The plan to find a needle in a haystack was completed, and only an unknown IP address was left. Moreover, Shi Lei invested 5 million tflops of computing resources, but was actually blocked!
Although the computing resources gathered by AON Network and Iwn Secret Network are all loosely distributed computing resources, but the order of magnitude reaches five million, how can it be blocked?
Even if intensive distributed computing resources are used, nearly one million computing resources are required to resist.
However, a supercomputer cluster with private million-level computing resources is simply a fantasy!
Shi Lei really couldn't imagine what kind of force it could withstand such huge computing resources and combine them into an attack.
etc!
Shi Lei thought of a possibility!
The place where the Internet originated has built the starting point of the modern Internet. It is known as the most mysterious institution in the Liberian Kingdom, and is simply called the Darpa Advanced Research Project Bureau, which is abbreviated as the "Advanced Bureau"!
According to rumors, Darpa has a lot of resources and very high authority. Even the NSA National Security Bureau needs to obey the instructions of Darpa Advanced Bureau when necessary.
In short, Darpa is the boss of the NSA National Security Agency, the boss of the FBI and the CIA.
The last unknown IP address, only Darpa, can resist Shi Lei's invasion.
However, Darpa's network IP address is not a hidden IP address, but is published. And intrusions are welcome anytime and anywhere.
Given this situation, Shi Lei is not sure whether the last unknown IP address is owned by Darpa.
Although I don’t know the answer, but whether I know the answer is actually the same for Shi Lei.
Because, regardless of whether the last unknown IP address is or is it or not, Shi Lei will completely break its defense and conduct a complete investigation.
Unless the last unknown IP address, just like the previous seven unknown IP addresses, directly disconnect the connection to the Internet.
But Shi Lei knew that such a situation would definitely be impossible!
In the global Internet world, Shi Lei has scanned all IP address information, leaving only the last unknown IP address, and the other IP addresses have been excluded by Shi Lei.
"Improve computing resources!" Shi Lei ordered, "Double!"
Now, Shi Lei and the other two have used 5 million tflops of computing resources, but cannot break the defense of the last unknown IP address. Then double the computing resources to see if the last unknown IP address can block the attack.
The distant country of Liberty, in some mysterious hall.
A group of middle-aged people, like young people, shouted loudly, like a noisy vegetable market.
"Mandalay. The other party has increased its invasion resources, and we can't stop it. Haven't you developed a killer program yet?" a middle-aged man with a beard shouted.
The middle-aged man named Mandalay also responded loudly: "Daosen, you damn bastard! Don't urge! I'm analyzing that damn mysterious virus! The killer program for that damn mysterious virus is not so easy to develop! If it's so easy, do I still need to do it?"
Through the conversation between Mandalay and Dawson, it can be judged that they are the last security guard of an unknown IP address.
"Mandalay! Give you a minute! The computing resources that the other party invaded have increased to 10 million!" Dawson said with a bad attitude.
Mandalay obviously doesn't take this trick!
"I know, you can stop it! All the servers of the lttw plan are handed over to you. Can't you stop the loose distributed computing resources of just 10 million tflops? Dawson, when did you become that kind of rookie?" Mandalay mocked.
The so-called lttw plan is a top-secret plan launched by Darpa.
Darpa suggests that Liberty countries should build excellent servers around the world and then monitor the entire world's Internet information, even telephone network information.
The full name of this plan is "', and the Xia Mandarin means "listen to the whole world". In other words, it is the Liberty Kingdom monitoring the communication information of the whole world.
The computing resources required to monitor communication information from all over the world are very large. In order to successfully promote the lttw project, the Liberty has established a huge private computer network worldwide.
With this private computer network, the NSA National Security Agency of the Liberian country was able to implement the LTTW plan and complete monitoring of information around the world.
Shi Lei guessed that there was no error. The only one that resisted the invasion of 5 million tflops computing resources was a huge private supercomputer network cluster.
It is indeed impossible for ordinary people to establish a private computer network of that level, but Liberty can. In order to safeguard their own interests and attack hostile forces, they have established a lttw network all over the world!
Now, Darpa has temporarily taken over the lttw network to fight Shi Lei's invasion. After all, Darpa's internal network has a lot of confidential information. Once Shi Lei captures Darpa's internal network, the consequences will be unimaginable!
As for the simplest thing, it is basically impossible to directly disconnect the Internet from the Darpa Advanced Bureau's internal network.
The internal network of the Darpa Advanced Bureau is not just their internal network. In fact, the multiple confidential networks of the Liberian State all use the internal network of the Darpa Advanced Bureau as the transit point.
Once the internal network of the Darpa Advanced Bureau is aborted, all other networks that use it as the transit point will be disconnected.
Some of these networks involve the most core security of the Liberian country!
Including automatic weapon control networks, covering unmanned missiles, drones, etc.
To put it simply, the internal network of Darpa Advanced Bureau cannot leave the Internet for the time being. At least it must wait until other important networks are disconnected from it, and it cannot leave the Internet environment.
"Mandalay, how long will it take? The lttw network is under great pressure. Our network interface data is too huge and cannot last for too long!" Dawson asked again.
Mandalay frowned and said, "Give me another three minutes! I'm going to succeed soon, I want three minutes! Damn! This bitch is a cheap guy! He actually used such a vicious trick! I have analyzed that the other party hid the virus in the source code of the operating system, but with a special encoding mode, I still need some time to analyze it!"
"You idiot! You can only delay you for five minutes at most! You know how many computing resources the other party has mastered! They have increased their computing resources to 15 million tflops, and the lttw network is beginning to collapse!" Dawson responded.
Another voice inserted in, "Ask afn network to go offline! bpn network to go offline! bwsn network to go offline..." The voice of temporary interruption said a long list of offline orders.
Those networks are important networks mounted on the internal network of Darpa, and they are usually protected by Darpa to prevent hackers from being invaded.
The afn network is the automatic weapon control network, while the bpn is the basic power network, and the bwsn is the basic water supply network.
If Shi Lei controls those basic networks, the entire Liberian country will be in chaos!
In order to prevent the internal network of Darpa, Ryan, the head of Darpa network security, in advance, ordered all important networks to be separated from the internal network of Darpa and entered a short closed self-operation state.
On the other hand, Shi Lei and the other two are invading Darpa's internal network. They have invested 15 million tflops computing resources, but they are still blocked.
"Yuzun, invest all the computing resources!" Shi Lei gritted his teeth.
Raphael reminded: "Stone, the opponent is blocking our attack by destroying the server by itself, and it is difficult for us to increase the invasion speed!"
"I know! But I don't care. We must open the last unknown IP address!" Shi Lei said in a cold tone.
The so-called self-destruction method is that the network security experts of Darpa Advanced Bureau actively sacrificed the servers of the lttw network and destroyed the servers of the lttw network in the form of information bombs, thereby temporarily blocking the invasion of Shi Lei and the other two.
This blocking time is very short. After all, the information bomb caused can only block a few seconds in the face of a huge data flow.
However, in a few seconds, it has won a glimmer of hope for darpa!
As long as Mandalay completes the killer program of the Venesis virus, the killer program can be used to clean up the Venesis virus in the entire Internet world.
Once the Goddess of Revenge virus is cleaned up, the aon network will naturally be broken. Shi Lei lost his huge computing resources and it is impossible to fight against Darpa!
As for darpa who has such a huge computing resource, why not destroy Shi Lei or other peak-level hackers in the world at other times?
First of all, Darpa's computing resources are not specifically used to eliminate hackers, but are used for the lttw program. At the same time, the world's peak-level hackers do not cannot leave the network.
Once you leave the network, Darpa has only computing resources and cannot surpass the network and capture the world's peak hackers in the real world, right?
"Brother Shitou, we cannot break the opponent's defense! According to the current progress and the resilience shown by the opponent, it will take at least half an hour!" Tao Wenxian reminded Shi Lei.
Shi Lei sneered, "Yi Zuer, prepare to execute the aon network forcibly exploded!"