The needle-in-a-haystack plan is the only solution that can discover the real IP address of Butler's parent server. ¡Ü
Although this plan will consume huge resources, Shi Lei doesn't care!
Shi Lei only cares about whether the real IP address of Butler's parent server can be discovered, and when the real IP address of Butler's parent server can be discovered.
Shi Lei¡¯s confidante has entered Death¡¯s sight. If he wants to save them all, he must race against time against Death.
Especially Ling Yumo, she now only has less than 115 hours left to live!
Yizuer launched the needle-in-a-haystack plan, and the logic analysis program has been started to analyze every IP address in the Internet world, as well as the subnets under the IP address, etc.
The most important thing about the needle in the haystack plan is the grading system!
The so-called grading system is to classify IP addresses within the Internet into different categories, and to divide different levels of attention according to different levels.
Through the grading system, the workload of the needle-in-a-haystack plan is effectively reduced. Just like the work of screening soybeans, if black beans are mixed in, the black beans must be eliminated first.
Now, the classification system of the needle in the haystack plan is to classify different IP addresses and which users they belong to. According to the restrictions set by Shi Lei, the classification system will first exclude IP segments of individual users, and then exclude IP segments related to known institutions, enterprises, government departments, etc.
After excluding the IP segments of individual users, commercial users and government agencies, the remaining IP addresses that need to be analyzed are greatly reduced.
Through the grading system. The workload of finding a needle in a haystack can be reduced at least in half!
IP addresses that are not excluded. They will also be graded. Classify according to the level of threat, from low to high. Safe level, unknown level, and suspect level respectively.
??Among them, the security level is 100% certain. It is definitely not the real IP address of Butler's parent server, so it will be placed in the security level.
The unknown level means that after Yizuer¡¯s preliminary scan, if the situation cannot be determined, it will be classified into the unknown level. Because, after Yizuer's preliminary scan, the situation cannot be determined, and if Yizuer carries out further scanning tasks. More computing resources will be required, slowing down the overall progress of finding the needle in the haystack.
In order to avoid such a situation, Shi Lei set up the discovery of unknown IP addresses, directly listed them as unknown, notified the system administrator, and the system administrator personally scanned and analyzed them.
The last level of suspicion is that after Yizuer conducted a preliminary scan, he directly found the IP address, which may be the real IP address of Butler's parent server.
The number of suspects. It will definitely not be too much. Setting this level is just a precaution!
"The grading system has been constructed, and the needle-in-a-haystack plan has officially begun!" Yizuer reminded again.
? Inside the virtual transparent screen of the lip lens information processor. It shows that the plan to find the needle in the haystack has officially begun. The first screening area for the needle in the haystack plan was chosen by Shi Lei in Lijian Country!
After all, no matter the organization. Or the Council of Angels, both of which are rooted in the Lijian Kingdom. In another life journey. Shi Lei knew that Abertir's mother server was there. It is located in Lijian Country.
The computing resources gathered by the iwn secret network all poured into Lijian Country through the private neutrino communication network of Mirui Technology Group, and began to scan the entire Internet world of Lijian Country.
More than 1 million tflops of computing resources poured into the Internet world of the United States, almost scaring the CIA and the FBI's cybersecurity department to the point of peeing!
With such huge computing resources, neither the CIA nor the FBI can guarantee that they can 100% stop it.
Even those computing resources are only loosely distributed computing resources. When loosely distributed computing resources are gathered to a certain extent, it is still very scary.
Fortunately!
The cybersecurity departments of the CIA and the FBI found that the millions of computing resources pouring into the country's cyber world were just scanning cyberspace and did not seem to have any intention of causing damage. They were temporarily relieved. tone.
Lijian is a democratic and open country, at least on the surface!
Whether it is the CIA, the FBI, their boss, the National Security Agency, or even the eldest brother, the Darpa Advanced Bureau, their internal networks all have access points in the Internet world, and they are even open to the public. 's access point.
??All well-known hackers know the access points to their internal networks.
Including the Li Jian government¡¯s network, as well as the military¡¯sThe Internet, the gateway to the Internet world, is no secret. The server that actually stores shady data must be in an environment that is isolated from the Internet, and there may not even be electronic data.
Therefore, the cybersecurity departments of the Central Intelligence Agency and the FBI were relieved when they discovered that millions of computing resources were pouring in just to search for IP address information in the online world.
If the actual controller of this million-level computing resource wants to conflict with Li Jian, or wants to steal Li Jian¡¯s confidential information, it is absolutely impossible to scan IP address information in the online world. Roll up your sleeves directly to hit the determined target.
Now, the behavior of millions of computing resources clearly illustrates one thing. Millions of computing resources are looking for hidden targets, and it should be a personal grudge, not to steal the official confidential information of Li Jian.
Such analysis results make experts from the CIA, the FBI, and the cybersecurity department feel at ease, but they are also secretly worried.
After all, millions of computing resources have rushed into Li Jian¡¯s online world. Even if they don¡¯t show any malicious intent for the time being, what if they do?
No one can guarantee whether the other party is malicious, right?
In order to prevent millions of computing resources from invading official networks of powerful countries, or even military networks, the CIA and the FBI began to prepare countermeasures.
If Shi Lei knew about their concerns, Shi Lei would definitely sneer and ridicule them. How could Shi Lei waste time and computing resources to invade Li Jian's network system?
? ? ? ? ? ? ? ? ? ? ? ? ? ? ?
Shi Lei's time is so precious. Under such circumstances, it is absolutely impossible to waste time with them!
"Brother Shitou, 27 unknown IP addresses have been marked. Which one should we start analyzing from?" Tao Wenxian asked Shi Lei.
"Just these two!" Shi Lei directly selected two of the addresses as the first batch of unknown IP addresses that were first selected for manual analysis.
Tao Wenxian looked puzzled. Did Shi Lei choose two addresses at random?
Raphael explained on behalf of Shi Lei: "Both IP addresses are from New York!"
Tao Wenxian coughed. He obviously had no interest in memorizing the location of the IP address. Anyway, it is not difficult to investigate the actual address corresponding to the IP address. Why do we need to memorize it?
In order to cover up his embarrassment, Tao Wenxian ordered: "Yizur, mark all unknown IP addresses with their places of origin."
Shi Lei did not make fun of Tao Wenxian. After all, there were no regulations stating that the world's top hackers needed to record the ownership of IP addresses.
Of course, quite a few hackers will indeed record the location of the IP address, so that they can directly and quickly determine the region to which the IP address belongs.
Shi Lei chose two IP addresses in New York City mainly because the parent server of the Angel Council's Abertiel is located in New York City.
Don¡¯t think that New York City is too prosperous and the goal is too big, so the Chaos Snake will not put Butler¡¯s mother server in New York City.
In fact, such a possibility exists!
As the saying goes, a great hideaway is hidden in the city!
What if Butler¡¯s parent server is in New York City?
No one can be sure of the answer to this question until the final result comes out!
Shi Lei and the others quickly scanned and analyzed two unknown-level IP addresses. One of the unknown-level IP addresses was hacked by three people. They found that the unknown-level IP address was a well-defended cross-border website that mainly provided privacy for overseas users. Love action art movie download service.
Shi Lei was very kind and did not tamper with the other party's data server. After all, such a good person has served too many otakus in need, and he cannot cut off the benefits of otakus, right?
The two unknown IP addresses selected by Shi Lei had nothing to do with Butler. Shi Lei was not surprised at all by this result.
If it was so simple to discover Butler's real IP address, why would Shi Lei need to go to war?
With no results for the first target, Shi Lei and the others began to analyze each unknown IP address. As the three of them and Yizuer worked simultaneously, one IP address after another was cracked, but still no answer was obtained.
Shi Lei took the time to look at the implementation progress of the needle in the haystack plan. It was now half past twelve and the needle in the haystack plan had been implemented for half an hour, but the implementation progress was very pitiful!
The first screening area of ??the needle-in-a-haystack plan was Lijian Country. In half an hour, the screening progress was only less than 3%.?
This means that it is just a Lijian country. If you want to completely traverse every IP address in the Lijian country¡¯s online world, it will take at least 20 hours!
The entire world is so large, the real IP address of Butler¡¯s parent server may exist in network space anywhere.
How could Shi Lei have so much time to search slowly, area by area?
To put it simply, the computing resources Shi Lei has are still not enough!.
(To be continued, please search Piaotian Literature, the novels will be better and updated faster!