Shi Lei has indeed reserved an information channel inside Abertir, and simulated it as a port for Abertir's basic communication, which will basically not be discovered.¢£
However, Abertier blends in with Butler!
Before the fusion, Butler was already an advanced pseudo-artificial intelligence system. After merging with Abertier, Butler went one step further.
Although Butler did not reach the level of a true artificial intelligence system, it exceeded the limitations of an advanced pseudo-artificial intelligence system.
Even though Butler is not as good as Yi Zuer, the gap is definitely not too far behind!
In addition to lacking real creativity and human emotions, a pseudo-artificial intelligence system of this level will never be far different from real humans in terms of logical thinking.
Therefore, for the first time, Shi Lei obtained information about the organization's pseudo-artificial intelligence system that was still online through the information channel reserved inside Abertir.
When Shi Lei continued to send execution commands and asked Abertil to reply to his real IP address, Butler, who had fused with Abertil, immediately discovered an abnormality.
In the fusion system of Abertier and Butler, Butler is in a dominant position. Abertier's core source code is basically integrated by Butler, and the basic code is retained to a large extent.
The information channel reserved by Shi Lei is in the basic code.
However, the execution of commands by the basic code needs to pass the review of the core system. When Butler discovered that the basic code that Abertier had left behind required the execution of information that sent the real IP address, it was immediately determined to be an abnormal state.
Butler first blocked the information channel reserved by Shi Lei. Then he followed the channel through which Shi Lei sent information and tracked Shi Lei's real IP address, preparing for an active counterattack.
Shi Lei was waiting for Abertier's feedback. When Butler's reverse tracking was about to track Shi Lei, Yizuer discovered Butler's reverse tracking information.
"Private r, the system found the reverse tracking data of the information channel, will it fight back?" Yizuer asked Shi Lei. Yizuer didn't understand that Butler's counterattack represented the information Shi Lei had reserved inside Aberdere.
The exposure of the channel also means that Shi Lei cannot determine the real IP address of Butler's parent server.
Shi Lei's expression changed. He frowned and said: "Fini, jazz, the situation has changed, prepare to fight! Let's track the reverse tracking data flow of the organization's pseudo-artificial intelligence system, it is tracking my real IP address!"
After Shi Lei finished speaking, he stood up directly and prepared to go to the previously renovated information war room.
Although the virtual keyboard of the lip lens information processor can also support three people in information operations, the virtual keyboard does not have a real touch feeling and key travel feedback, which causes the three people to use the virtual keyboard to input source code.
It will drop a lot.
Therefore, when faced with important cyber wars, they will choose real keyboards and computers to conduct information operations.
In the information war room, three computers and nine screens have been started. Each computer is equipped with three screens to facilitate the display of more data information.
"Are you ready?" Shi Lei asked, "If you are ready, let's access the other party's reverse tracking data stream!"
"Ready!" Tao Wenxian responded.
"OK!" Raphael simply replied, indicating that he was ready and ready to engage in information operations at any time.
Shi Lei took a deep breath, "Our actions must only succeed, not fail!"
"Understood!" Tao Wenxian and Raphael said in unison.
Shi Lei ordered: "Yizur, lead the reverse tracking data flow to our broiler server!"
Butler, who has fused with Abertier, is tracking the end of the information channel where Abertier is going to send the real IP address, which is Shi Lei's real IP address.
Yizuer redirected Butler's reverse tracking to the broiler server that the three of them were connected to. When Butler's reverse tracking entered the broiler server, the three of them started tracking Butler head-on.
"Coming!" Shi Lei shouted softly. The broiler server was tested by the data flow of reverse tracking. Shi Lei and the other three began to tap on the keyboard, trying to reverse reverse tracking in Butler's reverse tracking data!
Yizuer pretended to be Shi Lei's real IP address and tried to get rid of Butler's tracking, thereby setting a trap for Butler and giving Shi Lei and the others a chance to seize Butler's real IP address.
"Yizur, prepare to allocate iwn secret network resources, start the overed program, and obtain the computing resources of iwn to the maximum extent without affecting the players!" Shi Lei ordered Yizuer to start harvesting the iwn secret network.
computing resources.
Shi Lei has already experienced what kind of computing resources the organization's supercomputer has!
Supercomputer A is modeled on n13, and the computing resources reach 500tflops; supercomputer A is modeled on n14, and the computing resources reach 1200tflops!
Taken together, the intensive distributed computing resources reach a terrifying level of 1700tflops!
What about Mirui Technology Group?
The ten-thousand-acre headquarters of Mirui Technology Group was destroyed, and the brand-new supercomputer was a direct tragedy. Currently, the only supercomputers controlled by Mirui Technology Group are the supercomputers Origin and Lightning.
The computing resources of the supercomputer Lightning are 300tflops, which is 60% of that of a mod n13, which is quite good.
But the computing resources at the origin of supercomputers are only a pitiful 10tflops!
Supercomputers amo n13 and amo n14 are both private supercomputers of the organization. In other words, the organization's pseudo-artificial intelligence system Butler can use the computing resources of the two supercomputers 100% and unscrupulously without any worries.
was discovered.
The intensive distributed computing resources currently in Shi Lei's hands are only 310tflops, which is only about 18.24% of the computing resources controlled by Butler. Not even a fifth of it.
With only the origin of the supercomputer and lightning, it is impossible for Shi Lei to fight against Butler! Even if Butler does not have the assistance of a super administrator, Shi Lei and the other three are the world's top hackers, plus the pseudo-artificial intelligence system Yizuer of the same level
, there is still no chance of winning.
When the gap in computing resources reaches a certain level, it is almost impossible to rely on technology to make up for it.
Therefore, Shi Lei could only place his hope in the iwn secret network and fight from ion13 to a touch n14.
The computing resources of iwn secret network are generated on every computer with the World of Brave client installed. Regardless of whether the computer with the World of Brave client is running or not, the computing resources will be captured by iwn Secret Network.
However, the computing resources captured by the iwn secret network are very small, and users will not notice it.
As of now, the total number of registered players in World of Brave has exceeded 60 million. This is approximately 605 million.
The current number of people online has exceeded 45 million!
Although the computer configuration of most players is very poor, basically, the average total computing resources of the computer system used by players is about 20gflops, which is about 0.02tflops.
Such a pitiful total computing resources. Apart from dealing with daily applications of players, how much is left?
Normally, when the CPU usage rate exceeds 90%, computing tasks will become stuck.
This situation is more obvious in low-end central processors. The higher the high-end central processor, the higher the tolerance in terms of usage, because the base of high-end processors is higher, even if it reaches 100%
Ninety-nine percent, the remaining one percent is still more than 10% of the computing resources of a low-end processor.
Although Shi Lei ordered Yizuer to intercept the computing resources of iwnseed to the greatest extent, Shi Lei also set a premise, that is, to obtain the maximum computing resources as much as possible without affecting users.
Why should we care about user experience?
It's not that Shi Lei is so noble that he still considers users in such a critical situation, but Shi Lei is worried that users will discover the iwn secret network on a large scale, which will cause a collapse of the iwn secret network.
If there is a major collapse of the iwn secret network, given the current situation, it will definitely be fatal!
Shi Lei naturally doesn't want that situation to happen!
However, even if computing resources are captured to the maximum extent without affecting users, the computing resources obtained by the iwn secret network are still extremely terrifying!
According to Yizuer's statistics, there are currently about 52 million iwn EDs active on the iwn secret network. After excluding nearly 500,000 ultra-low-end users, there are still 51.5 million iwn EDs left.
According to the global average calculation rules, each of the remaining 51.5 million iwn colors can provide approximately 0.001tflops of computing resources.
Then, the entire iwn secret network will provide 51,500tflops of computing resources. If the difference between intensive distributed computing resources and loose distributed computing resources is not considered, it is only thirty times that of ion14!
However, there is a huge performance gap between loose distributed computing resources and intensive distributed computing resources. Especially in terms of data consistency, task collaboration, computing latency, etc., there is a very serious performance gap.
However, even so, the quantitative gap of a full 3,000% is enough to bridge the gap between the two sides!
"Izuer, activate the neutrino communication network and assist the iwn secret network in transmitting data!" Shi Lei ordered.
Mirui Technology Group has established a complete neutrino communication network across the five continents of the earth, aiming to eliminate the delay in network communication between continents.
After all, the transmission speed of submarine optical cables is greatly affected by external influences. The iwn secret network has collected computing resources. If it is transmitted through the submarine optical cables and then into Xia Kingdom, the network delay generated will be terrifying.
Therefore, Shi Lei used the neutrino communication network to connect the iwn secret network across five continents, which will greatly reduce network delays. Only with the help of the neutrino communication network, the computing resources collected by the iwn secret network can be applied in large-scale network wars
among.
"The iwn secret network overcolor is launched, the neutrino communication network is launched, and the iwn secret network will provide 51,000tflops computing resources!" Yizuerhui reported.
The actual computing resources collected by iwn secret network are lower than expected. This is because some ultra-low-end computer systems can obtain too few computing resources. Although theoretically they can provide computing resources, after Yizuer
actual testing, but cannot provide computing resources.
Shi Lei took a deep breath, nodded to Tao Wenxian and Raphael, and motioned for the two of them to start searching for the organization's pseudo-artificial intelligence system and the location of Butler's parent server.
This action, as Shi Lei said, can only succeed, not fail!
They cannot afford to fail!
After all, the price of failure is too high!
.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!