The End of Technology

Chapter 67 Is this a forum for gods?

Most of the people who hang out in the March forum are technical experts. Of course, they don't all like the only moderator of the forum and the builder of the forum - Mr. March. But even those who are extremely disgusted with Mr. March's style may not express it with their mouths, but in their hearts they are still convinced by March's superb skills and keen sense of smell.

There is no way, things like hacking technology can really be tried.

Finding Mr. March on the Internet can be said to be something that every member of the March Forum has been trying to do. Anyone who has tried it will know how difficult it is. Anyone who surfs the Internet will leave traces, but this March-sama seems to have never left any traces on the Internet.

This may not be accurate. It should be said that every pursuit will eventually lead to a dead end. What makes these people feel even more uncomfortable is that March seems to particularly like dealing with funeral homes. Every time 80% of the final clues are traced to the server where the official website of a certain funeral home is located...

Some people regard it as a warning, and some people think it is a provocation, but no matter what, Master March's anti-tracking and hacking skills are extremely superb and have already reached a consensus among the members of the March Forum.

Such a technical guru suddenly pinned a post containing an algorithm attachment to the top of a post, and even spared no effort in praising the algorithm. Naturally, it aroused the curiosity of almost everyone in the forum.

You must know that March Baike Forum is definitely one of the forums with the most active members in the world. Even though there are 20% to 30% of members who rarely post messages, they log in every day and peek at the screen. For many people, this is one of their daily jobs.

Get paid to participate in technical forums.

So naturally, after the source code was uploaded, coupled with Mr. March's comments, it was downloaded more than 1,300 times within an hour.

Don't be afraid of not knowing how to use it.

Along with the source code, there is also an incredibly detailed documentation, which is bilingual in Chinese and English. It introduces in detail the functions and characteristics of the algorithm and how to arrange the test system environment. As for which method to use for testing, How to conduct the test is up to the downloaders themselves.

For example, algorithm functions include helping websites to completely defend against malicious crawlers, having an effective protection rate of over 95% against DDOS attacks, supporting a variety of network environments, etc.

Of course, the document also solemnly reminds that the algorithm source code is free for researchers to download, test and use. As long as it is not used for commercial purposes, it can be used permanently for free. But if it is used for commercial operations, you need to purchase an activation code.

This prompt uses twelve mainstream languages ​​​​in the world, including Chinese, English, French, German, Korean, Japanese, Spanish, Arabic, etc...

At the same time, the document is also rigorous enough to provide extremely detailed explanations and definitions for various commercial usage situations.

For example, what is the price of directly using packaged software to protect your own website from attacks? What is the price of applying this algorithm to network equipment so that network switching equipment can shield malicious crawlers and defend against DDOS attacks?

Of course, I didn’t forget to leave an email address at the end of the document for easy contact. Naturally, the email address is Ning Zi’s personal email address, which is also Ning Zi’s only email address. The contact email used when submitting manuscripts to "Annals of Mathematics" is the same.

Tan Ming is carefully reading the documentation of the turbulence algorithm. As a member of the Network Equipment Division, he belongs to the Pilot System Department of Huaxia Youwei Company.

The full name of the pilot system in Youwei Company is the intermediate trial production department. This is a department between the R\u0026D system and the production system. The general meaning is that new products will be trial-produced first, and only after they are confirmed to have no problems will they be handed over to the production system for mass production.

In short, this is a department that does dirty work, and the salary is definitely not as good as that of R\u0026D positions, and some positions are even worse than those of the production system.

Fortunately, the technology stored in promising network equipment has been extremely mature in recent years, and things are much less common than in previous years. But within Youwei, having less things to do can only be said to be relative.

Just like Tan Ming, he was assigned a job to focus on the March Forum.

Now it seems to be valuable. For example, the turbulence algorithm is very interesting to read and can defend more than 95% of DDOS attacks.

People outside the industry most likely don’t understand what this concept is.

In fact, network security risks have never ceased.

In particular, the servers of various games and financial systems are the hardest hit areas.

Tan Ming has been paying attention to various security reports released by the Network Security Alliance, such as the DDOS attack security report, and the data shows that it is not optimistic. For example, reports in the first half of this year show that more than 160,000 DDOS attacks have occurred in China alone, an increase of 176% year-on-year. The total number of attacks with a peak value of 50-100Gbps increased by 136% compared with the first half of last year, with a peak value greater than The number of 300Gbps attacks increased by 511.2% year-on-year in the first half of the year.

Of these attacks, 14% of the C\u0026amp;amp;C control ends were located on cloud hosts. All well-known cloud servers in China are involved, including Youwei Cloud. Not only that, these attacks have begun to involve the Internet of Things field that Youwei has begun to lay out.

As for all kinds of malicious web crawlers, it is a headache for countless technical personnel.

Crawler technology has been made public and is indeed needed. Search engines must use this technology to provide services. It's nothing more than the difference between good intentions and bad intentions. How to distinguish them is a world-class problem.

So you can imagine how intense the inner activity of Tan Ming, who was reading the instruction document at this time, was.

If the technical parameters given in this document can be realized, it will mean a truly comprehensive upgrade in network security protection, and the IP/TCP protocol loopholes that were once almost unsolvable will finally be filled.

According to the description in the documentation, large-traffic DDOS attacks will only cause short-term network fluctuations, and can only be blocked by an environment with a turbulence algorithm deployed. These spam messages will no longer receive a response from the server, and the three-way handshake link will be cut off directly. The chance of a wrongful conviction will be less than one in a trillion.

After finally reading the document carefully from beginning to end, Tan Ming immediately opened WeLink and prepared to shake people.

As an industry veteran who has been in this industry for more than ten years, Tan Ming certainly understands the weight of this algorithm. In fact, this is probably the reason why he guards the forum every day.

It is no exaggeration to say that this thing can directly change the current pattern of Internet security around the world. He couldn't estimate the specific value at all, because it was an astronomical figure. He couldn't even figure out why the author would just throw it on the forum...

What kind of March forum is this? This is a fairy forum!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like