Saturday, January 6, 2018

1582: data impact!

LNMTL
HK :: VOLUME #16
#1582: data impact!
   
Comments 0
Report
English
Chinese
……
As World Sum­mit Grade Hacker, so was played un­ex­pect­edly tricks on by h, mys­te­ri­ous World Sum­mit Grade Hacker at this time un­usual anger, fast on the key­board, is rap­ping strings of Eng­lish source code.
Mys­ti­cal World Sum­mit Grade Hacker, opened true De­fense Sys­tem, pro­tec­tion Core de­fense inner layer of outer layer and Su­per­com­puter con­sti­tu­tion that-based Zom­bie Net­work com­poses.
The Zom­bie Net­work pro­tec­tion outer layer and Su­per­com­puter Core de­fense inner layer com­bines in the to­gether ef­fect, adds equal to two ef­fects by no means that but has sur­passed this ef­fect.
The Zom­bie Net­work pro­tec­tion outer layer, has acted as coolie char­ac­ter, re­gard­less of any at­tack can ac­cept, char­ac­ter that be­longs to ca­su­ally how dev­as­tate.
Core de­fense inner layer of Su­per­com­puter con­sti­tu­tion, then has acted as char­ac­ter of se­cret pro­tec­tor. When the de­fense outer layer is with­stand­ing var­i­ous sorts and va­ri­eties at­tack, it will be the de­fense outer layer will pro­vide the pow­er­ful sup­port and en­sure the de­fense outer layer will not be bro­ken through eas­ily.
Mys­ti­cal World Sum­mit Grade Hacker in­vested de­fense Su­per­com­puter, the com­pu­ta­tion speed has been the 30 tflops de­gree, com­put­ing re­sources that be­cause Su­per­com­puter com­posed, be­longed to Con­cen­trated Dis­tri­b­u­tion Com­put­ing Re­sources, in uni­for­mity, co­or­di­na­tion and con­trol­la­bil­ity and other as­pect, has sur­mounted Loose Dis­tri­b­u­tion Com­put­ing Re­sources com­pletely, even if fac­ing 100 tflops Loose Dis­tri­b­u­tion Com­put­ing Re­sources, main­tained su­pe­rior sta­tus.
„Hēng! Loose Dis­tri­b­u­tion Com­put­ing Re­sources? h was ac­tu­ally black many in­di­vid­ual com­puter and Or­di­nary Server, has com­posed so huge Corpse Net­work!” In the mys­te­ri­ous World Sum­mit Grade Hacker sound, is hav­ing thick dis­dain­ing mean­ing.
Loose Dis­tri­b­u­tion Com­put­ing Re­sources, in­deed is usu­ally pro­duced by Corpse Net­work. So-called Corpse Net­work, is an­other name of Zom­bie Net­work, is not ter­ri­fy­ing thing.
This mys­te­ri­ous World Sum­mit Grade Hacker, in­spects the Server sit­u­a­tion ac­cord­ing to the Fourth field. de­ter­mine h does not have Su­per­com­puter, but has con­trolled merely huge Corpse Net­work.
To con­trol huge Corpse Net­work, re­gard­ing for­mi­da­ble Hacker. It is not dif­fi­cult mat­ter, only needs to spend very much time. As well as com­piles one set of com­plex Zom­bie Man­age­ment Soft­ware.
Re­gard­ing for­mi­da­ble Hacker, will ba­si­cally not han­dle such mat­ter. Or­di­nary in­di­vid­ual can com­puter, how many com­put­ing re­sources pro­vide? Even if spreads Tro­jan Horse through the Virus type mas­sively, col­lects nu­mer­ous in­di­vid­ual com­puter to take Zom­bie, but this method is not good.
First, pro­lif­er­ated mas­sively col­lected Zom­bie Tro­jan Horse, was been eas­ily har­mo­nious by Net­work Se­cu­rity Com­pany, thus al­ready ac­quired Zom­bie Server. May re­im­burse com­pletely.
Sec­ond, in­di­vid­ual com­puter in­sta­bil­ity! This in­sta­bil­ity, not only dis­plays in the pe­riod of rev­o­lu­tion, dis­played in fault-tol­er­ant rate as­pect. Es­pe­cially uses Loose Dis­tri­b­u­tion Com­put­ing Re­sources, car­ries on Hacker at­tack time, only if uses rel­a­tive foun­da­tion sim­ple re­jec­tion to serve at­tack, is so-called ddos at­tack, will have the good safe­guard. If uses very dif­fi­cult data to unite at­tack, def­i­nitely may prob­a­bly fall the chain!
As­sum­ing that a sit­u­a­tion, in [In­ter­weave Net Mi­wang]. 100 tflops Loose Dis­tri­b­u­tion Com­put­ing Re­sources, prob­a­bly needs 1 Mil­lion user, even is 120 ten thou­sand user. Can pro­duce.
Ba­si­cally each user, can only pro­vide 0.0001 tflops com­put­ing re­sources merely, such es­ti­mated per­for­mance, re­gard­ing Brave's World's in­di­vid­ual user, equiv­a­lent to com­puter own 1%, even 1/1000 es­ti­mated per­for­mances.
Ex­trac­tion so low com­put­ing re­sources, this is to avoid being dis­cov­ered by user. How­ever, from this has pro­duced huge issue, that is so many user. When syn­the­sizes im­ple­ment Task, data in­for­ma­tion that needs to cal­cu­late needs to di­vide surely.
If part of user did leave In­ter­net sud­denly?
user of 1 Mil­lion base num­ber. Has the all kinds ac­ci­dent to leave In­ter­net user surely. Has met such sit­u­a­tion, needs in a short time. Will leave data that In­ter­net user needs to cal­cu­late, shifts cal­cu­lates to other user.
This ex­tremely short time, is not the time of macro­scopic sig­nif­i­cance, but is the time of mi­cro­scopic sig­nif­i­cance, ba­si­cally has been lower than ten mil­lisec­onds, is in 1% sec­onds, re­dis­trib­utes flaw user com­pu­ta­tion Task.
So huge so com­plex soft­ware de­sign and man­ages, if no High Grade Pseudo Ar­ti­fi­cial In­tel­li­gence Sys­tem [Izual]'s to be aux­il­iary, the [In­ter­weave Net Mi­wang] lim­i­ta­tion will be huge.
As a re­sult of such sit­u­a­tion, in the Hacker eye of high-end do­main, uses Loose Dis­tri­b­u­tion Com­put­ing Re­sources, be­longs to a com­par­i­son not to have the way of scale.
Hacker of high-end do­main, rather ex­pen­di­ture more time, chal­lenge very dif­fi­cult Su­per­com­puter, or is for­mi­da­ble En­ter­prise Grade Server, will not spend the nu­mer­ous time to do any huge Corpse Net­work.
Fi­nally, Loose Dis­tri­b­u­tion Com­put­ing Re­sources, when fac­ing Con­cen­trated Dis­tri­b­u­tion Com­put­ing Re­sources, was routed by Con­cen­trated Dis­tri­b­u­tion Com­put­ing Re­sources very much eas­ily.
Syn­the­sizes all sorts of flaws, this and Fourth field in­spects the Server re­sis­tance mys­te­ri­ous World Sum­mit Grade Hacker, some qual­i­fi­ca­tions ridiculed that h uses Loose Dis­tri­b­u­tion Com­put­ing Re­sources.
How­ever!
This mys­te­ri­ous World Sum­mit Grade Hacker, after 30 sec­onds, has re­al­ized own mis­take!
Orig­i­nally, mys­te­ri­ous World Sum­mit Grade Hacker de­ter­mine comes out, the Fourth field in­spects Server to have 100 tflops Loose Dis­tri­b­u­tion Com­put­ing Re­sources, he trans­ferred a com­pu­ta­tion speed to achieve 30 tflops Su­per­com­puter, wanted to break through the Fourth field to in­spect Server, sim­ply was the easy mat­ter.
But the re­sult is ac­tu­ally not so!
When the Fourth field in­spects Server fac­ing com­pu­ta­tion speed achieves 30 tflops Su­per­com­puter, not the sign of any rout. Al­though mys­te­ri­ous World Sum­mit Grade Hacker, in­deed sup­pressed the Fourth field to in­spect Server, but has not bro­ken through its pos­si­bil­ity com­pletely.
The Fourth field in­spects Server De­fense Sys­tem to be im­preg­nable, when fac­ing the im­pact of mys­te­ri­ous World Sum­mit Grade Hacker, sim­ply does not have the least bit is un­sta­ble.
In some mys­te­ri­ous Room, mys­te­ri­ous World Sum­mit Grade Hacker whole face sur­prised looks at the com­puter screen feed­back data, in the mouth calls out in alarm said: „This is im­pos­si­ble! Is Corpse Net­work pro­vides ob­vi­ously, ob­vi­ously is Loose Dis­tri­b­u­tion Com­put­ing Re­sources, why hadn't been borne the im­pact on pro­duce data to shake?”
Per­haps re­gard­ing Hacker of low-end do­main, they do not have such pow­er­ful tech­no­log­i­cal means. Uses the data im­pact on cause data to shake, thus dis­in­te­grates en­tire Corpse Net­work.
But in the Hacker high-end do­main, uses Con­cen­trated Dis­tri­b­u­tion Com­put­ing Re­sources for Loose Dis­tri­b­u­tion Com­put­ing Re­sources. Starts the data im­pact, thus pro­duces data to shake. This is very com­mon method.
„Was too strange! ac­tu­ally does h how process Corpse Net­work?” Mys­ti­cal World Sum­mit Grade Hacker, thought aloud that is hav­ing doubts.
An­other side, in Shuangqing City Jade Dis­trict 'Dragon Rise' Plan First Di­vi­sion.
Shi Lei through LIP Lens-type In­for­ma­tion Proces­sor, was ex­am­in­ing the Fourth field in­spects the Server sit­u­a­tion, when sees that mys­te­ri­ous World Sum­mit Grade Hacker, at­tempts through the way of data im­pact, had the data shake to de­stroy Loose Dis­tri­b­u­tion Com­put­ing Re­sources that [In­ter­weave Net Mi­wang] pro­vided, on the Shi Lei face re­veals has wiped light sneer­ing.
This mys­te­ri­ous World Sum­mit Grade Hacker. With the method is cor­rect, copes with Loose Dis­tri­b­u­tion Com­put­ing Re­sources, should use the data im­pact on cause data to shake, all pro­vides com­put­ing re­sources Zom­bie Server and in­di­vid­ual com­puter, shakes com­pletely from Zom­bie Net­work.
But [In­ter­weave Net Mi­wang] is dif­fer­ent!
Be­fore had then an­a­lyzed, [In­ter­weave Net Mi­wang] ex­tracted Brave's World user com­put­ing re­sources, had user merely own 1%, even was 1/1000 de­grees.
Ex­trac­tion so scarce com­put­ing re­sources, fac­ing the data shake that the data im­pact cre­ates, will not af­fect d. Also is the [In­ter­weave Net Mi­wang] re­sources provider, Brave's World's game user.
data shake that in ad­di­tion the [Izual] strong cor­rect mis­take func­tion, the triv­ial data im­pact cre­ates. Was ne­glected by [In­ter­weave Net Mi­wang] com­pletely.
Shi Lei sim­i­larly is World Sum­mit Grade Hacker , not clear is Corpse Net­work afraid the data shake that the data im­pact cre­ates?
Mys­ti­cal World Sum­mit Grade Hacker, at­tempts to cope with [In­ter­weave Net Mi­wang] with this con­ven­tional method, can only say that is the wish­ful think­ing!
Looks that mys­te­ri­ous World Sum­mit Grade Hacker ad­mits de­feat, Shi Lei is only the ob­ser­va­tion of quiet, so far, this mys­te­ri­ous World Sum­mit Grade Hacker, has not re­vealed the too ob­vi­ous in­di­vid­ual char­ac­ter­is­tics tem­porar­ily, Shi Lei does not have de­ter­mine to come out. Ac­tu­ally this fel­low is who!
Shi Lei need more time, let this mys­te­ri­ous World Sum­mit Grade Hacker and Fourth field in­spect Server to re­sist. Thus de­ter­mine com­ing out op­po­site party iden­tity.
That side mys­te­ri­ous World Sum­mit Grade Hacker, after the data im­pact cre­ates the way fail­ure of data shake. This mys­te­ri­ous World Sum­mit Grade Hacker, has not tried the brand-new in­va­sion side type im­me­di­ately, but pre­pares to try data to at­tack again.
How­ever, this time, mys­te­ri­ous World Sum­mit Grade Hacker, the data im­pact way of prepa­ra­tion, is dif­fer­ent some!
After all failed one time, if uses the same at­tack method, per­haps will not cre­ate any de­struc­tive power. There­fore, mys­te­ri­ous World Sum­mit Grade Hacker, al­though pre­pares to use the method that data at­tacks again, how­ever brand-new data im­pact method.
Each World Sum­mit Grade Hacker, is not sim­ple char­ac­ter!
If wants sim­ply be­came World Sum­mit Grade Hacker, has two sit­u­a­tions. The First type, had truly the un­ap­proach­able tal­ent, trades a data plan the view, that was iq IQ has been about 200 de­grees.
The ac­com­plish Hacker study that this iq Level player, ba­si­cally can be self-taught, starts from the study of most foun­da­tion, then through the In­ter­net re­sources, ac­quires a more pro­found knowl­edge, has achieved World Sum­mit Grade.
But human iq IQ over 140, merely only then uni­verse about 0.5%. To achieve over 200 iq IQ, ba­si­cally does not have what pos­si­bil­ity.
After all Bill. Gates and Steven. William. Hod­gen's iq IQ has 160!
As for an­other pos­si­bil­ity...

Comments

No comments:

Post a Comment

Berkomentarlah dengan baik