LNMTL
HK :: VOLUME #16
#1551: Weakness and [Black Hand]!
Comments 0
Report
English
Chinese
……
Three-layer Protection Network that three hundred twenty four temporary bot Server compose with Triangle Defense Network that three Supercomputer compose, is not really big in the protection strength aspect disparity.
But Three-layer Protection Network when facing mysterious invasion side, is actually similar to the avalanche equally fast chain-like collapse, as if simply does not have the strength of half minute resistance, is similar to facing the lamb of pack of wolves, only then slaughtered result.
Instead Shi Lei has not hugged by great expectations Triangle Defense Network, has brought the pleasant surprise to him, has prevented fierce invasion side successfully, letting Shi Lei can converse analysis invasion side attack data.
Through analyzing invasion side attack data, Shi Lei had discovered some clue, invasion side attack data, is not pure attack data, but has Comprehensive Data of High Degree paralysis nature.
Triangle Defense Network comprised of three Supercomputer, Supercomputer situated in Li Jian Nation and Great Britain Empire, belongs to High-tech Company private Supercomputer. This Supercomputer computation Task is very unitary, but processes Company computation Task, basically does not have other to calculate Task.
Supercomputer situated in Wo Sang Nation, subordinates in Osaka University, belongs to Supercomputer of learning quality, calculates Task motley complicated, processing data Task are many.
Shi Lei analyzes invasion side invasion data, discovered the invasion side invasion strategy, exactly as stated has pretended to be Osaka University Supercomputer calculates Task data normally, will invade the data mixture in normal computation Task data, thus attempts smooth practicing trickery.
But mysterious invasion side has not thought that Shi Lei does not care about three Supercomputer Controlling Right, directly has used the Task simulator, controls Supercomputer comprehensively.
Also in other words, three Supercomputer, although on outwardly seems like in implement respective computation Task. But in fact, they simply do not have implement any to calculate Task, but all computing resources. Invests in Defense System that Shi Lei has needed.
When mysterious invasion side, pretends to be Osaka University Supercomputer calculates Task data normally. Attempts through the Supercomputer defense strategy and [Endless Defense] System, when enters Supercomputer, had been intercepted by [Endless Defense] System directly.
If Shi Lei has not chosen the burn both jade and common stone plan, squeezes three Supercomputer all computing resources, but retained three computer computation Task discretely, then [Endless Defense] System will then not prevent Supercomputer calculates Task normally. invasion side then can through pretending to be the data method, breaks through the Supercomputer the stop of defense strategy and [Endless Defense] System fast.
Reason that Three-layer Protection Network was broken through fast, exactly as stated because of such reason. Was killed by mysterious invasion side directly. It is not the [Endless Defense] System function, but is the [Endless Defense] System defense strategy weakness, was used by mysterious invasion side.
Naturally, the [Endless Defense] System defense strategy weakness, could merely only be used in exterior network, if wants in Mirror Science and Technology Group Internal Network, uses the [Endless Defense] System weakness, that is absolutely impossible.
Mirror Science and Technology Group Internal Network, completely grasps in the [Izual]'s control, [Izual] controls all data to calculate Task. [Endless Defense] System will not let off any not authenticated data enters Mirror Science and Technology Group Internal Network.
Therefore, the [Endless Defense] System defense strategy weakness, can only be used by exterior network merely. And. Once Shi Lei chooses burn both jade and common stone time, the [Endless Defense] System defense strategy weakness will then vanish.
Had determined the mysterious invasion side invasion method, Shi Lei relaxed, invasion side is not omnipotent, Shi Lei can choose deals with the plan more.
„Damn fellow, had been daunted almost by you, now was one's turn me to tidy up you!” Ten fingers of Shi Lei both hands, on the keyboard brought a series of afterimage, on the screen to demonstrate large chunks source code.
Triangle Defense Network that three Supercomputer compose. Success is resisting invasion side, although gradually enhances computing resources along with invasion side. But has Triangle Defense Network of [Interweave Net Miwang] support, not any sign of collapse.
Shi Lei raps source code at the same time. At the same time is examining the invasion side situation. So far, the attack resources of mysterious invasion side use have achieved 200 tflops. [Interweave Net Miwang] pours into Triangle Defense Network Loose Distribution Computing Resources, has been the 800 tflops degree.
According to both's proportion, computing resources of Shi Lei determine invasion side use is Concentrated Distribution Computing Resources, is invasion side has private Supercomputer.
In the entire World range, the speed achieves 200 tflops private Supercomputer, on outwardly few. even though not open to the public Supercomputer, is few.
Because maintains the normal operation of Supercomputer is a huge persistent investment, Supercomputer is different to individual computer, individual computer persistent use cost is very low, Supercomputer is different, the Ordinary influence is unable to bear a computation speed to be the 200 tflops Supercomputer run cost.
„Li Jian Nation Government?” Shi Lei First suspected that target exactly as stated Li Jian Nation Government, hearsay Li Jian Nation Government, secret has established a substantial number of Supercomputer, through these Supercomputer, stirs up trouble in entire World Internet.
However, Shi Lei also immediately denied such guess!
The reason is very simple, the mysterious invasion side attack resources, the card in 200 tflops, had not continued to increase. If, mysterious invasion side is Li Jian Nation Government, that mysterious invasion side attack resources will continue to increase absolutely, until beats Triangle Defense Network thoroughly.
But now, Triangle Defense Network is impregnable, mysterious invasion side was resisted by Triangle Defense Network in the surrounding, simply does not have the means to go a step further.
„Since is not Li Jian Nation Government, actually that is who?” Shi Lei thought aloud again.
Wants investigate Hacker identity, is always not a simple matter, especially Hacker Expert identity, that is secret in secret.
Mystical invasion side is Expert, absolute Expert, the opposite party held the weakness of [Endless Defense] System defense strategy keenly, thus easily accomplished general routing Three-layer Protection Network, has proven opposite party Expert identity.
Wants investigate opposite party identity, has three means.
First, the Shi Lei reversion traces opposite party real ip address, thus investigate invasion side computer information and Reality address information. determine opposite party identity.
This method is not reasonable, the mysterious invasion side technological strength is very high, Shi Lei wants the reversion to invade investigate opposite party real ip address. Absolutely is not that simple matter.
A Second method is less reasonable, who that is the direct examination opposite party is. Although this method has certainly successful probability. But that type of probability and lottery ticket Big Prize is also similar.
Only reliable, only then a Third method, that is Shi Lei and mysterious invasion side mutually attack, then adopts the attack method of opposite party, determine opposite party possible identity.
If, Shi Lei and [Raphael] attack, Shi Lei can determine come out mutually in a short time, opposite Hacker is [Raphael].
If this mysterious invasion side is Shi Lei familiar Hacker, passes mutual attack of both sides. Shi Lei has possibility determine coming out opposite party identity.
However, the opposite party definitely is unable in this way, determine Shi Lei's identity! Comes because of the Shi Lei rebirth, this, contacts his Hacker to be few, knows very well that Shi Lei attack way Hacker, is naturally few.
After having determined Action Plan, Shi Lei transfers [Interweave Net Miwang] computing resources immediately, goes round mysterious invasion side and Triangle Defense Network battlefield, starts the reversion tracing mysterious intruder.
Although mysterious invasion side is Expert in Expert. But Shi Lei was World Summit Grade Hacker, Shi Lei stands in Hacker World Summit High Degree similarly, even if Shi Lei does not think. Through reversion tracing mysterious invasion side, can find opposite party real ip address, but Shi Lei has not given up.
[Interweave Net Miwang] built up 1700 tflops computing resources, 800 tflops computing resources, with support Triangle Defense Network, resistance mysterious invasion side.
Shi Lei adjusted other 900 tflops computing resources, along the mysterious invasion side attack data channel, reversion tracing went directly.
The huge reversion traces data, making mysterious invasion side realize the Shi Lei's motion immediately. The mysterious invasion side reaction rate is quick, has abolished directly to Triangle Defense Network attack. Returned to remove 200 tflops Concentrated Distribution Computing Resources, keeps off in the data channel of Shi Lei invasion. With the Shi Lei attack.
Just, mysterious invasion side underestimated Shi Lei, the response of mysterious invasion side is indeed quick, may have [Izual] auxiliary Shi Lei, the reaction rate is similarly quick.
When mysterious invasion side returns removed to the Triangle Defense Network attack data resources, Shi Lei almost synchronously tells [Izual], [Interweave Net Miwang] 800 tflops computing resources, invests the attack sequence of reversion tracing.
Mystical invasion side by 200 tflops Concentrated Distribution Computing Resources, resisted 900 tflops Loose Distribution Computing Resources, has appeared somewhat has too many problems to tackle.
Now, is 800 tflops Loose Distribution Computing Resources joins the attack sequence, immediately mysterious invasion side 200 tflops Concentrated Distribution Computing Resources, hits the collapse smashing.
Mystical invasion side facing 1700 tflops computing resources, can only retreat, be similar to mysterious invasion side destroys Three-layer Protection Network to be the same successively from the beginning, Shi Lei easily accomplished unceasing breakthrough mysterious invasion side defense.
Mystical invasion side has to make the revolt, but mysterious invasion side had estimated wrongly computing resources that Shi Lei grasps, struggle between Hacker, when the technological strength is similar, often is the war of hardware performance.
In the Film and Television work, uses Notebook Computer to kill the Supercomputer situation, can only appear in the Film and Television work eventually, but in Reality, only if Notebook Computer is only front the equipment, the backstage is connecting huge computing resources Cluster. Otherwise, does Notebook Computer possibly break Supercomputer defense?
In more and more modernized era, the formerly Hacker war, evolved the hardware war!
Shi Lei is having the formidable hardware resources, or is Shi Lei through Brave's World and [Interweave Net Miwang], is having the formidable hardware resources, to a certain extent, Shi Lei has compared general World Summit Grade Hacker, formidable too much too much.
Along with Shi Lei reversion invasion carries on, Shi Lei broke mysterious invasion side Defense System, Shi Lei has guessed correctly mysterious invasion side identity gradually.
The mysterious invasion side characteristics are very obvious, first is grasping 200 tflops computing resources, in the meantime, has the formidable Hacker technology, and also celebrates a holiday with Shi Lei, synthesizes, mysterious invasion side identity was already bright!
Hanya sebuah blog kecil yang bertujuan saling membantu sesama. Semoga dapat berjalan dengan lancar.
Friday, January 5, 2018
1551: Weakness and [Black Hand]!
Subscribe to:
Post Comments (Atom)