HacKer

Final-061 Begins with a Search!

.

Shi Lei did reserve an information channel inside Abertier, and simulated it as a port for Abertier's basic communication, which would basically not be discovered.

However, Aberdeen blends in with Butler!

Before the integration, Butler was already an advanced pseudo-artificial intelligence system. After integrating Abertier, Butler went a step further.

While Butler does not reach the level of a true AI system, it also exceeds the limits of an advanced pseudo-AI system.

Even though Butler isn't as good as Izull, it's definitely not too far behind!

A pseudo-artificial intelligence system of this level, except that it lacks real creativity and human emotion, will definitely not have a big gap with real human beings in terms of logical thinking.

Therefore, for the first time, Shi Lei obtained the information that the pseudo-artificial intelligence system of the organization is still online through the information channel reserved in Abertier.

When Shi Lei continued to send the execution order and asked Aberdeer to return the real IP address, he integrated Aberdeer's Butler and immediately discovered the abnormal situation.

In the fusion system between Aberdeer and Butler, Butler is in a dominant position. Aberdeer's core source code is basically fused by Butler, but the basic code has been retained to a large extent.

The information channel reserved by Shi Lei is in the basic code.

However, the basic code execution command needs to pass the audit of the core system. When Butler found the basic code left by Abertier, and asked to execute the information to send the real IP address, it was immediately determined as an abnormal state.

Butler first blocked the information channel reserved by Shi Lei, and then followed the channel through which Shi Lei sent the information, tracking Shi Lei's real IP address, and preparing to take the initiative to counterattack.

Shi Lei is waiting for Abertier's feedback. When Butler's reverse tracking was about to track Shi Lei, Izuer discovered Butler's reverse tracking information.

"Sir, the system found the reverse tracking data of the information channel, will it fight back?" Yizuer asked Shi Lei, but Yizuer didn't understand. Butler's counterattack represented the exposure of the information channel that Shi Lei reserved inside Abertier, and it also meant that Shi Lei could not determine the real IP address of the parent server where Butler was located.

Shi Lei's expression changed, and he frowned: "Fini, Jazz, the situation has changed. Get ready to fight! Let's track the reverse tracking data flow of the organization's pseudo-AI system, which is tracking my real IP address!"

After Shi Lei finished speaking, he got up and prepared to go to the previously remodeled information war room.

Although the virtual keyboard of the LIP lens-style information processor. It can also support three people to conduct information operations, but the virtual keyboard does not have a real tactile sense, as well as a sense of key travel feedback, which leads to three people using the virtual keyboard to input source code. Hand speed will drop a lot.

So, in the face of an important cyber war. They will choose real keyboards and computers for information warfare.

In the information war room, three computers and nine screens were activated. Each computer is equipped with three screens, which are convenient to display more data information.

"Are you ready?" Shi Lei asked, "If you are ready, let's access the data stream of the other party's reverse tracking!"

"It's ready!" Tao Wenxian responded.

"OK!" Raphael replied simply, indicating that he is ready and ready to engage in information operations at any time.

Shi Lei took a deep breath, "Our actions can only be successful and not allowed to fail!"

"Understood!" Tao Wenxian and Raphael said in unison.

Shi Lei ordered: "Yizul, direct the reverse tracking data flow to our broiler server!"

Butler, who has integrated Abertier, is tracking the end point of the information channel where Abertier is going to send the real IP address, which is Shi Lei's real IP address.

Izuer redirected Butler's reverse tracking to the broiler server connected by the three of them by means of a transfer. When Butler's reverse tracking entered the broiler server, the three of them would reverse-track Butler head-on.

"Come on!" Shi Lei snorted softly. The broiler server was subjected to the data flow test of reverse tracking. Shi Lei and the three began to tap the keyboard. In Butler's reverse tracking data, they tried to reverse reverse tracking!

Yizuer played Shi Lei's real IP address, trying to get rid of Butler's tracking, thus setting a trap for Butler, giving Shi Lei and the three a chance to capture Butler's real IP address.

"Izuer, prepare to deploy the resources of the IWN secret network, start the OverSeed program, and obtain the computing resources of the IWNSeed to the greatest extent without affecting the players!" Shi Lei ordered Yizuer to start harvesting the computing resources of the IWN secret network.

Shi Lei has already experienced what kind of computing resources the organization's supercomputer has!

Supercomputer Amon13, computing resources reached 500Tflops; supercomputer Amon14, computing resources reached 1200Tflops!

Taken together, the intensive distributed computing resources have reached a terrifying level of 1700Tflops!

What about Mirui Technology Group?

The 10,000-mu headquarters of Mirui Technology Group was destroyed, and the brand-new supercomputer was directly tragic. At present, the supercomputers in the hands of Mirui Technology Group are only the origin and lightning of supercomputers.

The computing resources of the supercomputer Lightning have 300tflops, which is 60% of Amon13, which is not bad.

But the computing resources originated from supercomputers are only a pitiful 10tflops!

The supercomputers Amon13 and Amon14 are both the organization's private supercomputers. In other words, the organization's pseudo artificial intelligence system Butler can 100% and unscrupulously call the computing resources of the two supercomputers without worrying about being discovered.

Shi Lei currently has only 310tflops of intensive distributed computing resources in his hands. That's only about 18.24% of the computing resources that Butler controls, not even one-fifth of that.

With only the origin of supercomputers and lightning, it is impossible for Shi Lei to fight against Butler! Even if Butler didn't have the assistance of a super administrator, and Shi Lei and the three of them were the world's top hackers, plus the pseudo-artificial intelligence system Yizuer of the same level, there was still no chance of winning.

When the computing resources reach a certain level of gap. It is almost impossible to make up for the gap by relying on technology.

Therefore, Shi Lei can only pin his hopes on the IWN secret network and extract the loose distributed computing resources from the IWN secret network to the maximum extent, so as to fight against the supercomputers Amon13 and Amon14.

The computing resources of the IWN secret network are generated from every computer with the Brave World client installed, regardless of the computer where the Brave World client is installed. Whether the Brave World is running or not, the computing resources will be captured by the IWN secret network.

However, the computing resources captured by the IWN secret network are very few, and users will not find it.

The total number of registered players in Brave World as of now. It has exceeded 60 million, which is about 605 million data.

The current number of people online has also exceeded 45 million!

Although the vast majority of players have terrible computer configurations, basically. The computer system used by the player, the average total computing resources. About 20Gflops, which is 0.02Tflops.

With such a pitiful total computing resource, apart from the daily applications to deal with players, how much can there be left?

usually. When the CPU utilization rate of the central processing unit exceeds 90%, the computing task will be stuck.

This situation is more obvious in low-end CPUs. The more high-end CPUs, the higher the tolerance in terms of usage, because the base of high-end processors is higher, even if it reaches 1% At ninety-nine, the remaining one percent is still more than ten percent of the computing resources of a low-end processor.

Although Shi Lei ordered Izuer to intercept IWNSeed's computing resources to the greatest extent possible, Shi Lei also set the premise, that is, to obtain the maximum computing resources as much as possible without affecting users.

Why care about user experience?

It's not that Shi Lei is so noble and still considers users in such a critical situation, but Shi Lei is worried that users will discover the situation of the IWN secret network on a large scale, which will cause the IWN secret network to collapse.

If there is a major collapse of the IWN secret network, for the current situation, it will definitely be the result of death!

Shi Lei naturally didn't want such a situation!

However, even if the computing resources are extracted to the greatest extent without affecting the users, the computing resources obtained by the IWN secret network are still extremely terrifying!

According to Izuer's statistics, there are about 52 million IWNSeeds currently active on the IWN secret network. Excluding nearly 500,000 ultra-low-end users, there are still 51.5 million IWNSeeds left.

The remaining 51.5 million IWNSeed, according to the rules of global average calculation, each can provide about 0.001tflops of computing resources.

Then, the entire IWN secret network will provide 51,500tflops of computing resources. If the difference between intensive distributed computing resources and loose distributed computing resources is not considered, only the computing resources provided by the IWN secret network will exceed the supercomputers Amon13 and Thirty times that of Amon14!

However, there is a large performance gap between loose distributed computing resources and intensive distributed computing resources. Especially in terms of data consistency, task coordination, computing latency, etc., there are very serious performance gaps.

However, even so, a full 3,000 percent quantitative gap is enough to bridge the gap between the two sides!

"Yizul, activate the neutrino communication network and assist the IWN secret network to transmit data!" Shi Lei ordered.

Miray Technology Group has established a complete neutrino communication network throughout the five continents of the earth, aiming to eliminate the delay of network communication between continents.

After all, the transmission speed of the submarine optical cable is greatly affected by the outside world. The IWN secret network has collected computing resources. If it is transmitted through the submarine optical cable and then transmitted into the Xia Kingdom, the resulting network delay will scare people to death.

Therefore, Shi Lei uses the neutrino communication network to link the IWN secret network of five continents, which will greatly reduce the network delay. Only with the help of the neutrino communication network, the computing resources collected by the IWN secret network can be used in large-scale cyber warfare.

"The IWN secret network OverSeed is launched, the neutrino communication network is launched, and the IWN secret network will provide 51,000 Tflops of computing resources!" Izuerhui reported.

The computing resources actually collected by the IWN secret network are lower than expected. This is because some ultra-low-end computer systems have too few computing resources. Although they can theoretically provide computing resources, they cannot provide computing resources after the actual test of Izull.

Shi Lei took a deep breath, nodded to Tao Wenxian and Raphael, and motioned for the two to start searching for the organization's pseudo-artificial intelligence system and the location of Butler's parent server.

This time, as Shi Lei said, it can only succeed, not fail!

They can't afford to fail!

After all, the price of failure to act is too high and too high!

.(To be continued ~^~)

Chapter 1860/1926
96.57%
HacKerCh.1860/1926 [96.57%]