typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Final-075 Forced Explosion!

The needle-in-a-haystack plan was completed, and in the end there was only one unknown IP address left. ◎Moreover, Shi Lei invested 5 million tflops of computing resources, and was actually resisted!

Although the computing resources gathered by the aon network and the iwn secret network are all loosely distributed computing resources, they are on the order of five million. How can they be resisted?

Even if intensive distributed computing resources are used, nearly one million computing resources are needed to be able to withstand it.

However, a supercomputer cluster with millions of private computing resources is simply a fantasy!

Shi Lei really couldn't imagine what kind of force could resist such a huge computing resource combined attack.

etc!

Shi Lei thought of a possibility!

The origin of the Internet, the starting point of the modern Internet, is known as the most mysterious institution in the country, the DARPA Advanced Research Projects Bureau, referred to as the "Advanced Bureau"!

According to rumors, Darpa has a lot of resources and very high authority. Even the National Security Agency of NSA needs to follow the instructions of Darpa Advanced Bureau when necessary.

In short, Darpa is the boss of the National Security Agency of the NSA, the boss of the FBI and the CIA.

The last unknown IP address, and only darpa, can resist Shi Lei's invasion.

However, Darpa's network IP address is not a hidden IP address, but a published one. Intrusions are welcome anytime and anywhere.

In view of this situation, Shi Lei is not sure whether Darpa owns the last unknown IP address.

Although he didn't know the answer, it was actually the same to Shi Lei whether he knew the answer or not.

Because, no matter whether the last unknown IP address is a darpa advanced bureau or not, Shi Lei will completely break its defense and investigate it thoroughly.

Unless, the last unknown IP address is directly disconnected from the Internet just like the previous seven unknown IP addresses.

But Shi Lei knew that such a situation was absolutely impossible!

In the global Internet world, Shi Lei has scanned all IP address information, leaving only the last unknown IP address. The other IP addresses have been excluded by Shi Lei.

"Increase computing resources!" Shi Lei ordered, "Double it!"

Now, Shi Lei and the others have used 5 million tflops of computing resources, but they are unable to break the defense of the last unknown IP address, so they will double their computing resources to see if the last unknown IP address can block the attack.

In the distant country of Lijian, inside a mysterious hall.

A group of middle-aged people, just like young people, were shouting and shouting like a noisy vegetable market.

"Mandalay. The other party has increased its invasion resources, and we will be unable to stop it. You haven't developed a killer program yet?" a middle-aged man with a beard yelled.

A middle-aged man named Mandalay also responded loudly: "Dawson, you damn bastard! Don't rush! I am analyzing that damn mysterious virus! The killer program for that damn mysterious virus is not that

It’s easy to develop! If it’s that easy, do I still need to take action?”

Through the conversation between Mandalay and Dawson, it can be judged that they are the last security personnel with unknown IP addresses.

"Bullshit Mandalay! Give you one minute! The computing resources invaded by the other party have increased to 10 million!" Dawson said with a bad attitude.

Mandalay obviously doesn’t like this!

"I know you can stop it! All the servers of the lttw plan have been handed over to you. Can't you still stop the loose distributed computing resources of 10 million tflops? Dawson, when did you become that kind of rookie?

"Mandalay mocked.

The so-called lttw plan is a top-secret plan launched by darpa.

Darpa suggested that Li Jian build excellent servers around the world and then monitor the entire world's Internet information, even telephone network information.

The full name of this project is called "", which means "listen to the whole world" in Xiaguo. In other words, Li Jianguo is monitoring the communication information of the whole world.

To monitor the world's communication information, the computing resources required are huge. In order to smoothly promote the lttw plan, Li Jian has established a huge private computer network around the world.

With the help of this private computer network, the National Security Agency of the United Kingdom was able to implement the LTTW plan and complete the monitoring of information around the world.

Shi Lei's guess was correct. The only thing that could withstand the invasion of 5 million tflops computing resources was the huge private supercomputer network cluster.

It is indeed impossible for ordinary people to build a private computer network of that level, but Lijian can. In order to protect their own interests and at the same time fight against hostile forces, Lijian has established an lttw network all over the world!

Now, Darpa has temporarily taken over the lttw network to fight against Shi Lei's intrusion. After all, Darpa's internal network contains a lot of confidential information. Once Shi Lei captures Darpa's internal network, the consequences will be disastrous!

As for simply letting Darpa enter the bureau's internal network and directly go offline and disconnect from the Internet, it is basically impossible.

The internal network of the Darpa Advanced Bureau is not just their internal network. In fact, multiple confidential networks of Lijian State all use the internal network of the Darpa Advanced Bureau as a transit point.

Once the internal network of the advanced bureau of Darpa is shut down, all other networks using it as a transit point will be shut down.

Some of these networks involve the most core security of Li Jian!

Including automatic weapons control networks, covering unmanned missiles, drones, etc.

To simplify things simply, the internal network of the Darpa Advanced Bureau cannot leave the Internet for the time being, at least until other important networks are disconnected from it. It cannot leave the Internet environment.

"Mandalay, how much longer do you want? The lttw network is under great pressure. Our network interface data is too huge and cannot support it for long!" Dawson asked again.

Mandalay frowned and said: "Give me another three minutes! I'm about to succeed, I need three minutes! Damn! This bitch! He used such vicious tricks! I

It has been analyzed that the other party hides the virus in the source code of the operating system, but uses a special encoding mode, I still need some time to analyze it!"

"You idiot! Five minutes at most! We can only delay you for five minutes at most! Do you know how much computing resources the other party has! They have increased their computing resources to 15 million tflops, and the lttw network is beginning to collapse.

!" Dawson responded.

Another voice intervened, "Instruct the afn network to go offline! The bpn network goes offline! The bwsn network goes offline..." The voice that temporarily interrupted said a long series of offline commands.

Those networks are important networks mounted on darpa's internal network and are usually protected by darpa to prevent hackers from intruding.

The afn network is the automatic weapons control network, the bpn is the basic power network, and the bwsn is the basic water supply network.

If Shi Lei controls those basic networks, the entire country will be in chaos!

In order to prevent Darpa's internal network from being compromised, Ryan, the head of Darpa's network security, ordered in advance to separate all important networks from Darpa's internal network and enter a short-term closed self-operation state.

On the other hand, Shi Lei and the others are trying to invade Darpa's internal network. They have invested 15 million tflops of computing resources, but they are still blocked.

"Yizur, invest all your computing resources!" Shi Lei gritted his teeth.

Raphael reminded: "Stone, the other party is blocking our attack by self-destructing the server. It is difficult for us to increase the invasion speed!"

"I know! But I don't care, we must open the last unknown IP address!" Shi Lei said indifferently.

The so-called self-destruction server method is that network security experts from the Darpa Advanced Bureau actively sacrificed the lttw network's server and used information bombs to self-destruct the lttw network's server, thereby temporarily blocking the intrusion of Shi Lei and the others.

This blocking time is very short. After all, the information bomb caused can only be blocked for a few seconds in the face of the huge data flow.

However, within a few seconds, Darpa had already won a glimmer of hope!

As long as Mandalay completes the Nemesis virus's killer program, he can use the killer program to clean up the Nemesis virus throughout the Internet world.

Once the Nemesis virus is cleared, the AON network will naturally be broken. Shi Lei has lost huge computing resources and cannot fight against Darpa!

As for Darpa's control of such huge computing resources, why not destroy Shi Lei or other world-leading hackers at other times?

First of all, the computing resources controlled by Darpa are not exclusively used to eliminate hackers, but are used for the LTTW plan. At the same time, the world's top hackers are not unable to leave the network.

Once it leaves the network, Darpa has no computing resources, and it is impossible to transcend the network and catch the world's top hackers in the real world, right?

"Brother Shitou, we can't break the opponent's defense! According to the current progress and the resilience shown by the opponent, it will take at least half an hour!" Tao Wenxian reminded Shi Lei.

Shi Lei sneered, "Yizur, prepare to execute the AON network to forcefully explode the seed!"

.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!


This chapter has been completed!
Previous Bookshelf directory Bookmark Next