HacKer

In HK1191, It Is Always NHK Who Is Lying on the Gun!

.

Shuangqing City, Shuanghu District.

Shi Lei put on the '' vest and joined the battle between Raphael and the unknown hacker. Shi Lei had just entered the defense interface provided by Raphael and immediately discovered the problem.

Raphael obtained 400tflops of distributed computing resources provided by Mirui Technology Group, but he didn't have the upper hand, he just blocked the opponent.

Although the computing resources of the iwn secret network are distributed computing resources, the computing resources of 400tflops are not trivial.

Shi Lei scanned Raphael's defense system. After he had a concept in his mind about Raphael's defense, he quickly began to try to track down the mysterious hacker who invaded Raphael.

"Mr. Feeney, I have started to trace the intruder's real IP address in reverse." Shi Lei spoke to Raphael through the microphone that changed his voice.

"Received! There is no problem with defense for the time being, you don't have to worry." Raphael assured.

There was a smile on Shi Lei's mouth. Raphael was so wronged by being bullied, and Shi Lei felt very funny in his heart. "Okay, Mr. Feeney. I'll leave the defense to you!" After speaking, Shi Lei cut off the power of the voice-changing microphone to facilitate communication between him and Izuer.

Under normal circumstances, the work of controlling the voice input and cut-off of the voice channel is automatically completed by Yizuer for Shi Lei. But this is a voice communication with Raphael. If Yizuer makes a mistake in his judgment, it will reveal a flaw. Raphael will know that Shi Lei is, and even speculate that Shi Lei is Mr. M.

In order to try to be safe, Shi Lei directly turned off the power of the voice-changing microphone, so that no accident would happen. Anyway, just the power of the microphone is turned off, and the sound of the earphone is not blocked. If Raphael has something, it is in the voice communication channel. Shi Lei can also receive it.

"Izuer, are the remaining computing resources of the iwn secret network ready?" Shi Lei asked.

The iwn secret network gathers huge distributed computing resources, but the utilization rate of distributed computing resources. It falls far short of the intensive computing resources of supercomputers.

However, Mi Rui Technology Group also has a supercomputer Lightning!

The computing resources of the supercomputer Lightning, under the control of Izure, have a full computing resource of 300 tflops, and no data has been released to the public, which is in a state of secrecy.

In the case of the combination of iwn secret network and supercomputer lightning, the distributed computing resources of iwn secret network will become more efficient after the integration and optimization of supercomputer lightning.

"Sir. The iwn secret network resource integration has completed 720tflops; the computing resources of the supercomputer Lightning have assembled 88tflops. The remaining computing resources of the iwn secret network and the supercomputer lightning are used to maintain the operation of the brave world and the basic needs of the endless defense system. Izuer responded to Shi Lei and showed Shi Lei all the computing resource interfaces.

Shi Lei has access to the 720tflops distributed computing resources provided by the iwn secret network. Through these distributed computing resources, Shi Lei began to quickly trace the intruder's connection IP address.

Due to the huge computing resources, Shi Lei's anti-tracking speed is very fast, and it is very hidden. The intruder's first connection IP address was implanted in a first-class broiler.

Although the Intruder's first-class broiler has superior performance and can be called a small supercomputer, it only has a computing speed of 2tflops. How can it stop the 720tflops of computing resources controlled by Shi Lei?

In just an instant, Shi Lei controlled the computing resources of the iwn secret network, broke through the defense of the first-level broiler, and captured the intruder's connection IP address.

‘Well, what the hell is Raphael doing? The technology of this intruder does not seem to be that powerful. He can't figure it out? ' Shi Lei thought to himself.

By anti-tracking the intruder's connection IP address, Shi Lei easily broke through the intruder's first broiler server. The whole process didn't take a minute, and Shi Lei didn't feel the intruder's technology.

'Could it be that Raphael's technique has gone backwards? ' Shi Lei thought while shaking his head. Then, according to the connection IP address captured in the first broiler server, it traces to the next broiler.

The intruder's second IP address relay server still did not cause any trouble for Shi Lei. Shi Lei naturally entered the second broiler server as if he was eating and drinking.

In the next few minutes, Shi Lei killed eight of the intruder's relay servers in a row. Including the previous two, which means that in less than five minutes, Shi Lei has even defeated ten broilers of the invaders!

'Fuck? Is this what Raphael calls a master? ' Shi Lei had doubts in his heart again, 'Could it be that he is an offensive master? ’

In the hacking world, hackers can be roughly divided into three types: offensive, that is, proficient in various intrusion techniques, extremely sharp when invading, and terrible when defending. The representative figure is the second-generation hacker organization of Xia Guo, the second head of the Hacker Alliance, Black Tiger.

Black Tiger's intrusion technology can reach super-first-class, or even higher. But as for defense technology, it is still a big question whether there is a third-class level in the world.

The second type is the defensive type, which is the opposite of the offensive type. Under normal circumstances, this type of hacker generally turns to the security field. The network security agencies of various countries, and the vast majority of security experts, belong to this type.

The last type, and the most powerful type, is the all-rounder hacker. The so-called omnipotent type is only a relative term. It does not mean that he can do everything, but that he can both attack and defend.

Shi Lei is the best among them, his offense is extremely sharp, and his defense is unparalleled!

In addition to these three types of hackers, there are some other categories, such as those who are proficient in anti-tracking, which can be counted as defensive hackers. Usually, hackers of this type also develop into the field of security experts; those who are proficient in tracking can be counted as defensive hackers. as an offensive hacker.

There are also hackers who are proficient in encryption and decryption. Hackers who are proficient in encryption can also develop into the field of security experts; those who decrypt are naturally regarded as offensive hackers.

The hacker who invaded and tracked Raphael should be an offensive hacker from the current situation. In terms of intrusion and tracking technology, this unknown hacker has shown an extremely powerful side.

However, in terms of defense and anti-tracking, this unknown hacker, like a rookie, does not match the offensive technology at all.

'If the opponent is an offensive hacker, he's so bold! ' Shi Lei secretly admired the unknown intruder in his heart.

Usually, not all-powerful hackers, rarely die with other powerful hackers. Unless it is an offensive hacker and a defensive hacker, together, they will do their best with other hackers.

Similar to a simple offensive hacker, basically it will not fight to the end with other powerful hackers!

After all, Raphael is also a world-class hacker. Ordinary offensive hackers, even if they reach the world's peak-level strength, will not confront Raphael head-on.

The guy who can become the world's top hacker, which one is a fool? Isn't it necessary to kill you because of the hatred of killing your father and the hatred of stealing your wife?

Shi Lei, who had broken through ten broiler servers in a row, just hesitated a little in his heart, and then continued to carry out the anti-tracking work. For this mysterious offensive hacker, Shi Lei also wanted to know who the other party was, and why did he stay with Raphael forever.

From the tenth broiler server, the connection IP address found was used as a clue to track the next broiler server, and Shi Lei followed the clue.

However, Shi Lei finally felt a little bit of difficulty when tracking down the intruder's eleventh relay server. However, in the next moment, Shi Lei showed a strange expression on his face.

Shi Lei first turned on the power switch of the voice-changing microphone, and then said in the voice communication channel: "Mr. Finney, I have tracked down the intruder's eleventh relay server. However, there is a problem with this relay server."

"What's the problem?" Raphael responded immediately. "Could it be that the opponent's defense is very strong and can't crack the defense system of the broiler server?"

"No, Mr. Feeney!" Shi Lei didn't give a shit, and said directly: "The eleventh relay server is the web server of the official website of nhk TV station. I heard that Mr. Feeney, one of your opponents, likes to have trouble with nhk TV station. ?"

The intruder's eleventh relay server is indeed the official website web server of nhk TV station. Shi Lei felt extremely strange about such a result.

Could it be that God is helping him?

The relay server of the mysterious intruder chose the web server of the official website of nhk TV station. As long as Shi Lei gave him a little guidance, Raphael would suspect that the mysterious hacker who tracked down him was Mr. M.

"What? Are you sure that the intruder's eleventh broiler server is the web server of the official website of nhk TV station?" Raphael was shocked.

Mr. m likes to find trouble with nhk TV station, which is an open secret in the hacker world. In addition, Mr. m always likes to find trouble with Raphael. Any hacking incident that is related to Raphael and nhk TV station is always It's easy to suspect Mr. M's head.

After all, Raphael is the world's top hacker, how can ordinary hackers bully Raphael? Only Mr. M is the best object of suspicion and the best object of blame.

"I'm sure! Mr. Fini, what should we do now?" Shi Lei's incarnation of the vest asked Raphael what his next move would be.

.

ps:

Chapter 1208/1926
62.72%
HacKerCh.1208/1926 [62.72%]