HK1582 Scam? Scam! 【Happy New Year! 】
.
"Sir, the third assessment server has been breached by a mysterious hacker!" While Shi Lei was meditating, Yizuer reminded Shi Lei that the mysterious world-level hacker had broken through the limitations of the third assessment server.
Shi Lei's expression remained unchanged. Since he had already determined that the other party was a world-class hacker, why should there be any surprise that the other party easily broke into the third assessment server?
"Increase the computing resources of the fourth assessment server to 100tflops. In addition, improve the security policy mechanism of the fourth assessment server and use the black magic subsystem to counterattack!" Shi Lei ordered.
Although the loose distributed computing resources provided by the IWN secret network are not as good as the intensive distributed computing resources generated by supercomputers in terms of consistency, coordination, and controllability.
But a full 100tflops of computing resources is almost equivalent to 15-20tflops of intensive distributed computing resources!
Shi Lei tried to use the method of crushing computing performance to test the bottom line of the top hackers in the mysterious world and see if the other party could mobilize enough resources to fight.
In today's hacker world, the situation of directly invading and defeating supercomputers or satellites through a mere laptop no longer exists.
A laptop has limited computing performance, and no matter how powerful the technology, it cannot bridge the gap in hardware disparity.
To give a simple example, when a laptop runs large applications, or runs too many applications, the CPU usage will increase. When the CPU usage gets closer and closer to 100%, The operating system will experience overall lag and be unable to perform new tasks. Or even outright downtime.
This situation also occurs in hacker wars. When a world-class hacker with 1tflops of computing resources meets a world-class hacker with 100tflops of computing resources, who will win the battle between the two?
Although the gap between a super-class hacker and a world-class hacker is very obvious, and can even be said to be a world of difference, there is a gap between 1tflops computing resources and 100tflops computing resources. It can no longer be described as a world of difference.
The gap between computing performance cannot be expressed by simple multiples. It can only be expressed by the relationship between 0 and 1, only what can be done and what cannot be done.
1tflops computing resource, in the hands of ordinary people, may only be able to do work at the computing speed of 1tflops, in the hands of experts. It may be possible to do work with a calculation speed of 3tflops, but it is absolutely impossible to do work with a calculation speed of 10tflops!
When a 100tflops computing resource meets a 1tflops computing resource head-on, it is like a balloon with a capacity of 1 liter trying to fill 100 liters of air.
Although this balloon is made of very good material and has a certain degree of pressure resistance. Can hold more than the standard volume of 1 liter of air, but never too much. Once the limit of this balloon is exceeded, it will only explode.
Shi Lei hopes to use 100tflops of computing resources to test the trump cards of the top hackers in the mysterious world. If you are a top hacker in the mysterious world, you have the mentality of just having fun. I want to fight against the fourth assessment server. Then, 100tflops computing resources will give him a big surprise.
The black magic subsystem will give him a big surprise!
The black magic subsystem is an upgraded version of the black magic software. Shi Lei and Tao Wenxian refined the black magic software. The attack methods of the black magic software are made even better, and at the same time, they are completely integrated into the main system framework of Yizuer. Yizuer can obtain information from the Internet and learn more through the deep natural logical thinking module and the independent inductive learning and judgment module. Good offensive means and defense breaking means.
After tests by Shi Lei and Tao Wenxian, Yi Zuer controlled the black magic subsystem, and when coupled with the endless defense system, it was almost like gods blocking gods and demons slaying demons.
First of all, the combination of the endless defense system, the IWN secret network, and the super computer Lightning has ensured that Yizuer is invincible.
Secondly, the diversified attack methods of the Black Demon Subsystem, coupled with Jackson's ability to handle multi-threaded tasks, make the attack intensity of the Black Demon Subsystem comparable to world-class, or even exceed world-class, almost approaching the world's peak level.
Shi Lei and Tao Wenxian once tried that if they did not write firewall software in advance, they could only temporarily fight against Yizuer and the Black Demon subsystem. With equal resources, two world-leading hackers could not stop Yizuer and the others. minute.
This is not because Yi Zuer is really amazing, but because Yi Zuer cheated!
Yes!
Cheating!
Yizuer's multi-threaded task processing capabilities, even if Yizuer uses the same computing resources as Shi Lei and Tao Wenxian, Shi Lei and Tao Wenxian did not write firewall software in advance, so it is impossible for them to fully use all resources.
To put it simply, Shi Lei and Tao Wenxian were unprepared and faced enemies several times their size at the same time, so of course they couldn't defeat each other.
They also conducted another test. After they were fully prepared, even if the computing resources they used were only half or even one-third of Yi Zuer's, Yi Zuer couldn't do anything to them.
Of course, they can't beat Yizuer!
After all, the endless defense system written by Shi Lei is simply an endless loop that cannot be broken. No matter what the attack method, the endless defense system is a simple rejection.
Now, Shi Lei is ready to let the top hacker in the mysterious world have a taste of Yizuer's power!
Suppose this mysterious world-level hacker has a strong background and has figured out the situation of the fourth assessment server using 100tflops of computing resources, but still chooses to fight against the fourth assessment server. At the same time, almost huge computing resources have also been mobilized, making it more likely that Shi Lei can determine the identity of the other party.
In an unknown room, a mysterious world-level hacker was testing the fourth assessment server. When the feedback data on the computer screen was displayed, the mysterious world-level hacker let out a light sigh, and then haha. Laughed loudly.
"That's it! That's it! Cunning! The difficulty of the third assessment server has reached a world-class level. I was still thinking about whether the fourth assessment server would be super-class difficulty or another difficulty. But there is no To think that this is actually the case!" The top hacker in the mysterious world suddenly said in realization, and then took off his gloves.
When the gloves are taken off, the slender fingers are exposed, like the hands of a pianist.
The top hacker in the mysterious world crossed his fingers, turned them from the inside out, and then moved his fingers again. He said to himself with excitement in his voice: "I haven't moved for too long, I want to see what this has. conspiracy!"
The top hacker in the mysterious world didn't know that Shi Lei was secretly observing him. The difficulty of the fourth test server was indeed the best in the world. But Shi Lei gave him a little trick, making him mistakenly believe that the fourth test was a scam, and suddenly increased the difficulty to a huge level, just to leave a gimmick of an LE Legend level and a monthly bonus of 100,000 US dollars.
In the hacker world, the technology has reached the world's first-class level. Basically, there are organizations, either hacker organizations, official organizations, or commercial companies. There are very few people who act independently.
This top hacker in the mysterious world thought he had seen through the scam, but in fact, these guesses were all just his self-righteous guesses!
As the lyrics sing: ‘What I think is just what I think! ’
Shi Lei didn't set up any scam at all. No, Shi Lei did set up a scam, but it was not a scam to recruit information, but an attempt to trick the top hackers in the mysterious world into actively exposing his identity.
This scam is completely inconsistent with what the top hackers in the mysterious world had guessed!
As the saying goes, if you make one wrong step, you will make mistakes every step of the way!
When the top hacker in the mysterious world guessed Shi Lei's plan wrongly, he had already fallen into Shi Lei's trap!
Although the top hacker in the mysterious world knew that the fourth assessment server had huge computing resources of 100tflops, he did not immediately mobilize relevant resources to fight back. Instead, he chose to use an egg against a stone, as if using a laptop to fight against a supercomputer. , heading directly to the fourth assessment server.
However, when he first came into contact with the fourth assessment server, he knew that he was wrong! How wrong! The fourth assessment server is definitely not a show-stopper. The 100tflops computing resources are truly utilized, and not just used as a scare statistic.
Yi Zuer controlled 100 tflops of computing resources and used the black magic subsystem to directly fight back against the top hackers of the mysterious world. In less than ten seconds, he destroyed the first line of defense of the top hackers of the mysterious world.
The attack plan of the Black Demon Subsystem is very powerful. The moment the top hacker in the mysterious world came into contact with the attack data stream of the Black Demon Subsystem, his face changed drastically and he screamed in surprise.
"Fake!" The top hacker in the mysterious world looked at the computer screen, and the data information fed back revealed a cold sweat.
The only thing he is glad about now is that although he is a little contemptuous, he is not too proud and does not use a broiler server to protect himself.
The first line of defense that had just been broken through in less than ten seconds was his first broiler protection network. Without the buffering of this broiler protection network, the results would be disastrous.
Fortunately, the existence of this broiler protection network bought him a few seconds and allowed him to activate the real protection system.
"Fake! Fake! Fake!, I want you to look good!" The top hacker in the mysterious world roared loudly, obviously getting really angry!
.(To be continued ~^~)
PS: All the best in the New Year, and all the best in the New Year.