The little beauty in front of the computer is just a software girl.

"Try the newly bought DDoS software. Hey, hey, I want to abuse the rookie on the opposite side and make him cry bitterly!" The little beauty wore a cat's ear cover, a lollipop in her mouth, and said in a vent of anger: "last week, I matched a Chinese Army (the third section), and made, the computer was all broken down by him, and left a message to ridicule me......"

"isn't the technology better? Why do you look down on people? "

Cat ear sister thought of last week's scene, angry chest ups and downs, small fist tightly clenched.

Due to the use of software, they, like plug-ins in the video games, are looked down upon by the hackers in the circle, and even do not admit that they are one of the hackers.

Similarly,

hackers in competitive competitions, if they defeat each other and find out that they are software brothers and sisters, they will immediately ridicule them. Even if the other party is a soft girl, they will not be soft hearted.

This point, they are somewhat similar to the video game players. No matter who they are, as long as they open the plug-in, they will definitely spray it on, not for other things, but for the bottom line and persistence of the industry.

When the hacker e-sports industry no longer talks about personal technology, but relies on some tools, it is completely destroyed.

Cat's ear sister opened the DDoS software and took a glance. The site displayed on the PK page skillfully input the IP address. Then, she said with a smile: "hum, this tool was bought by the God of legendary rank for 3500 federal dollars, which is twice as much as the previous tool. Even if you are the hacker of the Chinese rank, you should be in a hurry The quality of DDoS software is related to the broilers opened by the producers. If the number of broilers is enough and the quality is good enough, the power of a DDoS software is no less than that of professional hackers.

Broiler refers to the number of computers controlled by hackers. Computers that are usually implanted with viruses will become hackers' broilers. If they attack other places by using broilers, they will result in insufficient response resources of broilers, resulting in system stuck, non-stop buffering, and even computer crash. This is often the case for computers with viruses.

Hackers are generals and broilers are soldiers. As long as there are enough soldiers, they can even make up for a certain technical gap.

Cat ear sister for that software, can be said to spend a lot of effort, after a period of hard and soft, from the "God" hand, successfully got the use rights.

This Friday's "afternoon tea" is exactly her first battle out of the division. According to the previous points, she only needs to win the next one (last time she lost to the central army, due to the big difference between the two ranks, sister cat'er's deduction points are very small), she can be promoted to the guard rank and enjoy the new welfare!

Different ranks have different benefits on Osiris's website, such as the auxiliary function of information query: automatic search of keywords, narrowing of search scope, and even query of secret and secret information... The higher the rank of hacker, the more welfare they enjoy.

Otherwise, how could Osiris win over a bunch of hackers? Even more, let them regard a simple intelligence website as the best place for online gathering and the hacker Holy Land in the post PC era!

After all, the birth of virtual devices has gradually threatened the PC terminal (commonly known as the computer), making the online focus of human beings gradually shift to the magical world. It can be predicted that the future PC terminal will gradually decline. The hackers relying on this will also have a feeling of homelessness, and their hesitation and confusion have enveloped them. Only in Osiris' website can they find a sense of existence.

Who would have thought that the PC hackers, once popular for a time, would now become a -

Dead Game

nevertheless, they still stick to it, and fight without smoke every Friday at 3:00 p.m., which is their belief and their persistence.

"IP address input finished... OK!"

Cat ear sister showed a smile, next, she just start the software, let it constantly automatic attack that site, force the other party to choose to quit, give up the site, is her victory!

In any case, the battlefield is a small website without any additional protection, and the defense situation is also full of loopholes. A wave of DDoS can paralyze it, a simple and crude solution.

Osiris set up a battlefield, just a small website with the most initial, server resources are also very limited, does not appear on the search engine, there will be no access from outsiders, only the two sides of the hacker war.

"Tremble in despair, poor rookie."

Cat ear sister gently click the mouse, the next second, DDoS software to start its operation, automatically toward the site, launched a flood of attacks, a wave of spam information also swarmed away.

Taking advantage of this gap, cat ear sister took a look, the other side's head frame is the same as her, is also a guard rank."Well, a vegetable chicken at the bottom, it seems that this is sure." Cat ear sister simply set up her long legs, her back on the chair, very indecent sitting posture, but no one saw: "Shangfen! On the score

At the same time,

at the same time, ye Kong has successfully sneaked into the background of that site through the springboard, successfully deciphers its weak password (pointing to a very simple password), and has obtained the authority of the administrator.

According to the normal process, the battle between hackers is to invade the background of the website. The hacker who first grabs the management authority starts to lay down various means to protect the website. As for the backward hacker, we should try our best to break through the enemy's heavy blockade, seize the management authority of the website, and kick the other party out.

In this process, if the strength of the two sides is equal, their identities will often be exchanged. Sometimes they will be invaders, while they will become defenders. The whole battle will be in full swing. It can be said that it is quite a cross pecking competition.

If the strength difference between the two sides is too big, there will be no suspense in the whole battle. Basically, the powerful hackers always occupy the website, and the weak side will try their best to seize the management authority.

Ye Kong has not been fighting with anyone for a long time. He has a little skill itching on his hand. He does not intend to shoot the other party to death at one time. He just sets up a "simple" firewall and quietly waits for the other party's door.

Then...

"eh? So much junk information? Flood attack as soon as you come up. Don't you try to crack the firewall? "

Ye Kong looked at the data on the screen, not from Zheng for a moment.

The other party's action is unreasonable. If the server is directly destroyed by the non-stop DDoS attack, no one will get any benefits. For example, when two people have made an appointment to gamble privately, one of them suddenly called the police. After the note came, they sealed the gambling house directly. It's harmful to others but not to yourself!

Ye Kong thought for a while, and patted his head to make clear the problem: "I understand. It turned out to be a software girl... In that case, I don't need to keep my hands."

So, ye Kong's slender fingers touched the keyboard, the next moment, as if the wind dancing general percussion.

Dong Dong Dong Dong!

...

at the same time

at the same time

in a slovenly male bedroom

a nearly 30-year-old uncle, leaning back on a chair, is concentrating on attacking a site. His opponent is the same as "Legend" (the fifth section), which can not tolerate any negligence.

When the two sides of the code in full swing, suddenly, uncle found that his chicken is not right, even with a very terrible speed, one by one is dying out.

"What happened?"

Uncle can't help but panic.

......

in the pink boudoir,

"hey hey, half a minute has passed, you should not be able to hold on to it?"

Cat ear sister looked at the time on the screen, as if to see the other party in a hurry, suddenly, her heart is full of pride.

Drop by drop!

Her bracelet suddenly rings.

"Eh?"

Cat's ear girl found that it was the caller. It was the great God of the "legend" rank, so she quickly confirmed the call. As a result, on the other end of the call, there was only one sentence --

"cat's paw rice, CNM!"

Bang!

The call was hung up. At the same time, a prompt pops up on the "client" software of cat's sister: your account is disqualified.

Bang!

Software automatically closed, cat ear sister Leng for a few seconds, subconsciously key software, but got a sentence: "sorry, your account does not have permission to use."

"..."

the cat's ear was lost.

www.novelhold.com , the fastest update of the webnovel!