As a peak-level hacker in the world, he was actually teased like this. The peak-level hacker in the mysterious world was very angry at this time and quickly typing a string of English source codes on the keyboard.
The peak-level hacker in the mysterious world has enabled a real defense system, based on the outer layer of the protection composed of the broiler network and the inner layer of the core defense composed of the supercomputer.
The effect of combining the outer layer of the broiler network protection and the inner layer of the supercomputer core defense is not the effect of one plus one equals two, but exceeding this effect.
The protective outer layer of the broiler network acts as a coolie role. No matter what attack is, it is a character that can be ravaged at will.
The core defense inner layer composed of supercomputers acts as the protector behind the scenes. When the defense outer layer is subjected to various attacks, it will provide strong support for the defense outer layer to ensure that the defense outer layer will not be easily broken through.
The supercomputer, which is a peak-level hacker in the mysterious world, has a computing speed of 30 tflops. Because the computing resources composed of supercomputers are intensive distributed computing resources, they all surpass loose distributed computing resources in terms of consistency, coordination and controllability. Even in the face of loose distributed computing resources of 100 tflops, they maintain their dominant position.
"Hmph! Loose distributed computing resources? How many personal computers and ordinary servers have been hacked to form such a huge botnet!" The voice of the peak-level hacker in the mysterious world was full of disdain.
Loose distributed computing resources. They are usually generated by botnets. The so-called botnet, which is another name for broiler networks, is not a horror thing.
This mysterious world peak-level hacker judged that he did not have a supercomputer, but only controlled a huge botnet based on the situation of the fourth assessment server.
To control a huge botnet is not a difficult task for powerful hackers. It only takes a lot of time and write a complex set of broiler management software.
For powerful hackers, they basically won’t do such things. How many computing resources can an ordinary personal computer provide? Even if they use a viral large-scale spread of Trojans, collecting a large number of personal computers as broilers. But this method is not good.
First, the Trojans that collect broilers have spread on a large scale are easily harmonious by network security companies, so that all broilers servers that have been collected may be reimbursed.
Second. Instability of personal computers! This instability is not only reflected in usage time, but also in fault tolerance. Especially when using loose distributed computing resources to conduct hacking attacks, unless a relatively basic and simple denial-of-service attack is used, that is, the so-called ddos attack, there will be good guarantees. If you use a high-difficulty joint data attack, you will definitely lose the chain!
Suppose a situation. In the iwn secret network, 100tflops loose distributed computing resources are required. It takes about 1 million users, or even 1.2 million users, to generate them.
Basically, every user can only provide 0.0001tflops of computing resources. Such computing performance is equivalent to one percent or even one thousandth of computing performance for individual users in the Brave World.
The purpose of extracting such low computing resources is to avoid being discovered by users. However, this creates a huge problem, that is, so many users, when performing a task in a comprehensive manner, the data information that needs to be calculated must be divided.
What if some of the users suddenly leave the Internet?
For users with a base of one million, there must be various users who accidentally leave the Internet. In this case, the data that users who leave the Internet need to calculate will be transferred to other users in a very short time.
This extremely short time, not the time in the macro sense, but the time in the micro sense, is basically less than ten milliseconds, that is, within one percent of a second, and the calculation tasks of the missing users are reassigned.
Such a huge and complex software design and management, without the assistance of the advanced pseudo-artificial intelligence system, the limitations of iwn secret network will be very huge.
It is precisely because of this situation that in the eyes of hackers in high-end fields, using loose distributed computing resources is a relatively unclassified way.
Hackers in high-end fields would rather spend more time challenging supercomputers or powerful enterprise-level servers than spend a lot of time building huge botnets.
Last but not least, when loose distributed computing resources face intensive distributed computing resources, they are easily defeated by intensive distributed computing resources.
Combining various flaws, this mysterious world peak-level hacker who confronted the fourth assessment server is qualified to mock the use of loose distributed computing resources.
However!
This hacker at the peak of the mysterious world realized his mistake after thirty seconds!
Originally, the peak-level hacker in the mysterious world determined that the fourth assessment server had 100 tflops loose distributed computing resources. He called a supercomputer with a computing speed of 30 tflops. It was a breeze to break through the fourth assessment server.
But the result is not the case!
When facing a supercomputer with a computing speed of 30tflops, the fourth game showed no sign of failure. Although the mysterious world peak-level hacker did suppress the fourth game server, there was no possibility of breaking it.
The defense system of the fourth assessment server is solid, and when facing the impact of the mysterious world's peak-level hackers, there is no instability at all.
In a mysterious room, the peak-level hacker in the mysterious world looked at the data fed back by the computer screen in surprise and exclaimed: "This is impossible! It is clearly provided by a botnet and a loose distributed computing resource, why is it not affected by the impact and caused data oscillation?"
Perhaps for hackers in the low-end field, they do not have such powerful technical means, using data shocks to cause data oscillation, thus dismantling the entire botnet.
However, in the high-end field of hackers, it is very common to use intensive distributed computing resources to launch data impacts on loose distributed computing resources, thereby generating data oscillation.
"It's so strange! How do you deal with botnets?" The mysterious world's peak-level hacker was puzzled to himself.
On the other hand, the first-level branch of Longteng Plan in Zhongyu District, Shuangqing City.
Shi Lei checked the situation of the fourth assessment server through the lip lens-type information processor. When he saw the mysterious world peak-level hacker trying to generate data shocks to destroy the loose distributed computing resources provided by iwn secret network through data impact, Shi Lei showed a faint sneer on his face.
This mysterious world-class hacker is the right method to use. To deal with loose distributed computing resources, data shocks should be used to cause data oscillation, and all broiler servers and personal computers that provide computing resources should be shaken off from the broiler network.
But the iwn secret website is different!
I have analyzed before that iwn secret network extracts only one percent of the computing resources of users in the World of War, or even one thousandth of the level of the user.
Extracting such a rare computing resource will not affect iwnseed, which is the resource provider of iwn secret network, game users of the world of bravery.
In addition to Yi Zuer's super-super correction function, the data oscillation caused by mere data shocks has been completely ignored by iwn secret network.
Shi Lei is also a world-class hacker. Isn’t it clear that botnets are afraid of data shocks caused by data shocks?
The mysterious world peak-level hacker attempting to use this conventional means to deal with iwn secret network can only be said to be a delusion!
Seeing the mysterious peak-level hacker in the world being defeated, Shi Lei just observed quietly. So far, this mysterious peak-level hacker in the world has not shown too obvious personal characteristics for the time being, and Shi Lei did not judge who this guy is!
Shi Lei needs more time to let this mysterious world peak-level hacker fight against the fourth assessment server to determine the other party's identity.
On the mysterious world's peak-level hacker, when the data impact caused data shocks to fail, this mysterious world's peak-level hacker did not immediately try a brand new intrusion method, but was preparing to try another data impact.
However, this time, the data impact methods prepared by the peak-level hackers in the mysterious world will be somewhat different!
After all, it has failed once. If the same attack method is used, it may not cause any destructive power. Therefore, although the mysterious peak-level hacker of the world is preparing to use data impact again, he has a brand new data impact method.
Every world's peak-level hacker is not a simple character!
If you want to simply become a peak-level hacker in the world, there are only two situations. The first one is that you have truly unparalleled talent. If you change the data plan, it means that the iQ IQ has reached about 200.
This type of iQ-level player can basically complete hacker learning without a teacher, start with the most basic learning, and then obtain more advanced knowledge through Internet resources, and continue to reach the peak of the world.
However, only about 0.5% of the human IQs have IQs above 140. There is basically no possibility of reaching an IQ of above 200.
After all, Bill Gates and Stephen William Hawking's IQ IQ is only 160!
As for another possibility...
.(To be continued...)
ps: Another possibility is really simple, it is possible that everyone can meet the requirements!