HacKer
Chapter 1552: Weakness and black hand!
The three-layered protection network consisting of three hundred and twenty-four temporary broiler servers and the triangular defense network composed of three supercomputers have a really small gap in protection power. &{}..{}
However, when the three-layered protection network faces the mysterious invaders, it is like a rapid collapse of the avalanche. It seems that there is no resistance at all, just like the lambs facing the wolves, only the result of being slaughtered.
On the contrary, Shi Lei did not hold the high-definition triangle defense network, which brought him unexpected surprises and successfully blocked the fierce invaders, allowing Shi Lei to reversely analyze the attack data of the invaders.
By analyzing the attack data of the intruder, Shi Lei discovered some clues, the attack data of the intruder, not the simple attack data, but the comprehensive data with high paralysis.
The Delta Defense Network consists of three supercomputers, including supercomputers in the Lijian Kingdom and the British Empire, and private high-tech companies. This supercomputer has a single computing task, just dealing with the company's computing tasks, and basically no other computing tasks.
The supercomputer in the country of Wassang belongs to Osaka University and is an academic supercomputer. The computational tasks are mottled and the data tasks are very much processed.
Shi Lei analyzed the intruder's intrusion data and found that the intruder's intrusion strategy was to pretend to be the normal computing task data of Osaka University's supercomputer, and to inject the intrusion data into the normal computing task data, so as to try to smoothly cross the sea.
But the mysterious invaders did not think that Shi Lei did not care about the control of the three supercomputers. Directly use the task simulator to take full control of the supercomputer.
That is, three supercomputers. Although the open surface seems to be performing their own computing tasks, in reality, they do not perform any computing tasks at all, but instead put all computing resources into the defense system that Shi Lei needs.
When the mysterious invaders pretend to be the normal computing task data of the Osaka University supercomputer, trying to pass the supercomputer's defense strategy and the endless defense system. When entering the supercomputer, it was directly intercepted by the endless defense system.
If Shi Lei did not choose a plan to burn jade, it would squeeze all the computing resources of the three supercomputers. Instead of carefully retaining the computing tasks of the three computers, the endless defense system will not prevent the normal computing tasks of the supercomputer. Convenient intrusion can quickly break through the supercomputer's defense strategy and the endless defense system by impersonating data.
The reason why the three-layer protection network was quickly broken is because of this reason. Killed directly by the mysterious invaders. Not an endless defense system has no effect. It is the weakness of the defense strategy of the endless defense system, which is used by the mysterious invaders.
Of course, the defense strategy of the endless defense system is weak, and can only be used in the external network. If you want to use the weakness of the endless defense system in the internal network of the Miri Technology Group, it is absolutely impossible.
The internal network of the Mi Rui Technology Group is completely under the control of Yi Jue. With all the data computing tasks in control, the Endless Defense System will not let any uncertified data enter the internal network of the Mi Rui Technology Group.
and so. The defense strategy of the endless defense system is weak and can only be used by external networks. Moreover, once Shi Lei chooses to burn jade, the weakness of the defense strategy of the endless defense system will disappear.
Determined the intrusion means of the mysterious invaders, Shi Lei breathed a sigh of relief, the invaders are not omnipotent, Shi Lei can choose more solutions.
"Damn guy, I was almost scared by you, now it's my turn to pack you up!" Shi Lei's hands and fingers, on the keyboard brought a series of afterimages, the screen shows a large section of the source code.
The triangular defense network composed of three supercomputers successfully resisted the invaders. Although the invading party gradually increased computing resources, the triangular defense network with iwn secret network support did not show any signs of collapse.
Shi Lei tapped the source code while viewing the intruder's situation. So far, the mysterious intruder has used 200tflops of attack resources. The iwn secret network injects the loose distributed computing resources of the triangle defense network to a level of 800 tflops.
According to the ratio of the two, Shi Lei judges that the computing resources used by the intruder are intensive distributed computing resources, that is, the invaders own private supercomputers.
Worldwide, there are only a handful of private supercomputers with speeds of up to 200 tflops. Even a supercomputer that is not public is one of the few.
Because maintaining the normal operation of the supercomputer is a huge continuous investment, the supercomputer is different from the personal computer, the continuous use cost of the personal computer is very low, the supercomputer is different, and the ordinary forces can not afford a calculation speed of 200tflops. Supercomputer running costs.
"Leekin's government?" Shi Lei's first suspected goal was the government of Lijianguo. It was rumored that the Lijian government had secretly established a large number of supercomputers, and through these supercomputers, made waves in the Internet around the world.
However, Shi Lei immediately denied such speculation!
The reason is very simple. The attack resources of the mysterious intruder are stuck at 200tflops and have not continued to increase. If the mysterious invaders are the Lijian government, the attack resources of the mysterious invaders will definitely continue to increase until the triangle defense network is completely destroyed.
But now, the triangle defense network is impregnable, and the mysterious invaders are resisted by the triangle defense network. There is no way to go further.
"Since it is not the government of Lijian, who is it?" Shi Lei once again said to himself.
It is never a simple matter to investigate the identity of a hacker, especially the identity of a hacker. It is a secret in the secret.
The mysterious invaders are masters, absolute masters, and the other side sharply grasps the weaknesses of the endless defense system's defense strategy, thus destroying the general three-layer protection network. Has proved the identity of the other party's master.
There are only three ways to investigate the identity of the other party.
First, Shi Lei reversely tracks the other party's real ip address. Therefore, the intruder's computer information and real address information are investigated to determine the identity of the other party.
This method is not very reliable, the technical strength of the mysterious invaders is very high, and Shi Lei wants to reversely investigate the real ip address of the other party. It is definitely not that simple.
The second method is even less reliable, that is, directly ask who the other party is. Although this method has a certain chance of success, the odds are similar to the lottery jackpot.
The only reliable method is the third method. That is, Shi Lei and the mysterious invaders attack each other, and then judge each other's possible identity through the other party's attack means.
If you say. Shi Lei and Raphael attack each other. Shi Lei can judge it in a short time. The hacker opposite is Raphael.
If this time the mysterious intrusion party is a familiar hacker of Shi Lei, through mutual attack by both sides. Shi Lei is likely to judge the identity of the other party.
but. The other party can't judge the identity of Shi Lei in this way! Because Shi Lei came back from abundance, this world, there are very few hackers who contact him. Naturally, there are very few hackers who know Shi Lei’s attack methods.
After determining the implementation plan, Shi Lei immediately called the computing resources of iwn secret network to bypass the battlefield of the mysterious intruder and the triangle defense network. Start reverse tracking mysterious intruders.
Although the mysterious invaders are masters among the masters, Shi Lei is also a hacker at the peak of the world. Shi Lei stood at the height of the hacker's peak, even if Shi Lei did not think that by tracking the mysterious invaders in reverse, you could find the real ip address of the other party, but Shi Lei did not give up.
Iwn Secrets has accumulated 1,700 tons of computing resources, of which 800 tons of computing resources to support the triangle defense network against the mysterious intruder.
Shi Lei transferred another 900tflops of computing resources, directly following the attack data channel of the mysterious intruder, and went backwards.
The huge reverse tracking data allows the mysterious intruder to immediately detect the action of Shi Lei. The mysterious intruder reacts quickly, directly cancels the attack on the triangle defense network, and withdraws 200tflops of intensive distributed computing resources. In the data channel invaded by Shi Lei, he attacked Shi Lei.
However, the mysterious intruder saw Shi Lei, the reaction of the mysterious invaders was indeed very fast, and he had the stone-assisted Shi Lei, and the reaction speed was also very fast.
When the mysterious intruder retraced the attack data resources of the triangle defense network, Shi Lei almost simultaneously ordered the 800tflops computing resources of the iwn secret network to be put into the attack sequence of reverse tracking.
The original mysterious intruder with 200tflops of intensive distributed computing resources, resisting 900tflops of loose distributed computing resources, has become somewhat stretched.
Now, 800tflops of loose distributed computing resources are added to the attack sequence, and the mysterious intruder's 200tflops of intensive distributed computing resources are suddenly crashed.
In terms of mysterious intrusion, the computing resources of 1700tflops can only be regressed. If the same mysterious intrusion party breaks the three-layer protection network, Shi Lei will continue to break through the defense of the mysterious invaders.
The mysterious intruder is not without rebellion, but the mysterious intruder incorrectly estimates the computing resources that Shi Lei has mastered. The struggle between hackers, when the technical strength is similar, is often the war of hardware performance.
In film and television works, the use of laptops to kill supercomputers can only appear in film and television works, but in reality, unless the laptop is just a front-end device, the background is connected to a huge cluster of computing resources. Otherwise, how can a laptop break the defense of a supercomputer?
In an era of more and more modern times, the once hacker war has evolved into a hardware war!
Shi Lei holds powerful hardware resources, or Shi Lei masters powerful hardware resources through the brave world and iwn secret network. To a certain extent, Shi Lei has been much stronger than the average world-class hacker.
With Shi Lei's reverse invasion, Shi Lei broke the mysterious intrusion side by one defense system. Shi Lei gradually guessed the identity of the mysterious invaders.
The characteristics of the mysterious invaders are obvious. First, they have the computing resources of 200tflops. At the same time, they have powerful hacking techniques, and they have a festival with Shi Lei. The identity of the mysterious invaders is already clear!
(To be continued.)
You'll Also Like
-
Naruto Live: The Death of Naruto in the Beginning Movie
Chapter 829 14 hours ago -
Anime: Saiyans eat the world of food
Chapter 285 14 hours ago -
Hogwarts Summoning Guide
Chapter 466 19 hours ago -
The wrist of the Marvel world
Chapter 525 19 hours ago -
The beginning of the original god became General Raiden's personal ninja Yunmo
Chapter 876 19 hours ago -
Battlefield of Ten Thousand Races: I Have a Billion Times Critical Strike System
Chapter 789 19 hours ago -
Traveling through the beast world, I used hundreds of billions of materials to raise cubs
Chapter 640 19 hours ago -
Rebirth: I Want to Collect Rent
Chapter 673 19 hours ago -
Beastization of the whole people: Evolution from the willow tree
Chapter 814 19 hours ago -
I, the villain, start the game with the protagonist, the saint!
Chapter 1227 19 hours ago