HacKer

Chapter 1882



Final-074 Destroy and resist!

Xia Guo time, July 14th, at 1.40am. ◇↓

The virtual transparent screen of the lip lens type information processor shows that the haystack plan is completely completed, leaving only less than 10,000 unknown ip addresses not yet analyzed.

At the same time, the base point of the aon network has accumulated to the extent of 1,389,200,186!

This quantity once again surpassed Shi Lei’s estimated 1.2 billion data. Nearly 1.4 billion computer devices infected with the Vengeance virus provided 18 million tflops of computing resources for the aon network.

Under the impact of such a huge computing resource, there are less than 10,000 unknown ip addresses. In just five minutes, the analysis is almost complete, leaving only less than ten unknown ip addresses.

Butler’s parent server’s real ip address is hidden in it!

Although the aon network has 18 million tflops of computing resources, iwn.com has more than 1 million tflops of computing resources.

So much, breaking through the computing resources of the sky, and analyzing the remaining unknown ip addresses, can’t be done quickly, only to show that all the rest are hard bones.

The best way is to analyze one by one!

With the computing resources of aon network and iwn secret network, destroying the remaining ip addresses one by one is definitely not a problem.

Tao Wenxian and Raphael clearly understand this truth, and the two are waiting for Shi Lei to make a choice.

Shi Lei counted the remaining ip address, a total of only eight unknown ip addresses, Shi Lei did not specifically select. Directly pointing to the first unknown ip address, smiled and said: “Start from the beginning!”

“Okay!” Tao Wenxian and Raphael are the same.

The three started to invade the first unknown ip address. In the beginning, it did not directly mobilize all computing resources. after all. They have too many computing resources, and if they are used indiscriminately, they can easily block the network.

That is not the result that Shi Lei needs!

Shi Lei does not engage in destruction, Shi Lei needs the answer!

The first time, the three used 5 million tflops of computing resources, such a huge computing resources, when they just touched each other’s defense, they rushed to the other side’s defense.

Then I met the block again!

However, Shi Lei already knows. The identity information of this unknown ip address is the internal network of the nsa National Security Agency!

Shi Lei has been cautiously vigilant and never provoked the NSA National Security Agency or the Darpa Advanced Bureau. To the maximum extent, it is also playing with the CIA Central Intelligence Agency and the FBI.

If it is determined that the other party is the internal network of the NSA National Security Agency, Shi Lei will silently retreat and clean up all the intrusion marks.

Then, the cyber security expert of the NSA National Security Agency. The choice of pushing the boat will not be followed, thus avoiding a senseless battle.

But Shi Lei now holds the aon network and iwn secret network, and the collection of nearly 20 million tflops of computing resources, how can it easily retreat?

Even the nsa National Security Agency. Obviously not the target, but Shi Lei still has no intention of retreating.

“Push in and see, scan it. Look at the guys of nsa, knowing Butler’s message!” Shi Lei told.

Tao Wenxian and Raphael cooperated with Shi Lei to invade. With huge computing resources, it is almost a devastating gesture. Cracked the defense of the nsa National Security Agency.

It is not the defense of the NSA National Security Agency that is too rubbish, nor is the cyber security expert of the NSA National Security Agency too rookie, but the three people of Shi Lei are too unreasonable!

They directly used huge computing resources, unreasonable rampage, and easily defeated the defense of the NSA National Security Agency.

Inside the nsa National Security Agency, it’s a windy crane!

As the largest intelligence agency in Lijian, the NSA National Security Agency has a very high level of confidentiality, otherwise it will not be ridiculed as ‘no.’

Shi Lei three broke through the defense of the NSA National Security Agency. When they were preparing to scan the information inside the National Security Agency, they suddenly found that they could not link to the internal network of the NSA National Security Agency.

Tao Wenxian sarcastically said: “The nsa National Security Bureau, even disconnected from the physical connection of the network, is simply a shame!”

Rafael did not have many accidents. “Nsa National Security Agency has recorded a lot of black actions in Lijian, and it is normal to disconnect the network. They can’t let us, in their internal network, casually. Scan detection. However, the other party disconnected from the Internet, which means that Butler is not hidden.”

Shi Lei affirmed Raphael’s statement, “Well! Butler is not under the protection of the NSA National Security Agency! Crack the second unknown ip address!”

The NSA National Security Agency temporarily avoided its front, and Shi Lei did not have any excitement. If placed before, Shi Lei may still be proud of it.

When Ling Yumo’s life is threatened, Shi Lei has no pride in his mind!

The second unknown ip address, Shi Lei three people still mobilized 5 million tflops of computing resources, trying to invade. Like the previous re-enactment of the NSA National Security Agency, the huge computing resources easily broke through the defense of the other side.

In the first time, Shi Lei confirmed the identity of the other party.

It turned out to be Xia Guo’s cybersecurity intelligence department!

Tao Wenxian obviously also identified the target identity information. He asked: “Stone brother, is s, do we want to retreat?”

After all, the two are Xia Guoren. At the same time, the Mi Rui Technology Group is still developing in the summer, and the blatant invasion of the cybersecurity information department seems to be not very good?

However, although the target of the invasion was Xia’s cybersecurity intelligence department, Shi Lei only slightly hesitated and decided to continue the invasion.

“Continue to attack!” Shi Lei said indifferently.

The huge computing resources have brought in a powerful and powerful invasion force. s Network Security Information Division, can not stop the invasion of Shi Lei three people.

However, the cybersecurity intelligence division’s countermeasures are exactly the same as those of the nsa National Security Agency, which directly disconnects the physical connection with the Internet.

Shi Lei is not trying to invade the cybersecurity intelligence department, but just wants to rule out the suspicion of the cybersecurity intelligence department.

As long as the cybersecurity intelligence department disconnected the Internet from the physical level and ruled out the suspects that Butler was hiding in it, Shi Lei would never find the trouble of the cybersecurity information department.

“The third!” Shi Lei said directly.

……

Three people invaded seven unknown ip addresses in succession, and one was not the real ip address of the Butler mother server, only the last one!

Shi Lei took a deep breath, although in theory, this one must be the real IP address of the Butler mother server!

But Shi Lei’s heart has a faint worry!

Rafael also frowned. The situation of eight choices, although it was a choice from beginning to end, but the first seven were not selected, it is too sad to remind a little bit?

Tao Wenxian opened his mouth and seemed to want to say something, but he did not say it.

“Stone, are we starting to invade?” Rafael reminded.

Shi Lei focused on the head, “Good!”

“How many computing resources are called?” Rafael asked.

“As usual!” Shi Lei simply said, the so-called as usual, is still mobilizing 5 million tflops of computing resources, the first seven unknown ip addresses, all defeated by 5 million tflops of computing resources.

The last unknown ip address still uses 5 million tflops of computing resources as the underlying intrusion data.

However, the unfavorable invasion operation, in the eighth unknown level ip address, was actually blocked!

That’s right!

5 million tflops of computing resources, was actually resisted!

Although the computing resources of 5 million tflops are not all resources of aon network and iwn secret network, it is also a huge and irresistible computing resource.

The fact that the first seven unknown ip addresses have been verified. Including the nsa National Security Agency, it can’t resist 5 million tflops of computing resources!

However, the huge computing resources that are not unfavorable are actually being resisted. What resources does the other party obtain from the computing resources?

The current situation is that Shi Lei released the Nemesis virus, which infected more than 1.4 billion computer devices worldwide. Worldwide, almost 90% of computer equipment was infected with the Vengeance virus.

This also means that Shi Lei controls the vast majority of computer equipment on a global scale and collects computing resources that can be collected.

Even if others have the same technology as Shi Lei, they can create a super virus like the Vengeance virus and no computer equipment to infect.

Shi Lei does not understand, the eighth unknown ip address, why can they resist their offense?

Is it the eighth unknown ip address, with a private supercomputer cluster that has more than 1 million tflops of computing resources?

For this situation, Shi Lei does not believe it at all!

The cost of a supercomputer is not only the cost of parts, but also the huge maintenance costs. Supercomputers require very high maintenance costs when they are running.

If you want to maintain a supercomputer cluster with 1 million tflops of computing resources, the cost is simply horrifying.

Shi Lei absolutely does not believe that kind of possibility!

But if it is not a private supercomputer cluster, what is the situation, only to resist the invasion of Shi Lei?

(To be continued, please search for astronomical literature, the novel is better updated faster!


Tip: You can use left, right, A and D keyboard keys to browse between chapters.