HK1650 True Identity!
.
The mysterious intruder's protection server actually directly called 300tflops of intensive distributed computing resources when faced with Shi Lei's supercomputer lightning strike.
Although the defense system that protects the server, the investment ratio between defense and intrusion is close to one to one, which is good news. It indicates that the intruder's defense strength may not be very strong.
But this is also bad news!
Because Shi Lei only tried to invade the security server, the mysterious intruder actually had such a huge reaction that he mobilized 300 tflops of intensive distributed computing resources at once.
This behavior fully proves that the mysterious intruder definitely has more computing resources. If there are no more computing resources, how can it be possible to invest 300tflops of computing resources at one time?
In the hacker world, there are not many cases where you directly show your cards in the ‘Showhand’ way. Unless, you are 100% sure that you can really defeat the opponent. Otherwise, keeping your trump card is the conventional choice.
Shi Lei analyzed the mysterious intruder and controlled unimaginable computing resources. Therefore, Shi Lei ordered Yi Zuer in advance to activate the OverSeed operation plan in advance.
The OverSeed operation plan is dangerous to a certain extent when executed. Because, through the OverSeed operation, the IWN secret network will be upgraded to extract more computing resources from the IWNSeed base point.
Each IWNSeed represents a player's computer equipment. When the IWN Secret Network is in a semi-sleep state, the IWN Secret Network will only keep each IWNSeed in a semi-ready state, minimizing the performance of the player's computer equipment.
Because when the IWN secret network is in a semi-dormant state, the IWN secret network does not need to gather loosely distributed computing resources at all, and naturally it will not occupy users' computing resources.
When Shi Lei ordered Yizuer to optimize the resources of the IWN secret network. Yizuer will change the status of the IWN secret network from a semi-sleep state to an active state of normal operation.
The IWN secret network in normal state will draw computing resources from IWNSeed. However, in order to ensure that it will not affect the normal use of users, the 1tflops loose distributed computing resources of the IWN secret network will be drawn from approximately 20,000 IWNSeed basis points.
That is to say. When the IWN secret network is in normal working condition, each IWNSeed base point requires an average of 0.00005tflops of computing resources.
Under normal circumstances, the IWN secret network draws on such scarce computing resources and does not affect the normal use of users at all. Unless the individual user's computer equipment is too old. But in that case, the IWN secret network will not draw computing resources from old computer equipment.
Once the OverSeed operation is enabled. This data will increase. For example, each IWNSeed originally only provided 0.00005tflops. Now, depending on the needs of the IWN secret network, this data may be doubled, or even several times.
If the IWN secret network draws too much computing resources, it will affect the normal operation of users. so. Yizuer prompts the OverSeed operation, which is a dangerous operation.
But the current situation made Shi Lei unable to control so much for the time being. After all, the power shown by the mysterious invading party was too powerful. If the OverSeed operation is not enabled, huge computing resources will be used in case of a mysterious intrusion. Directly overcoming the endless defense system, what should we do?
Although the Endless Defense System claims to be invincible in defense, in fact, the Endless Defense System is not truly invincible.
If in a very short period of time. A very large amount of computing resources are gathered, and then the endless defense system is collectively attacked. Once the computing resources of the collective attack exceed the endurance of the endless defense system, the endless defense system will be overloaded and forced to restart.
In the short period of time when the endless defense system is forced to restart, the endless defense system will not work, which is equivalent to solving the endless defense system in another form.
"Sir, the IWN secret network has entered an active activation state, the second confirmation of GoodSeed has been completed, and the OverSeed operation plan has been preset." Yizuer reminded Shi Lei.
The IWN secret network has fully entered the activation state, which means it has entered a state of hacker war. As long as Shi Lei gives an order, Yizuer can collect all GoodSeed within five seconds and start the OverSeed operation plan.
Shi Lei nodded and stared at the computer screen to see how the mysterious intruder's protection server would react.
However, the protection server of the mysterious intruder did not respond at all. It only resisted Shi Lei's invasion without making any counterattack.
Such behavior gave Shi Lei a strange idea. Could it be that the mysterious intruder did not have strong hacking skills, but only had powerful computing resources?
But such a weird idea was immediately shattered when it was born!
Now that we have powerful computing resources, how can we not have powerful hacking technology? If that really happened, Shi Lei could only say that people with too much money are stupid.
Of course, Shi Lei was just thinking about it. He could figure it out even with his toes. Without powerful hacking technology, it was impossible to have powerful computing resources.
No matter what channel the powerful computing resources are obtained from, it only shows that the mysterious intruder possesses powerful hacking technology. As for the low ratio of defense to intrusion in the defense system, it can only mean that the mysterious intruder's defense technology is not very sophisticated.
"Yizur, combine the IWN secret network with the LagFree network, use the LagFree network as the backbone, and build the channels of the IWN secret network on the LagFree network!" Shi Lei ordered again.
The so-called LagFree network is a worldwide neutrino information network established by Mirui Technology Group. Every continent has a base point of the neutrino information network. Then it is connected to the final terminal in Shuangqing City to establish an information network using neutrinos as the carrier.
The characteristic of the neutrino information network is that the delay is very low. Even when transmitting from Lijian to Xia, the delay is less than 1 millisecond, which is almost equivalent to no delay.
That’s why it was named LagFree network by Shi Lei, which stands for ‘no delay and no lag’ network.
The IWN secret network is based on the users of the Brave World around the world. Except for the IWNSeed in Xia Kingdom and Asia, there will be a certain delay in the transmission of IWNSeed from other regions to Shuangqing City in Xia Kingdom.
For example, IWNSeed in the Lijian region will cause terrible delays!
The usual role of the IWN secret network is only to assist the core server of Brave World in managing the operation of Brave World. But now, Shi Lei needs to mobilize the IWN secret network to participate in the hacker war. Therefore, Shi Lei combined the IWN Secret Network with the LagFree Neutrino Information Network to create a low-latency IWN Secret Network, further increasing the availability of the IWN Secret Network's computing resources.
The computing resources provided by IWN Secret Network are loose distributed computing resources, which have certain defects compared to intensive distributed computing resources. Among them, the biggest flaw is the delay problem.
Now with the help of LagFree network, this shortcoming has been greatly compensated. The loose distributed computing resources provided by IWN Secret Network will be closer to the dense distributed computing resources.
Just as Shi Lei was continuously instructing Yizuer to prepare for the hacker war, the more than 12,000 zombie users who were causing trouble in the official player forum of Dream Entertainment changed again.
The more than 12,000 zombie users actually paused publishing content attacks without performing any operations.
Shi Lei thought strangely, 'What do these zombie users want to do? ’
However, when Shi Lei could not come up with a clear answer, Yizuer reported a piece of information to Shi Lei.
"Sir, the number of registered users in the official player forum of Dream Entertainment has increased significantly. According to system statistics, a total of 173,837 registered users have been added in the past eleven minutes. The system randomly selected a thousand users and conducted reverse tracking of the real IP addresses. , the final tracking clue came to the marked server." Yizuer reminded Shi Lei.
Shi Lei's expression was ugly. The marked server was the protection server of the mysterious intruder. This means that those mysterious intruders once again registered more than 170,000 user accounts for the Dream Entertainment official player forum in just eleven minutes.
"Yizur, determine the identity information of the newly registered user!" Shi Lei issued the order while quickly typing the code on the keyboard.
When Yizuer was verifying the identity information of the newly registered user, Shi Lei had already entered the Inca country's national population information database.
Because according to Yi Zuer's statistical information, the identity information of these newly registered users are all Inca citizens. Therefore, Shi Lei entered the national population information database through the backdoor preset in the National Bureau of Population Information and Statistics of Inca.
In the Inca country's national population information database, Shi Lei ordered: "Yizur, cross-match and verify the identity information!"
Yizuer immediately carried out Shi Lei's order and cross-matched and compared the identity information of the newly registered suspicious users in the official player forum of Dream Entertainment within the Inca National Population Information Database.
After matching and comparison, Yizuer displays the result information on the virtual transparent screen of the LIP lens-type information processor.
What makes Shi Lei depressed is that the identities of these newly registered suspicious users are all real! All are real citizens of the Inca country!
What the hell does this happen?
.(To be continued ~^~)