Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Romance -> hacker

Volume 1 Six Years Ago Final-063 Nothing can be done!

Previous page        Return to Catalog        Next page

    In the battle with Butler, Shi Lei initially chose a conservative plan, trying to win Butler silently.  ¡­¨Q

    But that was obviously just Shi Lei's fantasy!

    Butler owns the supercomputers amodule n13 and amodule n14, with a total of 1700tflops of intensive distributed computing resources. Butler is already in an invincible position!

    After careful consideration, Shi Lei had to choose to give it a go and mobilize all the iwn secret network computing resources to fight head-on with Butler.

    Shi Lei¡¯s decision to give it a try may be the right one!

    Because Shi Lei and the other three have ion13 defense power!

    Supercomputer a n13 was broken through the defense by the massive computing resources of the iwn secret network, and then the self-protection mechanism was activated and automatically restarted.

    Based on the computing resources owned by the supercomputer amo n13, reverse inference analysis shows that it requires at least 20 minutes of startup and self-test time.

    In other words, within twenty minutes, it is impossible for the supercomputer A to N13 to join the battle sequence again. The computing resources available to Butler have been reduced by 500tflops, leaving only 1200tflops.

    Although it seems that Butler's strength has been weakened to a limited extent, it is not that he has no power to fight.  However, don¡¯t forget that the massive computing resources provided by iwn Secret Network have not been reduced at all.

    When the strength of one party decreases, although the strength of the other party does not increase, it is equivalent to an increase in disguise!

    "Finney Jazz, kill the other supercomputer in one go! Isolate Butler completely!" Shi Lei ordered.

    By giving it a go attack.  Shi Lei determined that the supercomputers a-mod n13 and a-mod n14 were not Butler's parent servers.

    Butler¡¯s parent server.  Hidden elsewhere, but Butler's mother server, is definitely connected to the supercomputer AMOUN14.

    Only when the parent server is linked to the supercomputer amodon14, can Butler control the supercomputer amodon14 and other servers.

    Supercomputer A touch n14, equivalent to Butler's last fortress!

    If supercomputer A and N14 also fall, Butler¡¯s trump card will be completely revealed, the true IP address of the parent server.  will also emerge.

    As long as Shi Lei grasps the real IP address of the parent server, it is not a problem at all to find the corresponding real address.

    Once Shi Lei is in the real world and visits Butler's parent server, it is definitely not difficult to obtain Butler's internal information.

    The defense strength of the pseudo-artificial intelligence system is indeed very tight, but that is only for the situation of intrusion from the outside.  Suppose Shi Lei has a chance.  Direct contact with the parent server where Butler is located means direct contact with the hardware system hosting Butler.

    According to Shi Lei¡¯s skills, he wants to break Butler¡¯s defense. In fact.  It¡¯s not too difficult!

    "Okay!" Tao Wenxian responded with high spirits.

    Raphael also said with a smile: "No problem! The one with relatively few computing resources has been killed by us, and the rest is just a dead lip!" Raphael said an idiom from the Xia Kingdom  .  Very aptly described.

    Supercomputers A-touch N13 and A-touch N14 are interdependent, and now supercomputer A-touch N13 has fallen.  It is really difficult for the supercomputer A to n14 to compete with the massive computing resources provided by Shi Lei and the iwn secret network.

    ? 51,000tflops loose distributed computing resources captured from the iwn secret network.  Under the control of Shi Lei and the others, they once again pounced on the supercomputer A touch n14.

    The defense system of supercomputer A-touch n14 struggled to resist the intrusion of Shi Lei and the others. The defense system was constantly being broken through. Shi Lei estimated that supercomputer A-touch n14 would be stuck in a restart in three minutes at most.

    Shi Lei's face showed a smile involuntarily!

    Tao Wenxian and Raphael naturally looked happy!

    However, the smile on Shi Lei's face froze immediately before it lasted for a minute!

    Because, on the computer screen, the ion14 information is displayed.

    There is only one possibility for such a situation to happen!

    Supercomputer a n14, offline!

    Supercomputer A touched n14, and was directly disconnected from the Internet by Butler in the most brutal way, causing the iwn secret network attack to lose its target.

    Since supercomputer a-n14 is offline, it is naturally impossible for Shi Lei to hack into supercomputer a-n14, nor can he obtain Butler's real IP address, nor can he obtain the actual address of Butler's parent server.

    In short, stone??Attempting to obtain information about the Snake of Chaos in the field of biological genes through Butler was a complete failure!

    Butler turned out to be just like Shi Lei expected, the worst-case scenario, and retreated without any contact with Mirui Technology Group at all.

    Under such circumstances, it was as difficult for Shi Lei to find Butler as finding a needle in a haystack.

    The real IP address of Butler's parent server is uncertain. How could Shi Lei directly invade Butler in the Internet world?

    "Don't think that Shi Lei is like a god who controls the wind and rain in the online world. He can do whatever he wants and love.

    Although this is also true, Shi Lei is indeed a god in the online world!

    But this does not mean that Shi Lei can invade as he pleases.  As I said before, if you want to invade a target in the online world, you first need to have that target exist and know the exact target address.

    For example, Shi Lei wanted to invade the CIA's internal system.  First of all, Shi Lei has determined that the target of the intrusion is the internal system of the CIA. Secondly, Shi Lei knows where the internal system of the CIA exists.

    Because he knew these contents, Shi Lei could successfully invade!

    If Shi Lei didn't know anything, or in other words, the CIA's internal system did exist on the Internet, but it was not published or linked to the CIA's official website, then how could Shi Lei hack into it?  Woolen cloth?

    Usually, when hackers invade targets, except for special fixed targets, they are actually random targets.  Because a considerable number of hackers are randomly roaming around the Internet, searching for the networks and computer systems hidden in the dark side of the Internet.

    When they find networks and computer systems of interest, they will try to intrude.

    If Shi Lei wanted to invade Butler's parent server, he would probably use this method.  However, Shi Lei was a specific target, not a random target.

    How should we deal with it so that we can search for Butler¡¯s existence in the Internet world?

    As for whether Butler will disconnect from the Internet on his own initiative, Shi Lei is not worried.  Because if the pseudo-artificial intelligence system wants to disconnect from the Internet, or restore the connection to the Internet when the Internet is disconnected, it requires real-time authorization from the super administrator.

    Butler¡¯s super administrator is the Snake of Chaos, and the Snake of Chaos is finished. Butler cannot obtain real-time authorization from the Snake of Chaos, and naturally cannot disconnect from the Internet.

    Otherwise, what Butler did just now was not to abandon the supercomputer A-Mo n14, but to actively disconnect from the Internet.

    However, although Butler will not actively disconnect from the Internet, Shi Lei wants to find Butler's real IP address, which is indeed a needle in a haystack No!

    It should be, looking for a specific drop of sea water in the sea!

    Because there is no difference between Butler¡¯s real IP address and the real IP address of ordinary users. In the Internet world, they are exactly the same.

    Unless Shi Lei scanned Butler's real IP address and tested it, he could find out that it was Butler's real IP address.

    Otherwise, it would be impossible for Shi Lei to discover it!

    A problem of this magnitude is already an unsolvable situation within an unsolvable situation!

    If there is no time limit, Shi Lei can slowly scan randomly on the Internet and try his luck to find Butler's real IP address.

    Whether you can find it or not, it¡¯s just a matter of luck. There is no time limit anyway.

    But the situation is different now!

    The current situation is that the unknown genetic toxin in Ling Yumo's body will explode in about five days. Without the relevant antidote, Ling Yumo will undoubtedly die.

    In other words, Shi Lei must discover Butler's real IP address within five days, crack Butler's system, obtain the relevant technical information about the Snake of Chaos in the field of biological genes, and then hand it over to Jian Wushuang to develop the antidote.

    Is it possible to accomplish so many things in just five days?

    It seems impossible!

    Even if the possibility is very low and the chance of success is extremely slim, Shi Lei still has to try his best to fight.  Shi Lei was afraid of losing Ling Yumo and the others. If they really became memories, they would haunt Shi Lei for the rest of his life!

    Shi Lei doesn¡¯t want that ending!

    Such a powerful Snake of Chaos has been defeated, can't he still defeat Butler?

    ? ???Yes, in the current situation, it seems that there is really nothing we can do. It seems that we really can't catch Butler's real IP address!.

    (To be continued, please search Piaotian Literature, the novels will be better and updated faster!
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report