typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Final-067 still not enough!

The needle-in-a-haystack plan is the only solution that can discover the real IP address of Butler's parent server. ≤

Although this plan will consume huge resources, Shi Lei doesn't care!

Shi Lei only cares about whether and when the real IP address of Butler's parent server can be discovered.

Shi Lei's confidante has entered Death's sight. If he wants to save them all, he must race against time against Death.

Especially Ling Yumo, she now only has less than 115 hours left to live!

Yi Zuer launched the needle-in-a-haystack plan, and the logic analysis program has been started to analyze every IP address in the Internet world, as well as the subnets under the IP address, etc.

The most important thing about the needle in the haystack plan is the grading system!

The so-called grading system is to classify IP addresses within the Internet into different categories, and assign different levels of attention according to different levels.

Through the grading system, the workload of finding the needle in the haystack is effectively reduced. It is like the work of screening soybeans. If black beans are mixed in, the black beans must be eliminated first.

Now, the classification system of the Needle in a Haystack plan is to classify different IP addresses and which users they belong to. According to the restrictions set by Shi Lei, the classification system will first exclude the IP segments of individual users, and then exclude known institutions and enterprises.

IP segments related to government departments and so on.

After excluding the IP segments of individual users, commercial users and government agencies, the remaining IP addresses that need to be analyzed are greatly reduced.

Through the grading system, the workload of the needle-in-a-haystack plan can be reduced at least in half!

IP addresses that have not been excluded will also be divided into levels. They are divided according to the level of threat, from low to high. They are security level, unknown level, and suspect level.

Among them, the security level is 100% certain. It is definitely not the real IP address of Butler's parent server, so it will be placed in the security level.

The unknown level means that if the situation cannot be determined after Yizuer's preliminary scan, it will be classified into the unknown level. This is because if the situation cannot be determined after Yizuer's preliminary scan, if Yizuer carries out further scanning tasks, it will be necessary.

More computing resources will drag down the overall progress of finding the needle in the haystack.

In order to avoid this situation, Shi Lei set up the IP address of the unknown class to be listed directly in the unknown class, notify the system administrator, and the system administrator will personally scan and analyze it.

The last level of suspicion is that after Yizuer conducted a preliminary scan, he directly found the IP address, which may be the real IP address of Butler's parent server.

The number of suspect levels will definitely not be too many. Setting this level is just a precaution!

"The grading system has been constructed, and the plan to find the needle in the haystack has officially begun!" Yi Zuer reminded again.

Inside the virtual transparent screen of the lip lens information processor, it shows that the plan to find the needle in the haystack has officially begun. The first screening area for the plan to find the needle in the haystack was chosen by Shi Lei in Lijian Country!

After all, whether it is the organization or the Angel Council, both are rooted in the Lijian Kingdom. In another life journey, Shi Lei knew that Abertiel's mother server was located in the Lijian Kingdom.

The computing resources gathered by the iwn secret network all poured into the country of Lijian through the private neutrino communication network of the Mirui Technology Group, and began to scan the entire Internet world of the country of Lijian.

More than 1 million tflops of computing resources poured into the Internet world of the United States, almost scaring the CIA and the FBI's cybersecurity department to the point of peeing!

With such huge computing resources, neither the CIA nor the FBI can guarantee that they can stop it 100%.

Even those computing resources are only loosely distributed computing resources. When loosely distributed computing resources are gathered to a certain extent, it is still very scary.

fortunately!

The cybersecurity departments of the CIA and the FBI found that the millions of computing resources pouring into the country's cyber world were just scanning cyberspace and did not seem to have any intention of causing damage. They were temporarily relieved.

tone.

Lijian is a democratic and open country, at least on the surface!

Whether it is the CIA, the FBI, their boss, the National Security Agency, or even the darpa, their internal networks have access points in the Internet world, and they are even open to the public.

's access point.

All well-known hackers know the access points to their internal networks.

Including the Lijian government's network and the military's network, it is no secret that they have access points to the Internet world. The servers that actually store shady data must be in an environment that is isolated from the Internet, or even not electronic.

material.

Therefore, the cybersecurity departments of the CIA and the FBI were relieved to find that millions of computing resources were pouring in just to search for IP address information in the online world.

If the actual controller of this million-level computing resource wants to conflict with Li Jian, or wants to steal Li Jian’s confidential information, it is absolutely impossible to scan IP address information in the online world, but

Roll up your sleeves directly to hit the determined target.

Now, the behavior displayed by millions of computing resources clearly illustrates one thing. Millions of computing resources are looking for hidden targets, and it should be a personal grudge, not to steal official confidential information of Li Jian.

Such analysis results reassure experts from the CIA, FBI, and cybersecurity departments, but they are also secretly worried.

After all, millions of computing resources have rushed into Li Jian's online world. Even if no malicious intent is shown for the time being, what if malicious intent is shown?

No one can guarantee whether the other party is malicious, right?

In order to prevent millions of computing resources from invading official networks of powerful countries, or even military networks, the CIA and the FBI began to prepare countermeasures.

If Shi Lei knew about their concerns, Shi Lei would definitely sneer and ridicule them. How could Shi Lei waste time and computing resources to invade Li Jian's network system?

No kidding!

Shi Lei's time is so precious. Under such circumstances, it is absolutely impossible to waste time with them!

"Brother Shitou, there are 27 unknown IP addresses that have been marked. Which one should we start analyzing from?" Tao Wenxian asked Shi Lei.

"Just these two!" Shi Lei directly selected two of the addresses as the first batch of unknown IP addresses for manual analysis.

Tao Wenxian looked puzzled. Did Shi Lei choose two addresses at random?

Raphael explained on behalf of Shi Lei: "Both IP addresses are from New York!"

Tao Wenxian coughed. He obviously had no interest in memorizing the location of the IP address. Anyway, it is not difficult to investigate the actual address corresponding to the IP address. Why do we need to memorize it?

In order to cover up his embarrassment, Tao Wenxian ordered: "Yizur, mark all unknown IP addresses with their places of origin."

Shi Lei did not make fun of Tao Wenxian. After all, there were no regulations stating that the world's top hackers needed to record the ownership of IP addresses.

Of course, quite a few hackers will indeed record the location of the IP address, so that they can directly and quickly determine the region to which the IP address belongs.

Shi Lei chose two IP addresses in New York City mainly because the parent server of Abertier of the Angel Council is located in New York City.

Don't think that New York City is too prosperous and the target is too big, so Chaos Snake will not put Butler's mother server in New York City.

In fact, such a possibility exists!

As the saying goes, great hiddenness is hidden in the city!

What if Butler's parent server is in New York City?

No one can be sure of the answer to this question until the final result comes out!

Shi Lei and the others quickly scanned and analyzed two unknown-level IP addresses. One of the unknown-level IP addresses was hacked by three people. They found that the unknown-level IP address was a well-defended cross-border website that mainly provided privacy for overseas users.

Love action art movie download service.

Shi Lei was very kind and did not tamper with the other party's data server. After all, such a good person has served too many otakus in need. He cannot cut off the benefits of otakus, right?

The two unknown IP addresses selected by Shi Lei had nothing to do with Butler. Shi Lei was not surprised at all by this result.

If it was so simple to discover Butler's real IP address, why would Shi Lei need to go to war?

The first target had no results, so Shi Lei and the others began to analyze every unknown IP address. As the three of them and Yi Zuer worked simultaneously, one IP address after another was cracked, but they still did not get the answer.

Shi Lei took the time to look at the implementation progress of the needle in the haystack plan. It was now half past twelve and the needle in the haystack plan had been implemented for half an hour, but the implementation progress was very pitiful!

The first screening area of ​​the needle-in-a-haystack plan was Lijian Country. In half an hour, the screening progress was only less than 3%!

This means that it is just a Lijian country. If you want to completely traverse every IP address in the Lijian country’s online world, it will take at least 20 hours!

The entire world is so large, and the real IP address of Butler's parent server may exist in cyberspace anywhere.

How could Shi Lei have so much time to search slowly and area by area?

To put it simply, the computing resources Shi Lei has are still not enough!

.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!


This chapter has been completed!
Previous Bookshelf directory Bookmark Next