typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Final-073 The Skyrim-Breaking Resource!

Globally, the total number of computer devices infected with the Nemesis virus has exceeded 800 million!

An exaggerated statistic!

The Nemesis Virus was Shi Lei's desperate bargaining chip. It was designed to be extremely extreme by Shi Lei, and he used extremely novel source code hiding methods. Even the world's top hackers would find it difficult to discover the source code of the Nemesis Virus.⊥

Because Shi Lei hid the source code of the Nemesis virus in the system source code!

Although the system source code and the source code of the Nemesis virus cannot be exactly the same, the letters that make up the source code are standard and universal.

Shi Lei designed a new set of syntax to directly call the source code of the operating system to generate the final Nemesis virus, allowing the Nemesis virus to evade all scans, creating a Nemesis virus that is in the computer but not in the computer.

the illusion.

Although the Nemesis virus is not a disk-level virus, the Nemesis virus can be removed by formatting the hard drive and reinstalling the system.

However, the Nemesis virus is very contagious. Even if the computer system is reinstalled and the Nemesis virus is temporarily eliminated, the environment is filled with the Nemesis virus and you may be infected again anytime and anywhere.

Therefore, even if the Nemesis virus is temporarily eliminated, it will have no effect!

July 14, five minutes past midnight.

Shi Lei was typing on the keyboard quickly. The Nemesis virus had infected so many computer devices, how could Shi Lei waste it?

"Yizur, how long will it take to build a unified botnet?" Shi Lei asked Yizuer.

Constructing more than 800 million computer devices into a huge botnet. If Shi Lei is allowed to complete it alone, it will be an impossible task.

Fortunately, Yizuer can complete it!

The botnet Shi Lei tried to build was essentially no different from the iwn secret network. However, the basic point of the iwn secret network, iwn colored, was built into the World of Brave client and was directly accepted by players.

The basis of the botnet is the Nemesis virus!

So far, the Nemesis virus has not shown any malicious behavior, neither deleting user data nor tampering with user applications.

Therefore, the reputation of Nemesis virus is limited to the Internet security community and network hacker community, and it has no reputation among ordinary netizens.

After all, ordinary users don't understand what's so powerful about the Nemesis virus. It seems to be harmless at all. It just installs a useless program in the computer system.

Are there too many programs secretly installed by other software in the computer systems of ordinary users?

"Private, it will take about 30 minutes to complete the global unified botnet. Please wait, the system is configuring detailed parameters." Yi Zuer responded to Shi Lei.

Even a powerful pseudo-artificial intelligence system like Yizuer would still take half an hour to coordinate and process more than 800 million computer devices.

As time passed, Shi Lei was not in a hurry. Instead, he waited patiently. While waiting, Shi Lei chose a nice name for the globally unified botnet.

all-one-!

Referred to as aon!

Xia's name in Mandarin was named "Yiwang" by Shi Lei, which means "catch them all in one fell swoop".

At 00:36 in the morning, the aon network construction was completed!

The virtual transparent screen of the lip lens information processor shows that the number of users accessing the Aon network has reached 838,731,902.

This data is changing anytime and anywhere, and generally speaking, it shows a rapid increase trend. After all, the Nemesis virus is constantly infecting computer equipment around the world.

Shi Lei looked at the data on the total computing resources of the Aon network through the virtual transparent screen of the lip lens information processor. Suddenly, a rich smile appeared on Shi Lei's face.

The total computing resources of the aon network can mobilize up to 11 million tflops of computing resources without harming most users!

That’s right!

11,000,000tflops!

The computing resources of the aon network are approximately eleven times that of the computing resources obtained by the iwn secret network!

Using the simplest conversion method, it can be inferred that it takes 200 hours for the iwn secret network to scan the global Internet, and then the aon network can complete the scan of the global Internet in less than 20 hours.

However, in fact, the time it takes for the AON network to scan the global Internet does not take 20 hours at all, or even two hours!

Because there is the most fundamental difference between the aon network and the iwn secret network. The basic point of the aon network, that is, the computer equipment infected by the Nemesis virus, has been scanned once by the aon network, which is a normal security target and is excluded from the scanning scope.

outside.

Therefore, only computer devices that are not infected by the Nemesis virus are the targets of AON network scanning. In addition, the Nemesis virus is assisting and infecting more computer devices. How can it take such a long scanning time?

?

According to Shi Lei's estimation, in two hours at most, the base points that make up the AON network will exceed 1.2 billion data. By then, the computing resources of the AON network will skyrocket again, and the number of suspected targets around the world will suddenly plummet, requiring Shi Lei to personally explore the targets.

Not much at all.

"Yizur, optimize the computing resources of the AON network!" Shi Lei ordered Yizuer to start optimization to reduce latency based on the distribution of computing resources of the AON network.

Shi Lei turned to look at Tao Wenxian and Raphael and asked, "Have you found anything? How many unknown IP addresses are there in the backlog?"

Raphael took the initiative to answer: "Nothing has been found yet! There is a backlog of more than a thousand unknown IP addresses, and we are processing them quickly."

"Forget it, let me do it!" Shi Lei didn't say anything more. He controlled the computing resources of the Aon network. With the assistance of Yi Zuer, he began to scan the unknown IP addresses found in the needle-in-a-haystack plan.

The aon network has gathered more than 11 million tflops of computing resources, and it is increasing rapidly every minute and every second. When Shi Lei controlled the computing resources of the aon network and began to deal with the needle-in-a-haystack plan and discovered the unknown-level IP addresses, he had accumulated more than

More than 1,000 unknown IP address records were quickly identified.

Tao Wenxie and Raphael looked a little dazed!

Although the two of them understood that Shi Lei must have done something earth-shattering, the current situation seemed to be a bit too exaggerated?

Tao Wenxian couldn't help but ask: "Brother Shitou, what exactly did you do?"

Shi Lei snapped his fingers and ordered: "Yizur, share the information!"

Yizuer immediately shared the AON network information with Raphael and Tao Wenxian through the virtual transparent screen of the lip lens information processor.

The two of them looked at the Aon network, which gathered more than 11 million tflops of computing resources, and were stunned!

Isn’t this an illusion?

Especially Raphael, who has become the world's top hacker longer than Tao Wenxian, and he knows more 'common sense' information.

Among the world's top 500 supercomputers announced in June 2008, the No. 1 supercomputer is a supercomputer named Roadrunner manufactured by IBM.

This supercomputer named after the ‘Clown in the Desert’ has a stable computing speed of 1026tflops and a peak computing speed of .

The computing resources gathered by the aon network are equivalent to more than 10,000 supercomputers, the world's number one supercomputer. Although it is only a loosely distributed computing resource, that level of computing resources is still terrifying!

"Raphael, am I hallucinating?" Tao Wenxian said involuntarily.

Raphael shook his head, and then flicked Tao Wenxian's eyebrows, "If you are hallucinating, I must be hallucinating too. However, I think we are definitely not hallucinating."

Having said this, Raphael looked at Shi Lei and asked: "Stone, this is..."

Shi Lei nodded and affirmed: "Yes! This is the super virus I created! A super virus that simulates iwn-ed. With these computing resources, we can discover the real IP address of Butler's mother server before dawn!"

Tao Wenxian swallowed, "Then we still carry out the plan of finding a needle in a haystack?"

Shi Lei glanced at Tao Wenxian. He knew what Tao Wenxian meant, which was that he wanted to act together with the Aon Network instead of continuing to implement the plan of finding a needle in a haystack.

However, according to the current situation, the needle-in-a-haystack plan can indeed be suspended and the Aon network will perform the remaining tasks.

"Let's control the AON network operations together!" Shi Lei said.

Tao Wenxian nodded excitedly, "Great, Brother Shitou, we won't have to wait too long to find Butler!"

The three first integrated the iwn secret network and the aon network to form a cluster of distributed computing networks, and then mobilized all computing resources to scan the Internet space that had not yet been scanned.

Yizuer gave an estimated time, and it will only take one hour at most to complete the scan of the global Internet. By that time, 99.9% of network IP addresses will be excluded.

The remaining target is Butler's hiding place!

This time, it is absolutely impossible for Butler to escape again. After all, the plan implemented by Shi Lei is a plan to find a needle in a haystack. Shi Lei has turned the entire Internet world upside down, so why can't he still find Butler?

That's absolutely impossible!

No matter how good Butler's hiding ability is, he can't escape Shi Lei's search!

.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!


This chapter has been completed!
Previous Bookshelf directory Bookmark Next