Shi Lei did reserve an information channel inside Abertir, and simulated it as a port for Abertir's basic communication, which would basically not be discovered.
However, Abertier blends in with Butler!
Before the fusion, Butler was already an advanced pseudo-artificial intelligence system. After merging with Abertier, Butler went one step further.
Although Butler does not reach the level of a true artificial intelligence system, it also exceeds the limitations of advanced pseudo-artificial intelligence systems.
Even though Butler is not as good as Yi Zuer, the gap is definitely not too far behind!
In addition to lacking real creativity and human emotions, a pseudo-artificial intelligence system of this level will never be far different from real humans in terms of logical thinking.
Therefore, for the first time, Shi Lei obtained information about the organization's pseudo-artificial intelligence system that was still online through the information channel reserved inside Abertir.
When Shi Lei continued to send execution commands and asked Abertil to reply to his real IP address, Butler, who had fused with Abertil, immediately discovered the abnormality.
In the fusion system of Abertier and Butler, Butler is in a dominant position. Abertier's core source code is basically integrated by Butler, and the basic code is retained to a large extent.
The information channel reserved by Shi Lei is in the basic code.
However, the execution of commands by the basic code needs to pass the review of the core system. When Butler discovered that the basic code that Abertier had left behind required the execution of information that sent the real IP address, it was immediately determined to be an abnormal state.
Butler first blocked the information channel reserved by Shi Lei. Then he followed the channel through which Shi Lei sent information and tracked Shi Lei's real IP address, preparing for an active counterattack.
Shi Lei was waiting for Abertier's feedback. When Butler's reverse tracking was about to track Shi Lei, Yizuer discovered Butler's reverse tracking information.
"Sir, the system found the reverse tracking data of the information channel. Will it fight back?" Yizuer asked Shi Lei. Yizuer didn't understand that Butler's counterattack represented the information channel Shi Lei had reserved inside Aberdere.
The exposure also meant that Shi Lei could not determine the real IP address of Butler's parent server.
Shi Lei's expression changed. He frowned and said: "Fini, jazz, the situation has changed, prepare to fight! Let's track the reverse tracking data flow of the organization's pseudo-artificial intelligence system together, it is tracking my real IP address!"
After Shi Lei finished speaking, he stood up directly and prepared to go to the previously renovated information war room.
Although the virtual keyboard of the lip lens information processor can also support three people in information operations, the virtual keyboard does not have a real touch feel and key travel feedback, which causes the three people to use the virtual keyboard to input source code.
It will drop a lot.
Therefore, when facing important cyber wars, they will choose real keyboards and computers to conduct information operations.
In the information war room, three computers and nine screens have been started. Each computer is equipped with three screens to facilitate the display of more data information.
"Are you ready?" Shi Lei asked, "If you are ready, let's access the other party's reverse tracking data stream!"
"Ready!" Tao Wenxian responded.
"OK!" Raphael simply replied, indicating that he was ready and ready to engage in information operations at any time.
Shi Lei took a deep breath, "Our actions must only succeed, not fail!"
"Understood!" Tao Wenxian and Raphael said in unison.
Shi Lei ordered: "Yizur, lead the reverse tracking data flow to our broiler server!"
Butler, who has fused with Abertier, is tracking the end of the information channel where Abertier is going to send the real IP address, which is Shi Lei's real IP address.
Yizuer redirected Butler's reverse tracking to the broiler server that the three of them were connected to. When Butler's reverse tracking entered the broiler server, the three of them started tracking Butler head-on.
"Coming!" Shi Lei shouted softly. The broiler server was tested by the data flow of reverse tracking. Shi Lei and the other three began to tap on the keyboard, trying to reverse reverse tracking in Butler's reverse tracking data!
Yizuer pretended to be Shi Lei's real IP address and tried to get rid of Butler's tracking, thereby setting a trap for Butler and giving Shi Lei and the others a chance to seize Butler's real IP address.
"Yizur, prepare to allocate the resources of the iwn secret network, start the oversed program, and obtain the computing resources of iwnseed to the greatest extent without affecting the players!" Shi Lei ordered Yizuer to start harvesting the computing resources of the iwn secret network.
Shi Lei has already experienced what kind of computing resources the organization's supercomputer has!
The computing resources of supercomputer amon13 have reached 500tflops; the computing resources of supercomputer amon14 have reached 1200tflops!
Taken together, the intensive distributed computing resources reach a terrifying level of 1700tflops!
What about Mirui Technology Group?
The ten-thousand-acre headquarters of Mirui Technology Group was destroyed, and the brand-new supercomputer was a direct tragedy. Currently, the only supercomputers controlled by Mirui Technology Group are the supercomputers Origin and Lightning.
The computing resources of the supercomputer Lightning are 300tflops, which is 60% of amon13, which is quite good.
But the computing resources at the origin of supercomputers are only a pitiful 10tflops!
Supercomputers amon13 and amon14 are both the organization's private supercomputers. In other words, the organization's pseudo-artificial intelligence system Butler can use the computing resources of the two supercomputers 100% and unscrupulously without worrying about being discovered.
The intensive distributed computing resources currently in Shi Lei's hands are only 310tflops, which is only about 18.24% of the computing resources controlled by Butler. Not even a fifth of it.
With only the origin of the supercomputer and lightning, it is impossible for Shi Lei to fight against Butler! Even if Butler does not have the assistance of a super administrator, Shi Lei and the other three are the world's top hackers, plus the pseudo-artificial intelligence system Yizuer of the same level
, there is still no chance of winning.
When the gap in computing resources reaches a certain level, it is almost impossible to rely on technology to make up for it.
Therefore, Shi Lei can only place his hope on the iwn secret network and extract the maximum amount of loose distributed computing resources from the iwn secret network, thereby confronting the supercomputers amon13 and amon14.
The computing resources of iwn secret network are generated on every computer with the World of Brave client installed. Regardless of whether the computer with the World of Brave client is running or not, the computing resources will be captured by iwn Secret Network.
However, the computing resources captured by the iwn secret network are very small, and users will not notice it.
As of now, the total number of registered players in World of Brave has exceeded 60 million. This is approximately 605 million.
The current number of people online has exceeded 45 million!
Although the computer configuration of most players is very poor, basically, the average total computing resources of the computer system used by players is about 20gflops, which is about 0.02tflops.
Such a pitiful total computing resources. Apart from dealing with daily applications of players, how much is left?
Normally, when the central processing unit (CPU) usage exceeds 90%, computing tasks will become stuck.
This situation is more obvious in low-end central processors. The higher the high-end central processor, the higher the tolerance in terms of usage, because the base of high-end processors is higher, even if it reaches 100%
Ninety-nine percent, the remaining one percent is still more than 10% of the computing resources of a low-end processor.
Although Shi Lei ordered Yizuer to intercept iwnseed's computing resources to the greatest extent, Shi Lei also set a premise, that is, to obtain the maximum computing resources as much as possible without affecting users.
Why should we care about user experience?
It's not that Shi Lei is so noble that he still considers users in such a critical situation, but Shi Lei is worried that users will discover the iwn secret network on a large scale, which will cause a collapse of the iwn secret network.
If there is a major collapse of the iwn secret network, given the current situation, it will definitely be fatal!
Shi Lei naturally doesn't want that situation to happen!
However, even if computing resources are captured to the maximum extent without affecting users, the computing resources obtained by iwn secret network are still extremely terrifying!
According to Yizuer's statistics, there are currently about 52 million iwnseeds active on the iwn secret network. After excluding nearly 500,000 ultra-low-end users, there are still 51.5 million iwnseeds left.
The remaining 51.5 million iwnseeds, according to the global average calculation rules, can each provide approximately 0.001tflops of computing resources.
Then, the entire iwn secret network will provide 51,500 tflops of computing resources. If the difference between intensive distributed computing resources and loose distributed computing resources is not considered, the computing resources provided by the iwn secret network alone will exceed the supercomputers amon13 and
Thirty times that of amon14!
However, there is a huge performance gap between loose distributed computing resources and intensive distributed computing resources. Especially in terms of data consistency, task collaboration, computing latency, etc., there is a very serious performance gap.
However, even so, the quantitative gap of a full 3,000% is enough to bridge the gap between the two sides!
"Izuer, activate the neutrino communication network and assist the iwn secret network in transmitting data!" Shi Lei ordered.
Mirui Technology Group has established a complete neutrino communication network across the five continents of the earth, aiming to eliminate the delay in network communication between continents.
After all, the transmission speed of submarine optical cables is greatly affected by external influences. The iwn secret network has collected computing resources. If it is transmitted through the submarine optical cables and then into Xia Kingdom, the network delay generated will be terrifying.
Therefore, Shi Lei uses the neutrino communication network to connect the iwn secret network across five continents, which will greatly reduce network delays. Only with the help of the neutrino communication network, can the computing resources collected by the iwn secret network be used in large-scale network wars
among.
"The iwn secret network has been launched, the neutrino communication network has been launched, and the iwn secret network will provide 51,000tflops computing resources!" Yizuerhui reported.
The actual computing resources collected by iwn secret network are lower than expected. This is because some ultra-low-end computer systems can obtain too few computing resources. Although theoretically they can provide computing resources, after Yizuer
actual testing, but cannot provide computing resources.
Shi Lei took a deep breath, nodded to Tao Wenxian and Raphael, and motioned for the two of them to start searching for the organization's pseudo-artificial intelligence system and the location of Butler's parent server.
This action, as Shi Lei said, can only succeed, not fail!