©WebNovelPub
MTL - HacKer-~ Final-062 let go!
Iwn secret network computing resources are ready!
A total of 51,000 tflops of loose distributed computing resources, plus 300 tflops of intensive distributed computing resources, are all ready to go.
The mother of the server, the supercomputer origin, did not join the battle sequence. Because the supercomputer originated as the mother server of Yizheer, it controlled the balance mechanism of the entire iwn secret network, and coordinated the resource extraction scheme of iwn secret network.
Once the supercomputer originates and suffers any data impact, it is very likely that the iwn secret network will oscillate or even collapse.
Therefore, the supercomputer originated and did not join the battle sequence, but as a rear control center to handle global tasks.
Shi Lei three people control the computing resources provided by iwn secret network, anti-reverse tracking of Butler's real ip address. However, Butler has a lot of computing resources, and there are 1700tflops of intensive distributed computing resources.
Even if ion13 and a touch n14.
but!
If Shi Lei three people try ◆ map with ion13 and a touch n14, it will definitely be tragedy!
Although according to the ratio of computing resources of both parties, Shi Lei and the loose distributed computing resources provided by iwn secret network can finally win, but that is only the final victory. Because Shi Lei three people can choose to kill one thousand thousand self-damaged two thousand moves. In the end, the number of computing resources is won.
If Shi Lei three people tried to use the computing resources provided by iwn secret network and Butler hard hit, in the initial stage. Shi Lei, they will definitely lose very badly.
If Butler and Shi Lei did not die, they resisted to the last minute. In the case of unyielding and unyielding, Shi Lei, with the help of the iwn secret network's computing resources, can indeed win.
But what if Butler does not intend to compete with Shi Lei?
Butler is a pseudo-artificial intelligence system. No matter what decision Butler makes, there is a chance that Shi Lei can't guess Butler's actions. Therefore, Shi Lei three people can not be hard-hitting with Butler, only a sneaky attempt, in Butler reverse tracking data stream. Reverse anti-reverse tracking again.
"Discover the honeypot trap!" Tao Wenxian loudly. "In the base port of the broiler server, there are two honeypot traps, I have already marked them!"
Shi Lei and Raphael sighed and responded. Both of them are tapping the keyboard quickly and there is no time to discuss the communication.
Shi Lei quickly cracked the first transit server, and his face was a bit unsightly. "I found Butler using broiler jump! I am sure the nature of the broiler server!"
Butler is just a pseudo-artificial intelligence system, although the ability to think logically is almost identical to the real human category. But if the broiler server has a very high level of security, Butler can't choose a broiler server that is too difficult in autonomous state.
After all, a highly secure broiler server. There are generally twenty-four hour security guards. Once Butler caught the attention of the security guards, even if the security guards were not Butler's opponents, they would never let Butler invade. And successfully established a broiler server strategy.
Shi Lei quickly checked the nature of the broiler server, and the result was a sigh of relief. Butler-controlled broiler servers are just a matter of computing resources. Rather than a security strategy is very advanced.
"Butler may be unattended, we continue to reverse the trend!" Shi Lei loudly told.
Rafael is experimenting with Butler's reverse tracking of the authentication information of the data stream, trying to determine the specific location of the Butler's parent server through the authentication information.
However, the certification information is strictly protected by Butler, and if Raphael tries to force it, it will definitely be discovered by Butler.
Butler is tracking Shi Lei, who is pretending to be a singer. Shi Lei is also tracking Butler. The two sides track each other, no one is lax, or the pseudo artificial intelligence system does not understand loose.
Nearly half an hour, Shi Lei's three developments were few and far between, only to test out Butler's several broiler servers, and did not grasp the valuable goals.
"Stone brother, the supercomputer controlled by Butler is too strong. We want to circumvent Butler's defense, which is almost impossible!" Tao Wenxian said with some frustration.
In fact, it is indeed the truth!
If you have ion14, it is the two reefs on the coast!
Even if the seawater surrounds the reef and even floods the reef, it cannot directly destroy the reef!
Shi Lei three people want to sneak a trace of Butler's real ip address, but it is impossible to bypass the supercomputer a touch n13 and a touch n14 blocking.
In short, the chances of Shi Lei’s success are very slim!
Rafael also paused a little, frowning: "stone, the current situation seems, we only let go, try to use iwn secret network's massive computing resources, completely break through Butler's defense. Otherwise, we It is impossible to get Butler's real ip address."
Why did Shi Lei not understand?
However, Shi Lei has been imagining, has been looking forward to, hope that Butler's system has loopholes, so that they can successfully find the real ip address.
But now it seems that it is indeed Shi Lei’s fantasy!
"Stone brother, do you want to fight together? Now Butler is still tracking our real ip address in reverse, and we have established an information channel between them. If Butler retreats, remove the relevant link traces before we react. I am afraid that we want to find Butler, which is also a big problem, let alone discover Butler's real ip address and determine the location of its parent server." Tao Wenxian frowned.
Shi Lei still has some hesitation.
If you are now sneaking in anti-reverse tracking, although there is a good chance of being blocked, at least it will not be discovered and you can delay more time.
If it is said that let go of the attack with Butler, Butler will find the computing resources of Shi Lei and iwn secret network for the first time.
At that time, whether Butler will let go with Shi Lei, is still an unknown number. What if Butler runs straight?
This possibility is not non-existent!
When Butler discovered the massive computing resources of the iwn secret network, no one knows whether Butler, a pseudo artificial intelligence system, will directly retreat.
Rafael and Tao Wenxian looked at the silent Shi Lei, and they did not urge. They also understand that Shi Lei has difficulty making decisions. After all, Shi Lei’s decision is related to the life and death of Mushuang’s five people.
After waiting for about a minute, Shi Lei took a deep breath and then nodded hard: "Get ready to let go!"
The chances of a failure to let go, although high, have a greater chance of success!
The current situation is not a situation that does not seek merit but seeks no end, but must win. Therefore, Shi Lei chose to let go.
Raphael’s tone is serious, “stone, please rest assured, I will go all out!”
Tao Wenxian also said with a serious tone: "Stone brother, you can rest assured, we will succeed!"
Shi Lei just nodded dullly. "Hopefully! Otherwise... Hey, listen to the destiny of the people!" Shi Lei faintly produced a bad feeling.
After Shi Lei made a decision to let go, the three immediately began to mobilize the computing resources of iwn secret network. When the computing resources of 51,000 tflops were all sorted out, Shi Lei launched a counterattack against Butler.
Originally, Butler and yin, two pseudo artificial intelligence systems, are fighting each other. However, Shi Lei three people controlled 51,000 tflops of computing resources, and after entering the battlefield of both sides, the situation immediately changed.
The massive computing resources provided by iwn secret network, like the real sea waves, madly flocked to Butler, supercomputer a touched n13 and a touch n14 defense line, although successfully resisted the invasion of iwn secret network massive computing resources, But there have also been cases of slow operation.
Shi Lei discovered the slowness of the supercomputer a touching n13 and a touching n14 through the virtual transparent screen of the lip lens type information processor.
This is because, in the face of a sudden attack, the two supercomputers have a response time.
"Good opportunity! Directly impact the supercomputer with less computing resources!" Shi Lei issued an order to ask Tao Wen evil and Raphael, together with the supercomputer a touch n13.
Even if the supercomputer a touches n13 and a touches n14, it forms a cluster, but after all, it is not the same whole, giving Shi Lei three people a chance that is not an opportunity.
Shi Lei three people gathered all the 51,000tflops loose distributed computing resources of iwn secret network, trying to break through the defense of supercomputer a touch n13.
As long as the supercomputer a touches the defense of n13, all the problems will be solved. Because the super computer a touches the defense of n13 after being disintegrated, the super computer a touches the n14, and the situation of the single tree is difficult to bear. Finally, Shi Lei three people defeated the massive computing resources of iwn secret network.
Of course, this is only the ideal situation and the best situation.
However, in reality, Shi Lei three people gathered the defense of ion13...
(To be continued, please search for astronomical literature, the novel is better updated faster!
...