typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

In HK1191, it is always NHK who is lying on the gun!

Shuangqing City, Shuanghu District.

Shi Lei put on the 'wisdon' vest and joined the battle between Raphael and the unknown hacker. Shi Lei just entered the defense interface provided by Raphael and immediately discovered the problem.

Rafael obtained 400tflops of distributed computing resources provided by Mirui Technology Group, but he did not gain the upper hand and could only block the opponent.

Although the computing resources of iwn secret network are distributed computing resources, the computing resources of 400tflops are no small matter.

Shi Lei scanned Raphael's defense system. After having a rough idea of ​​the defense deployed by Raphael, he quickly began to try to track down the mysterious hacker who invaded Raphael.

"Mr. Feeney, I have started to reverse trace the real IP address of the intruder." Shi Lei said to Raphael through the microphone that changed his voice in the name of Wisdon.

"Roger! Wisdon, there is no problem with defense for the time being, you don't have to worry." Raphael assured.

A smile appeared at the corner of Shi Lei's mouth. It was very funny in his heart that Raphael was so wronged by being bullied. "Okay, Mr. Feeney. I'll leave the defense matters to you!" After saying that, Shi Lei cut off.

The power supply of the voice-changing microphone facilitates communication between him and Yizuer.

Normally, Yi Zuer automatically completes the work of controlling the voice input and cutting off the voice channel for Shi Lei. But this is a voice communication with Raphael. If Yi Zuer makes a mistake in judgment, it will expose a flaw. Raphael

You will know that Shi Lei is Wisdon, and even speculate that Shi Lei is Mr. M.

In order to be safe, Shi Lei directly turned off the power of the voice-changing microphone. This would definitely prevent any accidents. Anyway, it was only the power of the microphone that was turned off, and it did not block the sound of the earphones. If anything happened to Raphael, in the voice communication channel

Among them, Shi Lei can also receive it.

"Yizur, are the remaining computing resources of the iwn secret network ready to be completed?" Shi Lei asked.

The iwn secret network brings together huge distributed computing resources. However, the utilization rate of distributed computing resources is far behind the intensive computing resources of supercomputers.

However, Mirui Technology Group also owns the supercomputer Lightning!

The computing resources of the super computer Lightning. Under the control of Yi Zuer, it has a full 300tflops of computing resources, and no data has been released to the outside world and is kept confidential.

When iwn Secret Network and Super Computer Lightning are combined with each other, the distributed computing resources of iwn Secret Network will become more efficient through the integration and optimization of Super Computer Lightning.

"Pr, iwn secret network resource integration completed 720tflops; supercomputer lightning computing resources, a collection of 88tflops.iwn secret network and supercomputer lightning remaining computing resources to maintain the operation of the brave world and the basic needs of the endless defense system

." Yi Zuer responded to Shi Lei and showed all the computing resource interfaces to Shi Lei.

Shi Lei accessed the 720tflops distributed computing resources provided by iwn.com. Through these distributed computing resources, Shi Lei began to quickly track the intruder's connection IP address.

Due to the huge computing resources, Shi Lei's anti-tracing speed was very fast and very covert. The intruder's first connection IP address was implanted in a first-class broiler.

Although the Intruder's Level 1 broiler has superior performance and can be called a small supercomputer, it only has a computing speed of 2tflops. How can it stop the 720tflops of computing resources controlled by Shi Lei?

In just a moment, Shi Lei controlled the computing resources of the iwn secret network, broke through the first-level broiler's defense, and captured the intruder's connection IP address.

'Well, what on earth is Raphael doing? This intruder's skills don't seem to be that powerful, yet he can't handle it?' Shi Lei thought to himself.

By anti-tracing the intruder's connection IP address, Shi Lei easily broke into the intruder's first broiler server. The whole process did not take more than a minute. Shi Lei had no idea how powerful the intruder's technology was.

'Is it possible that Raphael's technology has gone backwards?' Shi Lei thought, shaking his head, and then traced to the next broiler based on the connection IP address captured from the first broiler server.

The intruder's second IP address relay server still did not cause any trouble to Shi Lei. Shi Lei naturally entered the second broiler server as if he was eating and drinking.

In the next few minutes, Shi Lei killed eight of the intruder's relay servers. Including the previous two, Shi Lei destroyed ten of the intruder's broilers in less than five minutes!

'What the hell? Is this what Raphael calls a master?' Shi Lei once again had doubts in his heart, 'Could he be an offensive master?'

In the hacker world, hackers can be roughly divided into three categories: offensive types, which are proficient in various intrusion techniques. They are extremely sharp when invading and terrible when defending. The representative figure is the second generation hacker organization of Xia State

, the second in command of the Hacker Alliance, Black Tiger.

Black Tiger's intrusion technology can reach the level of first-class, or even a little higher. But as for defense technology, whether it can reach the world's third-rate level is still a big question.

The second type is the defensive type, which is the opposite type to the offensive type. Usually, hackers of this type usually turn to the security field. Most of the network security agencies and security experts in various countries fall into this category.

this type.

The last type, and also the most powerful type, is the all-round hacker. The so-called all-round hacker is just a relative term, it does not mean that he can do everything, but he can attack as well as defend.

Shi Lei is one of the best, with extremely sharp offense and unparalleled defense!

In addition to these three major types of hackers, there are some other categories, such as those who are proficient in anti-tracking, this type can be counted as defensive hackers, and usually this type of hackers also develop into the field of security experts; those who are proficient in tracking can be considered

Become an offensive hacker.

There are also hackers who are proficient in encryption and decryption. Hackers who are proficient in encryption can also develop into the field of security experts; those who are proficient in decryption are naturally considered offensive hackers.

The hacker who invaded and tracked Raphael, judging from the current situation, should be an offensive hacker. In terms of intrusion and tracking technology, this unknown hacker has shown an extremely powerful side.

But in terms of defense and anti-tracking, this unknown hacker is like a rookie and does not match the offensive technology at all.

‘If the other party is an offensive hacker, then he is so courageous!’ Shi Lei secretly admired the unknown intruder in his heart.

Usually, hackers who are not all-powerful rarely fight against other powerful hackers. Unless offensive hackers and defensive hackers join forces, they will try their best to fight against other hackers.

Similar to pure offensive hackers, basically they will not fight to the end with other powerful hackers!

No matter how you say it, Raphael is a world-leading hacker. Ordinary offensive hackers, even if they reach the world's peak level, will not go head-to-head with Raphael.

Among the guys who can become the world's top hackers, which one is a fool? It's not like he has the hatred of killing his father and taking away his wife. Is it necessary to make you fight to the death?

Shi Lei, who had breached ten broiler servers in a row, hesitated for a moment before continuing to carry out anti-tracking work. Regarding this mysterious offensive hacker, Shi Lei also wanted to know who the other party was and why he was fighting with him.

Phil will not stop until he dies.

The connection IP address found in the tenth broiler server served as a clue to track the next broiler server. Shi Lei followed the clues.

However, when tracking the intruder's eleventh transit server, Shi Lei finally felt a little difficult. However, at the next moment, Shi Lei showed a strange expression on his face.

Shi Lei first turned on the power switch of the voice-changing microphone, and then said in the voice communication channel: "Mr. Feeney, I have tracked the eleventh relay server of the intruder. However, there is something wrong with this relay server."

"What's the problem?" Raphael responded immediately. "Is the opponent's defense very strong and unable to crack the defense system of the broiler server?"

"No, Mr. Feeney!" Shi Lei didn't sell it, and said directly: "The eleventh transfer server is the web server of the official website of NHK TV station. I heard that Mr. Feeney, one of your opponents, likes to have trouble with NHK TV station.

?”

The intruder's eleventh relay server was indeed the official website web server of NHK TV station. Shi Lei felt extremely weird about this result.

Is this God helping him?

The transfer server of the mysterious intruder was the web server of the official website of the NHK TV station. With a little guidance from Shi Lei, Raphael would suspect that the mysterious hacker who was tracking the intruder was Mr. M.

"What? Wisdon, are you sure that the intruder's eleventh broiler server is the web server of the official website of NHK TV station?" Raphael was shocked.

Mr. M likes to cause trouble for NHK TV. This is an open secret in the hacker community. In addition, Mr. M always likes to make trouble for Rafael. Any hacking incident involving Rafael and NHK TV is always

It is easy to be suspicious of Mr. M.

After all, Raphael is the world's top hacker. How can ordinary hackers bully Raphael? Only Mr. M is the best suspect and the best person to take the blame.

"I'm sure! Mr. Feeney, what should we do now?" Shi Lei transformed into a wisdon vest and asked Raphael about his next move.

.(To be continued..)

ps:automaticupdate


This chapter has been completed!
Previous Bookshelf directory Bookmark Next