After a while, Su Muxin calmed down.

Tired all morning, feeling a little hungry, she subconsciously looked in Lin Yu's direction.

After realizing that he seemed to have just finished dealing with work matters, Su Muxin's eyes lit up, and she looked at him pitifully: "Uncle, I'm hungry, I want to eat Kung Pao Chicken."

After finishing speaking, she blinked her big watery eyes at Lin Yu, as if she thought I was cute.

Lin Yu: "..."

Although it is said that this little kid looks like Su Muyun seven or eight points, but Lin Yu doesn't know why, he can't find the slightest trace of Su Muyun in her.

I don't know if it's because of her personality or a difference in temperament. Lin Yu has nothing to do with her acting like a baby.

"Well, just wait."

Lin Yu glanced at her, then looked at the time on the computer that it was already [-]:[-], responded lightly, and said lightly.

After all, he walked towards the kitchen amidst Su Muxin's happy smile.

After simply washing the rice and cooking, Lin Yu asked Su Muyun what he wanted to eat, and the answer he got was the same as what he thought, which was sweet and sour pork.

Soon, after more than an hour of busy work, the three dishes and one soup are slowly coming out of the pot, which are sweet and sour pork tenderloin, Kung Pao chicken, braised pork ribs, and seaweed egg drop soup.

Finally, Lin Yu also prepared a plate of after-dinner fruits to ensure balanced nutrition.

After the three of them had a simple lunch, Su Muxin obediently washed the dishes.

As for Su Muyun, because she didn't sleep well last night and morning, she wanted to take a nap and take a nap.

Of course, after hearing the good news, Lin Yu also said with a smile that he wanted to go together.

However, his suggestion was ruthlessly rejected by Su Muyun as soon as he put it forward.

Because she knew that once Lin Yu went, it would be the same as in the morning.

In this way, she will not be able to broadcast the live broadcast in the afternoon.

In fact, with Lin Yu's current wealth, even if Su Muyun doesn't live broadcast, he has been supporting her, and the two of them can still live well.

However, Lin Yu never told her about it, because he knew in his heart that with Su Muyun's temperament, he would never be a canary attached to him.

After all, the lives of two people need each other to support and maintain each other. This kind of thing has nothing to do with the amount of income.

After the suggestion was rejected, Lin Yu could only watch Su Muyun go back to the bedroom to sleep alone.

On the other hand, he returned to the living room helplessly, preparing to continue typing codes in the afternoon to complete the defensive wall.

At the same time, Su Muxin just finished washing the dishes, and the two sat on the sofa in the living room again, each holding a computer, busy with their own affairs.

Around 01:30 noon.

After typing the last condensed code in my mind, the last program on the display is slowly formed.

And with the formation of this last program, the firewall of the entire computer is also completely completed.

A firewall, in simple terms, is that all network communications and data packets flowing in and out of a computer must pass through it, just like a wall, blocking the connection between the outside network and the inside network.

It can be either a dedicated piece of hardware or software that sits between the computer and the network it is connected to.

The firewall edited by Lin Yu belongs to the latter, and it is a software built on dedicated hardware.

Looking at the firewall with countless calculations and thousands of programs on the screen, Lin Yu also nodded in satisfaction and turned off the [Super Brain] skill.

This firewall, Lin Yu intends to name it the "Great Wall".

As for why it was named after the "Great Wall", it was because Lin Yu felt that if others wanted to break through their own firewall, they had to go through many difficulties and obstacles before they could reach their feet, just like the Great Wall stretching thousands of miles.

Currently, the entire "Great Wall" firewall has three lines of defense.

The first line of defense consists of countless broiler chickens forming defensive nodes, forming the outer wall of the "Great Wall".

As long as someone attacks the outer wall, the data packets sent by the intruder through the DDOS attack will be equally divided among all bots, allowing them to process those useless data packets.

That is to say, if the intruder wants to break through the first line of defense of the firewall, he needs to break through all the broilers in Lin Yu's hands first.

This can only be done by DDOS attacks, other means are useless at all.

Of course, in addition to this method, if the intruder wants to break through Lin Yu's firewall, he can also find its loopholes to achieve the purpose of breaking through the firewall.

It's just that, with the firewall arranged by Lin Yu's near-god-level computer technology, to put it bluntly, hackers around the world basically can't find any loopholes.

Therefore, they have no other way except to use DDOS attacks to break through the first layer of defense of the firewall.

When using DDOS attacks, it is necessary to compare the number of bots and auxiliary machines on both sides, and also to look at the configuration of each computer on both sides.

This is equivalent to the two camps fighting in ancient times. Whoever has more soldiers and who has stronger soldiers can win.

Generally speaking, the number of troops on both sides will be estimated before the war, which is also the prerequisite for all hackers to use DDOS attacks.

But this first line of defense is different. Its strength cannot be estimated, and it can be increased at any time.

Because one of its programs is bound to the chicken catching tool on Lin Yu's computer.

Once it is found that the broilers have collapsed and disappeared, or the number is not enough, the broilers on the chicken catching tools will be continuously replenished into the first line of defense.

It is guaranteed that it can continue to fight in an infinite loop until all broilers collapse, or the chicken catching tools are too busy.

It can be said that the first line of defense of the "Great Wall" firewall may not be the most difficult, but it is definitely the most troublesome and desperate for intruders.

Of course, this first line of defense only stops the vast majority of hackers.

For those veteran hackers who use their own attack methods, they only need to manipulate the source point to attack by gathering points to break through the first line of defense.

This would put them into a second line of defense that was dedicated to them.

The second line of defense is composed of high-end auxiliary aircraft, forming the inner wall of the "Great Wall".

They are bound to each other with various tools in Lin Yu's computer.

Once an attacker among hackers enters the second line of defense, a high-end auxiliary machine will be connected to the attack tool in Lin Yu's computer, and then attack each other with the intruder until they kill each other.

If it is an intruder-like hacker, there will naturally be another high-end auxiliary machine connected to the intruder tool to bombard and kill the intruder.

Not only that, these high-end sub-machines can also cooperate with each other to form a special combination of invasion, defense, and attack, which is very powerful.

Basically, it is more than enough to deal with veteran hackers, unless it is a hacker who can continuously loop, otherwise it will be useless.

As for the last line of defense, it is composed of Lin Yu's own machine, which is also the simplest and purest line of defense.

Because Lin Yu only set up a solid defense program and an early warning program in it.

This defense program is a small firewall edited by Lin Yu alone, which can block all DDOS attacks by ordinary hackers or the attack patterns of experienced hackers.

And once this program is started, Lin Yu's computer host will fully defend against all external attacks within 3 minutes and issue an early warning to Lin Yu.

After the warning, it is necessary for Lin Yu to deal with the intruders himself.

However, Lin Yu felt that there should not be any intruders in the world that he could solve by himself.

Just when Lin Yu was looking at his firewall contentedly, Su Muxin's computer not far away suddenly issued an alarm sound like a "down" machine

Hearing the familiar siren that the firewall was invaded, Lin Yu came back to his senses, raised his eyebrows, and subconsciously looked in Su Muxin's direction.

I saw Su Muxin who was lazily leaning on the sofa with the computer on her lap, but now she was sitting upright, her eyes fixed on the computer screen, her expression was tense, her complexion was a little pale, and her brows were filled with a smile. shares worry.

Seeing this scene, Lin Yu quickly got up and walked over, looking at her computer screen.

With just one glance, Lin Yu found that Su Muxin was fighting an unknown hacker.

No, it's not so much a battle, it's more like a one-sided chase.

Because in the green war of hackers, apart from destroying or being destroyed, there is only chasing or being chased.

Obviously, Su Muxin belongs to the second type now. She was chased by the opponent and had no strength to fight back, so she could only run wildly in the chicken and springboard.

It's just that, seeing her running speed, Lin Yu knew that she was not good at this kind of thing.

"How did you provoke someone?"

Looking at the Samsung risk index displayed in the firewall program on her screen, Lin Yu couldn't help asking.

Star risk index, this is the security level of the firewall on Su Muxin's computer.

There are five stars in total, the higher the star, the safer, and the lower the star, the more dangerous.

At present, all firewalls on the market have only three security levels: low, medium, and high, and the default is generally medium.

But every hacker with technical content will set up a firewall by himself, so the security level of each hacker's firewall is different.

Just like Lin Yu's "Great Wall" firewall is a progress bar divided into three security levels, namely 30%, 60%, and 90%.

Each security level corresponds to the three defense lines of the firewall. Once it reaches 90%, the system will frantically alarm and whistle, non-stop.

After hearing Lin Yu's question, Su Muxin forgot the sense of crisis for a while, and couldn't help but stare at him with wide eyes, and said in shock: "I'll go! Uncle, you can understand what I'm doing? !!"

God, she thought Lin Yu didn't know anything.

You must know that there are five or six windows open on her computer screen, which are full of various calculation programs and corresponding tools.

If it weren't for hackers, ordinary people would never understand what they were doing.

In the end, the uncle could tell at a glance. Doesn't this mean...

In this regard, Lin Yu just glanced at her lightly and didn't say anything.

Who does this little brat look down on?

With her level of operation, I still can't understand it?

Just like her, Lin Yu bluntly said that tens of thousands of himself can hang her up and beat her.

While speaking, a large number of broilers in the broiler tool on the computer screen disappeared instantly, and then, a large wave of data streams caught up with Su Muxin's original data stream (origin point) while fleeing

At the same time, the local system was hacked, and the firewall sounded an alarm again. The original three-star danger index instantly dropped to two stars.

Seeing this scene, Su Muxin instantly came back to her senses, her expression was a little flustered.

At this moment, she has less than [-] broilers left, and only two auxiliary machines. If this continues, she will definitely be caught up by the other party, and her real IP address will be exposed!

If it was before, before the other party found her broiler IP, she would be able to forcibly log off by disconnecting from the Internet.

But it is impossible for her to disconnect from the internet now.

Because once you go offline forcibly, the other party will track you to your own machine step by step through the back door you left on the broiler.

In that case, your real IP address will still be exposed, it's just the length of time.

In fact, if Su Muxin was using someone else's broadband, then she could forcefully log off and run away.

Because even if the other party finds out the real IP address, it is from the company that installed the broadband, and your own information and real address will not be exposed

But the problem is that she is using her own broadband now!

Once they are forcibly logged out, the other party will find Su Muyun's real address, not Su Muxin's!

Because the broadband at home was installed in the name of Su Muyun, and the Information Bureau of Shanghai has her detailed information, as long as the other party looks for it, they will be able to find it.

This truth is not only clear to Su Muxin, but also to Lin Yu.

For this result, Lin Yu sighed helplessly.

This little brat can really cause trouble.

However, the other party also came at the right time, just as my "Great Wall" firewall had just been completed, so let's use him to try the effect.

After making up his mind, Lin Yu returned to his seat, tapped on the keyboard with both hands, and said to Su Muxin: "I will open port 7331 for you, and you can directly connect to my system, and I will resist him."

After speaking, Lin Yu quickly opened the port on his system.

"what?"

Hearing this, Su Muxin was obviously taken aback, and even the movements of her hands paused for a while.

However, before she could think about it, her original data flow was hit by the pursuit data flow behind her again, and the security level of the firewall instantly dropped to one star!

One star, this is an extremely threatening state!

This means that Su Muxin's firewall will be destroyed by the other party at any time in the next second, and then she will directly find the real IP address!

Immediately, harsh sirens sounded one after another.

Seeing this, Su Muxin didn't care about other things, and quickly found Lin Yu's open port 7331, and connected to it.

After seeing Su Muxin's successful access, Lin Yu closed the port calmly, then opened the "Great Wall" firewall, adjusted the security level to the maximum, and activated all three defense lines.

At the same time, the source data flow that was chasing after Su Muxin just happened to catch up.

Seeing the brand new firewall in front of him again, the other party was stunned for a moment, and immediately realized that someone had come to meet Su Muxin.

However, what surprised Lin Yu was that after seeing him, the other party launched a tentative attack on this brand new firewall without any hesitation.

A series of attack data streams rose from the opponent's original data stream, and all of them bombarded the outer wall composed of hundreds of thousands of broilers.

The outer wall of the first line of defense is composed of dozens of thick data sets with huge cross-sections, which is simply outrageous.

Therefore, when the streams of attacking data hit it, it did not cause any substantial damage to the outer wall at all, and it could be said that it remained motionless.

If Lin Yu's security level data bar is accurate to 0.001, he should be able to find out that the other party has just launched an attack for a short time.

The speed must be very fast, because if it is slower, the data bar will be restored to full health in an instant.

Well, that's an exaggeration.

Therefore, after seeing this scene, Lin Yu also smiled with satisfaction, even if he let the "Great Wall" firewall operate alone.

He cast his eyes on Su Muxin, who was lying softly on the sofa, her chest was heaving violently, and she looked like she had survived a catastrophe.

Seeing her embarrassed appearance, Lin Yu said calmly, "tell me what's going on."

Hearing this, Su Muxin didn't answer right away, but breathed a sigh of relief, and then said slowly: "I saw in a post of the Honker League that the Baqi group and the Fengmang group were engaged in a green war, and then I I went to the virtual battlefield to have a look and observe for a while."

"In the end, I felt a little itchy, so I killed a few peripheral members of the Yaqi group, and then I was hunted down by one of their group leaders..."

Speaking of this, her voice also weakened, and she couldn't help but secretly glanced at Lin Yu.

"you sure?"

Hearing this answer, Lin Yu couldn't help but glanced at the Japanese hacker who seemed to be crazy and kept attacking his firewall, looked at her expressionlessly, and said.

Does this little brat think he is stupid?

If she hadn't done anything excessive, why would the hackers attack her firewall so frantically today?

However, although this little brat did something stupid, he did it beautifully.

"Uh……"

Seeing Lin Yu's expression of "believe it or not", Su Muxin also smiled at him embarrassingly, and obediently confessed: "Well, I just killed more than a dozen people from the Baqi group Peripheral members, and then bombarded and killed more than a dozen in a virtual battlefield in the morning, adding up to more than 30."

"Who knew that the peripheral team leader of the Yaqi group was so impatient, I only destroyed a dozen of their peripheral members, just like mad dogs, chasing me all the time."

At the end, Su Muxin seemed to be a little bit angrily muttering something in a low voice.

Lin Yu: "..."

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like