Jiang Yanhai took a deep breath. To some extent, such an attack is a way when there is no way to break the enemy's computer.

Because of violent attacks, server computing and so on will inevitably be severely impacted, and the network speed will also be impacted, but the network speed is not a problem.

Although the server of such a public library is garbage... Its network dedicated line is still very fast. For modern network dedicated lines, if you want to block the network with tide attacks... You may not need to use several supercomputers.

Jiang Yanhai took a deep breath and quickly operated on the computer with both hands. Similar access requests were directly cloned and removed. Four supercomputers assisted in taking over part of the server's operations. This amount of computation is drizzle for Supercomputing.

He has found that under these tide attacks, people are constantly trying to crack his firewall and are trying to break through the firewall permissions.

Spam attacks such as DDoS attacks and e-mail bombs have been handled by him. Supercomputing and firewall cloning can be used. He directly starts to deal with those who are trying to break through the firewall. In the strong firewall, if you don't have anyone to operate and just let a group of top hackers attack there, they will be broken sooner or later.

I often see the news that how many times the firewall of a company has been attacked by hackers is controlled by security personnel behind it. If there were no security personnel, it would have been broken long ago.

For those who try to attack the firewall, under the response of Jiang Yanhai, they have no way at all.

Jiang Yanhai thought about it. He can't defend passively like this. It's too easy for them. After thinking about it, Jiang Yanhai simply released his anti tracking program directly.

They constantly try to attack the firewall, which means that they must have data exchange with the server. Once they have data exchange with the server, the anti tracking program will bite up in an instant.

The anti tracking program has chased each other's data flow and started to track and invade, but at present, they haven't seen anyone find it, which makes Jiang Yanhai more confident in his program.

It seems that the strength of these hackers is at this level. They still have a gap with the hacker who wrote the super virus.

Two super viruses were found in total. The first virus found in the unmanned stealth fighter was temporarily named "stealth bomb" by academician Bai. The name was named according to the virus bomb set in the unmanned stealth fighter.

Another widely spread super virus discovered by Jiang Yanhai, code named "ghost", is named according to its characteristics. Anyway, it was not discovered before Jiang Yanhai found it.

Jiang Yanhai seriously suspects that the two viruses are written by one person, because they are really very similar in some characteristics. Even if such a virus is not written by one person, it is definitely related to one person, possibly similar to the relationship between master and apprentice.

So if you catch one person, you may find another person, but at present, it seems that this person is not American? Otherwise, why are there more ghost viruses in the United States?

"Ding" a bright red warning prompt box appeared on Jiang Yanhai's screen. When he saw the prompt box, Jiang Yanhai was stunned. The warning was prompted only after someone broke through the first layer of the firewall and triggered the second layer of the real core Defense Firewall.

Just now, those people didn't even break through the first firewall. Suddenly, someone directly began to crack the second firewall?

Jiang Yanhai instantly tapped several keyboards on the desktop, and a data stream directly appeared in his monitoring. At present, after he broke into the first firewall, he is facing the second firewall, but before the second firewall, Jiang Yanhai also built a virtual system.

He now got into the virtual system, just like getting into a sandbox. Jiang Yanhai directly controlled the firewall and several locking programs, and immediately began to capture the data flow of the counter attack.

Under the operation of Jiang Yanhai, the anti tracking program is faster and the breaking program is stronger. It grabs the data flow almost instantly and then tracks it directly.

Jiang Yanhai followed up without hesitation. Those people in front of him set an example. He understood that the one who could touch his first layer of firewall was definitely an expert among the experts.

This may be the legendary big man!

On a farm in Texas.

Cass's computer sent out a harsh alarm.

"Didi... Didi..." the alarm made Cass suddenly burst out of the cold sweat on his forehead. He just quietly broke through the enemy's first firewall, but he didn't wait for any action. The second firewall came directly.

"Fu!" Cass burst out a rude remark. His hands immediately began to knock on his computer. After frantically switching several pages, he directly started several broiler firewalls behind him in advance.

The enemy's tracking offensive is too fierce. You can't run if you want to run. Such a hacker invasion doesn't mean that if you find the enemy tracking you, you can go offline immediately. If you really do so, you will be found and found at the door.

You should know that whether you log in to some computers using broiler or other methods, you will leave a system log, which is inevitable.

If you want a clean retreat, you must clean up all these system logs, and then retreat. The enemy can't track your location.

But if you don't clean up, just go offline directly. All the computers you have connected to have your login information. As long as you look up one by one, you can lock your real position in reality in an instant.

If a hacker is known about the physical address in reality, it is really that plucking Phoenix is not as good as chicken. You can either work in major security companies in the future, or you can help the government directly like x man.

Otherwise, everything will be limited in the future.

Just like Thomas gable mentioned by Jiang Tao before, when he was implementing the plan, the FBI recruited hundreds of hackers across the country at least at once, but some of them were directly killed in advance.

And the rest that have not been killed are those who have not helped them, or just some insignificant small roles.

Cass began to clean his ass at a very fast speed, but he found that he didn't clean fast enough. The cold sweat on his forehead came down in an instant.