Rebirth of the Internet: Starting from Games
Chapter 259
Chapter 259 Network Attack and Defense War
The situation that Century Zongheng faces now is rather complicated, with all areas being invaded, and we must first sort out our priorities.
This reminded Chen Hao of the busiest time when he had just been a programmer for two years, and one day he had five tasks on hand at the same time.
Develop functions, jointly debug interfaces, solve bugs during the testing period, provide statistical data and support operations students on problems encountered in operating the system, and the time points are all required to be completed before get off work on the same day.
At that time, he was very busy. While developing functions, he also needed to coordinate with other people for debugging. Occasionally, he had to answer technical questions encountered by the operation side. It was really stressful. In the end, he was busy until about 11 o'clock in the middle of the night before he managed to get everything done and returned. When I got home, my head was so swollen that I lay down on the bed and fell asleep without taking off my clothes.
Afterwards, he reviewed and summarized with his boss at the time, and found that although the tasks needed to be delivered today, the importance of each task was different. You can analyze their priorities, and then slice the time you have today, according to time period to complete a single task.
Although the tasks seem to be parallel, the most efficient one is definitely serial. It is genius to work on both sides of the task while still ensuring efficiency. However, most people are not Zhou Botong, so they focus on doing one task well in a unit of time. Things are important.
From the effect to the cause, we can not rush to work at the beginning, but rather spend half an hour analyzing the situation you are currently facing.
For example, the development function to be tested that day has downstream test dependencies and only takes 2 hours, so this is the most important and priority is given.
Interface joint debugging requires cooperation with other departments, which takes an hour. This should be placed second.
In this way, all work is estimated and prioritized, and the delivery time is communicated with related parties, so that it can be completed step by step and serially as planned.
If we follow this method to extrapolate the situation of the day, Chen Hao can get off work at 8 o'clock that day.
This is called methodology.
When a big problem cannot be solved or is difficult, analyze and break it down into several smaller problems. If you still can't solve it, continue to break it down until you find the problems you can solve.
Once the small problems are solved, the big problems will also be solved, layer by layer, recursively upward, and finally the problem will be solved.
In fact, people will encounter countless dilemmas and problems in this life, but looking back in hindsight, the problems that at the time thought were as difficult as climbing to the sky and always wanted to back down, were nothing more than that.
Later, the boss at the time saved enough money and went abroad with his wife and daughter.I don’t know where it is now, Sina?It was time to ask Li Qian to find out. After all, he was once his guide in the IT field.
Now that he encountered a similar situation, he knew how to deal with it.
Having said that, considering the current situation, the highest priority must be games. This is the foundation of Century Zongheng.
Security is an expanding side job, and the social field is for further exploration.
Then the result is obvious.Gaming (Hardware)>Security>Social.
Chen Hao came back to his senses, looked at the people looking at him in the conference room, and had some thoughts in his heart.
The order was issued step by step and in an orderly manner, "Wu Hanqing, all the original research and development work of Century Security's technical team has been suspended, and the technical team is divided into two. One part protects and provides support for network attacks suffered by Century Security, and the other part is Century Security Guard virus detection and killing." For iterative work, give priority to the former, and the latter can be suspended if necessary, understand?"
"Yes!" Although it was different from what he had communicated alone in the boss's conference room just now, in his heart he was actually more inclined to prioritize protecting the Century Security Guards. However, he was currently in a position where he could understand the boss's latest instructions. Considering the overall situation, it was true that Century Giants There cannot be any loss on the hard side.
"Lin Lang, after the support of the Century Security Team, we must ensure the stability of the server. This cannot be compromised! If there is any situation, please report back at any time."
"Yes!"
"Li Fang, find someone to check whether Rising and other traditional anti-virus vendors have any abnormal behavior at the company level in recent months. Let's start the investigation from the release of Century Security Guard on May 5 to now."
<divclass="contentadv">"Yes!"
"Li Wu, except for the cancellation of the planned support from the Century Security Guards, everything else is still going as planned."
"Yes!"
After issuing the order, each of these people occupied a corner of the conference room, made various calls, and began to give orders and arrange the next work.
Later, some senior executives would appear in this conference room from time to time, causing employees working outside to speculate whether something big was going to happen in the company recently. Today, they saw more senior executives than they did in a month.
At the same time, some players who are playing Century's online games find that the game freezes every once in a while.
There were even a few players who were disconnected, but everything was normal after logging in again. However, the impact was not big, so they didn't pay much attention to it. After all, Century Interactive Entertainment's game servers had never had any problems, giving them a rock-solid impression. , none of these players thought about it.
They all thought that the Internet cafe's network was not good, and there were packet losses. Some of them got angry and cursed the network administrator, saying that the network was broken.
On the Century Hardware side, Lin Lang turned on the super-defense mode of the network shield system. Although this mode can effectively resist unknown network attacks, it may cause accidental injuries to individual players.
The overall proportion reaches 0.6%. For the huge player base of Century Interactive Entertainment, tens of thousands of players have been affected, which is unacceptable to Lin Lang.
Century Security dispatched more than 50 technical personnel, while Century Juhard provided both personnel and efforts, with 30 hardware engineers and a total of 100 groups and 500 servers.
With the strong support of the Century Security technical team, they divided these servers into several clusters and set up a link verification filtering and interception mechanism in front of each game network shield defense system, just like in front of all game server clusters of Century Giant Hardware Build a safety barrier to avoid evil.
One party tried every means to bypass the interception and send requests to Century Giant's servers, causing a large number of accesses, thereby blocking the server's link and causing an increase in load.
One side tries every possible means to intercept attacks, screen, filter, and verify them. It can neither kill one by mistake nor let one go. Therefore, defense is naturally passive and disadvantaged compared to offense, and it also tests the team's combat capabilities.
An invisible war is going on fiercely in the virtual network environment of the Internet.
During the stalemate stage, Lin Lang received feedback from Wu Hanqing that he had temporarily resisted the opponent's attack and could turn off super defense first.
Then the hacker masters of the Zodiac were like hunters lurking on the side. Seeing that the situation was getting heated, they began to wait for opportunities to take advantage of the chaos and trace the origin of the attack.
In just 10 minutes, Zodiac had already broken through several defense lines of the opponent, and was about to break through the springboard machine (broiler) to track the opponent's real server.
Obviously, the other side also has experts who are very cunning and very courageous. When they found out that the Zodiac was not an easy person and saw the opponent's sharp bayonet breakthrough, they immediately retreated like a frightened bird. The gecko cut off its tail, leaving only a pile of broilers. Leaving any tail behind shows that the other party is also a group of well-trained masters.
This aroused the interest of the masters, but they did not have the habit of guarding against thieves for a thousand days. This was too inefficient. They spent a day writing a short and concise set of specially designed monitoring and early warning functions, embedded them into the network shield system, and used them on Century Network. The shield team's temporary verification and interception mechanism sprinkles "seeds" with tracking effect and high camouflage and concealment on the key links.
Under the advice of these hacker masters, the newly built security cover was closed, the super defense was lifted, and preparations were made to lure the enemy in.
Waiting for the enemy's next attack, they are confident that they can catch their opponent.
Afterwards, this group of experts directly moved to help analyze and study the mutant viruses of Century Security Guard. Compared with this timid opponent, the research on mutant viruses was obviously more to their taste.
After three days of attack and defense, it finally came to an end.
The situation that Century Zongheng faces now is rather complicated, with all areas being invaded, and we must first sort out our priorities.
This reminded Chen Hao of the busiest time when he had just been a programmer for two years, and one day he had five tasks on hand at the same time.
Develop functions, jointly debug interfaces, solve bugs during the testing period, provide statistical data and support operations students on problems encountered in operating the system, and the time points are all required to be completed before get off work on the same day.
At that time, he was very busy. While developing functions, he also needed to coordinate with other people for debugging. Occasionally, he had to answer technical questions encountered by the operation side. It was really stressful. In the end, he was busy until about 11 o'clock in the middle of the night before he managed to get everything done and returned. When I got home, my head was so swollen that I lay down on the bed and fell asleep without taking off my clothes.
Afterwards, he reviewed and summarized with his boss at the time, and found that although the tasks needed to be delivered today, the importance of each task was different. You can analyze their priorities, and then slice the time you have today, according to time period to complete a single task.
Although the tasks seem to be parallel, the most efficient one is definitely serial. It is genius to work on both sides of the task while still ensuring efficiency. However, most people are not Zhou Botong, so they focus on doing one task well in a unit of time. Things are important.
From the effect to the cause, we can not rush to work at the beginning, but rather spend half an hour analyzing the situation you are currently facing.
For example, the development function to be tested that day has downstream test dependencies and only takes 2 hours, so this is the most important and priority is given.
Interface joint debugging requires cooperation with other departments, which takes an hour. This should be placed second.
In this way, all work is estimated and prioritized, and the delivery time is communicated with related parties, so that it can be completed step by step and serially as planned.
If we follow this method to extrapolate the situation of the day, Chen Hao can get off work at 8 o'clock that day.
This is called methodology.
When a big problem cannot be solved or is difficult, analyze and break it down into several smaller problems. If you still can't solve it, continue to break it down until you find the problems you can solve.
Once the small problems are solved, the big problems will also be solved, layer by layer, recursively upward, and finally the problem will be solved.
In fact, people will encounter countless dilemmas and problems in this life, but looking back in hindsight, the problems that at the time thought were as difficult as climbing to the sky and always wanted to back down, were nothing more than that.
Later, the boss at the time saved enough money and went abroad with his wife and daughter.I don’t know where it is now, Sina?It was time to ask Li Qian to find out. After all, he was once his guide in the IT field.
Now that he encountered a similar situation, he knew how to deal with it.
Having said that, considering the current situation, the highest priority must be games. This is the foundation of Century Zongheng.
Security is an expanding side job, and the social field is for further exploration.
Then the result is obvious.Gaming (Hardware)>Security>Social.
Chen Hao came back to his senses, looked at the people looking at him in the conference room, and had some thoughts in his heart.
The order was issued step by step and in an orderly manner, "Wu Hanqing, all the original research and development work of Century Security's technical team has been suspended, and the technical team is divided into two. One part protects and provides support for network attacks suffered by Century Security, and the other part is Century Security Guard virus detection and killing." For iterative work, give priority to the former, and the latter can be suspended if necessary, understand?"
"Yes!" Although it was different from what he had communicated alone in the boss's conference room just now, in his heart he was actually more inclined to prioritize protecting the Century Security Guards. However, he was currently in a position where he could understand the boss's latest instructions. Considering the overall situation, it was true that Century Giants There cannot be any loss on the hard side.
"Lin Lang, after the support of the Century Security Team, we must ensure the stability of the server. This cannot be compromised! If there is any situation, please report back at any time."
"Yes!"
"Li Fang, find someone to check whether Rising and other traditional anti-virus vendors have any abnormal behavior at the company level in recent months. Let's start the investigation from the release of Century Security Guard on May 5 to now."
<divclass="contentadv">"Yes!"
"Li Wu, except for the cancellation of the planned support from the Century Security Guards, everything else is still going as planned."
"Yes!"
After issuing the order, each of these people occupied a corner of the conference room, made various calls, and began to give orders and arrange the next work.
Later, some senior executives would appear in this conference room from time to time, causing employees working outside to speculate whether something big was going to happen in the company recently. Today, they saw more senior executives than they did in a month.
At the same time, some players who are playing Century's online games find that the game freezes every once in a while.
There were even a few players who were disconnected, but everything was normal after logging in again. However, the impact was not big, so they didn't pay much attention to it. After all, Century Interactive Entertainment's game servers had never had any problems, giving them a rock-solid impression. , none of these players thought about it.
They all thought that the Internet cafe's network was not good, and there were packet losses. Some of them got angry and cursed the network administrator, saying that the network was broken.
On the Century Hardware side, Lin Lang turned on the super-defense mode of the network shield system. Although this mode can effectively resist unknown network attacks, it may cause accidental injuries to individual players.
The overall proportion reaches 0.6%. For the huge player base of Century Interactive Entertainment, tens of thousands of players have been affected, which is unacceptable to Lin Lang.
Century Security dispatched more than 50 technical personnel, while Century Juhard provided both personnel and efforts, with 30 hardware engineers and a total of 100 groups and 500 servers.
With the strong support of the Century Security technical team, they divided these servers into several clusters and set up a link verification filtering and interception mechanism in front of each game network shield defense system, just like in front of all game server clusters of Century Giant Hardware Build a safety barrier to avoid evil.
One party tried every means to bypass the interception and send requests to Century Giant's servers, causing a large number of accesses, thereby blocking the server's link and causing an increase in load.
One side tries every possible means to intercept attacks, screen, filter, and verify them. It can neither kill one by mistake nor let one go. Therefore, defense is naturally passive and disadvantaged compared to offense, and it also tests the team's combat capabilities.
An invisible war is going on fiercely in the virtual network environment of the Internet.
During the stalemate stage, Lin Lang received feedback from Wu Hanqing that he had temporarily resisted the opponent's attack and could turn off super defense first.
Then the hacker masters of the Zodiac were like hunters lurking on the side. Seeing that the situation was getting heated, they began to wait for opportunities to take advantage of the chaos and trace the origin of the attack.
In just 10 minutes, Zodiac had already broken through several defense lines of the opponent, and was about to break through the springboard machine (broiler) to track the opponent's real server.
Obviously, the other side also has experts who are very cunning and very courageous. When they found out that the Zodiac was not an easy person and saw the opponent's sharp bayonet breakthrough, they immediately retreated like a frightened bird. The gecko cut off its tail, leaving only a pile of broilers. Leaving any tail behind shows that the other party is also a group of well-trained masters.
This aroused the interest of the masters, but they did not have the habit of guarding against thieves for a thousand days. This was too inefficient. They spent a day writing a short and concise set of specially designed monitoring and early warning functions, embedded them into the network shield system, and used them on Century Network. The shield team's temporary verification and interception mechanism sprinkles "seeds" with tracking effect and high camouflage and concealment on the key links.
Under the advice of these hacker masters, the newly built security cover was closed, the super defense was lifted, and preparations were made to lure the enemy in.
Waiting for the enemy's next attack, they are confident that they can catch their opponent.
Afterwards, this group of experts directly moved to help analyze and study the mutant viruses of Century Security Guard. Compared with this timid opponent, the research on mutant viruses was obviously more to their taste.
After three days of attack and defense, it finally came to an end.
You'll Also Like
-
Simultaneous Travel: Becoming a Legend in the Heavens
Chapter 178 1 hours ago -
Simultaneous time travel: From Japanese comics to American comics
Chapter 454 1 hours ago -
Billions of dollars in stockpiling: Doomsday begins with nuclear wastewater discharge
Chapter 664 3 hours ago -
Sign in for ten thousand years: This ancestor is a bit strong
Chapter 617 3 hours ago -
Fairy King Dad
Chapter 1371 3 hours ago -
The beginning of the end of the world fusion black light
Chapter 438 3 hours ago -
Destiny Villain: Return the Supreme Bone at the Beginning
Chapter 86 3 hours ago -
Start from the Martial Arts
Chapter 107 3 hours ago -
Infinite Heavens: Start by getting Steve's panel
Chapter 899 3 hours ago -
Naruto: Becoming Sasuke's biological sister at the beginning
Chapter 401 1 days ago