typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Final-074 Destruction and Resistance!

Summer time, July 14th, 1:40 am.◇↓

The virtual transparent screen of the lip-lens information processor showed that the plan to find the needle in the haystack was completely completed, with only less than 10,000 unknown IP addresses left to be analyzed.

At the same time, the base points of the Aon network have accumulated to 1,389,200,186!

This number once again exceeded Shi Lei's estimate of 1.2 billion. Nearly 1.4 billion computer devices infected with the Nemesis virus provided 18 million tflops of computing resources for the Aon network.

Under the impact of such huge computing resources, less than 10,000 unknown IP addresses were analyzed. In just five minutes, the analysis was almost completed, and only less than ten unknown IP addresses were left.

The real IP address of Butler's parent server is hidden in it!

Although the aon network has 18 million tflops of computing resources, the iwn secret network also has more than 1 million tflops of computing resources.

There are so many, sky-breaking computing resources, and the analysis of the remaining unknown IP addresses cannot be completed quickly, which only shows that the remaining ones are all hard-core.

The best way is to analyze them one by one!

With the computing resources of the aon network and iwn secret network, it is definitely not a problem to defeat the remaining IP addresses one by one.

Tao Wenxian and Raphael obviously understood this truth, and they were waiting for Shi Lei to make a choice.

Shi Lei counted the remaining IP addresses. There were only eight unknown IP addresses in total. Shi Lei did not choose them specifically. He pointed directly at the first unknown IP address and said with a smile: "Let's start from the beginning!"

"Okay!" Tao Wenxian and Raphael said in unison.

The three began to invade the first unknown IP address. At the beginning, they did not directly mobilize all the computing resources. After all, they had too many computing resources. If they were used indiscriminately, they could easily cause network congestion.

That's not the result Shi Lei needs!

Shi Lei is not doing destruction, what Shi Lei needs is answers!

In the first attack, the three used 5 million tflops of computing resources. Such huge computing resources overwhelmed the opponent's defense as soon as they came into contact with it.

Then I encountered another obstacle!

However, Shi Lei already knew. The identity information of this unknown IP address was the internal network of the NSA National Security Agency!

Shi Lei has always been cautious and vigilant, never provoking the National Security Agency of the National Security Agency or the Advanced Bureau of Darpa. At most, he just played with the CIA and the FBI.

Normally, after confirming that the other party was the internal network of the National Security Bureau of the National Security Agency, Shi Lei would have quietly retreated and cleaned up all traces of the intrusion.

Then, the network security experts of the National Security Agency of the National Security Agency will follow the trend and choose not to track, thus avoiding a meaningless battle.

But Shi Lei now controls the aon network and iwn secret network, and has gathered nearly 20 million tflops of computing resources. How can he easily retreat?

Even though the NSA was obviously not the target, Shi Lei still had no intention of retreating.

"Come in and take a look, scan it. See if the NSA guy knows any information about Butler!" Shi Lei ordered.

Tao Wenxian and Raphael cooperated with Shi Lei to invade. With the help of huge computing resources, they almost broke through the defense of the National Security Agency of the NSA.

It’s not that the NSA’s defense is too rubbish, nor that the NSA’s network security experts are too rookies, it’s that Shi Lei and the other three are too unreasonable!

They directly used huge computing resources, ran rampant unreasonably, and easily defeated the National Security Agency's defense.

There is a lot of turmoil within the NSA National Security Agency right now!

As the largest intelligence agency in the United States, the National Security Agency's confidentiality level is extremely high, otherwise it would not be ridiculed as 'no.'

Shi Lei and the others broke through the defense of the National Security Bureau of the National Security Agency and were about to scan the data within the National Security Bureau when they suddenly discovered that they could not connect to the internal network of the National Security Bureau of the National Security Agency.

Tao Wenxian sarcastically said: "The National Security Agency of the National Security Agency disconnected the physical connection of the network. It is simply a shame!"

Raphael didn't have too many surprises. "The National Security Agency of the National Security Agency has recorded many black operations of powerful countries. It is normal to disconnect network links. They cannot allow us to do whatever we want in their internal network."

Scanning detection. However, the other party disconnected the physical connection from the Internet, which shows that Butler is not hiding in it."

Shi Lei confirmed Raphael's statement, "Well! Butler is not under the protection of the NSA National Security Agency! Cracking the second unknown-level IP address!"

The National Security Bureau of the National Security Agency temporarily avoided the front, and Shi Lei did not feel any excitement. In the past, Shi Lei might have been proud.

But when Ling Yumo and the others' lives were threatened, Shi Lei had no intention of being so proud!

For the second unknown-level IP address, Shi Lei and the others still mobilized 5 million tflops of computing resources and tried to invade. Just like the history of the NSA National Security Agency, the huge computing resources easily broke through the opponent's defense.

Shi Lei determined the other party's identity immediately.

It turned out to be Xia State’s Cyber ​​Security Intelligence Department!

Tao Wenxian obviously also confirmed the target's identity information. He asked: "Brother Shitou, it's S. Should we retreat?"

After all, the two of them are from Xia country. At the same time, Mirui Technology Group is still developing in Xia country. It seems not very good to blatantly invade the S Network Security Intelligence Department, right?

However, even though the target of the invasion was Xia State's Network Security Intelligence Department, Shi Lei only hesitated for a moment before deciding to continue the invasion.

"Continue the attack!" Shi Lei said coldly.

The huge computing resources brought extremely powerful intrusion power. The Network Security Intelligence Department could not stop the intrusion of Shi Lei and the others.

However, the countermeasures of the Cyber ​​Security Intelligence Division are exactly the same as those of the National Security Agency of the National Security Agency, which directly disconnects the physical connection to the Internet.

Shi Lei did not sincerely want to invade the S Network Security Intelligence Department, he just wanted to eliminate the suspicion of the S Network Security Intelligence Department.

As long as the S Network Security Intelligence Department physically disconnects from the Internet and eliminates the suspicion of Butler hiding in it, Shi Lei will not cause any trouble for the S Network Security Intelligence Department.

"The third one!" Shi Lei said directly.



The three of them invaded seven unknown-level IP addresses in a row, and none of them was the real IP address of Butler's parent server, only the last one was left!

Shi Lei took a deep breath, although according to theory, this one must be the real IP address of Butler's parent server!

But there was a hint of worry in Shi Lei's heart!

Raphael also frowned. In the situation of choosing one out of eight, although it is a choice from beginning to end, it is too sad to not choose the first seven?

Tao Wenxian opened his mouth, as if he wanted to say something, but in the end he didn't say anything.

"Stone, are we starting to invade?" Raphael reminded.

Shi Lei nodded heavily, "Okay!"

"How many computing resources are used?" Raphael asked.

"Business as usual!" Shi Lei said simply. The so-called "business as usual" means that the computing resources of 5 million tflops were still mobilized. The first seven unknown IP addresses were all defeated by the computing resources of 5 million tflops.

The last unknown IP address still uses 5 million tflops of computing resources as the basic intrusion data.

However, the all-conquering intrusion was blocked at the eighth unknown IP address!

That’s right!

The computing resources of 5 million tflops were actually resisted!

Although the computing resources of 5 million tflops are not all the resources of the aon network and the iwn secret network, they are still a huge and irresistible computing resource.

This fact has been verified in the previous seven unknown IP addresses. Even the NSA National Security Agency cannot withstand 5 million tflops computing resources!

However, the huge and invincible computing resources were actually blocked. From what channels did the other party obtain the computing resources?

The current situation is that the Nemesis virus released by Shi Lei has infected more than 1.4 billion computer devices around the world. Almost 90% of computer devices worldwide are infected with the Nemesis virus.

This also means that Shi Lei controls the vast majority of computer equipment around the world and has collected almost all the computing resources that can be collected.

Even if other people had the same technology as Shi Lei and could create a super virus like the Nemesis virus, there would be no computer equipment for infection.

Shi Lei didn't understand why the eighth unknown IP address could withstand their attack?

Could it be that the eighth unknown IP address has a private supercomputer cluster with more than 1 million tflops of computing resources?

Shi Lei didn't believe this situation at all!

The cost of a supercomputer is not only the cost of parts, but also huge maintenance costs. When a supercomputer is running, it requires very high maintenance costs.

If you want to maintain a supercomputer cluster with computing resources of 1 million tflops, the cost investment is simply appalling.

Shi Lei absolutely doesn't believe that is possible!

But if it wasn't a private supercomputer cluster, what was the situation that prevented Shi Lei's invasion?

.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!


This chapter has been completed!
Previous Bookshelf directory Bookmark Next