HacKer
Chapter 1649: OverSeed!
The Dream Entertainment Official Player Forum was attacked by nearly 13,000 users. "Vertical novels,
This kind of attack that can't be regarded as a hacker attack, in fact, will not affect the dream entertainment official player forum. Even the order of the official player forum will not be affected.
Because, the Dream Entertainment Official Players Forum is a global forum, and it is managed by the company. How to distinguish between the forums, what posts are meaningful, and what posts have no meaning, all of which are automatically judged by the clothes.
For example, in the brave world game board, it is subdivided into a lot of small sections. It includes story discussion, role discussion, task grading discussion, map information query, equipment appreciation, and so on.
Among the many small sections, there are more detailed sub-sections. Taking the task grading discussion as an example, in the task grading small section, there are sub-blocks corresponding to the task level.
Different levels of tasks need to be published in different sub-blocks, and posts cannot be posted across sections. If a post is posted across the board, it will be executed by the ‘Mobile Post’ operation. At the same time, some forum points will be lost.
If a player is said that the content of the release will not be divided into sections, it will definitely be severely punished by the clothes.
Of course, in the Dream Entertainment Official Player Forum, a special section of ‘Free World’ is provided to facilitate players from all over the world, freely watering, releasing some uncertain gossip, and even some advertising information.
Currently, more than 12,000 users who post content-based attacks, all posts. All of them were restricted to the ‘Dark Abyss’ sub-section of the ‘Free World’ large branch.
The so-called 'dark abyss' represents the post information inside this sub-section. Basically, it doesn't make sense, it belongs to posts waiting for the system to delete.
Generally speaking. No player enters the ‘Dark Abyss’ sub-section to view the forum message.
Therefore, the class attack of more than 12,000 users will not cause any loss to the official game forum.
However, Shi Lei will not let this behavior ignore it. Shi Lei told Penguer to randomly select one hundred users and then reversely track the other party's real IP address.
If it is a reverse tracking of the real ip address of the average user, it is almost no difficulty for the clothes, as it is difficult to calculate 1+1.
Even the reverse reverse tracking of the real IP address of a hundred users. The difficulty will not increase too much, and at most it will become 1+1+1 difficulty.
However, the things that were originally stable, but there have been abnormal situations!
"Private r, the system can not determine the real ip address of the random selection user!" Yi Zhuer reported to Shi Lei through the lip lens information processor.
Shi Lei’s expression was awkward. “Is not sure which user’s real IP address?” Shi Lei immediately asked, this is a clue, as long as the specific person is identified, you can follow this clue. Continue to dig deeper.
However, on the computer screen, the information displayed on the computer screen made Shi Lei’s face change dramatically.
Because the clothing is unable to determine the user of the real ip address. Not a user, not two users, but a random selection of one hundred users. All can't determine the real ip address!
Randomly extracted one hundred users out of nearly 13,000 users. It can represent the characteristics of the entire group.
This means that the real ip address is close to 13,000 users. You can't confirm directly!
"Well, shield this hundred users, and randomly select one hundred users from the remaining users. Then, reversely track their real ip address!" Shi Lei once again told.
If this time, a random selection of one hundred users, once again unable to determine the real ip address, it can only explain one thing.
That is close to 13,000 users who launched content-based attacks, not normal users! If they are not normal users, are they all registered as virtual identities?
But the real name registration mechanism of the Dream Entertainment Official Player Forum is so easy to bypass?
In less than ten seconds, the clothes gave feedback, "private r, the second batch randomly selected the real IP address of one hundred users, the system can not reverse tracking completed."
“What is the reason for the inability to track?” Shi Lei asked in detail.
In the virtual transparent screen of the lip lens information processor, the clothes show the detailed reason. When the black magic subsystem is used, the real ip address of the user is reversely tracked, and the powerful defense system is directly met. .
Even the black magic subsystem of Yizhe, with the cooperation of iwn secret network and supercomputer lightning, reached the level of world-class hackers, and still could not break the defense system.
To make matters worse, whether it is the first batch of 100 randomly selected users or the second batch of 100 randomly selected users, Shi Lei found that their defense systems are all from the same protection server.
To put it another way, Yirui reversely tracks two hundred randomly selected users, all of which tracked the same protection server.
This situation confirmed Shi Lei's guess!
That is close to 13,000 users, and all of them are zombie users, not the real users that Shi Lei originally guessed, but the real users who spend money.
Only zombie users can be centrally managed, and then gathered in the same protection server to counter the reverse tracking of the clothes!
"What kind of defense system is used by the other party's protection server?" Shi Lei frowned.
The dream of the official gamer forum was invaded, and more and more revealed a strange atmosphere. It was just a joke-like release of content-like attacks, but there seemed to be a hidden plot behind it.
"Private r, can not judge the attacker's protection server, what defense system is adopted. After the initial judgment of the system, the intruder's protection server, against the system reverse tracking, has already called 300tflops of intensive distributed computing resources." Respond to specific data.
"Where?" Shi Lei took a breath!
300tflops of computing resources!
300tflops of intensive distributed computing resources!
This means controlling a large number of zombie users. The mysterious intruder who performs the ridiculous release of content-like attacks has the supercomputer equivalent to supercomputer lightning. Or a supercomputer cluster!
There are only a handful of supercomputers with computing speeds in excess of 300 tflops worldwide. Even the mighty Angel Council. There are not so many computing resources.
Therefore, the Lord of the Angels' Parliament was completely suppressed by Shi Lei and Raphael, and there was no resistance. When the technology is not much different, the computing resources that are mastered determine everything.
After Shi Lei exclaimed, he put his hands on the keyboard and personally checked the protection server of the mysterious intruder.
When Shi Lei launched a test of attack, Shi Lei simultaneously conducted data detection. As Shi Lei calls more and more resources, Supercomputer Lightning has 300tflops of intensive distributed computing resources. More than 90% have been drawn by Shi Lei. But the mysterious intruder's protection server has nothing to do at all.
At this time, Shi Lei detected that the computing resources of the protection server did reach 300tflops. Although it confirmed the information of the feedback, it confirmed the strength of the enemy, but Shi Lei did not have too much frustration.
In fact, Shi Lei has a bit of fun!
Shi Lei attacks the computing resources called by the protection server, only the 280tflops of dense distributed computing resources provided by supercomputer lightning.
The server of the mysterious intruder can protect the server against the invasion of Shi Lei. It invoked 300tflops of intensive distributed computing resources.
This means that the mysterious intruder's protection server, the defense system used, basically needs to follow the ratio of one to one when fighting attacks. Investing in computing resources can fight against intrusions.
For defense systems, this ratio is not excellent.
A truly excellent defense system. For example, the endless defense system owned by the Miri Technology Group, usually. Can achieve a ratio of one to five. Even in small-scale intrusions, the defense input and intrusion of the endless defense system. Can achieve an exaggerated degree of one to ten.
However, as the magnitude of computing resources climbs, this ratio will gradually decline. After a certain number of levels, the defense and intrusion ratio of the endless defense system can only reach one to five.
Don't think that the ratio of defense to invasion of one to five is not exaggerated. This ratio is very exaggerated, and the endless defense system is known as the world's first defense system, and it is understandable!
"Jie Zheer, coordinate calculation iwn secret network overall framework color ed base point, ready to activate the overall resources of iwn secret network." Shi Lei told the clothing, ready to iwn secret network.
After the completion of the instructions, Shi Lei considered it. Finally, he bit his teeth and continued to command: "Detect iwn color ed, confirm good color ed twice, and start over color ed operation plan in advance!"
"Private r, warning, over color ed is a dangerous operation, please authorize the operation." Yi Zhuer reminded Shi Lei, asked Shi Lei to give operation authorization.
The so-called iwn color ed is the brave world user who provides computing resources for iwn secret network. Each user represents the base point of an iwn secret network, which is an iwn color ed.
The good color ed means that users with good computer configuration, especially those who use a personal game server, are definitely good ed.
As for the over-color ed operation scheme, it is defined as a dangerous operation. This is because the over-color ed operation scheme will increase the number of computing resources of the iwn color ed user.
Pre-launching the over-color ed operation is also forced to act. After all, Shi Lei analyzed some dangerous situations...
(To be continued, please search for astronomical literature, the novel is better updated faster!
Ps: over color ed, overclocking!
You'll Also Like
-
Naruto Live: The Death of Naruto in the Beginning Movie
Chapter 829 14 hours ago -
Anime: Saiyans eat the world of food
Chapter 285 14 hours ago -
Hogwarts Summoning Guide
Chapter 466 19 hours ago -
The wrist of the Marvel world
Chapter 525 19 hours ago -
The beginning of the original god became General Raiden's personal ninja Yunmo
Chapter 876 19 hours ago -
Battlefield of Ten Thousand Races: I Have a Billion Times Critical Strike System
Chapter 789 19 hours ago -
Traveling through the beast world, I used hundreds of billions of materials to raise cubs
Chapter 640 19 hours ago -
Rebirth: I Want to Collect Rent
Chapter 673 19 hours ago -
Beastization of the whole people: Evolution from the willow tree
Chapter 814 19 hours ago -
I, the villain, start the game with the protagonist, the saint!
Chapter 1227 19 hours ago