typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Final-067 Still Not Enough!

.

The plan to find a needle in a haystack is the only solution that can discover the real IP address of Butler's parent server.

Although this plan will consume huge resources, Shi Lei doesn’t care!

Shi Lei only cares whether he can find the real IP address of Butler's parent server and when can he find the real IP address of Butler's parent server?

Shi Lei's confidante has entered the sight of Death. If you want to save them all, you must compete with Death against Death.

Especially Ling Yumo, she only has less than 115 hours of life left!

Yi Zuer started the plan to find a needle in a haystack. The logic analysis program has been started and began to analyze every IP address in the Internet world, as well as the subnets under the IP address, etc.

The most important thing in the Haystack plan is the grading system!

The so-called hierarchical system is to classify IP addresses within the Internet in different categories and divide different levels of attention according to different levels.

Through the grading system, the workload of finding a needle in a haystack is effectively reduced. Just like the work of screening soybeans, if black beans are mixed in, the first thing to do is to eliminate black beans.

Now, the grading system of the Haystack Plan is to divide different IP addresses and users belonging to. According to the restrictions set by Shi Lei, the grading system will first exclude the IP segments of individual users, and then the targets excluded are related IP segments of known institutions, enterprises, government departments, etc.

After excluding IP segments between individual users, commercial users and government agencies, the remaining IP addresses that need to be analyzed are greatly reduced.

Through the grading system, the workload of the plan can be reduced by at least half!

IP addresses that are not excluded will also be divided into levels. They are divided from low to high according to the level of threat, respectively, from security level, unknown level, and suspicious level.

Among them, the security level is 100% certain, and it is definitely not the real IP address of Butler's parent server, so it will be placed in the security level.

The unknown level is that after Yi Zuer's preliminary scan, the situation cannot be determined, and it will be included in the unknown level. Because, if Yi Zuer's preliminary scan and the situation cannot be determined, if Yi Zuer further performs the scanning task, more computing resources will be required, which will drag down the overall progress of finding a needle in a haystack.

In order to avoid such a situation, Shi Lei set up an IP address that was found at an unknown level, directly listed it in an unknown level, notify the system administrator, and the system administrator will scan and analyze it personally.

The last suspicion is that after Yi Zuer conducted a preliminary scan, he directly discovered the IP address, which may be the real IP address of Butler's parent server.

The number of suspicious levels is definitely not too many. Setting this level is just to prevent it!

"The hierarchical system has been constructed, and the plan to find a needle in a haystack has officially started!" Yi Zuer once again issued a reminder.

In the virtual transparent screen of the lip lens-type information processor, the Haystack plan is officially implemented. The first screening area of ​​the Haystack plan was chosen by Shi Lei in Liberty!

After all, both are rooted in the Kingdom of Liberty. In another journey of life, Shi Lei knew that Aberty's mother server was located in the Kingdom of Liberty.

The computing resources gathered by iwn secret network have all poured into Liberty through the private neutrino communication network of Mirui Technology Group and began to scan the entire Internet world of Liberty.

More than 1 million TFlops of computing resources poured into the Internet world of Liberty, almost scaring the CIA and the FBI's cybersecurity department!

Such a huge computing resource, neither the CIA nor the FBI, can guarantee that they can be 100% able to stop it.

Even those computing resources are just loose distributed computing resources. When loose distributed computing resources gather to a certain level, it is still very terrifying.

fortunately!

CIA and the FBI's cybersecurity departments found that the millions of computing resources that were pouring into the Liberian cyber world were just scanning the cyberspace and did not seem to be planning to destroy it. They were temporarily relieved.

The Liberty is a democratic and open country, at least on the surface!

Whether it is the CIA, the FBI, or their boss, the National Security Agency, or even the Big Brother, the Darpa Advanced Bureau, their internal networks, in the Internet world, have access ports, or even public access ports.

All well-known hackers know the access to their internal networks.

It is no secret that the network of the Liberian government and the military network are accessed to the Internet world. Servers that truly store shameful information must be isolated from the Internet environment, and even without electronic information.

Therefore, the CIA and the FBI cybersecurity departments of the FBI discovered that the influx of millions of computing resources were all relieved when they were just searching for IP address information in the online world.

If the actual controller of this million-order computing resource wants to conflict with the Liberty or steal the confidential information of the Liberty, it is absolutely impossible to scan the IP address information in the online world, but instead roll up your sleeves and impact the target determined.

Now, the behaviors shown by millions of orders of magnitude computing resources clearly illustrate one thing: millions of orders of magnitude computing resources are looking for hidden targets, and they should be private grudges, rather than stealing the official confidential information of the Liberty.

Such analysis results have made experts from the CIA CIA and FBI and the Cybersecurity Department feel at ease, but they are secretly worried.

After all, millions of computing resources at the level of magnitude have rushed into the online world of the Liberian Kingdom. Even if they have not shown maliciousness for the time being, what if they show maliciousness?

No one can guarantee whether the other party has malicious intentions?

In order to prevent millions of orders of magnitude computing resources from invading the official networks of the Liberals, and even the military networks, the CIA and the FBI, have begun to prepare for a response.

If Shi Lei knew their concerns, Shi Lei would definitely sneer at it. How could Shi Lei waste time and computing resources and invade the Liberal country's network system?

Don't joke!

Shi Lei’s time is so precious. Under such circumstances, it is absolutely impossible to waste time with them!

"Brother Shitou, the unknown IP address has been marked 27. Which one should we start analyzing it?" Tao Wenxian asked Shi Lei.

"Just these two!" Shi Lei directly selected two of the addresses as the first batch of unknown IP addresses for manual analysis.

Tao Wenxian showed a puzzled look. Could it be that Shi Lei chose two addresses at will?

Raphael explained in place of Shi Lei: "The two IP addresses are from New York!"

Tao Wenxian coughed. He obviously had no hobby of memorizing the IP address. Anyway, investigating the actual address corresponding to the IP address is not a difficult task. Why do you need to memorize it?

In order to cover up his embarrassment, Tao Wenxian ordered: "Yu Er, mark all unknown IP addresses on their home locations."

Shi Lei did not make fun of Tao Wenxian. After all, there was no regulation, indicating that the world's peak-level hackers need to record the location of their IP address.

Of course, a considerable number of hackers do record the location of the IP address, so as to facilitate the direct and quick judgment of the region where the IP address belongs.

Shi Lei chose the IP addresses of the two New York City, mainly because Abertill, the parent server of Angels Council, is located in New York City.

Don't think that New York City is too prosperous and has too big a goal, and Chaos Snake will not place Butler's parent server in New York City.

In fact, this may exist completely!

As the saying goes, the big one is hidden in the city!

What if Butler's parent server is in New York City?

No one can determine the answer to this question until the final result comes out!

Shi Lei and the other two quickly scanned and analyzed two unknown IP addresses, one of which was unknown IP addresses, and were invaded by the three. They found that the unknown IP address was a cross-border website with strict defense, mainly providing private love action art movie download services overseas.

Shi Lei was very kind and did not tamper with the other party's data server. After all, such a good person has served too many otaku in need and cannot cut off the otaku's welfare, right?

The two unknown IP addresses selected by Shi Lei have nothing to do with Butler. Shi Lei is not surprised at all with such a result.

If it was so simple, he discovered Butler's real IP address. How could Shi Lei need to do something big?

The first choice target has no result. Shi Lei and the other two began to analyze each unknown IP address. As the three worked synchronously with Yi Zuer, one IP address after another was cracked, but there was still no answer.

Shi Lei took the time to check the implementation progress of the plan to find a needle in a haystack. It is now twelve:30. The plan to find a needle in a haystack has been implemented for half an hour, but the execution progress is very pitiful!

The first screening area for the Haystack Plan was Liberty. In half an hour, the screening progress was only less than three percent!

This means that it is just a Liberty country, and it takes at least 20 hours to completely traverse every IP address in the Liberty network world!

The entire world is so large that the real IP address of Butler's parent server may exist in any local cyberspace.

How could Shi Lei have so much time, slowly searching one by one?

Simply put, Shi Lei still does not have enough computing resources!

.(To be continued...)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next