Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Romance -> hacker

Volume 1 Six Years Ago Final-075 Forced Seed Explosion!

Previous page        Return to Catalog        Next page

    The needle in the haystack plan was completed, and in the end there was only one unknown IP address left.  ¡òMoreover, Shi Lei invested 5 million tflops of computing resources and was actually resisted!

    Although the computing resources gathered by the aon network and the iwn secret network are all loosely distributed computing resources, they are on the order of five million. How can they be resisted?

    Even if intensive distributed computing resources are used, nearly one million computing resources are needed to be able to withstand it.

    However, a supercomputer cluster with millions of private computing resources is simply a fantasy!

    Shi Lei really couldn't imagine what kind of force could resist such a huge computing resource combined attack.

    etc!

    Shi Lei thought of a possibility!

    The origin of the Internet, the starting point of the modern Internet, is known as the most mysterious organization in Lijian, referred to as the "Advanced Bureau", the Darpa Advanced Research Project Bureau!

    According to rumors, Darpa has a lot of resources and very high authority. Even the National Security Agency of NSA needs to follow the instructions of Darpa Advanced Bureau when necessary.

    In short, Darpa is the boss of the National Security Agency of the NSA, the boss of the FBI and the CIA.

    The last unknown IP address, only darpa, can resist Shi Lei's invasion.

    It¡¯s just that darpa¡¯s network IP address is not a hidden IP address, but a published one.  And invasion is welcome anytime and anywhere.

    In view of this situation, Shi Lei is not sure.  The last unknown IP address is owned by darpa.

    Although I don¡¯t know the answer.  However, whether he knew the answer or not, for Shi Lei, it was actually the same.

    Because, no matter whether the last unknown IP address is a darpa advanced bureau or not, Shi Lei will completely break its defense and investigate it thoroughly.

    Unless, the last unknown IP address.  Just like the previous seven unknown IP addresses, the connection to the Internet is directly disconnected.

    But Shi Lei knew that such a situation was absolutely impossible!

    In the global Internet world, Shi Lei has scanned all IP address information, leaving only the last unknown IP address. The other IP addresses have been excluded by Shi Lei.

    "Increase computing resources!" Shi Lei ordered, "Double it!"

    Now.  Shi Lei and the others used 5 million tflops of computing resources, but were unable to break the defense of the last unknown IP address, so they doubled their computing resources and looked at the last unknown IP address.  Can it block the attack?

    ??In a mysterious hall in the distant country of Lijian.

    A group of middle-aged people, just like young people.  They were shouting and shouting like a noisy vegetable market.

    "Mandalay. The other party has increased its invasion resources, and we will be unable to stop it. You haven't developed a killer program yet?" a middle-aged man with a beard yelled.

    The middle-aged man named Mandalay also responded loudly: "Dawson, you damn bastard! Don't rush! I am analyzing that damn mysterious virus! The killer program for that damn mysterious virus is not that  It¡¯s easy to develop! If it¡¯s that easy, do you still need me to take action?¡±

    Through the conversation between Mandalay and Dawson, it can be judged that they are the last security personnel with unknown IP addresses.

    "Bullshit Mandalay! Give you one minute! The computing resources invaded by the other party have increased to 10 million!" Dawson said with a bad attitude.

    Mandalay obviously doesn¡¯t like this!

    "I know you can stop it! All the servers of the lttw plan have been handed over to you. Can't you still stop the loose distributed computing resources of 10 million tflops? Dawson, when did you become that kind of rookie?  " Mandalay mocked.

    The so-called lttw plan is a top-secret plan launched by darpa.

    Darpa recommends that Li Jian build excellent servers around the world, and then monitor the entire world's Internet information, and even telephone network information.

    The full name of this project is ¡®Listen to the World¡¯ in Xia Mandarin.  In other words, Li Jianguo is monitoring communications around the world.

    Wanting to monitor communications around the world requires huge computing resources. In order to smoothly promote the lttw plan, Li Jian has established a huge private computer network around the world.

    With the help of this private computer network, the National Security Agency of the United States of America was able to implement the lttw plan and complete the monitoring of information around the world.

    Shi Lei¡¯s guess was correct.?The only thing that can withstand the invasion of 5 million tflops computing resources is the huge private supercomputer network cluster.

    It is indeed impossible for ordinary people to build a private computer network of that level, but Li Jian can. In order to protect their own interests and fight against hostile forces, Li Jian has established a global lttw network!

    Now, darpa has temporarily taken over the lttw network to fight against Shi Lei's invasion.  After all, Darpa's internal network contains a lot of confidential information. Once Shi Lei captures Darpa's internal network, the consequences will be disastrous!

    As for simply letting darpa access the internal network of the bureau and directly go offline and disconnect from the Internet, it is basically impossible.

    The internal network of darpa advanced bureau is not just their internal network.  In fact, Li Jianguo's multiple confidential networks all use the internal network of the Darpa Advanced Bureau as a transit point.

    Once the internal network of the darpa advanced bureau is shut down, all other networks using it as a transit point will be shut down.

    Some of these networks involve the core security of Li Jian!

    ?Including automatic weapons control networks, covering unmanned missiles, drones, etc.

    To put it simply, the internal network of the Darpa Advanced Bureau cannot leave the Internet for the time being, at least until other important networks are disconnected from it. It cannot leave the Internet environment.

    "Mandalay, how much longer do you want? The lttw network is under great pressure. Our network interface data is too huge and cannot support it for long!" Dawson asked again.

    Mandalay frowned and said: "Give me another three minutes! I'm about to succeed, I need three minutes! Damn it! This bitch! He used such vicious tricks! I  It has been analyzed that the other party hides the virus in the source code of the operating system, but uses a special encoding mode, I still need some time to analyze it!"

    "You idiot! Five minutes at most! We can only delay you for five minutes at most! Do you know how much computing resources the other party has! They have increased their computing resources to 15 million tflops, and the lttw network is beginning to collapse.  !" Dawson responded.

    Another voice came in, "Instruct the afn network to go offline! The bpn network goes offline! The bwsn network goes offline" The voice that temporarily interrupted said a long series of offline commands.

    Those networks are important networks mounted on the internal network of darpa. They are usually protected by darpa to prevent hackers from intruding.

    The afn network is the automatic weapons control network, the bpn is the basic power network, and the bwsn is the basic water supply network.

    If Shi Lei controls those basic networks, the entire country will be in chaos!

    In order to prevent darpa¡¯s internal network from being compromised, darpa network security director Ryan ordered all important networks to be separated from darpa¡¯s internal network in advance and enter a short-term closed self-operation state.

    On the other hand, Shi Lei and the others are trying to invade Darpa's internal network. They have invested 15 million tflops of computing resources, but they are still blocked.

    "Yi Zuer, invest all your computing resources!" Shi Lei gritted his teeth.

    Raphael reminded: "Stone, the other party is blocking our attack by self-destructing the server. It is difficult for us to increase the invasion speed!"

    "I know! But I don't care, we must open the last unknown IP address!" Shi Lei said indifferently.

    The so-called self-destruction server method is that the network security experts of the Darpa Advanced Bureau actively sacrificed the lttw network server and used information bombs to self-destruct the lttw network server, thereby temporarily blocking the intrusion of Shi Lei and the others.

    This blocking time is very short. After all, the information bomb caused can only block a few seconds in the face of the huge data flow.

    However, within a few seconds, Darpa had already won a glimmer of hope!

    As long as Mandalay completes the Nemesis Virus¡¯s killer program, he can use the killer program to clean up the Nemesis Virus in the entire Internet world.

    Once the Nemesis virus is cleared, the Aon network will naturally be broken without any attack. Shi Lei will lose his huge computing resources and it will be impossible to fight against Darpa!

    As for Darpa¡¯s control of such huge computing resources, why not destroy Shi Lei or other world-leading hackers at other times?

    First of all, the computing resources controlled by darpa are not exclusively used to eliminate hackers, but are used for the lttw plan.  At the same time, the world's top hackers are not unable to leave the Internet.

    Once it leaves the network, Darpa has no computing resources, and it is impossible to transcend the network and catch the world's top hackers in the real world, right?

    "Brother Shitou, we can't fight?The opponent¡¯s defense!  According to the current progress and the resilience shown by the other party, it will take at least half an hour!  "Tao Wenxian reminded Shi Lei.

    Shi Lei sneered, "Yizur, prepare to execute the AON network to force the seed to explode!".

    (To be continued, please search Piaotian Literature, the novels will be better and updated faster!
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report