Shi Lei published a post on the Indonesian Internet world, which put Li Jian into a very passive situation.
After all, the video released by Shi Lei was based on the security surveillance camera of the National Independence Monument, and Indonesian experts have already determined it. At the same time, this slightly blurry video record has been identified by a large number of technical experts, indicating that it is
Original video recording without any technical processing.
Therefore, there is nothing wrong with the numbers of the two drones recorded in this video. They are strong evidence that the two drones belong to Li Jian!
"Yizur, start cleaning up the traces of the invasion!" Shi Lei ordered with a smile. Shi Lei was quite satisfied with the easy victory.
"Private, the three-layer protection network is under attack!" Yizuer reminded Shi Lei, and the relevant situation was displayed on the virtual transparent screen of the lip lens information processor.
Yizuer used a graphical display solution to form a spherical network with 324 blue light points, representing the temporary broiler servers that form a three-layer protection network. Among them, the three larger and brighter blue light points are
The core of the three-layer protection network are three small supercomputers.
However, among the spherical network of 324 blue light points, there is a light blue light point that is flashing alternately red and blue light, indicating that the broiler server has been invaded.
Shi Lei was stunned for a moment, and quickly entered the source code on the keyboard with both hands. He was ready to personally inspect the situation of the broiler server. But before Shi Lei entered the temporary broiler server, he had to stop.
Because the invaded temporary broiler server has been breached!
In the spherical network, the red and blue light spots that originally flashed alternately turned into a steady red, indicating the collapse of the temporary broiler server.
"Impossible!" Shi Lei exclaimed!
Although the compromised temporary broiler server is just an ordinary server, the computing performance cannot even reach 0.1tflops. However, as part of the three-layer protection network, it is protected by the endless defense system.
Even its creator, Shi Lei, cannot break through the protective power of the Endless Defense System, let alone other hackers.
"Yizur, what happened to the temporary broiler server that fell? Why didn't the endless defense system stop the invasion?" Shi Lei quickly asked Yizuer.
"Private, the system is temporarily unable to determine the specific situation. The system has been unable to access the fallen temporary broiler server. Private, the three-layer protection network has been invaded again, and the scale of the intrusion has expanded!" Yizuer reminded again.
In the virtual transparent screen of the lip lens information processor, a spherical network composed of 324 light points suddenly appeared. Dense red and blue flashes appeared. Shi Lei could not tell clearly at a glance how many temporary broiler servers had been damaged.
Coming to attack.
Fortunately, Yi Zuer displayed specific data on the virtual transparent screen of the lip lens information processor. A total of 98 temporary broiler servers were attacked.
The composition of the three-layer protection network includes a core small supercomputer and eight high-quality broiler servers. The remaining ninety-nine temporary broiler servers have uneven computing performance and can only be used as auxiliary computing.
The intruder first invaded an ordinary temporary broiler server. Then he invaded 98 ordinary broiler servers. Apparently, he determined the composition of the protection network.
The three-layer protection network suffered a large-scale intrusion. Shi Lei tried to determine the situation of one of the ordinary broiler servers. But something shocking happened to Shi Lei. 98 ordinary temporary broiler servers were collectively destroyed in less than twenty seconds.
was broken through and fell.
Even if Shi Lei takes action on his own, he will not do better!
‘Who is it? What is going on? Did Li Jian Country discover my actions so quickly? And are there experts from the Darpa Advanced Bureau to take action?’ Shi Lei secretly guessed in his mind.
"Private, the first layer of protection network is about to fall. The endless defense system activates the self-destruct code, which is expected to be deleted within three seconds." Yizuer reminded Shi Lei.
At the same time, the first layer of protection network and the last remaining nine temporary broiler servers were also invaded. Even a small supercomputer with a computing performance of 5tflops did not last for twenty seconds before being ruthlessly breached.
Shi Lei watched helplessly as the first layer of protection network was breached, but there was nothing he could do. In less than a minute, Shi Lei didn't even judge the other party's invasion plan.
In other words, the other party broke through the blockade of the Endless Defense System, which made Shi Lei deeply worried. Since the other party can break through the Endless Defense System, can the other party invade the internal network of Dream Entertainment Company?
"Private r, the second layer of protection network was invaded. The intruder adopted a three-stage intrusion plan. 99 ordinary temporary broiler servers withstood the first round of attacks, 8 high-quality temporary broiler servers withstood the second round of attacks, and the core small super
The computer is under attack from the third round." Yi Zuer sounded the alarm.
After the intruder destroyed the first layer of the protection network, it was obvious that it had completely mastered the structure of the protection network and directly used a three-stage attack plan to attack all the broiler servers in the entire protection network at the same time.
The resistance time of the second layer of protection network is only less than one-third of that of the first layer of protection network. Within twelve seconds, the second layer of protection network completely collapsed!
Shi Lei gritted his teeth and said, "Yizur, disconnect from the third layer of protection network!"
"Yes, private!" Yi Zuer responded. Although he directly disconnected from the third-layer protection network and left the information of the remaining connection IP address in the third-layer protection network, after disconnection, he would win for Shi Lei.
Valuable time is used to rearrange defenses.
The three-layer protection network is the outermost layer of defense and the safest area. Fighting in the three-layer protection network was originally the most ideal situation planned by Shi Lei.
But the three-layer protection network did not resist for even two minutes. This is simply incredible!
After disconnecting from the third-layer protection network, Shi Lei personally began to lay out the defense strategy. Shi Lei used three supercomputers in his hand with a computing speed of 15 tflops to form a triangle defense network.
The protection of the triangle defense network is very powerful. No matter which supercomputer the enemy invades, the other two supercomputers can immediately support it.
The three supercomputers in Shi Lei's hands belong to the Wosang Kingdom, the Lijian Kingdom, and the British Empire. Although Shi Lei controls them, he has never used them and only uses them as a backup trump card.
Now the situation is urgent, these three trump cards were revealed by Shi Lei at the same time!
When Shi Lei had just completed the triangle defense network, an unknown and ferocious intruder had already broken through the third layer of protection network, found the connection IP address, and tracked it to Shi Lei.
Faced with the arrogant intruder, Shi Lei also became furious. He directly opened the task simulator, simulated the ongoing tasks of the three supercomputers, and took over all the computing resources of the three supercomputers in order to fight against the ferocious invasion.
square.
In terms of protection power, the triangular defense network composed of three supercomputers with computing resources reaching 15tflops is actually not much different from the protection power of the three-layer protection network.
Although in terms of computing performance comparison, the triangular defense network composed of three supercomputers far exceeds the three-layer protection network. However, in terms of structural complexity and defense strategies, the three-layer protection network is ahead of the triangular defense network composed of three supercomputers.
Triangular defense network.
If expressed in simple percentage data, the computing resources of the three-layer protection network are only less than 35% of the triangle defense network, but the defense power reaches 80%.
Using three supercomputers to form a triangular defense network to resist the mysterious intruders, Shi Lei was not sure at all. Shi Lei just hoped that the triangular defense network could block the intruders for a longer period of time, so that Shi Lei could build more defense networks.
, or reversely analyze the intrusion method of the intruder.
However, the situation was beyond Shi Lei's expectation!
It is not a tragic situation, but a wonderful result. The triangular defense network actually successfully resisted the intruder's attack. The triangular defense network robustly blocked the invasion without too much difficulty at all.
Shi Lei asked with some disbelief: "Yizur, hasn't the triangle defense network been breached?"
"Pr, the endless defense system successfully resisted the intruder's attack. The triangular defense network has not yet been breached, but the system has detected that the intruder is rapidly increasing the computing resources for intrusion data, and the load on the triangular defense network is increasing rapidly." Yi Zuer
Responded to Shi Lei.
Shi Lei quickly said: "Access the computing resources of the iwn secret network to reinforce the triangle defense network!"
"Yes, private!" After Yi Zuer responded, he immediately began to mobilize more than 1,700 tflops of loose distributed computing resources from the iwn secret network and gradually put them into the triangle defense network.
When Shi Lei ordered Yizuer, the load of the triangle defense network had reached 80%, and at the same time, the load was still increasing rapidly.
If Shi Lei hadn't ordered the resources to connect to the iwn secret network in time, I'm afraid the triangle defense network would collapse. By then, even if the triangle defense network had not been invaded, it would have to exit the defense sequence.
As the resources of the iwn secret network entered the triangle defense network to assist in defense, the endless defense system successfully resisted the intruder, and Shi Lei finally had the opportunity to analyze the intruder's situation.
When Shi Lei analyzed the intruder's attack data, Shi Lei discovered how the intruder broke through the three-layer protection network!
.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!