MTL - HacKer-~ Final-075 Forced explosion!

If audio player doesn't work, press Reset or reload the page.

The needle in the haystack is completed, leaving only one unknown ip address. ◎And, Shi Lei invested 5 million tflops of computing resources, and was actually resisted!

Although the aon network and the iwn secret network, the aggregated computing resources are all loose distributed computing resources, but the order of magnitude reached 5 million, how can it be resisted?

Even with intensive distributed computing resources, it takes nearly a million computing resources to be able to withstand it.

However, the supercomputer cluster of private million-level computing resources is simply a fantasy!

Shi Lei really can't think of what kind of forces can resist such a huge computing resource and synthesize the attack.

and many more!

Shi Lei thought of a possibility!

The origin of the Internet, the starting point of the modern Internet, known as the most mysterious institution of Li Jianguo, referred to as the darpa advanced research project bureau of the ‘Advanced Bureau’!

In the rumor, darpa has a lot of resources and very high authority. Even the nsa National Security Agency needs to follow the instructions of the Darpa Advanced Bureau when necessary.

In short, darpa is the boss of the nsa National Security Agency, the boss of the FBI and the CIA boss.

The last unknown ip address, only darpa, is likely to withstand the invasion of Shi Lei.

However, darpa's network ip address is not a hidden ip address, but is published. And welcome the invasion anytime, anywhere.

In view of this situation, Shi Lei is not sure. The last unknown ip address, whether it is darpa or not.

Although I don't know the answer. However, knowing the answer is actually the same for Shi Lei.

Because, regardless of the last unknown level ip address, and is not the darpa advanced bureau, Shi Lei will completely break its defense, a complete investigation is clear.

Unless, the last unknown level ip address. Also like the previous seven unknown ip addresses, the connection to the Internet is directly disconnected.

But Shi Lei knows that such a situation is absolutely impossible!

In the global Internet world, Shi Lei has scanned all the ip address information, leaving only the last unknown ip address, and other ip addresses have been excluded by Shi Lei.

"Improve computing resources!" Shi Lei ordered, "double!"

just now. Shi Lei used three million tflops of computing resources, but could not break the defense of the last unknown ip address. Then double the computing resources and look at the last unknown ip address. Can you block the offense?

The distant Lijian country, inside a mysterious hall.

A group of middle-aged people, like young people. Shouting and shouting, as if the market is the same.

"Mandalay. The other party has increased the intrusion resources, we have to stop. You have not developed a killer program?" A middle-aged man with a beard and a beard.

The middle-aged man named Mandalay also responded with a loud voice: "Dawson, you **** bastard! Don't remind me! I am analyzing the **** mysterious virus! The killer program for the **** mysterious virus is not so Well developed! If it's so easy, do you still need me to go out?"

Through the dialogue between Mandalay and Dawson, it can be judged that they are the security guards of the last unknown ip address.

"Shit Mandalay! Give you a minute! The computing resources of the other invaders have increased to 10 million!" Dawson said badly.

Mandalay obviously does not eat this set!

"I know, you can't stop it! The servers of the lttw plan are all handed over to you. Can't you still block the loose distributed computing resources of 10 million tflops? Dawson, when did you become the rookie? Mandalay taunted.

The so-called lttw plan is a top secret plan launched by darpa.

Darpa suggested that Lijianguo establish excellent servers around the world and then listen to Internet information and even telephone network information throughout the world.

The full name of this plan is called ‘’, and Xia Guoyu means ‘listen to the world’. To put it another way, Li Jianguo is listening to the world's communication information.

In order to monitor the communication information of the whole world, the computing resources required are very large. In order to smoothly promote the lttw plan, Lijianguo has established a huge private computer network on a global scale.

With this private computer network, the NSA National Security Agency of Lijianguo was able to implement the lttw plan to monitor the world's information.

Shi Lei guessed that there was no error, and it resisted the invasion of 5 million tflops of computing resources. There was only a huge cluster of private supercomputer networks.

It is indeed impossible for ordinary people to establish a private computer network of that level, but Li Jianguo can, in order to protect their own interests, while fighting against hostile forces, they have established a global network of lttw!

Now, darpa temporarily took over the lttw network to counter the invasion of Shi Lei. After all, darpa's internal network has a lot of confidential information. Once Shi Lei has captured Darpa's internal network, the consequences are unimaginable!

As for the simple, it is basically impossible to let the internal network of the darpa Advanced Bureau disconnect the Internet directly.

The internal network of the darpa Advanced Office is more than just their internal network. In fact, the multiple confidential networks of Lijianguo are all based on the internal network of the Darpa Advanced Bureau.

Once the internal network of the darpa Advanced Office is suspended, then all other networks that use it as a transit point will be disconnected.

Some of these networks involve the core security of Lijianguo!

Including automatic weapon control networks, covering unmanned missiles, drones and more.

In short, the internal network of Darpa Advanced Bureau can't leave the Internet for a while, and at least wait for other important networks to disconnect from it before it can leave the Internet environment.

"Mandalay, how long do you have to? The pressure on the lttw network is very high. Our network interface data is too large to support for too long!" Dawson asked again.

Mandalay frowned. "Give me another three minutes! I will succeed soon. I will have three minutes! I will lie in the trough! This is a scorpion. I have to raise the sputum. Goods! I used such a hazy trick! I Already analyzed, the other party hides the virus in the source code of the operating system, but with a special encoding mode, I still need some time to analyze!"

"You stupid! Up to five minutes! We can only delay you for up to five minutes! The computing resources that the other party has mastered, you know how many! They have increased the computing resources to 15 million tflops, and the lttw network is beginning to collapse. "Dawson responded.

Another voice inserted in, "Commanded afn network offline! BPN network offline! bwsn network offline..." The voice of the temporary interjection, said a long list of offline commands.

Those networks are important networks that are mounted on the darpa internal network, and are usually protected by darpa to prevent hacking.

The afn network is the automatic weapon control network, while the bpn is the basic power network and the bwsn is the basic water network.

If Shi Lei controls those basic networks, the entire Lijian country will be chaotic!

In order to prevent darpa's internal network from being compromised, darpa network security leader Ryan, in advance, ordered all important networks to be stripped from the darpa internal network and entered a short closed self-running state.

On the other hand, Shi Lei is in the right to invade darpa's internal network. They have invested 15 million tflops of computing resources, but they are still blocked.

"Jie Shier, put all computing resources!" Shi Lei bite his teeth.

Rafael reminded: "Stone, the other party is blocking the attack on our own, and it is difficult for us to increase the speed of the invasion!"

"I know! But I don't care, we have to open the last unknown ip address!" Shi Lei said indifferently.

The so-called self-destruction server is the darpa advanced network security experts, actively sacrificing the lttw network server, using information bombs to self-destroy the lttw network server, thus temporarily blocking the invasion of Shi Lei three people.

This blocking time is very short. After all, the information bomb caused by the huge data stream can only block for a few seconds.

However, in a matter of seconds, it has already won a ray of life for darpa!

As long as Mandalay completes the killer process of the Nemesis virus, it can be cleaned up against the Vengeance virus in the entire Internet world through the killer program.

Once the Vengeance virus is cleaned up, the aon network will naturally not break, Shi Lei loses huge computing resources, and it is impossible to fight against darpa!

As for darpa mastering such a huge computing resource, why not smash Shi Lei at other times, or annihilate other world-class hackers?

First of all, the computing resources that darpa masters are not dedicated to the elimination of hackers, but to the lttw plan. At the same time, the world's top-level hackers are not unable to leave the network.

Once you leave the network, darpa has computing resources, and it is impossible to go beyond the network and seize the world's peak-level hackers in the real world, right?

"Stone brother, we can't break the defense of the other side! According to the current progress, and the resilience shown by the other party, it will take at least half an hour!" Tao Wenxian reminded Shi Lei.

Shi Lei sneered, "Well, ready to implement the aon network forcible!"

(To be continued, please search for astronomical literature, the novel is better updated faster!

RECENTLY UPDATES