Final-075 Forced Seed Explosion!
.
The needle-in-a-haystack plan was completed, and in the end there was only one unknown IP address left. Moreover, Shi Lei invested 5 million Tflops of computing resources and was actually resisted!
Although the computing resources gathered by the AON network and the IWN secret network are all loosely distributed computing resources, they are on the order of five million. How can they be resisted?
Even if intensive distributed computing resources are used, nearly one million computing resources are needed to be able to withstand it.
However, a supercomputer cluster with millions of private computing resources is simply a fantasy!
Shi Lei really couldn't imagine what kind of force could resist such a huge computing resource combined attack.
etc!
Shi Lei thought of a possibility!
The origin of the Internet, the DARPA Advanced Research Projects Bureau that built the modern Internet and is known as the most mysterious organization in the country, referred to as the "Advanced Bureau"!
According to rumors, DARPA has a lot of resources and very high authority. Even the NSA National Security Agency needs to follow the orders of DARPA's Advanced Directorate when necessary.
In short, DARPA is the boss of the NSA National Security Agency, the boss of the FBI and the CIA.
The last unknown IP address, and only DARPA, can resist Shi Lei's invasion.
However, DARPA's network IP address is not a hidden IP address, but a published one, and welcomes intrusions anytime and anywhere.
In view of this situation, Shi Lei was not sure about the last unknown IP address. Does DARPA own it?
Although he didn't know the answer, it was actually the same to Shi Lei whether he knew the answer or not.
Because, regardless of the last unknown level IP address. Whether it is DARPA's advanced bureau or not, Shi Lei will completely break its defenses and investigate thoroughly.
Unless, the last unknown-level IP address, like the previous seven unknown-level IP addresses, directly disconnects from the Internet.
But Shi Lei knew that this was the case. Absolutely absolutely impossible!
In the global Internet world, Shi Lei has scanned all the IP address information, leaving only the last unknown IP address. The other IP addresses have been excluded by Shi Lei.
"Increase computing resources!" Shi Lei ordered. "Double it!"
Now, Shi Lei and the others have used 5 million Tflops of computing resources, but they cannot break the defense of the last unknown IP address, so they will double their computing resources. See if the last unknown IP address can block the attack.
The distant country of Lijian. In some mysterious hall.
A group of middle-aged people, like young people, were shouting and shouting like a noisy vegetable market.
"Mandalay. The other party has increased their invasion resources. We will be unable to stop them. You haven't developed a killer program yet?" a middle-aged man with a beard yelled.
The middle-aged man named Mandalay also responded loudly: "Dawson, you damn bastard! Don't rush! I am analyzing that damn mysterious virus! The killer program for that damn mysterious virus is not that It’s easy to develop! If it’s that easy, do you still need me to take action?”
Through the conversation between Mandalay and Dawson, it can be judged that they are the last security personnel with unknown IP addresses.
"Bullshit Mandalay! Give you one minute! The computing resources of the other party's invasion have increased to 10 million!" Dawson said with a bad attitude.
Mandalay obviously doesn’t like this!
"I know you can stop it! All the servers of the LTTW plan have been handed over to you. How can it still not stop the loose distributed computing resources of 10 million Tflops? Dawson, when did you become that kind of rookie? " Mandalay mocked.
The so-called LTTW program is a top-secret program launched by DARPA.
DARPA recommends that Li Jian build excellent servers around the world and then monitor the entire world's Internet information, even telephone network information.
The full name of this project is "", which means "Listen to the World" in Xia Mandarin. In other words, Li Jianguo is monitoring communications around the world.
To monitor the world's communication information, the computing resources required are huge. In order to smoothly promote the LTTW plan, Li Jian has established a huge private computer network around the world.
With the help of this private computer network, the NSA National Security Agency of the United States was able to implement the LTTW plan and complete the monitoring of information around the world.
Shi Lei's guess was correct. The only thing that could withstand the invasion of 5 million Tflops computing resources was the huge private supercomputer network cluster.
It is indeed impossible for ordinary people to build a private computer network of that level, but Li Jian can. In order to safeguard their own interests and combat hostile forces at the same time, Li Jian has established a global LTTW network!
Now, DARPA has temporarily taken over the LTTW network to fight against Shi Lei's invasion. After all, DARPA's internal network contains a lot of confidential information. Once Shi Lei compromised DARPA's internal network, the consequences would be disastrous!
As for simply taking DARPA's advanced bureau's internal network offline and disconnecting it from the Internet, it is basically impossible.
The internal network of DARPA's Advanced Directorate is not just their internal network. In fact, Li Jianguo's multiple confidential networks all use the internal network of DARPA's Advanced Directorate as a transit point.
Once the internal network of DARPA Advanced Directorate is shut down, all other networks using it as a transit point will be shut down.
Some of these networks involve the core security of Lijian Country!
Including automatic weapons control networks, covering unmanned missiles, drones, etc.
To put it simply, the internal network of DARPA's Advanced Directorate cannot leave the Internet for the time being, at least until other important networks are disconnected from it. It cannot leave the Internet environment.
"Mandalay, how much longer do you want? The LTTW network is under great pressure. Our network interface data is too huge and cannot support it for long!" Dawson asked again.
Mandalay frowned and said: "Give me another three minutes! I'm about to succeed, I need three minutes! Damn it! This bitch! He used such vicious tricks! I It has been analyzed that the other party hides the virus in the source code of the operating system, but uses a special encoding mode, I still need some time to analyze it!"
"You idiot! Five minutes at most! We can only delay you for five minutes at most! Do you know how much computing resources the other party has! They have increased their computing resources to 15 million Tflops, and the LTTW network is beginning to collapse. !” Dawson responded.
Another voice intervened, "Instruct the AFN network to go offline! The BPN network goes offline! The BWSN network goes offline..." The voice that temporarily interrupted said a long series of offline commands.
Those networks are important networks mounted on DARPA's internal network and are protected by DARPA to prevent hackers from invading them.
The AFN network is the automatic weapons control network, while the BPN is the basic power network, and the BWSN is the basic water supply network.
If Shi Lei controls those basic networks, the entire country will be in chaos!
In order to prevent DARPA's internal network from being compromised, Ryan, the head of DARPA's network security, ordered in advance to separate all important networks from DARPA's internal network and enter a short-term closed self-operation state.
On the other hand, Shi Lei and the others are trying to invade DARPA's internal network. They have invested 15 million Tflops of computing resources, but they are still blocked.
"Yizur, invest all your computing resources!" Shi Lei gritted his teeth.
Raphael reminded: "Stone, the other party is blocking our attack by self-destructing the server. It is difficult for us to increase the invasion speed!"
"I know! But I don't care, we must open the last unknown IP address!" Shi Lei said indifferently.
The so-called self-destruction server method is that network security experts from DARPA's Advanced Directorate actively sacrifice the servers of the LTTW network and use information bombs to self-destruct the servers of the LTTW network, thereby temporarily blocking the intrusion of Shi Lei and the others.
This blocking time is very short. After all, the information bomb caused can only block a few seconds in the face of the huge data flow.
However, in a few seconds, DARPA had already won a glimmer of hope!
As long as Mandalay completes the Nemesis virus's killer program, he can use the killer program to clean up the Nemesis virus throughout the Internet world.
Once the Nemesis virus is cleared, the AON network will naturally be broken. Shi Lei has lost huge computing resources and cannot fight against DARPA!
As for DARPA controlling such huge computing resources, why not destroy Shi Lei or other world-leading hackers at other times?
First of all, the computing resources held by DARPA are not specifically used to eliminate hackers, but are used for the LTTW program. At the same time, the world's top hackers are not unable to leave the Internet.
Once it leaves the network, DARPA has no computing resources, and it is impossible to transcend the network and catch the world's top hackers in the real world, right?
"Brother Shitou, we can't break the opponent's defense! According to the current progress and the resilience shown by the opponent, it will take at least half an hour!" Tao Wenxian reminded Shi Lei.
Shi Lei sneered, "Yizur, prepare to execute the AON network to force the seed to explode!"
.(To be continued ~^~)