©WebNovelPub
MTL - HacKer-~ Final-063 has nothing to do!
In the battle with Butler, Shi Lei began to choose a conservative plan, trying to win Butler in silence. ...≦
But that is obviously only the fantasy of Shi Lei!
Butler has a supercomputer a touch n13 and a touch n14, a total of 1700tflops of intensive distributed computing resources, Butler has been invincible!
In a well thought out situation, Shi Lei had to choose to let go, mobilize all the iwn secret network computing resources, and fight hard with Butler.
Shi Lei’s decision to let go of his hand is probably correct!
Because, Shi Lei three people with the defense power of ion13!
Supercomputer a touches n13 by iwn secret network massive computing resources to break through the defense, and then the self-protection mechanism starts, automatically restarts.
According to the supercomputer a touch n16 has the computing resources, reverse inference analysis, it takes at least 20 minutes of start and self-test time.
In other words, within twenty minutes, the supercomputer a can not join the battle sequence again. The computing resources that Butler can use are reduced by 500tflops, leaving only 1200tflops.
Although it seems that Butler’s power is weakened, it is not without the power of a war. However, don't forget that there is no reduction in the amount of massive computing resources provided by iwn.
When the strength of one side is reduced, the strength of the other side does not increase, but it is equivalent to an increase in disguise!
"Fini. Jazz, kill another supercomputer with a bang! Completely isolate Butler!" Shi Lei ordered.
By letting go of the attack. Shi Lei determined that the supercomputer a touches n13 and a touches n14, not the Butler's parent server.
Butler's parent server. Hidden in other locations, but Butler's parent server is definitely connected to the supercomputer a touch n14.
Only the parent server and the supercomputer a touch n14 link, Butler can control the supercomputer a touch n14, and other servers.
Supercomputer a touches n14, which is equivalent to Butler's last fortress!
If the supercomputer a touches n14 also falls, Butler's card will be completely opened, the real ip address of the parent server. It will also emerge.
As long as the real ip address of the parent server is captured, Shi Lei wants to find the corresponding real address, which is not a problem at all.
Once Shi Lei is in the real world, visiting Butler’s parent server and wanting to get Butler’s internal information is definitely not difficult.
The defense strength of the pseudo artificial intelligence system is indeed very strict, but it is only for the case of intrusion from the outside. If it is said, Shi Lei has an opportunity. Direct contact with Butler's parent server, that is, direct contact with the hardware system that carries Butler.
According to Shi Lei's technology, I want to break Butler's defense, in fact. Not too difficult!
"Okay!" Tao Wenxian responded with high morale.
Raphael also said with a smile: "No problem! The one with relatively few computing resources has been killed by us, and the rest is just a cold tooth!" Raphael said a idiom of Xia Guo. . Described as very appropriate.
Supercomputer a touches n13 and a touches n14 interdependence, and now supercomputer a touches n13 down. Supercomputer a touches n14, it is really difficult to fight the massive computing resources provided by Shi Lei three people and iwn secret network.
The 51,000 tflops of loose distributed computing resources captured by iwn. Under the control of Shi Lei three people, once again rushed to the supercomputer a touch n14.
Supercomputer a touches the defense system of n14, and it is difficult to resist the invasion of Shi Lei three people. The defense system is constantly being broken. Shi Lei estimates that for up to three minutes, the supercomputer will touch the restart.
Shi Lei’s face showed a smile involuntarily!
Tao Wenxian and Raphael naturally show a happy look!
However, the smile on Shi Lei’s face has not been maintained for one minute, and he immediately froze!
Because, on the computer screen, the information of ion14 is displayed.
When this happens, there is only one possibility!
Supercomputer a touch n14, offline!
The supercomputer a touched n14, which was directly blocked by Butler in the most rude manner, and broke the link with the Internet, which led to the attack of iwn secret network and lost the target.
Since supercomputer a touches n14 offline, Shi Lei naturally cannot invade into supercomputer a and touch n14, nor can it obtain Butler's real ip address, and it is even less likely to obtain Butler's parent server, the actual address.
In short, Shi Lei tried to obtain the information of the Chaos Snake in the field of biological genes through Butler, and completely failed!
Butler really is exactly the same as Shi Lei expected, the worst case, the direct retreat of the broken wrist, does not have any contact with the Mi Rui Technology Group.
Under such circumstances, Shi Lei wants to find Butler, as difficult as finding a needle in a haystack.
Butler's mother server's real ip address is uncertain, how does Shi Lei directly invade Butler in the Internet world?
Don't think that Shi Lei is in the online world. It seems to be a **** who calls for the rain. If you want to know what to do, how can you love it?
Although the fact is also true, Shi Lei is indeed the **** of the online world!
But this does not mean that Shi Lei can invade as he pleases. It has also been said before that if you want to invade a target in the online world, you first need that target to exist and know the exact target address.
For example, Shi Lei wants to invade the internal system of the CIA Central Intelligence Agency. First of all, Shi Lei has already determined that the intrusion target is the internal system of the CIA Central Committee; secondly, Shi Lei knows the address of the internal system of the CIA Central Intelligence Bureau.
Because knowing these contents, Shi Lei can successfully invade!
If Shi Lei didn’t know anything, or the internal system of the CIA’s CSI did exist in the Internet, but it was not announced, and it was not linked with the official website of the CIA Central Committee. How did Shi Lei invade? What?
Usually, when a hacker invades a target, in addition to a special fixed target, it is actually a random target. Because a considerable number of hackers, randomly chaotic in the Internet, search the Internet, hidden in the dark network and computer systems.
When the network and computer systems of interest are discovered, an attempt is made to invade.
If Shi Lei wants to invade Butler's parent server, most of them will use this method. However, Shi Lei is a specific target, not a random target.
How can we deal with it in order to search for the existence of Butler in the Internet world?
As for whether Butler will break the link with the Internet autonomously, Shi Lei is not worried. Because the pseudo-artificial intelligence system wants to disconnect from the Internet, or to disconnect from the Internet in the case of disconnected Internet status, a super administrator is required to perform real-time authorization.
Butler's super administrator is a snake of chaos. The snake of chaos is finished. Butler can't get the real-time authorization of the snake of chaos, and naturally can't disconnect from the Internet.
Otherwise, just Butler's treatment is not to abandon the supercomputer a touch n14, but to actively disconnect from the Internet.
However, although Butler will not actively disconnect from the Internet, Shi Lei wants to find Butler's real ip address, it is indeed a needle in a haystack... No!
It should be, in the sea, look for a drop of specific sea water!
Because Butler's real ip address and the real user's real ip address, there is no difference at all, placed in the Internet world, completely the same.
Unless Shi Lei scanned Butler's real ip address and tried it out, he could find out that it was Butler's real ip address.
Otherwise, Shi Lei could not find it!
This level of difficulty is already a solution to the problem without a solution!
If there is no time limit, Shi Lei can slowly scan the Internet randomly, try to try his luck and look for the real IP address of Butler.
Whether it is found or not found, it is just a matter of luck. There is no time limit anyway.
But the situation is different now!
The current situation is that the unknown genetic toxin in Ling Yu Mo has erupted after about five days. If there is no related antidote, Ling Yu Mo will die.
In other words, Shi Lei must discover Butler's real ip address within five days, and crack the Butler system, obtain the relevant technical information of the Chaos Snake in the field of biological genes, and then hand it to Sword Musou to develop antidote.
In just five days, is it possible to make so many things?
It seems impossible!
Even if the probability is very low, the chances of success are incomparable, but Shi Lei still has to do his best to fight hard. Shi Lei is afraid to lose Ling Yumo them. If they really become memories, they will wrap around Shi Lei for a lifetime!
Shi Lei does not want that ending!
So the powerful chaotic snakes have been defeated. Can't you beat Butler?
Just, the current situation seems to be really nothing to do, as if it really can't catch Butler's real ip address!
(To be continued, please search for astronomical literature, the novel is better updated faster!