As a top hacker in the world, he was actually teased by h in this way. The top hacker in the mysterious world was very angry at this time. He quickly typed a string of English source codes on the keyboard.
The top hacker in the mysterious world has opened a real defense system, based on the outer layer of protection composed of broiler networks and the inner layer of core defense composed of supercomputers.
The effect of combining the outer layer of broiler network protection and the inner layer of supercomputer core defense is not that one plus one equals two, but exceeds this effect.
The protective outer layer of the broiler network acts as a coolie. It can accept any attack and can be ravaged in any way.
The inner layer of core defense composed of supercomputers acts as a behind-the-scenes protector. When the outer layer of defense is subjected to various attacks, it will provide strong support to the outer layer of defense to ensure that the outer layer of defense does not
will be easily broken through.
The supercomputer used for defense by the top hackers in the mysterious world has a computing speed of 30tflops. Since the computing resources composed of supercomputers are intensive distributed computing resources, they have surpassed all in terms of consistency, coordination and controllability.
It uses loose distributed computing resources and maintains its dominant position even in the face of 100tflops of loose distributed computing resources.
"Hmph! Loosely distributed computing resources? How many personal computers and ordinary servers have been hacked by h to form such a huge botnet!" The voice of the top hacker in the mysterious world was filled with deep disdain.
Loosely distributed computing resources are usually generated by botnets. The so-called botnet, which is another name for the broiler network, is not a scary thing.
This top-level hacker in the mysterious world, based on the situation of the fourth assessment server, judged that h did not have a supercomputer, but only controlled a huge botnet.
It is not difficult for powerful hackers to control a huge botnet. It only requires a lot of time and writing a complex set of bot management software.
For powerful hackers, basically they will not do such a thing. How many computing resources can an ordinary personal computer provide? Even if Trojans are spread on a large scale through viruses and a large number of personal computers are collected as broilers, this method cannot
good.
First, Trojans that collect broilers have spread on a large scale and can easily be harmonized by network security companies. As a result, all the broiler servers that have been collected may be reimbursed.
Second, the instability of personal computers! This instability is not only reflected in the usage time, but also in the fault tolerance rate. Especially when using loose distributed computing resources to carry out hacker attacks, unless you use
Relatively basic and simple denial-of-service attacks, also known as DDoS attacks, can provide good protection. If a difficult data joint attack is used, it is definitely possible to lose the chain!
Assuming a situation, in the iwn secret network, 100tflops loose distributed computing resources require about 1 million users, or even 1.2 million users, to generate them.
Basically, for every user, this kind of computing performance is equivalent to one percent or even one thousandth of the computing performance of the computer itself for individual users in Brave World.
Extracting such low computing resources is to avoid being discovered by users. However, this creates a huge problem, that is, there are so many users. When a task is comprehensively performed, the data information that needs to be calculated must be divided.
What if some of these users suddenly leave the Internet?
With a base of one million users, there must be various users who leave the Internet unexpectedly. In such a situation, it is necessary to transfer the data that needs to be calculated by users who leave the Internet to other users in a very short period of time.
This extremely short time is not a time in a macro sense, but a time in a micro sense, which is basically less than ten milliseconds, that is, within one hundredth of a second, the computing tasks of missing users are redistributed.
Such a large and complex software design and management, without the assistance of the advanced pseudo-artificial intelligence system Yizuer, the limitations of iwn secret network will be very huge.
It is precisely because of this situation that in the eyes of hackers in the high-end field, using loosely distributed computing resources is a relatively unclassy method.
Hackers in the high-end field would rather spend more time challenging more difficult supercomputers or powerful enterprise-level servers than spend a lot of time building a huge botnet.
Finally, when loose distributed computing resources face intensive distributed computing resources, they can easily be defeated by intensive distributed computing resources.
Due to various shortcomings, this top-level hacker in the mysterious world who fought against the fourth assessment server is qualified to laugh at h for using loosely distributed computing resources.
However!
This top hacker in the mysterious world realized his mistake thirty seconds later!
Originally, the top hacker in the mysterious world judged that the fourth assessment server had 100 tflops of loose distributed computing resources. He called a supercomputer with a computing speed of 30 tflops. It was easy to break into the fourth assessment server.
matter.
But it turned out not to be the case!
When the fourth assessment server faced a supercomputer with a computing speed of 30 tflops, there was no sign of collapse. Although the mysterious world-leading hacker did suppress the fourth assessment server, there was no possibility of breaking it.
The defense system of the fourth assessment server was impregnable. When faced with the impact of the mysterious world-level hacker, there was no instability at all.
In a mysterious room, the top hacker in the mysterious world looked at the data fed back on the computer screen with surprise, and exclaimed: "This is impossible! It is obviously provided by a botnet, and it is obviously a loosely distributed computing resource. Why?
What if there is no data shock caused by the impact?”
Perhaps for hackers in the low-end field, they do not have such powerful technical means. They can use data shock to cause data shock, thereby disintegrating the entire botnet.
However, in the high-end field of hackers, it is a very common method to use intensive distributed computing resources to launch data impact on loose distributed computing resources, thereby causing data shock.
"It's so strange! How does h deal with the botnet?" The mysterious world-level hacker wondered to himself.
On the other side, the first-level branch of Longteng Project in Zhongyu District, Shuangqing City.
Shi Lei looked at the situation of the fourth assessment server through the lip lens information processor. When he saw the mysterious world-level hacker, he tried to use data impact to create data shock and destroy the loose distributed computing provided by the iwn secret network.
Resources, a faint sneer appeared on Shi Lei's face.
The method adopted by this mysterious world-level hacker is correct. To deal with loosely distributed computing resources, data shock should be used to cause data shock, and all servers and personal computers that provide computing resources will be shaken from the network.
Lose.
But iwn secret network is different!
It has been analyzed before that the iwn secret network extracts the computing resources of Brave World users, only to the extent of one percent, or even one thousandth, of the users themselves.
Extracting such scarce computing resources and facing data shock caused by data impact will not affect d at all. That is, the resource provider of iwn secret network and the game users of World of Brave.
Coupled with the super powerful error correction function of Shangzur, the data shock caused by the mere data shock was completely ignored by the iwn secret network.
Shi Lei is also the world's top hacker. Isn't it clear that botnets are afraid of data shock caused by data impact?
The mysterious world's top hacker attempts to use this conventional method to deal with the iwn secret network. It can only be said to be wishful thinking!
Seeing the mysterious world-level hacker being defeated, Shi Lei just observed quietly. So far, this mysterious world-level hacker has not shown any obvious personal characteristics, and Shi Lei has not yet been able to tell who this guy is.
!
Shi Lei needed more time to let this mysterious world-level hacker compete with the fourth assessment server to determine the identity of the other party.
On the side of the mysterious world-level hacker, when the method of data shock caused by data shock failed. This mysterious world-level hacker did not immediately try a new intrusion method, but prepared to try another data impact.
However, this time, the data attack methods prepared by the top hackers in the mysterious world will be a little different!
After all, it has already failed once. If the same attack method is still used, it may not cause much damage. Therefore, although the mysterious world-level hacker is preparing to use data impact methods again, it is a completely new data attack method.
Every top hacker in the world is not a simple character!
If you want to simply become the world's top hacker, there are only two situations. The first one is to have truly unrivaled talent. To put it in another data plan, that is to have an IQ of about 200.
.
This kind of IQ-level players can basically complete hacking learning without a teacher, starting from the most basic learning, and then gaining more advanced knowledge through Internet resources, until they reach the world's top level.
But for human IQs above 140, it is basically impossible to achieve an IQ above 200.
As for another possibility…
.(To be continued)
ps: Another possibility is that it is really simple, and it is possible that everyone can meet the requirements!