"Private, the third assessment server was breached by a mysterious hacker!" While Shi Lei was meditating, Yizuer reminded Shi Lei that the mysterious world-level hacker had broken through the limitations of the third assessment server.
Shi Lei's expression did not change. Since he has determined that the other party is the world's top hacker, how can it be surprising that the other party easily broke into the third assessment server?
"Increase the computing resources of the fourth assessment server, directly to 100tflops. In addition, improve the security policy mechanism of the fourth assessment server, and use the black magic subsystem to counterattack!" Shi Lei ordered.
Although the loose distributed computing resources provided by iwn secret network are not as good as the intensive distributed computing resources generated by supercomputers in terms of consistency, coordination and controllability.
But a full 100tflops of computing resources is almost equivalent to 15-20tflops of intensive distributed computing resources!
Shi Lei tried to use the method of crushing computing performance to test the bottom line of the top hackers in the mysterious world and see if the other party could mobilize enough resources to fight.
In today's hacker world, the situation of directly invading and defeating supercomputers or satellites through a mere laptop no longer exists.
The computing performance of a laptop is limited, and no matter how powerful the technology is, it cannot bridge the gap in hardware disparity.
To give a simple example, when a laptop runs large applications, or runs too many applications, the CPU usage will increase. When the CPU usage gets closer and closer to 100%,
The operating system will experience overall lag and be unable to perform new tasks. It may even crash directly.
This situation also occurs in hacker wars. When a world-class hacker with 1tflops of computing resources meets a world-class hacker with 100tflops of computing resources. Who will win the battle between the two?
Although the gap between a super-class hacker and a world-class hacker is very obvious, it can even be said to be a world of difference. However, the gap between 1tflops computing resources and 100tflops computing resources can no longer be described as a world of difference.
The gap between computing performance cannot be expressed by simple multiples. It can only be expressed by the relationship between 0 and 1, only what can be done and what cannot be done.
1tflops computing resource, in the hands of ordinary people, may only be able to do work with a computing speed of 1tflops, but in the hands of experts. It may be possible to do work with a computing speed of 3tflops, but it is absolutely impossible to do work with a computing speed of 10tflops!
When a 100tflops computing resource meets a 1tflops computing resource head-on, it is like a balloon with a capacity of 1 liter trying to fill 100 liters of air.
Although the material of this balloon is very good and has certain pressure resistance, it can hold more than 1 liter of standard air, but it must not exceed too much. Once the limit of this balloon is exceeded, it will only explode.
Shi Lei hopes to use 100 tflops of computing resources to test the trump cards of the top hackers of the mysterious world. If the top hackers of the mysterious world want to have fun and want to compete with the fourth assessment server, then 100 tflops of computing resources will be used.
It will give him a big surprise.
The black magic subsystem will give him a big surprise!
The Black Devil subsystem is an upgraded version of the Black Devil software. Shi Lei and Tao Wenxian refined the Black Devil software and made the attack methods of the Black Devil software better. At the same time, it was completely integrated into the main system framework of Yizuer. Yizuer
You can use the deep natural logical thinking module and the independent inductive learning and judgment module to obtain information from the Internet and learn better attack methods and defense methods.
After tests by Shi Lei and Tao Wenxian, Yi Zuer controlled the black magic subsystem, and when coupled with the endless defense system, it was almost like gods blocking gods and demons slaying demons.
First of all, the combination of the endless defense system, the iwn secret network, and the supercomputer lightning has ensured that Yizuer is invincible.
Secondly, the diversified attack methods of the Black Demon Subsystem, coupled with Jackson's ability to handle multi-threaded tasks, make the attack intensity of the Black Demon Subsystem comparable to world-class, or even exceeding world-class, almost approaching the world's peak level.
Shi Lei and Tao Wenxian once tried that if the firewall software was not written in advance, it would only be a temporary defense against Yizuer and the Black Devil subsystem. With equal resources, two world-leading hackers could not stop Yizuer and the others.
minute.
This is not because Yi Zuer is really amazing, but because Yi Zuer cheated!
Yes!
Cheating!
Yizuer's multi-threaded task processing capabilities, even though Yizuer uses the same computing resources as Shi Lei and Tao Wenxian, Shi Lei and Tao Wenxian did not write firewall software in advance, so it is impossible for them to fully use all resources.
To put it simply, Shi Lei and Tao Wenxian were unprepared and faced enemies several times their size at the same time, so of course they couldn't defeat each other.
They also conducted another test. After they were fully prepared, even if the computing resources they used were only half or even one-third of Yi Zuer's, Yi Zuer couldn't do anything to them.
Of course, they can't defeat Yi Zuer!
After all, the endless defense system written by Shi Lei is simply an endless loop that cannot be broken. No matter what the attack method, the endless defense system is a simple rejection.
Now, Shi Lei is ready to let the top hacker in the mysterious world have a taste of Yizuer's power!
Suppose this mysterious world-level hacker, with his powerful background, figured out how the fourth assessment server used 100tflops of computing resources, and still chose to fight against the fourth assessment server. At the same time, he also mobilized a similar huge amount of computing resources.
With resources, Shi Lei will be more likely to determine the identity of the other party.
In a room of unknown location, the mysterious world-level hacker was testing the fourth assessment server. When the data fed back on the computer screen was displayed, the mysterious world-level hacker let out a light sigh, and then laughed.
Laughed loudly.
"That's it! That's it! Cunning h! The difficulty of the third assessment server has reached a world-class level. I was still thinking about whether the fourth assessment server would be super-class difficulty or another difficulty. It's just that
I didn't expect that this would be the case!" The top hacker in the mysterious world said with sudden realization, and then took off his gloves.
When the gloves are taken off, the slender fingers are exposed, like the hands of a pianist.
The top hacker in the mysterious world crossed his fingers with his hands, turned them from the inside out, and then moved his fingers again. He said to himself with excitement in his voice: "I haven't moved for too long, I want to see what this h has."
What a conspiracy!"
The top hacker in the mysterious world didn't know that Shi Lei was secretly observing him. The difficulty of the fourth test server was indeed the best in the world. But Shi Lei gave him a trick and made him mistakenly think that the fourth test was a scam by H.
The difficulty is suddenly raised to a huge level, just to leave a gimmick of a legendary level and a bonus of 100,000 US dollars a month.
In the hacker world, the technology has reached the world's first-class level. Basically, there are organizations, either hacker organizations, official organizations, or commercial companies. There are very few people who act independently.
This top hacker in the mysterious world thought he had seen through H's scam, but in fact, these guesses were all just his self-righteous guesses!
As the lyrics go: 'What I think is just what I think!'
Shi Lei did not set up any scam at all. No, Shi Lei did set up a scam, but it was not a scam for recruiting information, and he took the initiative to expose his identity.
This scam is completely inconsistent with what the top hackers in the mysterious world had guessed!
As the saying goes, one wrong step will make you wrong every step of the way!
When the top hacker in the mysterious world guessed Shi Lei's plan wrongly, he had already fallen into Shi Lei's trap!
Although the top hacker in the mysterious world knew that the fourth assessment server had a huge computing resource of 100tflops, he did not immediately mobilize relevant resources to fight back. Instead, he chose to use an egg against a stone, as if using a laptop to fight against a supercomputer.
, and went directly to the fourth assessment server.
However, when he first came into contact with the fourth assessment server, he knew that he was wrong! He was so wrong! The fourth assessment server was definitely not a piece of gold and jade, but the 100tflops computing resources were genuine.
Use it instead of just using it as data to scare people.
Yizuer controlled 100tflops of computing resources and used the black magic subsystem to directly fight back against the top hackers of the mysterious world. In less than ten seconds, he destroyed the first line of defense of the top hackers of the mysterious world.
The attack plan of the Black Demon Subsystem is very powerful. The moment the top hacker in the mysterious world came into contact with the attack data stream of the Black Demon Subsystem, his face changed drastically and he screamed in surprise.
"Fake!" The top hacker in the mysterious world looked at the computer screen, and the data information fed back revealed a cold sweat.
The only thing he is glad about now is that although he despises h a little, he is not too proud and does not use a broiler server to protect himself.
The first line of defense that had just been broken through in less than ten seconds was his first broiler protection network. Without the buffer of this broiler protection network, the results would have been disastrous.
Fortunately, the existence of this broiler protection network bought him a few seconds and allowed him to activate the real protection system.
"Fake! Fake! Fake! h, I want you to look good!" The top hacker in the mysterious world roared loudly, obviously getting really angry!
.(To be continued)
ps: All the best in the new year, all the best in the new year.r655