typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

In HK1191, it will always be NHK!

.

Shuangqing City, Shuanghu District.

Shi Lei put on the vest of "wisdon" and joined the battle between Raphael and unknown hackers. Shi Lei had just entered the defensive interface provided by Raphael and immediately discovered the problem.

Raphael obtained the distributed computing resources of 400 tflops provided by Miri Technology Group, but did not gain the upper hand and barely blocked the other party.

Although the computing resources of iwn secret network are distributed computing resources, the computing resources of 400 tflops are also quite good.

Shi Lei scanned Raphael's defense system. After having a rough idea of ​​the defense arranged by Raphael, he quickly began to try to counter-track the mysterious hackers who invaded Raphael.

"Mr. Fini, I have begun to track the intruder's real IP address in reverse." Shi Lei said to Raphael by changing the sound microphone in the name of Wisdon.

"Received! Wisdon, there is no problem with defense for the time being, you don't have to worry." Raphael made a guarantee.

A smile appeared on the corner of Shi Lei's mouth. Raphael was bullied so aggrievedly. Shi Lei felt very funny in his heart. "Okay, Mr. Fini. I'll leave the defense matter to you!" After saying that, Shi Lei cut off the power supply of the voice-changing microphone to facilitate communication between him and Yi Zuer.

Normally, the control of voice input and cutting of voice channels is automatically done by Yi Zuer. But this is a voice communication with Raphael. If Yi Zuer makes a mistake in judgment, it will reveal a flaw. Raphael will know that Shi Lei is Wisdon, and even speculates that Shi Lei is Mr. M.

In order to strive for insurance, Shi Lei turned off the power of the voice-changing microphone directly. This would never happen. Anyway, the power of the microphone was turned off, and the sound of the headphones was blocked. If Raphael had anything to do, Shi Lei could also receive it in the voice communication channel.

"Yuzhuer, are the remaining computing resources on iwn secret network ready?" Shi Lei asked.

iwn secret network brings together huge distributed computing resources. However, the utilization rate of distributed computing resources is far from keeping up with the intensive computing resources of supercomputers.

However, Mirui Technology Group also owns the supercomputer Lightning!

The computing resources of supercomputer lightning. Under Yi Zuer's control, it has a total of 300 tflops of computing resources, and has not published any data to the public, so it is in a confidential state.

When iwn secret network and supercomputer lightning are combined, the distributed computing resources of iwn secret network will become more efficient through the integration and optimization of supercomputer lightning.

"Sir, iwn secret network resources are integrated to complete 720 tflops; the computing resources of supercomputer lightning gather 88 tflops. iwn secret network and supercomputer lightning's remaining computing resources are used to maintain the operation of the brave world and the basic needs of the endless defense system." Yi Zuer responded to Shi Lei and showed all the computing resource interfaces to Shi Lei.

Shi Lei connected to the 720tflops distributed computing resources provided by iwn secret network. Through these distributed computing resources, Shi Lei began to quickly track the intruder's connection IP address.

Due to its huge computing resources, Shi Lei's anti-tracking speed is very fast and very hidden. The intruder's first connection IP address was implanted into a first-class broiler.

Although the invader's first-class broiler has excellent performance and can be called a small supercomputer, but only has 2tflops computing speed, how can it block the 720tflops computing resources controlled by Shi Lei?

In just a moment, Shi Lei controlled the computing resources of the iwn secret network, broke through the defense of the first-level broiler and grabbed the intruder's connection IP address.

‘Well, what is Raphael’s name? The invader’s skills seem to be not that powerful, and he can’t handle it?’ Shi Lei was thinking in his heart.

By counter-tracking the intruder's connection IP address, Shi Lei easily broke the intruder's first broiler server. The whole process did not take a minute. Shi Lei did not feel at all that the intruder's technology was powerful.

‘Will Raphael’s technique go backwards?’ Shi Lei shook his head and thought, and then followed the next broiler based on the connection IP address caught in the first broiler server.

The intruder's second IP address transfer server still did not cause any trouble to Shi Lei. Shi Lei seemed to be eating and drinking water, and naturally entered the second broiler server.

In the next few minutes, Shi Lei killed eight of the invader's transit servers in a row. Adding to the previous two, which means that in less than five minutes, Shi Lei broke through the invader's ten broilers!

‘Damn? This is what Raphael calls a master?’ Shi Lei once again had a doubt in his heart, ‘Is it an offensive master?’

In the hacker world, hackers can be roughly divided into three types: offensive type, that is, they are proficient in various invasion technologies, which are extremely sharp when invading, and extremely bad when in defense. The representative figure is the second-generation hacker organization in Xia Kingdom and the second leader of the Hacker Alliance.

Black Tiger's invasion technology can reach the best, or even a little higher. But as for defense technology, whether it has the third-class level in the world is still a big problem.

The second type is the defense type, which is the opposite type to the offensive type. Usually, this type of hacker will generally turn to the security field. The cybersecurity agencies of various countries and the vast majority of security experts belong to this type.

The last type, and the most powerful type, is the all-round hacker. The so-called all-round type is just relative, not to say that you can do everything, but to be able to attack and defend.

Shi Lei is one of the best, with extremely sharp attacks and extremely powerful defenses!

In addition to these three types of hackers, there are some other categories, such as those who are proficient in anti-tracking. This type can be considered as a defensive hacker. Usually this type of hacker also develops into the field of security experts; those who are proficient in tracking can be considered as an offensive hacker.

There are also hackers who are proficient in encryption and decryption. Hackers who are proficient in encryption can also develop into the field of security experts; decryption is naturally considered an offensive hacker.

Judging from the current situation, the hacker who invaded and tracked Raphael should be an offensive hacker. In terms of intrusion and tracking technology, this unknown hacker showed an extremely powerful side.

But in terms of defense and anti-tracking, this unknown hacker is like a rookie and does not match the offensive technology at all.

‘If the other party is an offensive hacker, then he is so brave!’ Shi Lei secretly admired the unknown invader in his heart.

Generally speaking, hackers who are not all-rounders rarely fight with other powerful hackers. Unless they are attacking and defensive hackers, they will fight all their strength with other hackers.

Similar to simple offensive hackers, they basically won’t compete with other powerful hackers!

No matter how much Raphael is, he is also a world-class hacker. Even if he reaches the world-class strength, he will not confront Raphael head-on.

Which guy who can become a peak hacker in the world is a fool? Isn’t it necessary to kill your father or take your wife?

Shi Lei, who had broken through ten broiler servers in a row, just hesitated for a moment and continued to carry out anti-tracking work. Regarding this mysterious offensive hacker, Shi Lei also wanted to know who the other party was and why the reason was that he was with Raphael.

The connection IP address found from the tenth broiler server was used as a clue to track the next broiler server, and Shi Lei followed the clue to track it.

However, when tracking the eleventh transit server of the intruder, Shi Lei finally felt a little bit of difficulty. However, the next moment, Shi Lei showed a strange expression on his face.

Shi Lei first turned on the power switch of the voice changer, and then spoke in the voice communication channel: "Mr. Fini, I have tracked down the eleventh transit server of the intruder. However, this transit server has some problems."

"What's the problem?" Raphael immediately responded. "Is the opponent's defense very strong and cannot crack the defense system of the broiler server?"

"No, Mr. Fini!" Shi Lei said directly without any hesitation: "The eleventh transit server is the web server of the official website of nhk TV. I heard that Mr. Fini, one of your opponents, likes not to get along with nhk TV?"

The eleventh transit server of the intruder was indeed the web server of nhk TV. Shi Lei felt extremely strange about this result.

Is this God helping him?

The mysterious invader's transit server chose the nhk TV official website web server. As long as Shi Lei guided him a little, Raphael would suspect that the mysterious hacker who tracked him was Mr. M.

"What? Wisdon, are you sure the eleventh broiler server of the intruder, and the web server of the official website of nhk TV?" Raphael was shocked.

Mr. M likes to find trouble for NHK TV station, which is an open secret in the hacking industry. In addition, Mr. M always likes to find trouble for Raphael. Any hacker incident involving Raphael and NHK TV station is always easy to suspect Mr. M's head.

After all, Raphael is a peak-level hacker in the world. How can ordinary hackers bully Raphael? Only Mr. M is the best object of suspicion and the best object of blame.

"I'm sure! Mr. Fini, what should we do now?" Shi Lei's Wisdon vest was transformed into, asking Raphael for the next move.bsp;update


This chapter has been completed!
Previous Bookshelf directory Bookmark Next