Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Romance -> hacker

Volume 1 Six Years Ago Final-076 Impossible!  !  !

Previous page        Return to Catalog        Next page

    The foundation of the aon network comes from computer equipment infected with the Nemesis virus, not computer equipment with the World of Brave client installed.  ¡À

    The way aon network extracts computing resources is basically the same as the way iwn secret network extracts computing resources.

    So far, the amount of computing resources captured by the Aon network is very, very restrained. Without affecting the normal use of computer users, it captures 80% of the remaining resources of the computer system, leaving 20% ??of the computing resources.  resources to respond to the unexpected needs of computer users.

    At the same time, if computer users need to use more computing resources, the aon network will actively release some computing resources to meet the needs of computer users.

    However, the foundation of the Aon network is, after all, the Nemesis virus!

    With computer viruses as the starting point, should we still consider computer users when necessary?

    The answer is naturally no!

    Aon network forced seeding is to directly extract 100% of the computing resources of computer equipment infected with the Nemesis virus.

    Although 100% extraction of computing resources from a computer system will definitely be discovered by computer users, and most computer users have a high chance of choosing to restart their computers, such a situation has long been planned by Shi Lei!

    ?????????????????????????????????????????????????????????????????????????????????????????????????????? Once the forced seeding is turned on on the Aon network, it will 100% force the computer equipment infected with the Nemesis virus to provide 100% computing resources for the Aon network.

    Even computer users clicked the restart button for hot boot.  Nothing will change!

    Because the Nemesis virus is implanted into the source code of the operating system.  When the user clicks the restart button, the computer system will simulate a restart screen.  Including the boot process, etc., but in fact, the computer system has not restarted at all and is still running at full power, providing the maximum computing resources for the AON network.

    When the restart is completed, although the computer user cannot use the task manager, he finds that the computing resources of the computer system are being used 100%.  But computer users can still feel it.  The operation of the computer system is sluggish and the response speed is slow.

    At this time, if the computer user restarts again.  Then, the computer system is still performing a false restart cycle just like the previous operation.

    But let¡¯s say that the computer user chooses to shut down the computer.  Either through the shut down computer option provided by the operating system or directly by long pressing the power button.  It is impossible to shut down the computer even if you try to shut down the computer!

    The reason is that Shi Lei still expected such a situation!

    After the computer user selects the option to shut down the computer, the computer system will simulate the computer shutdown.  This includes cutting off the power supply to the CPU radiator, the power supply to the main hard disk light, and forcibly cutting off the power supply to the independent graphics card radiator.  You can even change the speed setting of the hard disk and forcibly reduce the speed of the hard disk.  This reduces the noise generated by the hard drive when writing or reading data.

    Overall.  Once the user selects the option to shut down the computer, the computer system will simulate the shutdown of the computer, but the computer is still powered on and is still providing computing resources to the AON network.

    "If a computer user chooses to force shutdown and then starts the computer device again, it will still enter a loop. The computer system will not be improved in any way and will only provide computing resources for the AON network.

    Even if the computer user cuts off the power to the computer, if the computer user plugs the power in again, the computer system will still automatically restart.

    This is because the Nemesis virus has written a scheduled startup program for the computer, and it has broken the setting restrictions and written all restart programs according to one node every minute.

    Although, forcing computer equipment, simulating a shutdown state, and turning off the fans of various radiators will cause the hardware temperature of the computer equipment to be extremely high, accelerate the aging rate, and even directly cause damage to the computer equipment.

    But what does that have to do with Shi Lei?

    Whether other people's computer equipment is damaged or not, it has nothing to do with Shi Lei. Shi Lei can't be allowed to pay compensation on a global scale, right?

    It¡¯s not about the amount of compensation, it¡¯s about Shi Lei creating the Nemesis virus and creating a network disaster. Shi Lei doesn¡¯t want to be the enemy of the whole world.

    That is definitely what an idiot would choose!

    "Private, the system is configuring the aon network forced seeding program! It is expected to take thirty seconds to complete the configuration, and it is counting down, 30, 29, 28" Yi Zuer reported the situation.

    Thirty seconds is neither long nor short, ?As the time was decreasing second by second, Shi Lei had already clenched his fists.

    Victory or defeat depends on this!

    It is absolutely impossible for Shi Lei to accept the result of falling short!

    The virtual transparent screen of the lip lens information processor displays the countdown to the forced explosion of the Aon network. When the last second countdown is completed, the forced explosion of the Aon network starts!

    The computing resources provided by the aon network have directly exceeded 30 million from 18 million tflops to 34 million tflops, which is almost doubled!

    Shi Lei understood that such huge computing resources were based on 100% seizure of computer equipment infected with the Nemesis virus.

    Shi Lei didn't know how long those computer equipment could last under simulated shutdown conditions, so Shi Lei could only race against time!

    Any waste of time is a huge luxury at this point in time!

    The computing resources of the aon network, plus the computing resources of the iwn secret network, were mobilized by Shi Lei and the others under the coordination of Yizuer to attack the last unknown IP address, which is the address of the Darpa internal network.

    The unprecedentedly huge computing resources directly broke through the defense of darpa's internal network. Shi Lei also confirmed that the last unknown IP address was consistent with his initial guess and was indeed the internal network of darpa's advanced bureau.  However, it is not a public internal network, but another confidential internal network.

    ¡­¡­

    ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? darpa advanced inside the bureau.

    When Shi Lei controlled 35 million tflops of computing resources and broke through darpa's internal network defense, Dawson exclaimed.

    "Damn, we're done! We're done!" Dawson looked at the computer screen with a painful expression.

    Mandalay exclaimed, "It's done, I'm done! I've completed the development of the killer program for the mysterious virus!"

    Dapra's head of network security, Ryan, calmly ordered: "Mandalay, execute the killer plan! Dawson, cut off our connection to the Internet!"

    The important subnet systems that are attached to the darpa internal network have all been disconnected from the darpa internal network. The internal network of dapra no longer needs to stay connected to the Internet!

    Even if the connection to the Internet is disconnected now, there will be no serious consequences. Instead, it will save Darpa's internal network, which will be scanned by Shi Lei anyway.

    "Understood!" Dawson breathed a sigh of relief and took the initiative to cut off the connection between darpa's internal network and the Internet world. The darpa internal network was directly disconnected from the Internet world.

    When Shi Lei and the other three entered the Darpa internal network and used the huge computing resources to scan part of the content, they still found no trace of Butler.

    However, Shi Lei firmly believes that Butler must be hidden in the darpa internal network.  However, Shi Lei, who was full of confidence, withstood the blow given by Darpa!

    The internal network of darpa is disconnected from the Internet world!

    If the network link of Butler's parent server is hidden in the darpa internal network, when the darpa internal network disconnects from the Internet, Butler will be directly exposed.

    However, Darpa¡¯s internal network was disconnected from the Internet, and the network link to Butler¡¯s parent server did not appear!

    This can only mean one thing!

    The real IP address of Butler's parent server is not hidden in Darpa's internal network. Shi Lei's plan to find a needle in a haystack completely failed!

    Even though Shi Lei searched all over the Internet, he still couldn't find Butler!

    Such a result was beyond Shi Lei's imagination. Shi Lei couldn't understand why he couldn't find Butler when he searched for Butler on the global Internet like a needle in a haystack!

    ??Could it be that the organization still has core members surviving?  And obtained Butler's super administrator privileges?  If this is really the case, then it can explain why the real IP address of Butler's parent server cannot be found in the Internet world.

    Because, Butler¡¯s parent server has been offline!

    If it does not exist in the Internet world, naturally it cannot be found in the Internet world!

    Tao Wenxian and Raphael looked at Shi Lei worriedly, not knowing how to comfort Shi Lei, or in other words, how to relieve Shi Lei.

    In the end, it was Tao Wenxian who said, "Brother Shitou, my condolences!"

    Butler is the ¡®key¡¯ to save Ling Yumo and the others. If Butler cannot be found, how can we save Ling Yumo and the others?  The current situation is that Butler can't be found and I don't know how to find Butler.

    "It's equivalent to Ling Yumo and the others being 100% dead!"

    ? ?Lei snorted coldly, glared at Tao Wenxian, took a deep breath and said, "Sorry! It's not over yet!"

    Raphael gritted his teeth and said: "Stone, we really can't find the organization's pseudo-artificial intelligence system! We don't know how to find it! Face reality!"

    "We can't find it, but someone can! If no one can find it, I can only say with great regret that I will help him complete what the Snake of Chaos didn't complete!" Shi Lei said indifferently!

    Shi Lei¡¯s meaning is already very obvious

    (To be continued, please search Piaotian Literature, the novels will be better and updated faster!
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report