LNMTL
HK :: VOLUME #17
#1649: real identity!
Comments 0
Report
English
Chinese
……
Mystical invasion side Defend the Server, facing Shi Lei uses the Supercomputer [Lightning] impact the time, unexpectedly transferred 300 tflops Concentrated Distribution Computing Resources directly.
Although Defend the Server Defense System, investment proportion of defense and invasion close 1 : 1, this is a good news, from one side indicated that the invasion side defense strength is not quite perhaps strong.
But this is also not a good news!
Because Shi Lei is only invasion of probe guarantees Server merely, unexpectedly makes the response of mysterious invasion side so big, transferred 300 tflops Concentrated Distribution Computing Resources one time.
This behavior confirmed fully, mysterious invasion side is grasping many computing resources absolutely. If no many computing resources, how possibly one time to invest 300 tflops computing resources?
In Hacker World, the situation of way bright card in a hand are not directly many by ‚showhand’. Only if, 100% determinations, can indeed defeat the opposite party. Otherwise, leaves behind the card in a hand is the conventional choice.
Shi Lei analyzed mysterious invasion side, controlled is being above computing resources outside imagination. Therefore, Shi Lei ahead of time orders [Izual], in advance opens the d operation plan.
d operation plan implement gets up, has certain danger degree. Because, through the d operation, promoted [Interweave Net Miwang] from the d basic point, extraction many computing resources.
Each d represents Gamer computer equipment, when [Interweave Net Miwang] is at half dormant state, [Interweave Net Miwang] will maintain each d will only be at half ready condition, threshold will let loose the Gamer computer equipment performance.
Because under the condition of [Interweave Net Miwang] half dormant state, [Interweave Net Miwang] does not need to gather Loose Distribution Computing Resources, naturally will not occupy user computing resources.
When Shi Lei orders [Izual] to optimize the [Interweave Net Miwang] resources. [Izual] will then change the [Interweave Net Miwang] condition, enters the normal work from half dormant state the state of activation.
[Interweave Net Miwang] of normal state, will derive computing resources from d. However. In order to guarantee unable to affect the normal use of user, [Interweave Net Miwang] 1 tflops Loose Distribution Computing Resources. Big date derives from 20,000 d basic points.
Also in other words, when [Interweave Net Miwang] is at the normal working condition, each d basic point, needs to provide 0.00005 tflops computing resources approximately on average.
Under normal conditions, [Interweave Net Miwang] derives so scarce computing resources, will not affect the normal use of user. Only if, individual user computer equipment extremely in obsolete. But met that situation, [Interweave Net Miwang] will not derive computing resources from obsolete computer equipment.
Once after opening d to operate. This data then meets promoted. For example each d merely only provided 0.00005 tflops, now according to the [Interweave Net Miwang] demand, this data may promoted one time, even is several times.
computing resources that if [Interweave Net Miwang] derives are too much, will then affect the normal operation of user. Therefore, [Izual] prompts the d operation, is the danger operation.
But the current situation, making Shi Lei unable to control temporarily that many, strength that after all mysterious invasion side displayed extremely in great strength, if did not start the d operation. If by mysterious invasion side by huge computing resources, had been shattered [Endless Defense] System directly, that what to do?
Although [Endless Defense] System was known as that defense is invincible. But in fact, [Endless Defense] System is also not the true invincibility.
If in a short time, gathered very huge computing resources, then attacks [Endless Defense] System collectively, once computing resources of collective impact, has exceeded beyond the [Endless Defense] System withstanding range, then [Endless Defense] System will then overload to be forced to restart.
In a short time, [Endless Defense] System that is forced to restart in [Endless Defense] System will then not play the role, equivalent to from another form. Solves [Endless Defense] System.
„Sir, [Interweave Net Miwang] enters active state of activation d two confirmed accomplish d operation plan preinstall accomplish.” [Izual] was reminding Shi Lei.
[Interweave Net Miwang] enters the state of activation comprehensively. Also entered the Hacker state of war, so long as Shi Lei issues an order, [Izual] can within five seconds, collect all d, and starts the d operation plan.
Shi Lei nodded, fixes the eyes on computer screen to look at mysterious invasion side Defend the Server, to make actually also what response.
However, mysterious invasion side Defend the Server, simply does not have any response, but is resisting the Shi Lei's invasion, but has not made any counter-attack.
Such behavior, making Shi Lei have a strange idea, mysterious invasion side did not have the formidable Hacker technological strength, had formidable computing resources merely?
But like this strange idea, in the birth, was disillusioned directly!
Since has formidable computing resources, possibly doesn't have the formidable Hacker technology? If there is that situation, Shi Lei can only say that the money many people are silly.
Naturally, Shi Lei has thought that even if can also want to understand with the toe that does not have the formidable Hacker technology, is impossible to have formidable computing resources.
Regardless of formidable computing resources obtains from any channel, can only explain that mysterious invasion side has the formidable Hacker technological strength. It is not high as for Defense System defense and invasion proportion, most can only explain that the mysterious invasion side defense technology, is not quite exquisite.
„[Izual], [Interweave Net Miwang] and network links, takes network as the backbone, the [Interweave Net Miwang] channel, establishes on network!” Shi Lei told again.
So-called network, is Mirror Science and Technology Group establishes Neutrino information network in entire World range. Each continent, has a Neutrino information network basic point. Then connects to being located in the Shuangqing City final end, thus establishes to take Neutrino as carrier information network.
The Neutrino information network characteristics lie in delay are low, even if from Li Jian Nation to the transmission of Xia Nation, delay is also lower than 1 millisecond, almost equivalent to does not have delay.
Therefore was named as network by Shi Lei, represents ‚the non- delay zero lag’ network.
Brave's World's user of [Interweave Net Miwang] the Worldwide range -based , besides Xia Nation and Asian Area d, the d transmissions of other areas to Xia Nation Shuangqing City, will present certain slowness.
For example d of Li Jian Nation area, will produce very fearful delay!
The [Interweave Net Miwang] usual function, assists Brave's World's Core Server to manage Brave's World's to operate merely. But now, Shi Lei needs to transfer [Interweave Net Miwang] to attend the Hacker war. Therefore, Shi Lei lets [Interweave Net Miwang] and Neutrino information network links, Create leaves low delay [Interweave Net Miwang], further increases [Interweave Net Miwang] computing resources application.
computing resources that [Interweave Net Miwang] provides is Loose Distribution Computing Resources, to Concentrated Distribution Computing Resources, has certain flaw. And, biggest flaw, exactly as stated Delay Issue.
Now draws support from network, this flaw was made up for large section. Loose Distribution Computing Resources that [Interweave Net Miwang] provides, will be closer to Concentrated Distribution Computing Resources.
While Shi Lei told continuously the [Izual] implement Hacker war preparations work time, in that Ten Thousand more than 2000 corpse user that Dream Entertainment Official Gamer Forum stirs up trouble, had the change again.
That Ten Thousand more than 2000 corpse user, suspended Publishing Content Type Attack unexpectedly, but does not have implement any operation.
The Shi Lei in the heart strange ponder, ‚these corpse are user, actually wanting to make what?’
However, when Shi Lei has not found out an explicit answer, [Izual] to Shi Lei has reported information.
„Sir, Dream Entertainment Official Gamer Forum registration user dramatically increases, according to the statistics of System, in the past 11 minutes, altogether increased 173,837 to register user. System has drawn an item at random 1000 user, carries on reversion tracing real ip address, the final tracing clue, arrived at marked Server.” [Izual] was reminding Shi Lei.
The Shi Lei's complexion is very ugly, marked Server, exactly as stated mysterious invasion side Defend the Server. This means that these mysterious invasion side, in short 11 minutes, have registered ten Seventy Thousand multi- Dream Entertainment Official Gamer Forum user account numbers once more.
„[Izual], determine registers user Identity Information newly!” Shi Lei has issued the order, simultaneously is rapping the code on the keyboard fast.
[Izual] when verifies registers user Identity Information newly, Shi Lei entered the Yinjia Nation Nation(s) population information data storehouse.
Because counts information according to [Izual]'s, these register user Identity Information newly, completely is the Yinjia Nation citizen. Therefore, Shi Lei through the preinstall in Yinjia Nation Nation(s) population information Bureau of Statistics Back Door, entered the Nation(s) population information data storehouse.
In the Yinjia Nation Nation(s) population information data storehouse, Shi Lei told: „[Izual], the overlapping match checks Identity Information!”
[Izual] implement the Shi Lei's order, Dream Entertainment Official Gamer Forum new registration suspicious user Identity Information, in the Yinjia Nation Nation(s) population information data storehouse, has carried on the overlapping match contrast immediately.
After undergoing the match contrast, [Izual] the result information demonstration in the LIP Lens-type Information Processor Virtual transparence screen.
Those who make Shi Lei depressed is, these register suspicious user identity newly, completely is unexpectedly real! Completely is citizen identity that Yinjia Nation has really!
Hanya sebuah blog kecil yang bertujuan saling membantu sesama. Semoga dapat berjalan dengan lancar.
Wednesday, January 10, 2018
1649: real identity
Subscribe to:
Post Comments (Atom)