HacKer

Chapter 1583: Data Impact!

As a world-class hacker, he was so teased by the h, the mysterious world peak-level hacker was very angry at this time, quickly on the keyboard, tapping a string of English source code.

The mysterious world-class hacker has opened up a real defense system based on the core defense layer of the protective outer layer and supercomputer composed of broiler networks.

The effect of combining the outer layer of the broiler network protection with the inner layer of the supercomputer core defense is not the effect of one plus one equals two, but exceeds this effect.

The protective outer layer of the broiler network acts as a coolie, and it can be accepted regardless of the attack. It is a role that is easily shackled.

The core defense inner layer of the supercomputer acts as a behind-the-scenes protector. When the defensive outer layer is subjected to various attacks, it will provide strong support for the defensive outer layer, ensuring that the defensive outer layer will not be easily broken.

The supercomputer of the mysterious world's peak-level hacker puts into defense, the calculation speed reaches 30tflops. Because the computing resources composed of supercomputers are intensive distributed computing resources, they all surpass the consistency, coordination and controllability. Loose distributed computing resources, even in the face of 100tflops of loose distributed computing resources, have maintained a dominant position.

"Hey! Loose distributed computing resources? How many personal computers and ordinary servers are black, which constitutes such a huge botnet!" The voice of the mysterious world's peak-level hackers is full of disdain.

Loose distributed computing resources are usually generated by botnets. The so-called botnet, another name for the broiler network, is not a horrible thing.

This mysterious world peak-level hacker, according to the fourth assessment server situation. Judging h doesn't have a supercomputer, it just controls a huge botnet.

Want to control a huge botnet, for powerful hackers. It's not a difficult thing, it only takes a lot of time. And write a complex set of broiler management software.

For a powerful hacker, basically not doing this kind of thing. How much computing resources can an ordinary personal computer provide? Even if a large number of personal computers are collected as broilers through a viral large-scale spread Trojan, this method is not good.

First, the large-scale proliferation of Trojans that collect broilers is easy to be harmonized by cybersecurity companies, and thus the broiler servers that have been collected. It is possible to reimburse all.

Second, the instability of the personal computer! This instability is not only manifested in the time of use, but also in terms of fault tolerance. Especially when using loose distributed computing resources, when hacking attacks, unless you use a relatively simple refusal service attack, that is, the so-called ddos ​​attack, there will be a good guarantee. If you use a difficult data joint attack, you may definitely want to drop the chain!

Suppose a situation is in the iwn secret network. 100tflops of loose distributed computing resources, requiring about 1 million users or even 1.2 million users. Can be produced.

Basically, every user, such computing performance, is equivalent to one-hundredth or even one-thousandth of the computing performance of the computer itself for the individual users of the brave world.

Extract such low computing resources in order to avoid being discovered by users. However, this has created a huge problem, so there are so many users. When performing a task in combination, the data information that needs to be calculated must be split.

What if some of the users suddenly left the Internet?

One million base users. There must be a variety of users who accidentally leave the Internet. In such a situation, it takes a very short time. Transfer data that needs to be calculated by users leaving the Internet to other users for calculation.

This extremely short time is not a macroscopic time, but a microscopic time, which is basically less than ten milliseconds, that is, within one hundredth of a second, redistributing the computing tasks of missing users.

Such a large and complex software design and management, if there is no assistance with the advanced pseudo artificial intelligence system, the limitations of iwn secret network will be very large.

It is precisely because of this situation that in the eyes of high-end hackers, the use of loose distributed computing resources is a relatively unclassified approach.

Hackers in the high-end are willing to spend more time challenging more difficult supercomputers, or powerful enterprise servers, and don't spend a lot of time doing huge botnets.

Finally, loose distributed computing resources are vulnerable to intensive distributed computing resources when faced with intensive distributed computing resources.

Comprehensive flaws, this mysterious world-class hacker against the fourth assessment server, is qualified to ridicule h for loose distributed computing resources.

however!

The hacker at the peak of this mysterious world realized his mistake after thirty seconds!

Originally, the mysterious world peak-level hacker judged that the fourth evaluation server had 100tflops of loose distributed computing resources. He called a supercomputer with a computing speed of 30tflops. It is easy to break through the fourth evaluation server. thing.

But the result is not the case!

The fourth appraisal server did not show any signs of collapse when faced with a supercomputer with a speed of 30tflops. Although the mysterious world-class hacker did suppress the fourth evaluation server, it did not break it.

The defense system of the fourth evaluation server is impregnable. In the face of the impact of the mysterious world-class hacker, there is no instability at all.

In a mysterious room, the mysterious world peak-level hacker looked at the data from the computer screen with amazement. The mouth exclaimed: "This is impossible! It is obviously provided by the botnet, which is obviously a loose distributed computing resource. Why? Didn't it suffer from data shocks?"

Perhaps for low-end hackers, they don't have such powerful technical means. Data shocks caused data shocks that disrupted the entire botnet.

But in the high-end field of hackers, use intensive distributed computing resources for loose distributed computing resources. Generating data shocks, resulting in data shocks. This is a very common means.

"It's weird! How does h deal with botnets?" The mysterious world-class hacker is suspicious of himself.

On the other side, the first-level branch of the Longteng Plan in Zhongyu District, Shuangqing City.

Shi Lei used the lip lens information processor to view the situation of the fourth evaluation server. When he saw the mysterious world-class hacker, he tried to generate data loosening and destroy the loose distributed computing provided by iwn. Resources, Shi Lei's face showed a touch of sneer.

This mysterious world-class hacker. The method used is correct. To deal with loose distributed computing resources, data shocks should be used to cause data fluctuations. All broiler servers and personal computers that provide computing resources are shaken off from the broiler network.

But iwn secret network is different!

I have analyzed before, iwn secret network extracts the computing resources of the brave world users, only one percent of the users themselves, or even one thousandth.

Extracting such scarce computing resources and facing data shocks caused by data impact will not affect d at all. That is the resource provider of iwn secret network, the game user of the brave world.

Coupled with the superior error correction function of the clothing, the data shock caused by the data impact of the district. Completely ignored by iwn secret network.

Shi Lei is also a hacker at the peak of the world. Is it not clear that the botnet is afraid of data shocks caused by data impact?

The mysterious world-class hacker, trying to use this conventional means to deal with iwn secret network, can only be said to be delusional!

Looking at the mysterious world's peak-level hackers, Shi Lei is only a quiet observation. So far, this mysterious world-class hacker has not shown any obvious personal characteristics, and Shi Lei has not judged it. Who is this guy?

Shi Lei needs more time to confront this mysterious world-class hacker with the fourth assessment server. Thereby judging the identity of the other party.

The mysterious world's peak-level hacker, when the data shock caused the data to oscillate in a way that failed. This mysterious world-class hacker did not immediately try a new way of intrusion, but was prepared to try another data shock.

However, this time, the mysterious world peak-level hackers, prepared data impact methods, there will be some different!

After all, it has failed once. If you still use the same attack method, I am afraid it will not cause any destructive power. Therefore, the mysterious world-class hacker, although ready to use data shocks again, but a new means of data impact.

Every world-class hacker is not a simple character!

If you want to be a world-class hacker in a simple way, there are only two situations. The first one, with a truly unrivaled talent, is a different data scheme, that is, iq IQ has reached about 200 degrees.

This kind of iq-level players can basically complete hacking without a teacher, starting from the most basic learning, and then gaining higher and deeper knowledge through Internet resources, and reaching the peak of the world.

But human iq IQ is above 140. There is basically no possibility to achieve iq IQ of more than 200.

As for another possibility...

(To be continued)

Ps: Another possibility, really really simple, it is possible that everyone can meet the requirements!

Guess what?

...

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like