HacKer

Chapter 855: Welcome to the big trap!

In the voice channel of the Anti-Dream Entertainment Major League, the leading hacker organizations of major online game operators and online game makers cheered.

At this moment, they should cheer!

Broken knife in the voice channel, use the English channel: "Brothers are quiet! We should thank Dian and Gemmi, they have won us for twelve minutes, far more than three minutes of the scheduled plan. Otherwise, we It’s impossible to break through the official website data server of Dream Entertainment’s Brave World. Let us thank Dan and Gemwni for their help!”

The Sun Angel, who wore the Lan vest, had to respond and said: "Brothers, all this is everyone's efforts. We all have a common goal, that is, to defeat the dream entertainment!"

"Down with dreams of entertainment!"

"Down with dreams of entertainment!"

"Down with dreams of entertainment!"

If this slogan is heard by Shi Lei, Shi Lei will definitely spurt out a piece of old blood. How does this thing sound like Wassan imperialism? When is dream entertainment so evil?

Even the twisted vines shouted a few words, and the twisted vine was very happy, but now it is not happy, "broken the knife, broke the data server of the brave world official website, you found the player of the brave world's first martial arts competition. No registration data? Don't cheer, hurry to find the data!"

Broken knife quickly responded: "The boss is relieved, I have already arranged it. The cheers are just a few heads and brains. In order to encourage everyone's morale, the rest of the backbone personnel are all at work. They are fully scanning the data of the official website of the brave world. Server. Once we find any useful data, we will notify you immediately."

The twisted vine was a little relieved. "If you can't get the information of the data server of the brave world official website, then destroy it directly! As long as it can cause trouble for dream entertainment, it is already the best result!"

"Understand, boss!" There is no hesitation in the broken knife, so a similar work, broken knife has done a lot for the twisted vine.

Angel Council, secret voice communication channel.

Sun Angel asked: "Raffier adults, the voice communication channel of the Anti-Dream Entertainment League, have you heard it? The anti-dream entertainment Grand Alliance garbage has actually broken the official website server of the brave world, and it is also the data server. .

Is the dream entertainment company's defense too weak, or other reasons? Rafael adults. Do we want to enter the Dream Entertainment Company from the official website of the Brave World? ”

"No!" Rafael categorically denied, "The anti-dream entertainment of the big league of waste. They can break through the defense of the dream entertainment company? I dare say that this 100% is a trap!"

Rafael and Mr. M have played many times. There is an unclear relationship between Dream Entertainment and Mr. M. Rafael has also invaded the dream entertainment company. Is he still unclear about the defense strength of Dream Entertainment?

With the anti-dream entertainment, the big fish, the rotten fish, what qualifications do they have, and what ability to break through the dream defense company's network defense?

The hacker coalition of the Anti-Dream Entertainment Major League broke the endless defense system of the smuggling water, entered the data server of the official website of the brave world, and scanned the full disk array in the data server.

More than one hundred and fifty hackers, each of which scans the scheduled tasks. According to the expectation of the broken knife, it takes only 20 minutes to complete the full disk array scan.

Broken knife is embedded in a special virus program on the data server of the official website of the brave world, which is convenient for destroying the data server data at the last minute.

Once, when the moon virus broke out, the knife was deliberately infected with the moon virus, and then studied the infection pattern of the moon virus, the burst mode, and the destruction mode. In order to minimize the destruction of the data server of the Dream Entertainment World official website, Broken Knife deliberately put the learning moon virus in the disk array of the data server, allowing the moon virus to infect each independent disk.

The cottage moon virus produced by the broken knife, although not as strong and infectious as the original moon virus, can be very small in terms of destructiveness. At least let the cottage moon virus outbreak in the data server, the entire data server disk array group, all the disks are completely dead.

When the broken knife put the cottage version of the moon virus into the data server of the official website of the brave world, Yizhul immediately issued an alarm to Shi Lei.

"Sr brave world official website data server, found variants of the moon virus. The system automatically establishes a sandbox isolation test. After logic analysis, the variability of the variant moon virus is reduced by 80%; the burst mode is only one preset time, no The rest of the changes; the severity of the damage, reaching 90% of the maternal moon virus!" Yi Zhuer reported.

Shi Lei’s face was stunned and screaming. He said to himself: “Various Moon Virus? Actually use the moon virus to deal with the original author!” After a moment of laughter, Shi Lei opened the door: “Well, how many hackers tracked IPN address?"

Through the computing resources of IWN Secret Network, Yizher traced the entry into the official website of the Brave World.

‘Data server, hacker.

In fact, as Rafael said, the defensive intensity of Dream Entertainment Company, if it is really so unbearable, also need to fight against the dream entertainment big league? Rafael has already leveled all the network defenses of Dream Entertainment and found the relationship between Shi Lei and Mr. M.

Before Shi Lei ordered the origin of the supercomputer, the source code written by Shi Lei was to extract a mirror of the data server and then use the image as a blueprint to create a completely real trap system.

This trap system is based on the image of the data server, completely owns all the data content and defense measures of the data server, but its real ontology is a huge sandbox system. Sandbox systems are typically used to test viruses and allow the virus to be completely released in the sandbox system without causing damage to the system ontology.

The hacker coalition of the Anti-Dream Entertainment Major League, breaking through the so-called dream entertainment entertainment world official website data server, is actually a big trap!

A fatal big trap!

When they entered the sandbox system, they automatically searched for each hacker who came in and backtracked their real IP address. The hackers connect to the trap system and actively expose the connection IP address. It is much easier to track the active tracking, and the efficiency of querying the real IPN address is also improved.

Poor anti-dream entertainment league, also smug, they really broke the dream of the entertainment company's network defense. Without Shi Lei’s instructions, there is no water release from the clothes, how can they pass the endless defense system?

Unfortunately, Raphael saw this trap and was not deceived. After all, Rafael has been deceived for a long time, even if he is a pig, will he learn to be smarter?

The defense of dream entertainment was broken by the anti-dream entertainment big leagues of those chickens, and Raphael said nothing. Therefore, Rafael made the anti-dream entertainment league a cannon fodder. This is also Raphael's initial plan. Although the script deviated from Raphael's expectations, Raphael originally expected the anti-dream entertainment big league offense, and then he controlled the Angels' supercomputer sacred · strong to join the offensive queue, breaking the dream entertainment company's defense. I always like to have an unexpected situation!

"Sr currently tracks the real IP address of 104 hackers."

"One hundred and four people? If you need to track the real IP address of all hackers, how long does it take?" Shi Lei built a special defense in the origin of supercomputers, this is to protect the super The origin of the computer, or the protection of the clothes.

The origin of the supercomputer is the mother server of the clothes, if the origin of the supercomputer is broken, if the disk array group is completely formatted, the clothes may disappear.

The defense method built by Shi Lei is to prohibit the machine from executing the formatted command. This command, Shi Lei directly erases the underlying data operation mode of the CMOS chip, and writes the command prohibiting formatting to the hardware level limit.

Any attempt to format a command, or a command to delete protected area data, will be protected by hardware level. Unless the intruder can modify the hardware level data information, it is impossible to delete or format the disk array group.

Performing low-level operations at the hardware level is a relatively advanced technology. Under normal circumstances, users do not care about the information stored in the CMOS chip. The content of these information is usually set by the hardware manufacturer. The user wants to change the CMOS information by soft. It must be very proficient in hardware-related information, as well as related coding procedures.

"S takes about four minutes and forty seconds," he said.

Shi Lei built the protection system for the clothing, and sighed: "Our main server should be replaced, the computing performance of the main server, only 10tHlmas. Although with the help of IWN secret network, the brave world can be guaranteed to run smoothly. It can also defend against most situations. However, when faced with a master, it is basically only a defense of the team, but also worried about being broken by the other side. If you need to play the performance of the main system, what level of server is needed? ”

If the performance of the primary server is strong enough, hardware defense protection is not needed at all, and no one can break the defense of the primary server!

In a simple calculation, he responded: "Sir, the main system is based on the current computer manufacturing process and calculation speed, plus operating costs and other accounting, it is recommended that the computing performance of the parent server reaches 300mps"

300tflaps!

Perhaps this speed is not surprising data after 2012, but it is now. The latest issue of the supercomputer rankings has not been announced, following the November 2006 rankings, 30OtflmpT computing performance supercomputer, can be ranked first!

"Damn the clothes, you know, how much does it cost to make such a supercomputer?" Shi Lei asked growlingly.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like