now he should solve the problem of overcoming the firewall first.

"A suitable linear combination of all Dirichlet characters modulo D can express the counting function of an arithmetic series modulo D. Therefore, Dirichlet L-series is closely related to the problem of the distribution of prime numbers in arithmetic series.

We can use this method to build passwords. After setting these conditions, we can quickly find the other party's password pattern. At the same time, we can also use this method to reverse the construction of password measures. As long as our algorithm is more advanced than the other party, others will not be able to find our pattern. "Turing found a way after a few hours.

Simply put, the thickness of the code book in everyone's hand is different. The thicker the code book, the more advantageous it is. It will contain the content in the thinner code book. The Riemann hypothesis is a tool to expand the thickness of the code book. Now that the Siegel zero-point problem has been solved, it will also summarize many situations that others do not know.

It is like a college student looking at a primary school student’s problem. Their knowledge reserves and ideas are obviously at a higher level. This is the tool attribute of mathematics.

The role of mathematics is far more exaggerated than what is said. Mathematics is the foundation of all subjects!

Even if you want to find various particles through the characteristics of the stone, you have to use mathematical calculations, which spans several disciplines.

The essence of mathematics is a tool that can summarize and organize many problems into theorems, saving everyone’s time and improving efficiency.

After a day of preparation, Turing has prepared the code. It depends on the specific situation of 306. He will try it first and then write a more targeted attack program according to the characteristics of the firewall to give 306 a good lesson.

Of course, 306 had no idea that someone was planning a big move, and everyone in the company was in a very excited state.

First of all, of course, the fame has been greatly improved.

306 has been building up momentum, but later felt that there were not enough people who signed up voluntarily, and was also afraid that the people who came to attack were not strong enough, so it actually publicly posted a message to its peers, asking them to test the waters!

This method is very unfriendly and even extreme. It is like competing on the same stage, not only determining who is better, but also deciding life and death. Whoever loses will be remembered as a failure until the next head-on confrontation.

But I can't refuse the public invitation, as refusing would be tantamount to giving in.

306 won all the attention in this way, and for a time the whole Xia country was talking about this matter.

Is this the end of the matter? It's impossible!

Zhou Hong gave instructions that in order to further expand the influence, invitations should also be sent to foreign security agencies!

"Boss Zhou, isn't this too..." Li Bo was so scared that he almost hiccupped. This was tantamount to declaring war on the whole world. He knew the level of those foreign security companies. There was a high probability that 306 really couldn't handle it!

Zhou Hong didn't care at all: "Go ahead and do it! I know what I'm doing."

He knew that 306 had good technology and had fought back and forth with its peers internationally. What if the world's top security companies came to participate? The probability was really low. Those companies would not look down on such competitions. There was no prize money and it was a waste of resources. Who would be such a fool?

Besides, for a truly top-tier company, what would it bring to its reputation if it defeated a company like 306?

A new player challenged Jordan to a one-on-one duel. After losing twice, Jordan refused the third duel and said, "You can brag that you beat Jordan if you win once, but if I beat you, I am still me."

Assuming that the big companies can no longer bear it and 306 really loses, there is still public opinion. At that time, it will be said that it was an attack from multiple parties and 306 was outnumbered. The winner will not win fairly, and although they lose, they will still have an honor, and public opinion will still be in their favor.

Therefore, the companies that really need this opportunity to show their faces are those with relatively small reputations, who are eager to establish their reputations and obtain more orders. 306 is confident in facing such opponents.

When those companies participated in the competition, they all replied to 306, and then 306 disclosed the information of the participants as agreed in advance.

Upon closer inspection, there were indeed quite a few well-known domestic companies, as well as some second- and third-tier foreign security companies. None of the super security companies were eliminated, which made 306 breathe a sigh of relief.

It is impossible to count the number of people participating in the competition as individuals. There are so many hackers in the world, and since they don’t sign up, it’s up to them.

"A certain star is here! A certain mountain is here! A certain master is here! It looks like a real fight between dragons and tigers!"

"Yeah, I'm really looking forward to what's going to happen!"

"306 has released the virtual page, waiting for everyone to break into it. As long as there is an abnormality on the web page, it means that the server has been breached!"

The Internet has begun to pay attention to that virtual webpage, and many people have logged on to see if there is any problem with this webpage. In this era, there is no live broadcast technology, and if you want to watch live broadcasts, you have to watch TV broadcasts. There is no TV broadcast for such events, so you can only log in to the webpage and keep watching.

Laymen watch the excitement, while experts watch the details. 306 was thoughtful enough to put real-time attack data on its official website, showing how many network attacks it suffered every second, which made everyone very excited.

Tens of thousands of attacks per second was already a considerable frequency. Later, the frequency increased to hundreds of thousands of times. It was obvious that those companies were firing on all cylinders, with the peak reaching a million times per second.

Do you think it’s too much?

In fact, it is not so bad. In August 2021, before Lu Shan was reborn, the maximum frequency of DDOS attacks reached 8 million times per second, 1720 million HTTP requests per second. On the one hand, it consumed the host's bandwidth resources and blocked the network. On the other hand, it sent a large number of junk requests. The goal was to exhaust the host's CPU or memory. Anyway, it made the defender's computer unable to think or confused, and took the opportunity to break through.

306 was like a small boat bobbing up and down in the rough sea. Although it was dangerous, it did not flip over.

The attack lasted a day and a night, but the webpage remained unchanged.

The 306 team was on high alert, and many were almost vomiting blood from exhaustion. Zhou Hong also personally took charge, making decisions at key points and changing the defensive strategy. Resources were limited, so they had to be arranged reasonably.

This kind of thing does not rely solely on hard power, sometimes it also depends on luck, you have to have a certain degree of foresight on the enemy's strategy, passive defense is sometimes not enough, you have to take the initiative to disrupt the opponent's deployment. It is not a joke to crawl along the network cable to attack you. Some hackers go off the line and may even be counterattacked by the firewall protection, causing their own program to crash.

"Everyone hold on! The frequency of attacks has dropped, and they are running out of energy. Those who can't hold on can take turns to rest and sleep here. Be careful, the opponent may have some last resort!" Zhou Hong saw the dawn of victory. He also calculated the strength of the opponent this time, and they should not be able to hold on any longer.

Sure enough, a day later, many well-known security companies admitted defeat, saying that their own resources could not be wasted like this, and it would not be cost-effective to continue wasting them.

Individual hackers are even more helpless. This is not a question of who is smarter or not. Attacks also depend on resources. How many infected devices can an individual mobilize to attack the firewall? If the company's professional equipment can't handle it, what can an individual do?

The premise of the World Hacker Conference is that both parties have equal resources and everyone shows off their skills. If one person can really mess up the entire company system, then what is the point of network security companies in this world?

The situation has completely stabilized. With the withdrawal of large companies, the power of small companies and individuals is limited and they cannot break through the 306 firewall at all.

306 publicized this good news in a big way and became the talk of the town for a while. Netizens praised 306's skills one after another and said that he could defeat all opponents without any help.

The school has been following this incident and was very shocked by the strength shown by 306. They did not expect that 306 could actually successfully defend the title.

Gou Siyuan was the happiest. It turned out that whether it was a mule or a horse, it had to be taken out for a walk. It seemed that this matter had been settled, and his own benefits would be in place!

The school has already held an internal meeting, and the calls for 306 from the top school leaders are getting louder and louder. Only Zhu Yajie is still thinking about Lu Shan's comments. However, there are more people in favor, so he can only compromise and announce whether he will cooperate after the defense is over.

(End of this chapter)

Loading...