typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK1650 True Identity!

.

The protection server of the mysterious intruder actually directly called 300tflops of intensive distributed computing resources when faced with Shi Lei's use of supercomputer lightning strike. △ Dianping Novel,

Although the defense system that protects the server, the investment ratio between defense and intrusion is close to one to one, which is good news. It shows from the side that the intruder's defense strength may not be very strong.

But this is also bad news!

Because Shi Lei only tried to invade the security server, the mysterious intruder actually reacted so greatly, mobilizing 300 tflops of intensive distributed computing resources at once.

This behavior fully proves that the mysterious intruder definitely has more computing resources. If there are no more computing resources, how can it be possible to invest 300tflops of computing resources at one time?

In the hacker world, there are not many cases where you directly reveal your trump card in the 'showhand' way. Unless you are 100% sure that you can really defeat the opponent. Otherwise, leaving your trump card is the conventional choice.

Shi Lei analyzed the mysterious intruder and controlled unimaginable computing resources. Therefore, Shi Lei ordered Yizuer in advance to activate the oversed operation plan in advance.

There is a certain degree of danger in executing the overseed operation plan. This is because through the overseed operation, the iwn secret network will be improved to extract more computing resources from the iwnseed base point.

Each iwnseed represents a player's computer device. When the iwn secret network is in a semi-sleep state, the iwn secret network will only keep each iwnseed in a semi-ready state, minimizing the performance of the player's computer equipment.

Because when the iwn secret network is in a semi-dormant state, the iwn secret network does not need to gather loosely distributed computing resources at all. Naturally, it will not occupy the user's computing resources.

When Shi Lei orders Yizuer to optimize the resources of the iwn secret network, Yizuer will change the status of the iwn secret network. It will enter the active state of normal work from the semi-sleep state.

The iwn secret network in normal state will draw computing resources from iwnseed. However, in order to ensure that it will not affect the normal use of users, the 1tflops loose distributed computing resources of the iwn secret network will draw from approximately 20,000 iwnseed base points.

In other words, when the iwn secret network is in normal working condition, each iwnseed base point requires an average of 0.00005tflops of computing resources.

Under normal circumstances, iwn Secret Network draws on such scarce computing resources. It will not affect the normal use of users at all. Unless the computer equipment of individual users is too old. But in that case, iwn Secret Network will not change from the old one. Computer equipment draws computing resources.

Once the oversed operation is enabled, this data will increase. For example, each iwnseed originally only provided 0.00005tflops. Now, depending on the needs of the iwn secret network, this data may be doubled, or even several times.

If the iwn secret network draws too much computing resources, it will affect the normal operation of the user. Therefore, Yizuer prompts that the oversed operation is a dangerous operation.

But the current situation means that Shi Lei can't control that much for the time being. After all, the power shown by the mysterious intruder is too powerful. If the oversed operation is not turned on, what if the mysterious intruder uses huge computing resources to directly overwhelm the endless defense system?

, what should we do?

Although the Endless Defense System claims to be invincible in defense, in fact, the Endless Defense System is not truly invincible.

If a very large amount of computing resources are gathered in a very short period of time, and then collectively attack the endless defense system. Once the computing resources collectively attacked exceed the endurance range of the endless defense system, then the endless defense system will be overloaded and forced to

Restart.

In the short period of time when the Endless Defense System is forced to restart, the Endless Defense System will not function, which is equivalent to solving the Endless Defense System in another form.

"Sir, the iwn secret network has entered an active activation state, the second confirmation of goodseed has been completed, and the preset of the overall operation plan has been completed." Yizuer reminded Shi Lei.

The iwn secret network has fully entered the activation state, which means it has entered a state of hacker war. As long as Shi Lei gives an order, Yizuer can collect all the goodseed within five seconds and start the overalled operation plan.

Shi Lei nodded and stared at the computer screen to see how the mysterious intruder's protection server would react.

However, the protection server of the mysterious intruder did not respond at all. It only resisted Shi Lei's invasion without making any counterattack.

Such behavior gave Shi Lei a strange thought. Could it be that the mysterious intruder did not have strong hacking skills, but only had powerful computing resources?

But such a weird idea was immediately shattered when it was born!

Since he has powerful computing resources, how could he not have powerful hacking technology? If that were the case, Shi Lei could only say that people with too much money are stupid.

Of course, Shi Lei was just thinking about it. He could figure it out even with his toes. Without powerful hacking skills, it was impossible to have powerful computing resources.

No matter what channel the powerful computing resources are obtained from, it can only show that the mysterious intruder has powerful hacking technology. As for the low ratio of defense to intrusion of the defense system, at most it can only show that the mysterious intruder’s defense technology is not

It's just too exquisite.

"Yizur, combine the iwn secret network and the lagfree network, use the lagfree network as the backbone, and build the channels of the iwn secret network on the lagfree network!" Shi Lei ordered again.

The so-called lagfree network is the neutrino information network established by Mirui Technology Group around the world. Every continent has a base point of the neutrino information network. It is then connected to the final end in Shuangqing City.

Thereby establishing an information network using neutrinos as carriers.

The characteristic of the neutrino information network is that the delay is very low. Even when transmitting from Lijian to Xia, the delay is less than 1 millisecond, which is almost equivalent to no delay.

That’s why it was named lagfree network by Shi Lei, which stands for ‘no delay and no lag’ network.

The iwn secret network is based on users of the Brave World around the world. Except for iwnseed in Xia Kingdom and Asia, there will be a certain delay in transmitting iwnseed from other regions to Shuangqing City in Xia Kingdom.

For example, iwnseed in Lijian country will cause terrible delays!

The usual role of the iwn secret network is only to assist the core server of the brave world to manage the operation of the brave world. But now, Shi Lei needs to mobilize the iwn secret network to participate in the hacker war. Therefore, Shi Lei combined the iwn secret network with the lagfree neutrino information network.

Together, we create a low-latency iwn secret network, further increasing the availability of iwn secret network computing resources.

The computing resources provided by iwn Secret Network are loose distributed computing resources. Compared with intensive distributed computing resources, there are certain defects. Among them, the biggest defect is the delay problem.

Now with the help of the lagfree network, this shortcoming has been greatly compensated. The loose distributed computing resources provided by the iwn secret network will be closer to the intensive distributed computing resources.

Just as Shi Lei was continuously instructing Yi Zuer to prepare for the hacker war, the more than 12,000 zombie users who were causing trouble in the official player forum of Dream Entertainment changed again.

The more than 12,000 zombie users actually paused publishing content attacks without performing any operations.

Shi Lei was thinking strangely, 'What do these zombie users want to do?'

However, when Shi Lei could not come up with a clear answer, Yizuer reported a piece of information to Shi Lei.

"Sir, the number of registered users in the official player forum of Dream Entertainment has increased significantly. According to system statistics, a total of 173,837 registered users have been added in the past eleven minutes. The system randomly selected a thousand users and conducted reverse tracking of the real IP addresses.

, the final tracking clue came to the marked server." Yizuer reminded Shi Lei.

Shi Lei's face looked ugly. The marked server was the protection server of the mysterious intruder. This meant that in just eleven minutes, those mysterious intruders had registered more than 170,000 members of the Dream Entertainment official player forum again.

User account.

"Yizur, determine the identity information of the newly registered user!" Shi Lei issued the order while quickly typing the code on the keyboard.

When Yizuer was verifying the identity information of the newly registered user, Shi Lei had already entered the Inca country's national population information database.

Because according to Yi Zuer's statistical information, the identity information of these newly registered users were all Inca citizens. Therefore, Shi Lei entered the national population information database through the backdoor preset in the Inca National Bureau of Population Information and Statistics.

In the Inca country's national population information database, Shi Lei ordered: "Yizur, cross-match and verify the identity information!"

Yizuer immediately carried out Shi Lei's order and cross-matched and compared the identity information of the newly registered suspicious users in the Dream Entertainment official player forum within the Inca National Population Information Database.

After matching and comparison, Yizuer displays the result information on the virtual transparent screen of the lip lens information processor.

What makes Shi Lei depressed is that the identities of these newly registered suspicious users are all real! All of them are real citizens of the Inca country!

What is going on?

.(To be continued..)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next