typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK1650 True Identity!

The protection server of the mysterious intruder actually directly called 300tflops of intensive distributed computing resources when faced with Shi Lei's use of supercomputer lightning strike. △ Dianping Novel, 2+3wx

Although the defense system that protects the server, the investment ratio between defense and intrusion is close to one to one, which is good news. It indicates from the side that the intruder's defense strength may not be very strong.

But this is also bad news!

Because Shi Lei only tried to invade the security server, the mysterious intruder actually reacted so greatly, mobilizing 300tflops of intensive distributed computing resources at once.

This behavior fully proves that the mysterious intruder definitely has more computing resources. If there are no more computing resources, how can it be possible to invest 300tflops of computing resources at one time?

In the hacker world, there are not many cases where you directly reveal your trump card in the "showhand" way. Unless you are 100% sure that you can really defeat the opponent. Otherwise, leaving your trump card is the normal choice.

Shi Lei analyzed the mysterious intruder and controlled unimaginable computing resources. Therefore, Shi Lei ordered Yizuer in advance to activate the over-ed operation plan in advance.

There is a certain degree of danger in executing the overed operation plan. This is because, through the overed operation, the iwn secret network will be improved to extract more computing resources from the iwn base point.

Each iwn color ed represents a player's computer equipment. When the iwn secret network is in a semi-sleep state, the iwn secret network will only keep each iwn color ed in a semi-ready state. Minimize the performance of the player's computer equipment.

Because when the iwn secret network is in a semi-dormant state, the iwn secret network does not need to gather loosely distributed computing resources at all. Naturally, it will not occupy the user's computing resources.

When Shi Lei orders Yizuer to optimize the resources of the iwn secret network, Yizuer will change the status of the iwn secret network. It will enter the active state of normal work from the semi-sleep state.

The iwn secret network in normal state will draw computing resources from iwn color ed. However, in order to ensure that it will not affect the normal use of users, the 1tflops loose distributed computing resources of iwn secret network will draw approximately 20,000 iwn color ed base points. absorb.

In other words, when the iwn secret network is in normal working condition, each iwn color ed base point needs to provide an average of 0.00005tflops of computing resources.

Under normal circumstances, iwn Secret Network draws on such scarce computing resources. It will not affect the normal use of users at all. Unless the computer equipment of individual users is too old. But in that case, iwn Secret Network will not change from the old Computer equipment draws computing resources.

Once the over color ed operation is turned on, this data will increase. For example, each iwn color ed originally only provided 0.00005tflops. Now, depending on the needs of the iwn secret network, this data may be doubled, or even several times.

If the iwn secret network draws too much computing resources, it will affect the normal operation of the user. Therefore, Yizuer prompts that the over-ed operation is a dangerous operation.

But the current situation means that Shi Lei can't control that much for the time being. After all, the power shown by the mysterious invading party is too powerful. If the over-ed operation is not turned on, what if the mysterious invading party uses huge computing resources to directly overwhelm the endless world?

Defense system, what to do?

Although the Endless Defense System claims to be invincible in defense, in fact, the Endless Defense System is not truly invincible.

If a very large amount of computing resources are gathered in a very short period of time, and then collectively attack the endless defense system. Once the collective impact of computing resources exceeds the endurance range of the endless defense system, then the endless defense system will be overloaded and forced to

Restart.

In the short period of time when the Endless Defense System is forced to restart, the Endless Defense System will not function, which is equivalent to solving the Endless Defense System in another form.

"Private, the iwn secret network has entered the active activation state, the second confirmation of good colored has been completed, and the over colored operation plan has been preset." Yizuer reminded Shi Lei.

The iwn secret network has fully entered the activation state, which means it has entered a state of hacker war. As long as Shi Lei gives an order, Yizuer can collect all the good color ed within five seconds and start the over color ed operation plan.

Shi Lei nodded and stared at the computer screen to see how the mysterious intruder's protection server would respond.

However, the protection server of the mysterious intruder did not respond at all. It only resisted Shi Lei's invasion without making any counterattack.

Such behavior gave Shi Lei a strange thought. Could it be that the mysterious intruder did not have strong hacking skills, but only had powerful computing resources?

But such a weird idea was immediately shattered when it was born!

Since he has powerful computing resources, how could he not have powerful hacking technology? If that were the case, Shi Lei could only say that people with too much money are stupid.

Of course, Shi Lei was just thinking about it. He could figure it out even with his toes. Without powerful hacking skills, it was impossible to have powerful computing resources.

No matter what channel the powerful computing resources are obtained from, it can only show that the mysterious intruder has powerful hacking technology. As for the low ratio of defense to intrusion of the defense system, at most it can only show that the defense technology of the mysterious intruder is not high.

It's just too exquisite.

"Yizur, combine the iwn secret network with the lagfree network, use the lagfree network as the backbone, and build the channels of the iwn secret network on the lagfree network!" Shi Lei ordered again.

The so-called lagfree network is the neutrino information network established by Mirui Technology Group around the world. Each continent has a base point of the neutrino information network. It is then connected to the final end in Shuangqing City.

Thereby establishing an information network using neutrinos as carriers.

The characteristic of the neutrino information network is that the delay is very low. Even when transmitting from Lijian to Xia, the delay is less than 1 millisecond, which is almost equivalent to no delay.

That’s why it was named lagfree network by Shi Lei, which stands for ‘no delay and no lag’ network.

The iwn secret network is based on the users of the Brave World around the world. Except for the iwn color ed in Xia Kingdom and Asia, there will be a certain delay in the transmission of iwn color ed from other regions to Shuangqing City in Xia Kingdom.

For example, iwn color ed in Lijian country will cause a very terrible delay!

The usual role of the iwn secret network is only to assist the core server of the brave world to manage the operation of the brave world. But now, Shi Lei needs to mobilize the iwn secret network to participate in the hacker war. Therefore, Shi Lei combined the iwn secret network with the lagfree neutrino information network.

Together, we create a low-latency iwn secret network, further increasing the availability of iwn secret network computing resources.

The computing resources provided by iwn Secret Network are loose distributed computing resources. Compared with intensive distributed computing resources, there are certain defects. Among them, the biggest defect is the delay problem.

Now with the help of the lagfree network, this shortcoming has been greatly compensated. The loose distributed computing resources provided by the iwn secret network will be closer to the intensive distributed computing resources.

Just as Shi Lei was continuously instructing Yizuer to prepare for the hacker war, the more than 12,000 zombie users who were causing trouble in the official player forum of Dream Entertainment changed again.

The more than 12,000 zombie users actually suspended publishing content attacks without performing any operations.

Shi Lei was thinking strangely, 'What do these zombie users want to do?'

However, when Shi Lei could not come up with a clear answer, Yizuer reported a piece of information to Shi Lei.

"Private r, the number of registered users of the official player forum of Dream Entertainment has increased significantly. According to system statistics, a total of 173,837 registered users have been added in the past eleven minutes. The system randomly selected a thousand users to reversely track the real IP

The address, the final tracking clue, came to the marked server." Yizuer reminded Shi Lei.

Shi Lei's expression was ugly. The marked server was the protection server of the mysterious intruder. This meant that in just eleven minutes, those mysterious intruders had registered more than 170,000 members of the Dream Entertainment official player forum again.

User account.

"Yizur, determine the identity information of the newly registered user!" Shi Lei issued the order while quickly typing the code on the keyboard.

When Yizuer was verifying the identity information of the newly registered user, Shi Lei had already entered the Inca country's national population information database.

Because according to Yi Zuer's statistical information, the identity information of these newly registered users were all Inca citizens. Therefore, Shi Lei entered the national population information database through the backdoor preset in the Inca National Bureau of Population Information and Statistics.

In the Inca country's national population information database, Shi Lei ordered: "Yizur, cross-match and verify the identity information!"

Yizuer immediately carried out Shi Lei's order and cross-matched and compared the identity information of the newly registered suspicious users in the Dream Entertainment official player forum within the Inca National Population Information Database.

After matching and comparison, Yizuer displays the result information on the virtual transparent screen of the lip lens information processor.

What makes Shi Lei depressed is that the identities of these newly registered suspicious users are all real! They are all real citizens of the Inca country!

What is going on?

.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!


This chapter has been completed!
Previous Bookshelf directory Bookmark Next