Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Romance -> hacker

Volume 1 Six Years Ago Final-073 Resources that break through the sky!

Previous page        Return to Catalog        Next page

    Globally, the total number of computer devices infected with the Nemesis virus has exceeded 800 million!

    An exaggerated statistic!

    The Nemesis Virus was Shi Lei's desperate bargaining chip. It was designed to be extremely extreme by Shi Lei and used extremely novel source code hiding methods. Even the world's top hackers would find it difficult to discover the source code of the Nemesis Virus.  ¡Í

    Because Shi Lei hid the source code of the Nemesis virus in the system source code!

    Although the system source code and the source code of the Nemesis virus cannot be exactly the same, the letters that make up the source code are standard and universal.

    Shi Lei designed a new set of syntax to directly call the source code of the operating system to generate the final Nemesis virus, allowing the Nemesis virus to evade all scans, creating a Nemesis virus that is in the computer but not in the computer.  the illusion.

    Although the Nemesis virus is not a disk-level virus, it can be removed by formatting the hard drive and reinstalling the system.

    However, the Nemesis virus is very contagious. Even if the computer system is reinstalled and the Nemesis virus is temporarily eliminated, the environment is filled with the Nemesis virus and you may be infected again anytime and anywhere.

    Therefore, even if the Nemesis virus is temporarily eliminated, it will have no effect!

    July 14th, five minutes past midnight.

    Shi Lei was typing on the keyboard quickly. The Nemesis virus had infected so many computer devices, how could Shi Lei waste it?

    "Yizur, build a unified botnet. How long will it take?" Shi Lei asked Yizuer.

    ??Constructing more than 800 million computer devices into a huge botnet.  If Shi Lei was allowed to complete it alone, it would be an impossible task.

    ? ?Fortunately.  Yizuer can do it!

    The botnet Shi Lei tried to build was essentially no different from the iwn secret network.  However, the basic point of the iwn secret network, iwn colored, is built into the World of Brave client and is directly accepted by players.

    The basis of the botnet is the Nemesis virus!

    So far, the Nemesis virus has not shown any malicious behavior, neither deleting user data nor tampering with user applications.

    therefore.  The reputation of the Nemesis virus is limited to the Internet security community and the network hacker community. It has no reputation among ordinary netizens.

    After all, ordinary users don¡¯t understand what¡¯s so powerful about the Nemesis virus. It seems to be harmless at all. It just installs a useless program in the computer system.

    ?????In the computer system of ordinary users, other software is used.  Are there too many programs installed secretly?

    "Private r, it will take about 30 minutes to complete the global unified botnet. Please wait, the system is configuring detailed parameters." Yi Zuer responded to Shi Lei.

    Even a powerful pseudo-artificial intelligence system like Yizuer can coordinate the processing of more than 800 million computer devices.  It also takes half an hour.

    As time passed by, Shi Lei was not in a hurry.  But wait patiently.  While waiting, Shi Lei established a globally unified botnet.  Choose a nice name.

    All-one-!

    ?Referred to as aon!

    Xia's Mandarin name was named "Yiwang" by Shi Lei, which means "catch them all in one fell swoop".

    At 0:36 in the morning, the aon network construction was completed!

    The virtual transparent screen of the lip lens information processor shows that the number of users accessing the AON network has reached 838,731,902.

    This data is changing anytime and anywhere. Generally speaking, it shows a rapid increasing trend.  After all, the Nemesis virus is constantly infecting computer equipment around the world.

    Shi Lei looked at the data on the total computing resources of the Aon network through the virtual transparent screen of the lip lens information processor.  Suddenly, a rich smile appeared on Shi Lei's face.

    The total computing resources of the aon network can mobilize up to 11 million tflops of computing resources without harming most users!

    That¡¯s right!

    11,000,000tflops!

    The computing resources of the aon network are approximately eleven times that of the iwn secret network!

    Using the simplest conversion method, it can be inferred that it takes 200 hours for the iwn secret network to scan the global Internet, so the aon network can complete the scan of the global Internet in less than 20 hours.

    However, in fact, it does not take 20 hours at all for the aon network to scan the global Internet, or even two hours!

    Because aon?There are fundamental differences between the ? network and the iwn secret network.  The basic point of the aon network, that is, the computer equipment infected by the Nemesis virus, has been scanned once by the aon network and is a normal security target, and is excluded from the scanning scope.

    Therefore, only computer devices that are not infected by the Nemesis virus are the targets of aon network scanning. In addition, the Nemesis virus is assisting and infecting more computer devices. How can it take such a long scan time?  ?

    According to Shi Lei's estimation, in two hours at most, the base points that make up the AON network will exceed 1.2 billion data.  By then, the computing resources of the Aon network have skyrocketed again, and the number of suspected targets around the world has plummeted. There are not many targets that require Shi Lei to explore personally.

    "Yizur, optimize the computing resources of the aon network!" Shi Lei ordered Yizuer to start optimization to reduce latency based on the distribution of computing resources of the aon network.

    Shi Lei turned to look at Tao Wenxian and Raphael and asked, "Have you found anything? How many unknown IP addresses are there in the backlog?"

    Raphael took the initiative to answer: "Nothing has been found yet! There is a backlog of more than a thousand unknown IP addresses, and we are processing them quickly."

    "Forget it, let me do it!" Shi Lei didn't say much. He controlled the computing resources of the Aon network. With the assistance of Yi Zuer, he began to scan the unknown IP addresses found in the needle-in-a-haystack plan.

    The aon network has gathered more than 11 million tflops of computing resources, and it is increasing rapidly every minute and every second. When Shi Lei controlled the computing resources of the aon network and began to deal with the needle-in-a-haystack plan and discovered the unknown-level IP address, he had accumulated more than  More than 1,000 unknown IP address records were quickly identified.

    Tao Wenxie and Raphael looked a little dazed!

    Although the two of them understood that Shi Lei must have done something earth-shattering, the current situation seemed to be a bit too exaggerated?

    Tao Wenxian couldn't help but asked: "Brother Shitou, what on earth did you do?"

    Shi Lei snapped his fingers and ordered: "Yizur, share the information!"

    Yizuer immediately shared the AON network information with Raphael and Tao Wenxian through the virtual transparent screen of the lip lens information processor.

    The two of them were stunned when they looked at the Aon network, which had gathered more than 11 million tflops of computing resources!

    Isn¡¯t this an illusion?

    Especially Raphael, who has become the world¡¯s top hacker longer than Tao Wenxian, and he knows more ¡®common sense¡¯ information.

    Among the world's top 500 supercomputers announced in June 2008, the number one ranking was a supercomputer named Roadrunner manufactured by IBM.

    This supercomputer named after the ¡®Clown in the Desert¡¯ has a stable computing speed of 1026tflops and a peak computing speed of 1026tflops.

    The computing resources gathered by the aon network are equivalent to more than 10,000 supercomputers, the world's number one supercomputer.  Although it is only a loosely distributed computing resource, that level of computing resources is still terrifying!

    "Raphael, am I hallucinating?" Tao Wenxian said involuntarily.

    Raphael shook his head, and then flicked Tao Wenxian's eyebrows, "If you are hallucinating, I must be hallucinating too. However, I think we are definitely not hallucinating."

    Having said this, Raphael looked at Shi Lei and asked, "Stone, this is"

    Shi Lei nodded and affirmed: "Yes! This is the super virus I created! A super virus that simulates iwn-ed. With these computing resources, we can discover the real IP address of Butler's parent server before dawn!"

    Tao Wenxian swallowed, "Then we still implement the plan of finding a needle in a haystack?"

    Shi Lei glanced at Tao Wenxian. He knew what Tao Wenxian meant, which was that he wanted to act together with the Aon Network instead of continuing to implement the plan of finding a needle in a haystack.

    However, according to the current situation, the needle-in-a-haystack plan can indeed be suspended, and the Aon network will perform the remaining tasks.

    "Let's control the AON network operations together!" Shi Lei said.

    Tao Wenxian nodded excitedly, "Great, Brother Shitou, we won't have to wait too long to find Butler!"

    The three first integrated the iwn secret network and the aon network to form a cluster of distributed computing networks, and then mobilized all computing resources to scan the Internet space that had not yet been scanned.

    Yizuer gave an estimate of the time, and it would only take up to one hour to complete the scan of the global Internet.  By that time, 99.9 percent of network IP addresses will be excluded.

    The remaining target is Butler¡¯s hiding place!

    ThisThis time, it was absolutely impossible for Butler to escape again.  After all, the plan implemented by Shi Lei was to find a needle in a haystack. Shi Lei had turned the entire Internet world upside down. Could it be that Butler still couldn't be found?

    That is absolutely impossible!

    No matter how good Butler¡¯s hiding ability is, he can¡¯t escape Shi Lei¡¯s search!.

    (To be continued, please search Piaotian Literature, the novels will be better and updated faster!
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report