home

search

Chapter 36: Feng Xiao Tians Battle with the Hackers

  Chapter 36: Feng Xiaotian's Battle with the Hackers

  Thanks for "Zhi Wei" book friend's reward support!

  At this moment, on the other side of the earth, Feng Xiaotian has obtained control of the server. The first thing he did was to kick out all the people hiding in the background of the server. After doing this, he began to check the core folder of the server. Soon, he got an IP address, which should be the location of the computer behind the server.

  Feng Xiang Tian noted down the IP address, then checked this core folder again, after confirming that there was no mistake, he prepared to exit the server. Since he had obtained what he wanted, he did not plan to continue wasting time here. The hacker competition was still in progress, as long as he had not yet achieved final victory, he would not stop his own footsteps.

  But just as he was about to exit the server, a window suddenly popped up in the bottom right corner of his computer screen displaying the following message: "Warning! Warning! Server 37 has been breached!"

  Feng Xiao Tian was stunned when he saw the message, and then he suddenly realized: I have already gained control of the server, so that's why I can see the server's alert. However, this seems to have nothing to do with the hacking competition, so I guess I don't need to participate anymore?

  Feng Xiao Tian had just thought of this when another message popped up: "Warning! Warning! Number Five has been breached!"

  "Warning! Warning! Machine No. 13 has been breached!"

  Alert messages popped up one after another, in just a few seconds, several computers on the server were breached. Feng Xiaotian knew that this should be the result of other hackers' efforts. Without the timely adjustment of the maintenance personnel behind him, this server finally showed signs of loosening under the attack of the hackers.

  Feng Xiao Tian looked at the continuous pop-up alert messages, smiled slightly, and a thought suddenly emerged in his mind: Why not take this opportunity to test the software program he developed?

  To counter the potential threat of hackers, Fengxiaotian developed two software suites. One is called "Qiankun Dainiyu", a firewall software, and the other is "Dahuilang" software against flood attacks. Since their development, they have not been tested in actual combat, now is an excellent opportunity to try them out, but will he?

  Feng Xiao Tian thought for only a few seconds before making his decision: since he had already obtained the IP of the computer behind the server, he might as well test the results.

  As soon as he thought of it, Feng Xiaotian immediately took action. The server's matrix was quickly breached one after another. Feng Xiaotian didn't dare to slow down. He unloaded the server's own firewall at the fastest speed and then installed "Qiankun Dainiyizhi" on the server. This process took less than a minute, which means that the server completely lost any protection during this minute. It could only rely on its hardware to withstand it. When Feng Xiaotian finished installing "Qiankun Dainiyizhi", the server was left with only a dozen or so machines. It has to be said that these hackers were indeed formidable!

  However, the situation soon stabilized after "Qian Kun Da Nuo Yi" was activated, and no server machines were lost again. As for those computers that had been breached, Feng Xiao Tian immediately launched a "Lost Territory Recovery" operation.

  Although these machines were breached, they did not stop running. They were simply occupied by hackers. What Wind Laughing Sky had to do was to take them back from the hackers' hands. For others, this difficulty was not ordinary, but for Wind Laughing Sky, it wasn't necessarily so. His "Big Gray Wolf" hadn't even appeared yet!

  Feng Xiang Tian obtained a foothold on each machine through management privileges, and then he embedded the "Big Gray Wolf" software into these computers as his base. As soon as he activated the "Big Gray Wolf", the hackers who originally occupied these computers immediately discovered something was wrong, with many people's first thought being: Why did my flood attack suddenly weaken?

  Their second thought was: Oh no! How did my chicken disappear so quickly?

  Their third idea was - no, it can't be called an idea because these people had already started shouting: "xxxx! What's going on? My meat chickens have all disappeared! Ah - and my computer! How did it crash?!"

  The whole process only lasted a few minutes, and then... many hackers' computers crashed, and what's more, their computers were burned down by the CPU due to the massive data processing in an instant!

  Why did Feng Xiaotian achieve such results? This is caused by the hacking methods of hackers and the characteristics of "Da Huilang" software.

  First, these hackers adopted a flood attack mode. In order to occupy the server, they could only slow down the server's processing speed by constantly flooding it, until the server collapsed due to overload, and then they could completely control the server. However, unfortunately, this server was different, it was composed of 100 supercomputers in a matrix, each with an operating speed of over 10 million times per second. So even if the hackers launched a terrible flood attack, these computers still didn't collapse. As for the alarm sent out by the server, it was just because these machines couldn't complete their normal work due to having to process the massive flood attack. That's what the system meant by "being hacked".

  The situation has changed completely since the "Big Gray Wolf" software was launched. The "Big Gray Wolf" is specifically designed to counter flood attacks, and it can transfer all access requests from hackers back to the hackers themselves, making it equivalent to the hackers attacking themselves. The larger the flood attack, the more obvious the effect of the "Big Gray Wolf". Therefore, the first batch of hackers who collapsed were actually the most ferocious hackers. As for the few hackers whose computer hardware was burned out, they are actually the strongest among these people.

  As the "Big Gray Wolf" software ran, the servers one by one returned to Feng Xiaotian's hands. Every time he gained a computer, he immediately installed "Qiankun Dano" on it. After a while, only nine machines were left in the hackers' hands. Although the "Big Gray Wolf" software was running on these machines, it seemed to have no effect. Feng Xiaotian couldn't understand: Why hadn't these hackers been kicked out of the server?

  With doubts, it's natural to look for reasons. Five minutes later, Feng Xiaotian learned the cause of the matter. Three of the nine machines had completely lost their defenses, that is, they had completely disconnected from the server and were controlled by hackers.

  As for the other six, two of them were infected with viruses and had crashed, while one was in a tug-of-war. This one was particularly strange, as the hacker had also launched a flood attack, and the "Big Gray Wolf" software was running, but both sides were stuck in a stalemate. Feng Xiaotian only watched for a moment before thoroughly understanding: it seemed that this hacker possessed a very powerful computer, able to process the data flow lured back by the "Big Gray Wolf" in real-time.

  The last three machines were a bit different, Feng Xiaotian had already gained control of the server, but when he tried to enter these three machines, they refused his access request. It was clear that these three machines had been taken back by the organizers of this competition, who had the core code of the server in their hands, and Feng Xiaotian naturally couldn't think of a way to deal with it.

Recommended Popular Novels