Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Romance -> hacker

Volume One Six Years Ago Final-074 Destruction and Resistance!

Previous page        Return to Catalog        Next page

    Xia Kingdom time, July 14th, 1:40 in the morning.  ¡ó¡ý

    The virtual transparent screen of the lip lens information processor shows that the plan to find the needle in the haystack has been completely completed, leaving less than 10,000 unknown IP addresses that have not yet been analyzed.

    At the same time, the base points of the Aon network have accumulated to 1,389,200,186!

    This number once again exceeded Shi Lei's estimate of 1.2 billion.  Nearly 1.4 billion computer devices infected with the Nemesis virus provide 18 million tflops of computing resources for the Aon network.

    Under the impact of such huge computing resources, less than 10,000 unknown-level IP addresses were almost completely analyzed in just five minutes, leaving less than ten unknown-level IP addresses.

    The real IP address of Butler¡¯s parent server is hidden in it!

    Although the aon network has 18 million tflops computing resources, the iwn secret network also has more than 1 million tflops computing resources.

    There are so many, sky-breaking computing resources, and the analysis of the remaining unknown-level IP addresses cannot be completed quickly, which only shows that the remaining ones are all hard-core.

    The best way is to analyze them one by one!

    With the computing resources of aon network and iwn secret network, it is definitely not a problem to defeat the remaining IP addresses one by one.

    Tao Wenxian and Raphael obviously understood this truth, and they were waiting for Shi Lei to make a choice.

    Shi Lei counted the remaining IP addresses and found that there were only eight unknown IP addresses in total. Shi Lei did not choose them specifically.  He pointed directly at the first unknown IP address and said with a smile: "Let's start from the beginning!"

    "Okay!" Tao Wenxian and Raphael said in unison.

    The three began to invade the first unknown IP address.  At the beginning, all computing resources were not directly mobilized.  after all.  They have too many computing resources, and if they are used indiscriminately, they can easily cause network congestion.

    That¡¯s not the result Shi Lei needs!

    Shi Lei does not want to destroy things, what Shi Lei needs is answers!

    In their first attack, the three used 5 million tflops of computing resources. Such huge computing resources overwhelmed the opponent's defense as soon as they came into contact with it.

    Then we encountered another obstacle!

    However, Shi Lei already knew.  The identity information of this unknown IP address is the internal network of the NSA National Security Agency!

    Shi Lei has always been cautious and vigilant, never provoking the National Security Agency of the National Security Agency or the Advanced Development Bureau of the Darpa.  To the greatest extent, it is just playing with the CIA and the FBI.

    In normal times, after confirming that the other party was the internal network of the National Security Bureau of the National Security Agency, Shi Lei would have quietly retreated and cleaned up all traces of the intrusion.

    So, a cybersecurity expert from the National Security Agency of the National Security Agency.  They will also choose not to follow the situation, thus avoiding a pointless battle.

    "But Shi Lei now controls the aon network and iwn secret network, and has gathered nearly 20 million tflops of computing resources. How can he easily retreat?"

    Even the NSA National Security Agency.  It was obviously not the target, but Shi Lei still had no intention of retreating.

    "Come in and take a look, scan it. See if the NSA guy knows any information about Butler!" Shi Lei ordered.

    Tao Wenxian and Raphael cooperated with Shi Lei to invade.  With the help of huge computing resources, it is almost overwhelming.  Cracked the National Security Agency's defenses.

    It¡¯s not that the NSA¡¯s defense is too rubbish, nor is it that the NSA¡¯s network security experts are too novices, it¡¯s that Shi Lei and the other three are too unreasonable!

    They directly used huge computing resources, ran rampant unreasonably, and easily defeated the NSA National Security Agency's defense.

    There is a lot of turmoil within the NSA National Security Agency at the moment!

    As the largest intelligence agency in the United States, the National Security Agency's confidentiality level is extremely high, otherwise it would not be ridiculed as "no."

    Shi Lei and the other three broke through the NSA National Security Bureau's defense, and when they were about to scan data within the National Security Bureau, they suddenly discovered that they could not connect to the NSA National Security Bureau's internal network.

    Tao Wenxian sarcastically said: "The National Security Agency of the National Security Agency disconnected the physical connection of the network. It is simply a shame!"

    Raphael did not have too many surprises. "The National Security Agency of the National Security Agency has recorded many black operations of powerful countries. It is normal to disconnect network links. They cannot allow us to do whatever we want in their internal network."  Scanning detection. However, the other party disconnected the physical connection from the Internet, which shows that Butler is not hiding in it."

    Shi Lei confirmed Raphael's statement, "Well! Butler is not under the protection of the NSA National Security Agency! EnterCrack the second unknown IP address!  "

    The National Security Bureau of the National Security Agency has temporarily avoided the front, and Shi Lei is not in any excited mood.  If it were in the past, Shi Lei might still be proud.

    But when the lives of Ling Yumo and the others were threatened, Shi Lei had no intention of being so proud!

    For the second unknown-level IP address, Shi Lei and the others still mobilized 5 million tflops of computing resources to try to invade.  Just like the previous history of the National Security Agency of the NSA, the huge computing resources easily broke through the opponent's defense.

    Shi Lei determined the identity of the other party immediately.

    It turned out to be Xia Guo¡¯s Cyber ??Security Intelligence Department!

    Tao Wenxian obviously also confirmed the target's identity information. He asked: "Brother Shitou, it's S. Do we want to retreat?"

    After all, the two of them are from Xia. At the same time, Mirui Technology Group still wants to develop in Xia. It seems not very good to blatantly invade the S Network Security Intelligence Department, right?

    However, although the target of the invasion was Xia State's Network Security Intelligence Department, Shi Lei only hesitated for a moment before deciding to continue the invasion.

    "Continue the attack!" Shi Lei said coldly.

    Huge computing resources bring extremely powerful intrusion power.  s Network Security Intelligence Department could not stop the invasion of Shi Lei and the others.

    " However, the countermeasures used by the Cyber ??Security Intelligence Division are exactly the same as those of the National Security Agency, which directly disconnects the physical connection to the Internet.

    Shi Lei did not sincerely want to invade the S Network Security Intelligence Department, he just wanted to eliminate the suspicion of the S Network Security Intelligence Department.

    ¡° As long as the S Network Security Intelligence Department physically disconnects from the Internet and eliminates the suspicion of Butler hiding in it, Shi Lei will not cause trouble to the S Network Security Intelligence Department again.

    "The third one!" Shi Lei said directly.

    ¡­¡­

    The three of them invaded seven unknown-level IP addresses in a row, and none of them was the real IP address of Butler's parent server, only the last one was left!

    Shi Lei took a deep breath, although according to theory, this one must be the real IP address of Butler's parent server!

    But Shi Lei felt a hint of worry in his heart!

    Raphael also frowned. In the situation of choosing one out of eight, although it is a choice from beginning to end, it is too sad that the first seven are not selected?

    Tao Wenxian opened his mouth, as if he wanted to say something, but in the end he didn't say anything.

    "Stone, are we starting an invasion?" Raphael reminded.

    Shi Lei nodded heavily, "Okay!"

    "How many computing resources are used?" Raphael asked.

    "It's the same!" Shi Lei said simply. The so-called "the same" means that the computing resources of 5 million tflops are still mobilized. The first seven unknown IP addresses were all defeated by the computing resources of 5 million tflops.

    The last unknown-level IP address still uses 5 million tflops of computing resources as the basic intrusion data.

    However, the all-conquering intrusion was blocked at the eighth unknown IP address!

    That¡¯s right!

    The computing resources of 5 million tflops were actually resisted!

    Although the computing resources of 5 million tflops are not all the resources of the aon network and iwn secret network, they are still a huge and irresistible computing resource.

    This fact has been verified for the first seven unknown IP addresses.  Even the NSA National Security Agency cannot withstand 5 million tflops computing resources!

    However, the huge and invincible computing resources were really blocked. From what channel did the other party obtain the computing resources?

    The current situation is that the Nemesis virus released by Shi Lei has infected more than 1.4 billion computer devices worldwide. Almost 90% of computer devices worldwide are infected with the Nemesis virus.

    This also means that Shi Lei controls the vast majority of computer equipment around the world and has collected almost all the computing resources that can be collected.

    Even if other people have the same technology as Shi Lei and can create a super virus like the Nemesis virus, there will be no computer equipment for infection.

    Shi Lei didn¡¯t understand why the eighth unknown IP address could withstand their attack?

    ?? Could it be that the eighth unknown IP address has a private supercomputer cluster with more than 1 million tflops of computing resources?

    Shi Lei doesn¡¯t believe this situation at all!

    The cost of a supercomputer is not only the cost of parts, but also huge maintenance costs.  When a supercomputer is running, itRequires very high maintenance costs.

    If you want to maintain a supercomputer cluster with computing resources of 1 million tflops, the cost investment is simply appalling.

    Shi Lei absolutely does not believe that is possible!

    But if it weren¡¯t for the private supercomputer cluster, what would have happened to resist Shi Lei¡¯s invasion?.

    (To be continued, please search Piaotian Literature, the novels will be better and updated faster!
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report