HacKer

HK1583 Data Shock!

.

As a top hacker in the world, he was actually teased like this. The top hacker in the mysterious world was very angry at this time. He quickly typed a string of English source codes on the keyboard.

The top hacker in the mysterious world has opened a real defense system, based on the outer layer of protection composed of broiler networks and the inner layer of core defense composed of supercomputers.

The effect of combining the outer layer of broiler network protection and the inner layer of supercomputer core defense is not that one plus one equals two, but exceeds this effect.

The protective outer layer of the broiler network acts as a coolie. It can accept any attack and can be ravaged at will.

The core defense layer composed of supercomputers acts as a behind-the-scenes protector. When the outer layer of defense is subjected to various attacks, it will provide strong support to the outer layer of defense to ensure that the outer layer of defense will not be easily broken through.

The supercomputer used for defense by top-level hackers in the mysterious world has a computing speed of 30tflops. Since the computing resources composed of supercomputers are intensive distributed computing resources, they have surpassed all other aspects in terms of consistency, coordination, and controllability. It uses loose distributed computing resources and maintains its dominant position even in the face of 100tflops of loose distributed computing resources.

"Hmph! Loosely distributed computing resources? How many personal computers and ordinary servers have been hacked to form such a huge botnet!" The voice of the top hacker in the mysterious world was full of disdain.

Loosely distributed computing resources are often indeed generated by botnets. The so-called botnet, another name for a botnet, is not a scary thing.

This top-level hacker in the mysterious world, according to the situation of the fourth assessment server. Judgment does not have a supercomputer, but merely controls a huge botnet.

It is not difficult for powerful hackers to control a huge botnet. It only requires a lot of time and writing a complex set of bot management software.

For powerful hackers. Basically you won't do such a thing. How much computing resources can an ordinary personal computer provide? Even if Trojans are spread on a large scale through viruses and a large number of personal computers are collected as broilers, this method is not good.

First, Trojans that collect broilers have spread on a large scale and can easily be harmonized by network security companies, so that broiler servers have been collected. It is possible to reimburse everything.

Second, the instability of personal computers! This instability is not only reflected in the usage time, but also in the fault tolerance rate. Especially when using loosely distributed computing resources to conduct hacker attacks. Unless you use a relatively basic and simple denial of service attack, also known as a DDOS attack, you will have good protection. If a highly difficult data joint attack is used, it is definitely possible to lose the chain!

Consider a situation. In the IWN secret network, 100tflops loose distributed computing resources. It takes about 1 million users, or even 1.2 million users, to generate it.

Basically, each user can only provide 0.0001tflops of computing resources. This kind of computing performance, for individual users in Brave World, is equivalent to one percent or even one thousandth of the computing performance of the computer itself.

Drawing such low computing resources is to avoid detection by users. However, a huge problem arises from this, that is, when so many users perform a task comprehensively, the data information that needs to be calculated must be divided.

What if some of these users suddenly leave the Internet?

With a base of one million users, there must be various users who accidentally leave the Internet. In such a situation, the data that needs to be calculated by the Internet user needs to be transferred to other users for calculation in a very short period of time.

This extremely short time is not a time in a macro sense, but a time in a micro sense, which is basically less than ten milliseconds, that is, within one hundredth of a second, the computing tasks of missing users are redistributed.

Such a large and complex software design and management, without the assistance of the advanced pseudo-artificial intelligence system Yizuer, the limitations of the IWN secret network will be very huge.

It is precisely because of this situation that in the eyes of hackers in the high-end field, using loosely distributed computing resources is a relatively unclassy method.

Hackers in the high-end field would rather spend more time challenging more difficult supercomputers or powerful enterprise-level servers than spend a lot of time building a huge botnet.

Finally, when loose distributed computing resources face dense distributed computing resources, they are easily defeated by dense distributed computing resources.

Combining various shortcomings, this mysterious world-level hacker who fought against the fourth assessment server is qualified to laugh at the use of loosely distributed computing resources.

However!

This top hacker in the mysterious world realized his mistake thirty seconds later!

Originally, the top hacker in the mysterious world judged that the fourth assessment server had 100 tflops of loosely distributed computing resources. He called a supercomputer with a computing speed of 30 tflops. It was easy to break into the fourth assessment server. matter.

But it turned out not to be the case!

When the fourth assessment server faced a supercomputer with a computing speed of 30tflops, there was no sign of collapse. Although the mysterious world-leading hacker indeed suppressed the fourth assessment server, there was no possibility of breaking it.

The defense system of the fourth assessment server was impregnable. When faced with the impact of the mysterious world-level hacker, there was no instability at all.

In a mysterious room, the top hacker in the mysterious world looked at the data fed back on the computer screen with surprise, and exclaimed: "This is impossible! It is obviously provided by a botnet, and it is obviously a loose distributed computing resource. Why? What if there is no data shock caused by the impact?”

Perhaps for hackers in the low-end field, they do not have such powerful technical means. Use data shock to cause data concussion to disrupt the entire botnet.

However, in the high-end field of hackers, it is a very common method to use intensive distributed computing resources to launch data impact on loose distributed computing resources, thereby causing data shock.

"How strange! How to deal with botnets?" The mysterious world's top hacker. He wondered to himself.

On the other side, the first-level branch of Longteng Project in Zhongyu District, Shuangqing City.

Shi Lei looked at the situation of the fourth assessment server through the LIP lens-type information processor. When he saw the mysterious world-level hacker, he tried to use data impact to create data shock and destroy the loose distributed computing provided by the IWN secret network. Resources, a faint sneer appeared on Shi Lei's face.

This mysterious world-leading hacker. The method adopted is correct. To deal with loosely distributed computing resources, data shock should be used to cause data shock, and all broiler servers and personal computers that provide computing resources should be shaken off from the broiler network.

But IWN Secret Network is different!

It has been analyzed before. The computing resources extracted by the IWN secret network from Brave World users are only one percent, or even one thousandth, of the users themselves.

Extracting such scarce computing resources faces data shock caused by data impact. It will not affect IWNSeed at all, which is the resource provider of the IWN secret network. Game users of World of Brave.

Coupled with Shanzuer's powerful error correction function, data shocks caused by mere data shocks were completely ignored by the IWN secret network.

Shi Lei is also the world's top hacker. Isn't it clear that botnets are afraid of data shock caused by data impact?

The mysterious world's top hacker. Attempting to use this conventional method to deal with the IWN secret network can only be said to be wishful thinking!

Seeing the mysterious world-level hacker being defeated, Shi Lei just observed quietly. So far, this mysterious world-level hacker has not shown any obvious personal characteristics, and Shi Lei has not yet judged who this guy is. !

Shi Lei needed more time to let this mysterious world-level hacker compete with the fourth assessment server to determine the opponent's identity.

On the side of the mysterious world-level hacker, when the method of data shock caused by data shock failed, this mysterious world-level hacker did not immediately try a new intrusion method, but prepared to try another data shock.

However, this time, the data attack methods prepared by the top hackers in the mysterious world will be a little different!

After all, it has already failed once. If the same attack method is used, it may not cause much damage. Therefore, although the mysterious world's top hacker is preparing to use data impact methods again, it is a completely new data impact method.

Every top hacker in the world is not a simple character!

If you want to simply become the world's top hacker, there are only two situations. The first type has truly unparalleled talent. To put it in another data plan, that is, the IQ has reached around 200.

Players with this IQ level can basically complete hacking learning without a teacher, starting from the most basic learning, and then gaining more advanced knowledge through Internet resources, until they reach the world's top level.

However, only about 0.5% of all humans have an IQ above 140. It is basically impossible to achieve an IQ of over 200.

After all, the IQs of Bill Gates and Stephen William Hawking are only 160!

As for another possibility…

.(To be continued ~^~)

PS: Another possibility is that it is really simple, and maybe everyone can meet the requirements! Guess what?

Chapter 1604/1926
83.28%
HacKerCh.1604/1926 [83.28%]