Super Weapon Exchange System

Chapter 2941: Network attacks

When the meeting ended, it was late at night. Everyone knew what today’s meeting meant. This can also be said to be the beginning of a new era. Starting today, a new network-based virtual currency will Appeared.

Of course, profiting from it is also very simple, because this algorithm determines that it is not difficult to obtain this kind of bitcoin in the early stage. As time goes by, more and more bitcoins are mined, and later bitcoins, It's getting harder and harder to get.

"If you consider from these levels, then we will not only increase the demand for CPU, I am afraid that the demand for graphics cards will be more vigorous." After thoroughly understanding this matter, Mr. Ni said to Qin Guan.

This kind of algorithm will definitely depend on the graphics card. If one graphics card is not enough, it may need two or three. The more the number of graphics cards, the easier the calculation, so in the future, there will definitely be greater demand in this area. And in terms of graphics cards, the performance is naturally a matter of course.

"Yes, we need to add an extra graphics card slot to the motherboards we ship in the future to facilitate future upgrades for users. We also need to adjust the production line to produce more graphics chips." Qin Guan said.

In short, after the Hanxin-3 chip is produced by Samsung, its own production line is empty, and it is easy to adjust the output of various products.

Now, Qin Guan was talking to Mr. Ni while walking, and soon came to the company's technical department.

There are many people here.

Many technical geniuses have a characteristic. The brain becomes active only at night. Therefore, there are not many people here during the day, especially in the morning, but at night, almost everywhere is full.

The tool they use is a computer, and of course, Hanxin Technology Co., Ltd. also equips them with the latest computers, which use Hanxin No. 4 chips. The performance is almost equivalent to a small server produced by IBM.

At this time, in front of a computer, Qiu Xiaojun, who has grown up, is facing the computer screen, constantly thinking about something, occasionally putting his finger on the keyboard, tapping it crackling, and occasionally starting again Into contemplation.

When Qin Guan stood behind him, he didn't notice, he was always looking at the screen in front of him.

Not only the host is the most advanced, but also the computer screen. Naturally, the most advanced LCD screen is used here, which does not flicker and protects the eyes. Moreover, in order to expand the display area, in addition to the front, there is a small on the side. Display screen.

That was the monitor of the previous few years. With the continuous development of LCD screen technology, it will be upgraded every few years, but the original monitor is reluctant to throw it away, so almost all of them are dual-screen display methods to expand the display area. In this way, you can get better work efficiency.

Now, Qin Watch didn't understand what the other party was doing, but looking like this, he must be busy.

Suddenly, Qiu Xiaojun patted the table: "I found it, I finally found it, it's the headquarters of Microsoft!"

He shouted so, everyone around stood up and said loudly: "Yes, it's their corporate headquarters, it's damned!"

"What's the matter?" Qin Guan frowned when he heard the words of Microsoft.

Computers are composed of hardware and software. Some companies are proficient in hardware, some are proficient in software, and some companies are proficient in both software and hardware. Of course, one of the masters is naturally Hanxin Technology.

Hanxin computers are all produced by themselves, including CPU, motherboard, hard disk, graphics card, etc., as well as the software. The boot sound is the same all over the world and no longer changes.

The Eagle Country is different. They pay attention to the division of labor and cooperation. Now they feel the pressure of Hanxin Technology, and they can only stay together for warmth. For example, the central processing unit is Intel's, and then the hardware integration depends on Dell. , IBM and other companies, and the software used in the computer system is used by Microsoft.

Microsoft is bundled with Intel. After all, it is impossible for them to pre-install the Red Flag operating system of China.

Microsoft Corporation is almost following the system of Hanxin Technology Corporation and developed a similar system, but the operating efficiency is very poor, which is also one of the reasons why Intel's processors are criticized by others.

Now, Yingguo has begun to attack Hanxin Technology Company, and at the same time, head-to-head battles in all aspects are proceeding.

"We found that our network system was attacked by DDOS." Qiu Xiaojun said: "It is not troublesome to block this attack, because we already have perfect anti-virus software, but now, we have to follow the vine and find the source of the attack. Now it is finally certain that although they have controlled a batch of broilers as a springboard, in fact, the real controller is Microsoft, and their IP addresses cannot be wrong."

Now, computer network technology was initiated from Han, and has gradually expanded to the whole world. Han and island countries have network exchanges, while island countries have network interconnections with Europa, and then connected to Eagle countries, thus forming a globalization. Computer network.

Although Eagle Country is not very willing, the speed of network development is still very fast. They have to purchase a large number of Huawei’s digital switch equipment to build their civilian networks, because after using this kind of network, they do Feeling the convenience, Yingguo people, that is the most important work efficiency, each network operating company is rapidly expanding their own market.

And with it, of course, there are cyber attacks.

This kind of DDOS is not highly technical. In fact, it sends a large amount of data stream to the attacked object to saturate the other party's network system and prevent them from providing network services. The target of the attack is mainly the servers of various large websites. And now, it is the headquarters of Hanxin Technology, which is simply a threat from Chiguoguo.

Of course, they will not watch this attack. The counterattack is actually very simple. However, a large number of IPs are forged. They must find the real controller. It can also be said that most of them attacked. All of the computer systems are actually innocent, but controlled by others.

Through the springboard, they circulated back and forth in the entire computer network world, and even bypassed three or four, just to hide their identity, and now they can finally determine the source of the final attack.

Microsoft, really can do this kind of thing!

Now that the target of the attack has been determined, the counterattack can begin!