Friday, January 5, 2018

1551: Weakness and [Black Hand]!

LNMTL
HK :: VOLUME #16
#1551: Weakness and [Black Hand]!
   
Comments 0
Report
English
Chinese
……
Three-layer Pro­tec­tion Net­work that three hun­dred twenty four tem­po­rary bot Server com­pose with Tri­an­gle De­fense Net­work that three Su­per­com­puter com­pose, is not re­ally big in the pro­tec­tion strength as­pect dis­par­ity.
But Three-layer Pro­tec­tion Net­work when fac­ing mys­te­ri­ous in­va­sion side, is ac­tu­ally sim­i­lar to the avalanche equally fast chain-like col­lapse, as if sim­ply does not have the strength of half minute re­sis­tance, is sim­i­lar to fac­ing the lamb of pack of wolves, only then slaugh­tered re­sult.
In­stead Shi Lei has not hugged by great ex­pec­ta­tions Tri­an­gle De­fense Net­work, has brought the pleas­ant sur­prise to him, has pre­vented fierce in­va­sion side suc­cess­fully, let­ting Shi Lei can con­verse analy­sis in­va­sion side at­tack data.
Through an­a­lyz­ing in­va­sion side at­tack data, Shi Lei had dis­cov­ered some clue, in­va­sion side at­tack data, is not pure at­tack data, but has Com­pre­hen­sive Data of High De­gree paral­y­sis na­ture.
Tri­an­gle De­fense Net­work com­prised of three Su­per­com­puter, Su­per­com­puter sit­u­ated in Li Jian Na­tion and Great Britain Em­pire, be­longs to High-tech Com­pany pri­vate Su­per­com­puter. This Su­per­com­puter com­pu­ta­tion Task is very uni­tary, but processes Com­pany com­pu­ta­tion Task, ba­si­cally does not have other to cal­cu­late Task.
Su­per­com­puter sit­u­ated in Wo Sang Na­tion, sub­or­di­nates in Osaka Uni­ver­sity, be­longs to Su­per­com­puter of learn­ing qual­ity, cal­cu­lates Task mot­ley com­pli­cated, pro­cess­ing data Task are many.
Shi Lei an­a­lyzes in­va­sion side in­va­sion data, dis­cov­ered the in­va­sion side in­va­sion strat­egy, ex­actly as stated has pre­tended to be Osaka Uni­ver­sity Su­per­com­puter cal­cu­lates Task data nor­mally, will in­vade the data mix­ture in nor­mal com­pu­ta­tion Task data, thus at­tempts smooth prac­tic­ing trick­ery.
But mys­te­ri­ous in­va­sion side has not thought that Shi Lei does not care about three Su­per­com­puter Con­trol­ling Right, di­rectly has used the Task sim­u­la­tor, con­trols Su­per­com­puter com­pre­hen­sively.
Also in other words, three Su­per­com­puter, al­though on out­wardly seems like in im­ple­ment re­spec­tive com­pu­ta­tion Task. But in fact, they sim­ply do not have im­ple­ment any to cal­cu­late Task, but all com­put­ing re­sources. In­vests in De­fense Sys­tem that Shi Lei has needed.
When mys­te­ri­ous in­va­sion side, pre­tends to be Osaka Uni­ver­sity Su­per­com­puter cal­cu­lates Task data nor­mally. At­tempts through the Su­per­com­puter de­fense strat­egy and [End­less De­fense] Sys­tem, when en­ters Su­per­com­puter, had been in­ter­cepted by [End­less De­fense] Sys­tem di­rectly.
If Shi Lei has not cho­sen the burn both jade and com­mon stone plan, squeezes three Su­per­com­puter all com­put­ing re­sources, but re­tained three com­puter com­pu­ta­tion Task dis­cretely, then [End­less De­fense] Sys­tem will then not pre­vent Su­per­com­puter cal­cu­lates Task nor­mally. in­va­sion side then can through pre­tend­ing to be the data method, breaks through the Su­per­com­puter the stop of de­fense strat­egy and [End­less De­fense] Sys­tem fast.
Rea­son that Three-layer Pro­tec­tion Net­work was bro­ken through fast, ex­actly as stated be­cause of such rea­son. Was killed by mys­te­ri­ous in­va­sion side di­rectly. It is not the [End­less De­fense] Sys­tem func­tion, but is the [End­less De­fense] Sys­tem de­fense strat­egy weak­ness, was used by mys­te­ri­ous in­va­sion side.
Nat­u­rally, the [End­less De­fense] Sys­tem de­fense strat­egy weak­ness, could merely only be used in ex­te­rior net­work, if wants in Mir­ror Sci­ence and Tech­nol­ogy Group In­ter­nal Net­work, uses the [End­less De­fense] Sys­tem weak­ness, that is ab­solutely im­pos­si­ble.
Mir­ror Sci­ence and Tech­nol­ogy Group In­ter­nal Net­work, com­pletely grasps in the [Izual]'s con­trol, [Izual] con­trols all data to cal­cu­late Task. [End­less De­fense] Sys­tem will not let off any not au­then­ti­cated data en­ters Mir­ror Sci­ence and Tech­nol­ogy Group In­ter­nal Net­work.
There­fore, the [End­less De­fense] Sys­tem de­fense strat­egy weak­ness, can only be used by ex­te­rior net­work merely. And. Once Shi Lei chooses burn both jade and com­mon stone time, the [End­less De­fense] Sys­tem de­fense strat­egy weak­ness will then van­ish.
Had de­ter­mined the mys­te­ri­ous in­va­sion side in­va­sion method, Shi Lei re­laxed, in­va­sion side is not om­nipo­tent, Shi Lei can choose deals with the plan more.
„Damn fel­low, had been daunted al­most by you, now was one's turn me to tidy up you!” Ten fin­gers of Shi Lei both hands, on the key­board brought a se­ries of af­ter­im­age, on the screen to demon­strate large chunks source code.
Tri­an­gle De­fense Net­work that three Su­per­com­puter com­pose. Suc­cess is re­sist­ing in­va­sion side, al­though grad­u­ally en­hances com­put­ing re­sources along with in­va­sion side. But has Tri­an­gle De­fense Net­work of [In­ter­weave Net Mi­wang] sup­port, not any sign of col­lapse.
Shi Lei raps source code at the same time. At the same time is ex­am­in­ing the in­va­sion side sit­u­a­tion. So far, the at­tack re­sources of mys­te­ri­ous in­va­sion side use have achieved 200 tflops. [In­ter­weave Net Mi­wang] pours into Tri­an­gle De­fense Net­work Loose Dis­tri­b­u­tion Com­put­ing Re­sources, has been the 800 tflops de­gree.
Ac­cord­ing to both's pro­por­tion, com­put­ing re­sources of Shi Lei de­ter­mine in­va­sion side use is Con­cen­trated Dis­tri­b­u­tion Com­put­ing Re­sources, is in­va­sion side has pri­vate Su­per­com­puter.
In the en­tire World range, the speed achieves 200 tflops pri­vate Su­per­com­puter, on out­wardly few. even though not open to the pub­lic Su­per­com­puter, is few.
Be­cause main­tains the nor­mal op­er­a­tion of Su­per­com­puter is a huge per­sis­tent in­vest­ment, Su­per­com­puter is dif­fer­ent to in­di­vid­ual com­puter, in­di­vid­ual com­puter per­sis­tent use cost is very low, Su­per­com­puter is dif­fer­ent, the Or­di­nary in­flu­ence is un­able to bear a com­pu­ta­tion speed to be the 200 tflops Su­per­com­puter run cost.
„Li Jian Na­tion Gov­ern­ment?” Shi Lei First sus­pected that tar­get ex­actly as stated Li Jian Na­tion Gov­ern­ment, hearsay Li Jian Na­tion Gov­ern­ment, se­cret has es­tab­lished a sub­stan­tial num­ber of Su­per­com­puter, through these Su­per­com­puter, stirs up trou­ble in en­tire World In­ter­net.
How­ever, Shi Lei also im­me­di­ately de­nied such guess!
The rea­son is very sim­ple, the mys­te­ri­ous in­va­sion side at­tack re­sources, the card in 200 tflops, had not con­tin­ued to in­crease. If, mys­te­ri­ous in­va­sion side is Li Jian Na­tion Gov­ern­ment, that mys­te­ri­ous in­va­sion side at­tack re­sources will con­tinue to in­crease ab­solutely, until beats Tri­an­gle De­fense Net­work thor­oughly.
But now, Tri­an­gle De­fense Net­work is im­preg­nable, mys­te­ri­ous in­va­sion side was re­sisted by Tri­an­gle De­fense Net­work in the sur­round­ing, sim­ply does not have the means to go a step fur­ther.
„Since is not Li Jian Na­tion Gov­ern­ment, ac­tu­ally that is who?” Shi Lei thought aloud again.
Wants in­ves­ti­gate Hacker iden­tity, is al­ways not a sim­ple mat­ter, es­pe­cially Hacker Ex­pert iden­tity, that is se­cret in se­cret.
Mys­ti­cal in­va­sion side is Ex­pert, ab­solute Ex­pert, the op­po­site party held the weak­ness of [End­less De­fense] Sys­tem de­fense strat­egy keenly, thus eas­ily ac­com­plished gen­eral rout­ing Three-layer Pro­tec­tion Net­work, has proven op­po­site party Ex­pert iden­tity.
Wants in­ves­ti­gate op­po­site party iden­tity, has three means.
First, the Shi Lei re­ver­sion traces op­po­site party real ip ad­dress, thus in­ves­ti­gate in­va­sion side com­puter in­for­ma­tion and Re­al­ity ad­dress in­for­ma­tion. de­ter­mine op­po­site party iden­tity.
This method is not rea­son­able, the mys­te­ri­ous in­va­sion side tech­no­log­i­cal strength is very high, Shi Lei wants the re­ver­sion to in­vade in­ves­ti­gate op­po­site party real ip ad­dress. Ab­solutely is not that sim­ple mat­ter.
A Sec­ond method is less rea­son­able, who that is the di­rect ex­am­i­na­tion op­po­site party is. Al­though this method has cer­tainly suc­cess­ful prob­a­bil­ity. But that type of prob­a­bil­ity and lot­tery ticket Big Prize is also sim­i­lar.
Only re­li­able, only then a Third method, that is Shi Lei and mys­te­ri­ous in­va­sion side mu­tu­ally at­tack, then adopts the at­tack method of op­po­site party, de­ter­mine op­po­site party pos­si­ble iden­tity.
If, Shi Lei and [Raphael] at­tack, Shi Lei can de­ter­mine come out mu­tu­ally in a short time, op­po­site Hacker is [Raphael].
If this mys­te­ri­ous in­va­sion side is Shi Lei fa­mil­iar Hacker, passes mu­tual at­tack of both sides. Shi Lei has pos­si­bil­ity de­ter­mine com­ing out op­po­site party iden­tity.
How­ever, the op­po­site party def­i­nitely is un­able in this way, de­ter­mine Shi Lei's iden­tity! Comes be­cause of the Shi Lei re­birth, this, con­tacts his Hacker to be few, knows very well that Shi Lei at­tack way Hacker, is nat­u­rally few.
After hav­ing de­ter­mined Ac­tion Plan, Shi Lei trans­fers [In­ter­weave Net Mi­wang] com­put­ing re­sources im­me­di­ately, goes round mys­te­ri­ous in­va­sion side and Tri­an­gle De­fense Net­work bat­tle­field, starts the re­ver­sion trac­ing mys­te­ri­ous in­truder.
Al­though mys­te­ri­ous in­va­sion side is Ex­pert in Ex­pert. But Shi Lei was World Sum­mit Grade Hacker, Shi Lei stands in Hacker World Sum­mit High De­gree sim­i­larly, even if Shi Lei does not think. Through re­ver­sion trac­ing mys­te­ri­ous in­va­sion side, can find op­po­site party real ip ad­dress, but Shi Lei has not given up.
[In­ter­weave Net Mi­wang] built up 1700 tflops com­put­ing re­sources, 800 tflops com­put­ing re­sources, with sup­port Tri­an­gle De­fense Net­work, re­sis­tance mys­te­ri­ous in­va­sion side.
Shi Lei ad­justed other 900 tflops com­put­ing re­sources, along the mys­te­ri­ous in­va­sion side at­tack data chan­nel, re­ver­sion trac­ing went di­rectly.
The huge re­ver­sion traces data, mak­ing mys­te­ri­ous in­va­sion side re­al­ize the Shi Lei's mo­tion im­me­di­ately. The mys­te­ri­ous in­va­sion side re­ac­tion rate is quick, has abol­ished di­rectly to Tri­an­gle De­fense Net­work at­tack. Re­turned to re­move 200 tflops Con­cen­trated Dis­tri­b­u­tion Com­put­ing Re­sources, keeps off in the data chan­nel of Shi Lei in­va­sion. With the Shi Lei at­tack.
Just, mys­te­ri­ous in­va­sion side un­der­es­ti­mated Shi Lei, the re­sponse of mys­te­ri­ous in­va­sion side is in­deed quick, may have [Izual] aux­il­iary Shi Lei, the re­ac­tion rate is sim­i­larly quick.
When mys­te­ri­ous in­va­sion side re­turns re­moved to the Tri­an­gle De­fense Net­work at­tack data re­sources, Shi Lei al­most syn­chro­nously tells [Izual], [In­ter­weave Net Mi­wang] 800 tflops com­put­ing re­sources, in­vests the at­tack se­quence of re­ver­sion trac­ing.
Mys­ti­cal in­va­sion side by 200 tflops Con­cen­trated Dis­tri­b­u­tion Com­put­ing Re­sources, re­sisted 900 tflops Loose Dis­tri­b­u­tion Com­put­ing Re­sources, has ap­peared some­what has too many prob­lems to tackle.
Now, is 800 tflops Loose Dis­tri­b­u­tion Com­put­ing Re­sources joins the at­tack se­quence, im­me­di­ately mys­te­ri­ous in­va­sion side 200 tflops Con­cen­trated Dis­tri­b­u­tion Com­put­ing Re­sources, hits the col­lapse smash­ing.
Mys­ti­cal in­va­sion side fac­ing 1700 tflops com­put­ing re­sources, can only re­treat, be sim­i­lar to mys­te­ri­ous in­va­sion side de­stroys Three-layer Pro­tec­tion Net­work to be the same suc­ces­sively from the be­gin­ning, Shi Lei eas­ily ac­com­plished un­ceas­ing break­through mys­te­ri­ous in­va­sion side de­fense.
Mys­ti­cal in­va­sion side has to make the re­volt, but mys­te­ri­ous in­va­sion side had es­ti­mated wrongly com­put­ing re­sources that Shi Lei grasps, strug­gle be­tween Hacker, when the tech­no­log­i­cal strength is sim­i­lar, often is the war of hard­ware per­for­mance.
In the Film and Tele­vi­sion work, uses Note­book Com­puter to kill the Su­per­com­puter sit­u­a­tion, can only ap­pear in the Film and Tele­vi­sion work even­tu­ally, but in Re­al­ity, only if Note­book Com­puter is only front the equip­ment, the back­stage is con­nect­ing huge com­put­ing re­sources Clus­ter. Oth­er­wise, does Note­book Com­puter pos­si­bly break Su­per­com­puter de­fense?
In more and more mod­ern­ized era, the for­merly Hacker war, evolved the hard­ware war!
Shi Lei is hav­ing the for­mi­da­ble hard­ware re­sources, or is Shi Lei through Brave's World and [In­ter­weave Net Mi­wang], is hav­ing the for­mi­da­ble hard­ware re­sources, to a cer­tain ex­tent, Shi Lei has com­pared gen­eral World Sum­mit Grade Hacker, for­mi­da­ble too much too much.
Along with Shi Lei re­ver­sion in­va­sion car­ries on, Shi Lei broke mys­te­ri­ous in­va­sion side De­fense Sys­tem, Shi Lei has guessed cor­rectly mys­te­ri­ous in­va­sion side iden­tity grad­u­ally.
The mys­te­ri­ous in­va­sion side char­ac­ter­is­tics are very ob­vi­ous, first is grasp­ing 200 tflops com­put­ing re­sources, in the mean­time, has the for­mi­da­ble Hacker tech­nol­ogy, and also cel­e­brates a hol­i­day with Shi Lei, syn­the­sizes, mys­te­ri­ous in­va­sion side iden­tity was al­ready bright!

Comments

No comments:

Post a Comment

Berkomentarlah dengan baik