LNMTL
HK :: VOLUME #17
#1648: OverSeed!
Comments 0
Report
English
Chinese
……
Dream Entertainment Official Gamer Forum, has encountered close 13,000 user Publishing Content Type Attack.
This type cannot be Hacker attack attack, in fact, regarding Dream Entertainment Official Gamer Forum, will not cause anything to affect. Even, including the Official Gamer Forum order, will not be affected.
Because, Dream Entertainment Official Gamer Forum belongs to Worldwide Forum, and there is [Izual] to conduct the management. How to distinguish in Forum, any post belongs meaningful, any post does not have the significance, completely by [Izual] automatic preliminary determine.
For example in the Brave's World game plate, was subdivided for very many Little Section. Has included Storyline Discussion, Character Discussion, Task Classification Discussion, Map Information Inquiry, Equipment Appreciation and so on.
In numerous Little Section, more detailed Sub-section. Takes Task Classification Discussion as the example, in Task graduation Little Section, corresponds Task Grade Sub-section.
Different Grade Task, need to issue in different Sub-section, but cannot the stepping sector issue post. If cross plate issue post, by [Izual] implement ‚motion post’ operation. Meanwhile, will also subtract part of Forum integrals.
If some Gamer, does not divide the issue content of sector continuously, will be punished severely by [Izual]'s absolutely.
Naturally, in Dream Entertainment Official Gamer Forum, has provided one specially ‚Freedom World’ Big Section, Gamer from entire World, irrigation of Freedom, issued conveniently some indefinite hearsay, even is some ad information.
At present, implement Publishing Content Type Attack Ten Thousand more than 2000 user, all posts, completely by [Izual] restriction(s) in ‚Freedom World’ Big Section branch ‚Dim Abyss’ in Sub-section.
So-called ‚Dim Abyss’, is representing this Sub-section internal post information, basically does not have what significance. Belongs to wait for post that System deletes.
Usually, not having Gamer to enter ‚Dim Abyss’ Sub-section to examine the Forum news.
Therefore , that Ten Thousand more than 2000 user kind of attack. To Dream Entertainment Official Gamer Forum, will not cause any losses.
But Shi Lei to ignore behavior will not pay no attention. Shi Lei told that [Izual] draws an item at random 100 user, then the reversion traces opposite party real ip address.
If the reversion traces ordinary user real ip address, regarding [Izual], does not have any difficulty matter simply, is similar to calculates 1 + 1 difficulties to be the same.
even though simultaneously the reversion traces 100 user real ip address, the difficulty will not enhance too much, most turned into 1 + 1 + 1 difficulties.
However, originally ninety percent sure matter. Had the unusual circumstance!
„Sir, System is unable to determine random selection user real ip address!” [Izual] reports to say to Shi Lei through LIP Lens-type Information Processor.
The Shi Lei expression stares, „which user real ip address isn't able to determine?” Shi Lei is inquiring immediately, this is a clue, so long as had determined concrete personnel, then can act according to this clue , to continue deep cuts.
However, [Izual] on the computer screen, demonstrated information that lets the Shi Lei complexion drastic change.
Because [Izual] is unable to determine real ip address user. It is not user, is not two user, but is random extraction 100 user. It is not able to determine real ip address completely!
From close 13,000 user, extracts 100 user to come out randomly, almost can represent the characteristics of entire community.
This means that close 13,000 user real ip address, [Izual] is unable direct confirmed!
„[Izual], shields these 100 user, from remaining user, draws an item at random 100 user once more. Then, the reversion traces their real ip address!” Shi Lei told again.
If this time. 100 user of random extraction, are unable to determine real ip address again. That can only explain a matter.
That close 13,000 starts Publishing Content Type Attack user, at is not normal user! If they are not normal user. Completely is the Virtual identity registration?
But Dream Entertainment Official Gamer Forum real name registration mechanism, so is can it be that easy to bypass?
Less than ten seconds, [Izual] gave has fed back information, „sir, the Second batch drew an item at random 100 user real ip address, System are unable the reversion to trace accomplish.”
„Is the reason that is unable to trace what?” The Shi Lei detailed inquiry said.
[Izual] in the LIP Lens-type Information Processor Virtual transparence screen, demonstrated the detailed reason, when [Izual] used Black Magic Subsystem, reversion tracing immediately user real ip address time, met formidable Defense System directly.
even though [Izual]'s Black Magic Subsystem, under the coordination of [Interweave Net Miwang] and Supercomputer [Lightning], has been the World Grade Hacker degree, is unable to break Defense System as before.
What is more awful, 100 user of First batch of random extractions, are Second batch of random extractions 100 user, Shi Lei discovers their Defense System, even origin in same Defend the Server.
Changes a view, the [Izual] reversion traces 200 random extractions user, traced same Defend the Server completely.
Such situation, confirmed the Shi Lei's guess!
That close 13,000 user, really completely is corpse user, but is not Shi Lei at first guess such, is real user that spends to hire.
Only then corpse user has the possibility centralized management, then gathers in same Defend the Server, resists [Izual]'s reversion tracing!
„Opposite party has Defend the Server, what Defense System used?” Shi Lei frowns to say.
Dream Entertainment Official Gamer Forum invaded matter, even more disclosed a strange aura. Is only joke same Publishing Content Type Attack, but behind seems hiding not seeing clearly plot.
„Sir, Defend the Server of Unable to Judge attack side, has used any Defense System. After System preliminary determine, invasion side Defend the Server, resists System reversion tracing, transferred 300 tflops Concentrated Distribution Computing Resources.” [Izual] was responding to concrete data.
„Damn?” Shi Lei has held breath cold air!
300 tflops computing resources!
300 tflops Concentrated Distribution Computing Resources!
This means that has controlled numerous corpse user, implement laughable Publishing Content Type Attack mysterious invasion side, is actually grasping equivalent to Supercomputer [Lightning] same Supercomputer, or is Supercomputer Cluster!
In entire World range. Has the computation speed to surpass the 300 tflops Supercomputer influence to be few. even though formidable incomparable Angel Parliament, does not have so many computing resources.
Therefore, Angel Parliament [Jehovah]. Completely by Shi Lei and [Raphael], suppresses must not have the strength of revolt. When the technology differs in not big situation. computing resources that grasps decides all.
After Shi Lei has called out in alarm one, both hands build on the keyboard, personally examination mysterious invasion side Defend the Server.
When Shi Lei starts the probe attack, Shi Lei is carrying on the data survey synchronously. The resources that as Shi Lei transfers are getting more and more, Supercomputer [Lightning] 300 tflops Concentrated Distribution Computing Resources, over 90% had been reassigned by Shi Lei. But mysterious invasion side Defend the Server, simply does not have any response.
At this time, Shi Lei surveyed Defend the Server computing resources. Indeed has been the 300 tflops degree. Although confirmed information of [Izual] feedback, confirmed the formidable place of enemy, but Shi Lei not many depressed.
In fact, Shi Lei instead somewhat chuckles to oneself!
computing resources that Shi Lei attack Defend the Server transfers, 280 tflops Concentrated Distribution Computing Resources that merely only then Supercomputer [Lightning] provides.
But mysterious invasion side Defend the Server, resists the Shi Lei invasion time, actually transferred 300 tflops Concentrated Distribution Computing Resources.
This means mysterious invasion side Defend the Server, Defense System of use, when resists attack, basically needs to defer to 1 : 1 proportion. Invests computing resources, can resist the invasion.
Regarding Defense System, this proportion not Outstanding.
True Outstanding Defense System. For example [Endless Defense] System that Mirror Science and Technology Group has, can be 1 : 5 proportion under normal conditions. Even in the small scale intrusion event, the defense investment and invasion of [Endless Defense] System invests, can achieve the exaggerating 1 : 10 degree.
However, along with computing resources magnitude increasing, this proportion will drop gradually. After having exceeded certain magnitude degree, [Endless Defense] System defense and invasion investment proportion, most also can only be 1 : 5.
Do not think that 1 : 5 defense and invasion investment proportion does not exaggerate. This proportion exaggerates. [Endless Defense] System is known as World First Defense System, is indisputable!
„[Izual]. Calculates the [Interweave Net Miwang] overall structure seed basic point coordinated, prepares to activate the [Interweave Net Miwang] overall resources at any time.” Shi Lei was telling [Izual]. Prepares [Interweave Net Miwang].
After telling accomplish, Shi Lei had considered, clenched teeth finally , to continue to tell: „Detects the d situation, two confirmed d, start the d operation plan in advance!”
„Sir, warned that d is the danger operation, please be authorized to operate.” [Izual] was reminding Shi Lei, requesting Shi Lei to give the operation authorization.
So-called d, exactly as stated is [Interweave Net Miwang] provides computing resources Brave's World user, each user, represents a [Interweave Net Miwang] basic point, is d.
d opinion is, computer disposes good user, especially has used Personal Game Server Gamer, belongs to d absolutely.
As for the d operation plan, is defined as the danger operation, this is because of the d operation plan, will enhance [Interweave Net Miwang] to gain the d user computing resources quantity.
In advance starts the d operation , is forced the helpless behavior. After all, Shi Lei analyzed some danger situations...
Hanya sebuah blog kecil yang bertujuan saling membantu sesama. Semoga dapat berjalan dengan lancar.
Wednesday, January 10, 2018
1648: OverSeed!
Subscribe to:
Post Comments (Atom)