typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK1765 Amon14, desperately!

Under normal circumstances, cutting-edge technology or top-secret information will not be stored digitally, but will be stored on paper.∷

Even if you choose to save it digitally, you will choose to save it in isolation from the Internet environment, rather than storing it in a device with an Internet environment.

This is not to say that storing cutting-edge technology or top-secret information in a device with an Internet environment is a stupid act.

No matter which choice you choose, each has its own pros and cons.

If you choose to save cutting-edge technology or top-secret information in paper form, although it will completely isolate the possibility of being stolen by hackers, it will also create new problems.

In the real world, paper data are easy to be stolen, copied, photographed, etc. In extreme cases, the enemy may even forcefully attack the storage location where paper data is stored.

For example, if Mirui Technology Group's new energy data is stored in paper format, not to mention the organization, even Mirui Technology Group's close partner, the Rongcheng Military Region, may have evil intentions.

As for the storage solution that is isolated from the Internet environment, it seems to combine the dual advantages of paper storage solutions and Internet environment storage solutions, and greatly weakens the shortcomings of both. But in fact, this is also a failed storage method.

Storing data in an isolated Internet environment means that the owner cannot manage it remotely. Once an emergency occurs, the problem cannot be effectively solved.

This storage solution also has the same weaknesses as the paper-based data storage solution, and is even more obvious.

For example, Shi Lei's Tiandi Xuanhuang Thieves Group. If they want to steal data from a closed network system, they only need to secretly install a wireless network device inside the closed network system, and then they can steal the data remotely.

According to the skills of the Tiandi Xuanhuang Thieves Group, I am afraid that after stealing the information, no trace will be found at all!

Therefore, the method of storing data in an isolated Internet environment is not a good method and can only be an alternative.

Although neither the paper-based storage solution nor the storage solution in an isolated Internet environment is a perfect solution, this does not mean that a storage solution with an Internet environment is a good solution!

In fact, the shortcomings of storage solutions in an Internet environment are also very obvious. The biggest disadvantage is that they are easily hacked and even stolen by hackers.

As for the advantage, it is that the owner can respond quickly and provide solutions.

When hackers invade, as long as the owner's skills are high enough and the defense system of the device storing data is strong enough, the intruder can be blocked. There is no fear of intruders at all.

Mirui Technology Group has powerful network technology, coupled with the sensitivity of the data, it is not suitable for paper storage and storage in an isolated Internet environment, so it naturally chose a storage solution with an Internet environment.

Duke Duke invaded the official player forum of Dream Entertainment and met with resistance from the organization. This made Duke Duke understand that the core data of Mirui Technology Group must be stored in the internal network, rather than using paper data storage. Or it is

Storage solution for isolated Internet environment.

This also means that as long as Duke Duke breaks through the internal network defense of Mirui Technology Group, he will have the opportunity to obtain the most core information of Mirui Technology Group.

"Butler, I need a lot of N14 resources!" Duke Duke ordered.

"Mr. Duke, according to your authority, you cannot obtain the resources of a touch n14!" Butler responded.

Duke Duke had already expected that he would not be able to obtain the resources of the supercomputer a-mod n14. At first, after the Chaos Snake Shiwen took back the permissions of a-mod n13 and a-mod n14, it made corresponding permission adjustments.

With Duke Duke's authority, he can only mobilize supercomputer a-touch n13, but cannot mobilize a-touch n14.

"Start the savior program!" Duke Duke ordered.

Butler, the organization's pseudo-artificial intelligence system, did not refuse Duke Duke's order this time, but carried it out.

"The savior program is being executed, and the main system begins to determine the high-level authority..." Butler displayed the relevant information on the screen of Duke Duke's laptop.

"The senior authority, Marquis Anlin, has been logged out..."

"The senior authority, Duke Satan, cannot be contacted. According to the logic of the main system, Duke Satan is dead, and the corresponding authority is temporarily frozen..."

"The senior authority, Duke Anducias, has died, and the authority has been terminated."

"Senior authority Duke Eligo and senior authority Duke Agares, according to the information collected by the main system, have died at the S17 base in Nevada, and the authorization has been suspended."

"Through the request of Duke Duke, the senior authority user, the savior program has been started, and Duke Duke is temporarily granted full authority until it is canceled by the super authority person!"

Butler sent out prompt messages one after another. It is obvious that there is a certain judgment mode within Butler. When the number of core members of the organization is reduced to a certain level, a program called "Savior" can be launched.

Duke received full temporary authorization from Butler through the 'Rescuer' process.

"Butler, prepare to touch n14 computing resources!" Duke Duke issued the order again.

This time, Butler did not refuse directly, but responded: "The computing task of supercomputer AMOUN14 is being reviewed. There is no task authorized by a super authority. Relevant task suspension notifications are being sent, and the computing resources of supercomputer AMOUN14 are being sorted.

Please wait..."

Duke Duke waited patiently. The supercomputer amod n14 is the core supercomputer of the organization. The key computing power for the organization to develop biogenetic technology is provided by the supercomputer amod n14.

About half a minute later, Butler gave another prompt. "Mr. Duke, supercomputer A touch n14 is ready to be completed!"

The laptop screen in front of Duke shows the computing resources of the supercomputer a n14, a total of 1200tflops of intensive distributed computing resources!

Equivalent to four times the speed of supercomputer lightning!

The combined computing resources of supercomputers amodon13 and amodon14 reach the level of 1700tflops, and they are intensive distributed computing resources.

Duke Duke is obviously prepared to fight tooth and nail to break through the network defense of Mirui Technology Group!

At present, the defense intensity displayed by Mirui Technology Group's network defense is only about 500tflops of intensive distributed computing resources.

Although the attack and defense ratio of the Endless Defense System is excellent, it may also be tragic when faced with an attack of 1700tflops intensive distributed computing resources.

This is not because the Endless Defense System is not powerful enough, but because the loosely distributed computing resources provided by iwn Secret Network are not powerful enough. As long as the iwn Secret Network fluctuates slightly and the computing resources provided cannot be delivered on time, the Endless Defense System will collapse.

Duke Duke gathered the computing resources of the supercomputers amo n13 and amo n14, paused the attack rhythm slightly, and allowed the defenders of Mirui Technology Group to relax their vigilance, and then immediately launched a sharp attack.

When 1,700 tflops of intensive distributed computing resources attacked the Dream Entertainment official player forum like a tsunami, the Dream Entertainment official player forum immediately experienced slow browsing or even failure to provide services.

Raphael immediately exclaimed, "Stone. The situation is not good!"

Shi Lei had already noticed something was wrong and shouted loudly: "Jazz, hurry up and join the battle and help Feini resist the attack!" After saying that, Shi Lei continued to give instructions, "Yizur, activate the over-ed program of the iwn secret network!"

Overed. Overclocked to explode!

By increasing the computing resources drawn by each iwn color ed, the iwn secret network can obtain more computing resources. According to the current size of the iwn secret network, without affecting users, the iwn secret network can obtain up to 8000tflops of slack.

distributed computing resources.

Although only from data analysis, 8000tflops far exceeds 1700tflops, but in fact, 8000tflops is a loose distributed computing resource, while 1700tflops is a dense distributed computing resource.

The two are not the same concept at all!

Even if we ignore many issues, including consistency, coordination, delay, etc., according to a very simple ratio, 8000tflops loose distributed computing resources are equivalent to 1000tflops intensive distributed computing resources at most, or even only 800tflops

degree of intensive distributed computing resources.

Although coupled with the 300tflops intensive distributed computing resources provided by the supercomputer Lightning, it still lags behind the 1700tflops intensive distributed computing resources controlled by Duke, but in the end it will not be too different, and there is no gap between performance and computing resources.

Relying on the endless defense system, it can still be blocked!

If there were no computing resources provided by the iwn secret network, and no overed to absorb more resources from the iwn secret network, and only the supercomputer Lightning, facing the menacing Duke, I am afraid that the internal network defense of Mirui Technology Group would have been destroyed early.

It just collapsed!

Fortunately, Shi Lei had the foresight to build the iwn secret network as one of the trump cards of Mirui Technology Group to protect the network environment of Mirui Technology Group.

iwn Secret Network has played a vital role in many hacker wars!

Duke Duke, Tao Wenxian and Raphael fought continuously for nearly half an hour, and finally gave up the plan of directly invading the network to break the network defense of Mirui Technology Group.

Duke Duke never thought that Mirui Technology Group could mobilize so many computing resources!

‘It seems that we can only try to enter the internal network of Mirui Technology Group in the current world!’ Duke Duke thought to himself.

Although there is a certain degree of danger in entering the internal network of Mirui Technology Group through real-world methods, there is no other way.

And in Duke Duke's view, the current situation is also the best time!

Once you miss this good opportunity, you may never have the opportunity to obtain the cutting-edge and new technologies of Mirui Technology Group. Fortunately, Duke Duke has already anticipated this situation and made a predetermined plan.

.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!


This chapter has been completed!
Previous Bookshelf directory Bookmark Next