Shi Lei posted a post in the Internet world of Indonesia, which put the Riks in a very passive situation.
After all, the video released by Shi Lei was taken based on the security surveillance camera of the Monument to National Independence, and experts from Indonesia have already judged it. At the same time, this slightly vague video record has been identified by a large number of technical experts, indicating that it is an original video record and has not been processed in any technical manner.
So, in this video, the numbers of the two drones recorded are not any problem. They are strong evidence to prove that the two drones belong to the Liberty!
"Yi Zuer, start to clear the invasion traces!" Shi Lei ordered with a smile. Shi Lei was quite satisfied with the easy victory.
"Sir, the three-layer protection network is under attack!" Yi Zuer reminded Shi Lei that the relevant situation was displayed in the virtual transparent screen of the lip lens-type information processor.
Yi Zuer used a graphical display scheme, forming a spherical network with 324 blue light spots, representing a temporary broiler server that forms a three-layer protection network. Among them, three larger and brighter blue light spots are the core of the three-layer protection network and three small supercomputers.
However, in the spherical network of 324 blue light spots, there is a light blue light spot that is flashing with alternate lights of red and blue, indicating that the broiler server is being invaded.
Shi Lei was slightly stunned and quickly entered the source code on the keyboard with both hands. He was preparing to personally inspect the situation of the broiler server. However, before Shi Lei entered the temporary broiler server, he had to stop.
Because the invaded temporary broiler server has been broken through!
In the spherical network, the light spots that originally flashed alternately in red and blue turned into a constant bright red, representing the fall of the temporary broiler server.
"Impossible!" Shi Lei exclaimed!
Although the invaded temporary broiler server is just an ordinary server, and its computing performance cannot even reach 0.1tflops. However, as part of the three-layer protection network, it is protected by an endless defense system.
The protective power of the endless defense system cannot be broken through even its creator Shi Lei, let alone other hackers.
"Yuzhuer, what is the situation of the fallen temporary broiler server? Why did the endless defense system not stop the invasion?" Shi Lei quickly asked Yizhuer.
"Sir, the system cannot determine the specific situation for the time being. The system can no longer access the fallen temporary broiler server. Sir, the third-layer protection network has been invaded again, and the scale of the invasion has expanded!" Yi Zuer reminded again.
In the virtual transparent screen of the lip lens-type information processor, a spherical network of 324 light spots suddenly appeared in dense red and blue flashing. Shi Lei could not tell at a glance how many temporary broiler servers were attacked.
Fortunately, Yi Zuer showed specific data on the virtual transparent screen of the lip lens-type information processor, and a total of 98 temporary broiler servers were attacked.
The composition of the three-layer protection network is, in addition to a core small supercomputer, there are eight high-quality broiler servers. The remaining ninety-nine temporary broiler servers have mixed computing performance and can only be used as auxiliary computing.
The invading party first invaded an ordinary temporary broiler server. Then it invaded 98 ordinary broiler servers, which obviously was determined to protect the composition of the network.
The third-layer protection network was invaded on a large scale, and Shi Lei tried to judge the situation of one of the ordinary broiler servers. But the situation shocked Shi Lei. 98 ordinary temporary broiler servers were collectively broken into pieces in less than twenty seconds.
Even if Shi Lei takes action himself, he won’t do better!
‘Who is it? What is the situation? Did the Liberians discover my action so quickly? And was there any expert from the Darpa Advanced Bureau taking action?’ Shi Lei secretly guessed in his heart.
"Sir, the first layer of protection network is about to fall, the endless defense system starts to destroy the code, and it is expected to be deleted within three seconds." Yi Zuer reminded Shi Lei.
At the same time, the first layer of protection network and the last nine temporary broiler servers were also invaded. Even the small supercomputer with a computing performance of 5tflops was ruthlessly broken through without persisting for twenty seconds.
Shi Lei watched helplessly as the first layer of protection network was broken through, but there was no way. In less than a minute, Shi Lei did not even judge the other party's invasion plan.
In other words, the opponent broke through the blockade of the endless defense system, which made Shi Lei feel deeply worried. Since the opponent can break through the endless defense system, can the opponent invade the internal network of Dream Entertainment?
"Sir, the second layer of protection network was invaded, and the invading party adopted a three-stage invasion scheme. 99 ordinary temporary broiler servers suffered the first round of attacks, 8 high-quality temporary broiler servers suffered the second round of attacks, and the core small supercomputer suffered the third round of attacks." Yi Zuer issued an alarm.
After the intruder destroyed the first layer of protection network, he obviously had completely mastered the composition structure of the protection network and directly used a three-stage attack plan to attack all broiler servers of the entire protection network at the same time.
The resistance time of the second layer of protection network is only less than one-third of the first layer of protection network. Within twelve seconds, the second layer of protection network collapses completely!
Shi Lei gritted his teeth and said, "Yuzun, disconnect from the third layer of protection network!"
"yes, sir!" Yi Zuer responded. Although the connection to the third layer of protection network was directly disconnected and the information of the legacy connection IP address was left on the third layer of protection network, after disconnection, it would buy Shi Lei valuable time to re-arrange the defense.
The three-layer protection network is the outermost defense and the safest area. Fighting in the three-layer protection network was originally the ideal situation Shi Lei planned to do.
But the third-layer protection network has not even resisted for two minutes, which is simply incredible!
After disconnecting from the third layer of protection network, Shi Lei personally began to arrange defense strategies. Shi Lei used the three supercomputers with a computing speed of 15tflops in his hand to form a triangular defense network.
The protection power of the triangular defense network is very powerful. No matter which supercomputer the enemy invades, the other two supercomputers can be supported immediately.
The three supercomputers in Shi Lei's hands are affiliated to the Kingdom of Wosang, the Kingdom of Liberty, and the Empire of Great Britain. Although Shi Lei has mastered them, Shi Lei has never used them before and is just used as a backup card.
The situation is urgent now, and these three trump cards were opened by Shi Lei at the same time!
When Shi Lei just completed the triangular defense network, the unknown and fierce invading party had broken the third layer of protection network, and found the connection IP address and followed Shi Lei.
Faced with the arrogant invading party, Shi Lei was also furious and directly turned on the task simulator, executed the simulation plan for the ongoing tasks of the three supercomputers, and took over all the computing resources of the three supercomputers to facilitate the fight against the fierce invading party.
Three supercomputers with computing resources of 15tflops, forming a triangular defense network. In fact, there is not much difference between the protective power of the three-layer protection network.
Although in terms of computing performance comparison, the triangular defense network composed of three supercomputers is indeed far superior to the three-layer protection network. However, in terms of structural complexity and defense strategy, the three-layer protection network is ahead of the triangular defense network composed of three supercomputers.
If expressed in simple percentage data, the computing resources of the three-layer protection network are less than 35% of the triangular defense network, but the defense power reaches 80%.
Shi Lei was not sure about the triangular defense network through three supercomputers to form a triangular defense network to resist the mysterious invading party. Shi Lei only hoped that the triangular defense network could block the invading party for a longer time, so that Shi Lei could build more defensive networks, or reversely analyze the invading party's invasion methods.
However, the situation was beyond Shi Lei's expectations!
It was not a tragic situation, but a beautiful result. The Triangle Defense Network successfully resisted the attack of the invading party. The Triangle Defense Network steadily blocked the invasion, and there were no too many difficulties at all.
Shi Lei asked a little disbelief: "Yu Er, hasn't the triangular defense network been broken through?"
"Sir, the endless defense system successfully resisted the attack of the invading party. The triangular defense network has not been broken yet, but the system detected that the invading party is rapidly increasing the computing resources of the invading data, and the load of the triangular defense network is increasing rapidly." Yi Zuer responded to Shi Lei.
Shi Lei hurriedly said: "Connect the computing resources of the iwn secret network and reinforce the triangle defense network!"
"yes, sir!" After Yi Zuer responded, he immediately began to mobilize loose distributed computing resources of iwn secret networks of more than 1700 tflops and gradually invested in triangular defense networks.
When Shi Lei ordered Yi Zuer, the load of the triangular defense network had reached 80%, and the load was still increasing rapidly.
If Shi Lei had not ordered the resources to access the iwn secret network in time, the Triangle Defense Network might have collapsed. At that time, even if the Triangle Defense Network is not invaded, it would have to exit the defense sequence.
As the resources of iwn secret network enter the triangular defense network to assist in defense, the endless defense system successfully resisted the invading party, and Shi Lei finally had the opportunity to analyze the invading party's situation.
When Shi Lei analyzed the attack data of the invading party, Shi Lei discovered the invading party's way to break through the third-layer protection network!