The next day,
Jiang Hao and Zhou Xinyan came to the company and looked up at their company building. The big brand of "Hao Ran Technology" had been hung on it. It was very eye-catching. Now the company office building has been renovated and officially settled in. Here is the headquarters of Hao Ran Technology.
Jiang Hao originally wanted Zhou Xinyan to rest, but Zhou Xinyan said, "I'm the company's CEO. How can I rest? Yesterday you also said that this business may be worth billions, and I can't bear to rest."
Jiang Hao grabbed Zhou Xinyan's hand and shook it. "Okay, our husband and wife are in the same heart, and we pit the two richest men hard."
"The money of the richest man is not good." Zhou Xinyan said.
Jiang Hao smiled, "Sometimes, it's also very good."
Enter through the side door, the courtyard is lined with trees, the car stopped in front of the supercomputing building, Jiang Hao got off and glanced at it. The distant cottage has been built and is hidden between flowers and trees. If there is an independent technology in the future Groups can stay there.
Not long ago, Xiaomao took the lead, not only him, but also Q Teng, a vice president responsible for security, and their security team, about seven or eight people.
The crowd had just trembled, and they hadn't waited for them to enter the building. Two more cars came over. Alima came and took only a few bodyguards. The multitude went through the ridge and entered the supercomputing building together.
At the data center, after everyone sat down, Jiang Hao said with a smile: "Yesterday I mentioned that I got a security suit. Both horses are very interested. Yesterday, Ma Ma called me and agreed to a game. Offensive and defensive, test the performance of my software. Ali claims to have the strongest hacking team, and I still have a little puppet in my heart, so I'm afraid of shame in front of the two brothers. "
"I don't think you're worried at all. Instead, it's me. If I can't break your software with all my strength, then Ali is not ashamed." Alima said with a smile.
Xiao Ma said next: "Then I took Q Teng's security team and opened my eyes next to it. Is it that President Ma's spear is strong or President Jiang's shield is strong."
Jiang Hao looked at Alima, "Brother Ma, are you ready over there?"
"Ready, you're fine here, I'll call to get started over there." Alima said.
Jiang Hao sat in front of a computer. He didn't call Xiaoxin, mainly because he didn't want to expose too many intelligent AI things. After some operations, he started the security defense system, and then sat back next to the two horse bosses.
The front of the data center is a large LCD screen. Data tables appear on the large screen, which shows the various data of the super calculation, as well as the network data. The vice president and security team brought by Xiao Ma, see these data. , You can understand the current situation of supercomputing.
Everyone looked at each other,
"Mr. Jiang, this is all over. Doesn't the security team need to operate the protection?" Alima asked with surprise.
Jiang Hao smiled. "We are trying to test the defense capabilities of this software, and it is not better than hacking attack and defense technology. President Ma, you can let the people on Ali start."
Alima took out her mobile phone and called Lao Wu. After receiving the phone call, Lao Wu immediately organized an attack on Jiang Hao's supercomputing.
Ali headquarters,
In the data center, there were dozens of hackers in two rows, and they quickly found Jiang Hao's supercomputing address.
"Director, can you start?" Someone asked.
Wu nodded hard, "Let's get started, just look at how powerful that software is."
These dozens of white hats can rank among the masters in the country, by various means, OOB attacks, WinNuke attacks, SSPing attacks, TearDrop attacks ..., there are various means, violent and violent.
In the data center of Haoran Technology, people saw that the data on the big screen began to soar in an instant, the means of vulnerability, the discovery of viruses, the interception and analysis of data flashed on the big screen.
Everyone watched for a while, and someone on the Q Teng security team whispered, "The attack is really fierce, with more than one million attacks per minute."
Someone replied, "Not a million times. This is just the beginning. It should only be tested. It will be more fierce later. Don't forget. This time it is a free attack. Don't be afraid to be found by President Jiang. You can use any means. , Even torrent attacks, as long as it can disrupt the normal operation of the opponent's supercomputer. "
"I think President Jiang is hanging here. It is already difficult to fully defend. It is even more difficult to ensure the normal operation of the server, and it is almost impossible under the full fire of Ali. I can't think of it anyway. Which domestic company can do it, and foreign companies are suffocating. "
They are the top people in the industry and are extremely knowledgeable. Most people here also hold an unbelieving attitude, because according to their knowledge, the most powerful artificial intelligence + security precautions can not prevent this. Degree of attack.
You know, this is not a sneak invasion, but a crazy attack, and the security defense of Peace Day is different.
The numbers on the big screen are beating wildly, and the speed is getting faster and faster. After a few minutes of trial and error, the speed has reached the level of 10 million times per minute.
There is an electronic clock on the big screen, and 10 minutes pass.
The supercomputing of Haoran Technology is still intact and has not been broken by Ali's team. Various data show that the supercomputing is running normally.
Alima looked at Jiang Hao and said with some admiration: "Brother Jiang, your security system is very good. I see his potential. Ali, we will be attacked by more than 300 million attacks every day. The cloud shield we developed ourselves It has played a very big role, and I don't think your software loses Yundun. "
Jiang Hao smiled, "Let's continue to look down."
Xiao Ma didn't speak, his eyes were always staring at the screen. He knew Jiang Hao better than Ali Ma. After all, the two were partners. He knew that Jiang Hao was not a big talker, but he attacked Jiang Hao. War has some confidence.
To be honest, he also hopes that Jiang Hao wins. The reason is very simple. The current Q Teng security defense is slightly inferior to Ali. If Jiang Hao wins, whether it is to buy this security set or choose to cooperate, then Q Teng In this regard, the gap with Ali suddenly disappeared.
Twenty minutes passed, Lao Wu's brows frowned slightly, and their team used almost all the means, but the other side's defense was rock solid and impenetrable, as if they had hit the iron plate, which made many people feel very uncomfortable.
"Director, I'm afraid this won't work," said a team leader.
Old Wu touched his chin. He knew that he had encountered hard bones this time and immediately said: "Change the strategy, try the information disguise attack, and send the normal information with the disguised information. According to the rules, they must receive this information. Send Trojans and viruses together. "
...
"Beep toot ~!"
On the large screen of Haoran Technology, a small red light flashed again, and then a large amount of information poured in, no matter whether it was good or bad, the mud and sand rushed into the server together.
"Automatic killing begins!"
A line of Chinese characters is displayed on the screen.
Q Teng's security personnel saw here, some people said: "The virus and Trojan came in, the system started artificial intelligence killing, but I don't know if their level of intelligent program is strong, and too many wrong data are unqualified. Artificial intelligence is a test. "
"Such a huge amount of data cannot be processed manually. It can only be analyzed automatically by artificial intelligence. I remember when Google tested Alpha, the pass rate was only 89.7%." Someone said.
"Yes, I am looking forward to Hao Ran's degree of artificial intelligence."
Everyone looked at the screen and found that under this level of attack, the server was operating normally, and there was a prompt for data killing next to it. This prompt was still 0.00%.
"Do you believe it?"
Someone shook his head. "Not so sure."
There is no wrong killing data generated, which makes many people unbelievable. Is the artificial intelligence used by Haoran's security system stronger than Google's artificial intelligence? If that's the case, it would be shocking.
"But it's useless to fake this thing. You can find it out just by looking back."
"Then keep watching."
Ali Center,
Another ten minutes passed, Lao Wu found that the attack still had no effect ~ www.novelhall.com ~ Frown frowned even tighter, and then ordered, "Retrieve more data resources and increase DDOS attacks at the same time, resulting in network congestion on the other side, See how he keeps it running. "
The hacker group started to call more data resources, and launched a crazy data stream impact on Haoran Supercomputing, like a flood.
But after a while, the team leader reported in surprise: "Director, the attack was invalid. It seems that the other party directly filtered our data and made the data disappear automatically. I don't know what method was used."
Old Wu's eyes rolled,
"Using hardware vulnerabilities, we have enabled us to search for vulnerabilities that have not been announced before." Old Wu said.
Vulnerabilities are everywhere, depending on whether you can find them or not. After finding them, some companies will not publish them, but hide them. As a secret weapon, take them out in case you need them. Or may become a sharp sword in your hand.
Crackling, crackling,
A group of hackers slammed the keyboard, and their fingers showed afterimages. Ten minutes later, someone finally said frustrated, "Head, tried, the loophole on my side is invalid, it should be blocked."
"Head, I can't get in here."
"My director is not good either."
Unpublished vulnerability attacks can be said to be the killer of hackers. This won't work. Lao Wu exhaled softly and said that the vast technology is so powerful that it can make up for so many unpublished vulnerabilities, which is a bit troublesome.
"Calling more data resources and increasing the DDOS flood attack, I don't believe how long his network is, I will not block him." Lao Wu gritted his teeth.
This is a rogue trick. By relying on his own supercomputing to bully people, Jiang Hao also used this trick to block the Google server with a DDOS torrent, and then attacked the Android system.