HacKer

Chapter 1551: fast crash defense!

February 27, near the early morning. —{2}{3}{w}{x}]

In the Internet world of Indonesia, Shi Lei posted a post that made Li Jianguo into a very passive situation.

After all, the video released by Shi Lei was shot by a security surveillance camera based on the National Independence Monument. Experts from Indonesia have already judged it. At the same time, this slightly blurred video record, after a lot of technical experts' identification, shows that it is the original ecological video record, and has not done any technical processing.

Therefore, in this video, the number of the two drones recorded has no problem. They are strong evidence that both drones belong to Lijianguo!

"Jie Zheer, began to clean up the traces of the invasion!" Shi Lei smiled and told him that Shi Lei felt quite satisfied with the easy victory.

"Private r, three-layer protection network is attacked!" Yi Zhuer reminded Shi Lei, in the virtual transparent screen of the lip lens information processor, showing the relevant situation.

Benz has used a graphical display solution with 324 blue dots to form a spherical network representing a temporary broiler server that forms a three-layered protection network. Among them, three large and bright blue spots are the core of the three-layer protection network and three small supercomputers.

However, in the spherical network of 324 blue spots, there is a light blue spot that is flashing red and blue alternating light, which means the broiler server is invaded.

Shi Lei gave a slight glimpse and quickly entered the source code on the keyboard with both hands. Prepare to see the broiler server in person. However, Shi Lei had not yet entered the temporary broiler server and had to stop.

Because the invaded temporary broiler server has been broken!

In a spherical network. The original red and blue flashing spots turned into a bright red, representing the temporary broiler server.

"Impossible!" Shi Lei exclaimed!

Although the invaded temporary broiler server is just an ordinary server, the computing performance is not even 0.1tflops. But as part of a three-layered defense network, it is protected by an endless defense system.

The protective power of the endless defense system, even its maker Shi Lei, cannot break through. Not to mention other hackers.

"What is the situation of the temporary broiler server that fell in the clothes? Why is the endless defense system not blocking the invasion?" Shi Lei quickly asked about the clothes.

“Private r, the system is temporarily unable to determine the specific situation. The system has been unable to access the temporary broiler server that has been framed. Private r, the three-layer protection network has been invaded again, and the scale of the invasion has expanded!”

In the virtual transparent screen of the lip lens type information processor, there is a spherical network of 324 spots. Suddenly there was a dense red and blue staggered flash. Shi Lei couldn't tell at a glance how many temporary broiler servers were attacked.

Fortunately, in the virtual transparent screen of the lip lens information processor, the company showed specific data, a total of 98 temporary broiler servers were attacked.

The composition of the three-layer protection network, in addition to a core small supercomputer, there are eight high-quality broiler servers, and the remaining ninety-nine temporary broiler servers have mixed computing performance and can only be used as auxiliary calculations.

The intruder first invaded an ordinary temporary broiler server. Then invaded 98 ordinary broiler servers, apparently judged. The composition of the protection network.

The three-tiered protection network was invaded by a large scale, and Shi Lei tried to determine the situation of one of the ordinary broiler servers. The situation that shocked Shi Lei happened. 98 ordinary temporary broiler servers, in just less than 20 seconds, the collective was broken.

Even if Shi Lei is on his own, he will not do anything better!

‘Who is it? What is the situation? Did Li Jianguo discover my actions so quickly? And is there a master from the darpa advanced board? ‘Shi Lei’s heart secretly guessed.

"Private r, the first layer of protection network is about to fall, the endless defense system starts the self-destruction code, it is expected to be deleted within three seconds." Yi Zhuer prompted Shi Lei.

At the same time, the first layer of protection networks, the last nine temporary broiler servers, were also invaded. Even a small supercomputer with a computing performance of 5tflops did not persist for twenty seconds and was ruthlessly broken.

Shi Lei watched the first layer of protection network being broken, but there was no way. In less than a minute, Shi Lei did not even judge the other party's invasion plan.

In other words, the other party broke through the blockade of the endless defense system, which caused Shi Lei to have a deep concern. Since the other party can break through the endless defense system, can the other party invade the dream entertainment company's internal network?

“Private r, the second layer of protection network was invaded, the intruder adopted a three-stage intrusion scheme, 99 ordinary temporary broiler servers were subjected to the first round of attacks, and 8 high-quality temporary broiler servers were subjected to the second round of attacks. The computer was subjected to a third round of attacks."

After the invaders destroyed the first layer of protection network, it is clear that they have thoroughly mastered the structure of the protection network, directly attacking all the broiler servers of the entire protection network with a three-stage attack scheme.

The resistance time of the second layer of protection network is only less than one third of the first layer of protection network. Within twelve seconds, the second layer of protection network will collapse!

Shi Lei bit his teeth and said: "The clothes are broken, and the link to the third layer of protection network is broken!"

"yes, private r!" replied, although directly disconnected from the third layer of protection network, the information of the legacy connection ip address will be in the third layer of protection network, but after disconnection, will win for Shi Lei Valuable time to rearrange defenses.

The three-layered protection network is the outermost defense and the safest area. Fighting in the three-layer protection network is the ideal situation for Shi Lei.

But the three-tiered protection network didn't even resist for two minutes, which is incredible!

After disconnecting from the third-layer protection network, Shi Lei personally began to arrange the defense strategy. Shi Lei will master the three supercomputers with a computing speed of 15tflops to form a triangle defense network.

The defense of the triangle defense network is very powerful. No matter which supercomputer the enemy invades, the other two supercomputers can support it immediately.

The three supercomputers that Shi Lei holds in his hands belong to the Wosang State, the Lijian State, and the Great Britain Empire. Although Shi Lei holds them, Shi Lei has never used it, just as a spare card.

Now the situation is urgent, these three cards were opened by Shi Lei at the same time!

When Shi Lei had just completed the triangle defense network, the unknown and fierce intruder had broken the third layer of protection network and found the connection IP address and traced it to Shi Lei.

In the face of arrogant invaders, Shi Lei was also worried, directly opened the task simulator, the three supercomputers in progress, executed the simulation program, took over all the computing resources of the three supercomputers, in order to fight against fierce intrusion square.

Three supercomputers with a computing power of 15tflops form a triangular defense network. In terms of protection power, there is not much difference between the protection power of the three-layer protection network and the protection power of the three-layer protection network.

Although from the comparison of computing performance, the triangular defense network composed of three supercomputers is indeed far beyond the three-layer protection network. However, in terms of structural complexity and defense strategy, the three-layer protection network is ahead of the triangular defense network composed of three supercomputers.

If expressed in simple percentage data, the computing resources of the three-layer protection network are only less than 35 percent of the triangular defense network, but the defense force reaches 80 percent.

Through the formation of a triangular defense network by three supercomputers to withstand the mysterious invaders, Shi Lei has no grasp of the heart. Shi Lei only hopes that the triangle defense network can block the intruder's longer time, so that Shi Lei can build more defense networks. Or reverse analysis of the intruder's intrusion.

However, the situation is beyond the expectations of Shi Lei!

It was not a tragic situation, but a good result. The triangle defense network succeeded in resisting the attack of the invaders. The triangle defense network steadily blocked the invasion and there was no excessive difficulty.

Shi Lei was a little bit unbelievable and asked: "Is there a breakthrough in the triangle defense network?"

"Private r, the endless defense system successfully resisted the attack of the invaders, the triangle defense network has not been broken, but the system detected that the intruder is rapidly increasing the computing resources of the intrusion data, and the load of the triangle defense network is rapidly increasing." Responding to Shi Lei.

Shi Lei quickly said: "Access iwn secret network computing resources, reinforcement triangle defense network!"

“yes, private r!” After responding, I immediately began to mobilize the loose distributed computing resources of iwn secret network over 1700tflops and gradually put into the triangle defense network.

At the time of Shi Lei’s command, the load on the triangle defense network has reached 80%. At the same time, the load is still increasing rapidly.

If Shi Lei did not promptly access the resources of iwn secret network, I am afraid that the triangle defense network is about to collapse. At that time, even if the triangle defense network was not invaded, it had to exit the defense sequence.

As the resources of iwn secret network entered the triangle defense network to assist defense, the endless defense system successfully resisted the invaders, and Shi Lei finally had the opportunity to analyze the situation of the invaders.

When Shi Lei analyzed the attack data of the invaders, Shi Lei discovered that the invaders broke through the three-layer protection network!

(To be continued, please search for astronomical literature, the novel is better updated faster!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like