HK1551 quick crash defense!

.

February Twenty-seven day, near the early morning.

Shi Lei posted a post at Internet World in Yinni Nation, which put Li Jian Nation in a very passive situation.

After all, the video released by Shi Lei was based on the Security Surveillance Camera of the National Independence Monument, and the Specialist of Yinni Nation has determined it. At the same time, this slightly blurred video record, after the identification of the Numerical Technical Expert, shows that it is the original video recording, and has not done any technical processing.

So, in this video, the two Pilot-less Aircraft numbers are recorded without any issues, which is a strong proof that both Pilot-less Aircraft belong to Li Jian Nation!

“Izual, start cleaning up the intrusion!” Shi Lei smiled and told, Shi Lei was quite satisfied with the easy win.

“Sir, Three-layer Protection Network is attacked!” Izual reminds Shi Lei that the relevant situation is displayed in the Virtual Transparency screen of the LIPLens-type Information Processor.

Izual uses the Graphicalization scheme to form a Sphere-type Network with 324 blue dots, representing the temporary bot server that makes up the Three-layer Protection Network. Among them, three larger and brighter blue light spots, exactly as the three-layer Protection Network Core, three Small-scale Supercomputer.

However, in the Sphere-type Network composed of 324 blue dots, there is a pale-blue spot, which is currently flashing red and blue alternating radiance, which means the Zombie Server is invaded.

Shi Lei gave a slight glimpse of both hands and quickly entered the source code on the keyboard, ready to see the Zombie Server in person. But Shi Lei has not yet entered the temporary bot server and has to stop.

Because the invaded temporary bot server has been brokenthrough!

In the Sphere-type Network, the light spots that alternately flash red and blue. The red that became the constant light represents the depression of the temporary bot server.

“Impossible!” Shi Lei exclaimed!

Although the invaded temporary bot server is just an Ordinary Server, the computing performance is not even 0.1tflops. But as part of the Three-layer Protection Network, it is protected by the Endless Defense System.

The protective power of the Endless Defense System, even its manufacturer, Shi Lei, cannot break through. Not to mention other Hackers.

“Izual, what is the situation of the temporary bot server? Why does Endless Defense System not block the invasion?” Shi Lei quickly asked Izual.

“Sir, System is temporarily unable to determine the specific situation, System has been unable to access the depressed temporary bot Server. Sir, Three-layer Protection Network has been invaded again, the scale of the invasion expanded!” Izual reminded again.

In the Virtual transparency screen of the LIPLens-type Information Processor, 324 is a Sphere-type Network consisting of light spots. Suddenly there was a dense red and blue interlacing, and Shi Lei couldn’t tell at a glance how many temporary bot servers were attacked.

Fortunately, Izual showed specific data on the Virtual transparency screen of the LIPLens-type Information Processor. A total of 98 temporary bot servers were attacked.

The composition of the Three-layer Protection Network. In addition to a Core’s Small-scale Supercomputer, there are eight high quality Zombie Servers, and the remaining ninety-nine temporary bot servers have mixed computing performance and can only be used as auxiliary calculations.

The invasion side first invaded an Ordinary temporary bot server. Then invaded the XombiX Ordinary Zombie Server, apparently determined. The composition of the Protection Network.

The Three-layer Protection Network was heavily invaded and Shi Lei tried to determine one of the Ordinary Zombie Servers. What shocked Shi Lei happened, 98 Ordinary temporary bot Server, actually less than twenty seconds. The collective was broken down.

Even though Shi Lei will not do anything better!

‘Who is it? What is the situation? Did Li Jian Nation discover my actions so quickly? And is there an Expert on the DARPAAdvanced Bureau? ‘Shi Lei in the heart secretly guessing.

“Sir, First Level Protection Network is about to fall, Endless Defense System starts the self-destruction code and is expected to be deleted within three seconds.” Izual prompts Shi Lei.

At the same time, the First Level Protection Network, the last nine temporary bot servers, were also invaded. Even though Small-scale Supercomputer with 5tflops is calculated, and it doesn’t stick to twenty seconds, it is ruthlessly brokenthrough.

Shi Lei watched the First Level Protection Network being broken through, but there was no way. In less than a minute, Shi Lei didn’t even figure out the other’s invasion side case.

In other words, the other party broke through the blockade of Endless Defense System, which caused Shi Lei to have a deep concern. Since the other party can break through Endless Defense System, can the other party invade Dream Entertainment Company’s Internal Network?

“Sir, Second Level Protection Network was invaded, the Invasion side adopted the Three Step Invasion solution, 99 Ordinary temporary bot Server with First Round attack, 8 high quality temporary bot Server with Second Round attack, Core Small-scale Supercomputer with Third Round attack.” Izual made an alarm.

After destroying the First Level Protection Network, the invasion side has clearly mastered the composition of the Protection Network, directly in the three-stage attack scheme, and attacked all Zombie Servers of the entire Protection Network.

The Resistance Level of the Second Level Protection Network is only less than one third of the First Level Protection Network. Within 12 seconds, the Second Level Protection Network crashes completely!

Shi Lei bit his teeth, started talking: “Izual, disconnect from the Three-layer Protection Network!”

“Yes, Sir!” Izual responded, although the connection to the Three-layer Protection Network was disconnected directly, the legacy connection IPaddress is in the Three-layer Protection Network, but after disconnection, it will be valuable for Shi Lei. Time to re-deploy the defense.

The Three-layer Protection Network is the outermost defense and the most safe area. Fighting in the Three-layer Protection Network is the ideal situation for Shi Lei.

But the Three-layer Protection Network didn’t even resist for two minutes, which is incredible!

After disconnecting from the Three-layer Protection Network, Shi Lei personally began to deploy the defense strategy. Shi Lei took the three Supercomputers that were in the hands of 15tflops and formed the Triangle Defense Network.

The Triangle Defense Network’s protection is so powerful that no matter which Supercomputer the enemy invades, the other two Supercomputers can support it immediately.

Shi Lei has three Supercomputers in his hands, belonging to Wo Sang Nation, Li Jian Nation, and Great Britain EmpIRE. Although Shi Lei holds them, Shi Lei has never used it, just as an alternate card.

The situation is urgent now, and these three cards are turned over at the same time by Shi Lei!

Shi Lei just accomplished the Triangle Defense Network, the unknown and fierce invasion side, has broken the Three-layer Protection Network, and found the connection IPaddress, traced to Shi Lei.

In the face of the arrogant invasion side, Shi Lei is also worried, directly open the Task simulator, the Tasks of the three Supercomputer currently, simulate the simulation program, take over all the computing resources of the three Supercomputer, in order to fight against the fierce invasion side .

Three computing resources reach the 15tflops Supercomputer, the Triangle Defense Network, in the protection power aspect, in fact, and the protection power of the Three-layer Protection Network, there is not much difference.

Although from the comparison of computing performance, the Triangle Defense Network consisting of three Supercomputers is indeed far more than the Three-layer Protection Network. But in terms of structural complexity and defense strategy, the Three-layer Protection Network is ahead of the Triple Defense Network of three Supercomputers.

If represented by a simple percentage data, the Three-layer Protection Network’s computing resources are only less than the 30% of the Triangle Defense Network, but Defensive Power has reached 80%.

With three Supercomputers forming the Triangle Defense Network to resist the mysterious invasion side, Shi Lei in the heart is not at all grasped. Shi Lei is only the Hope Triangle Defense Network, which can block the invasion side for a longer time, so that Shi Lei can build more. More defense network, or the inverse side of the inverse side of the analysis side of the analysis side.

However, the situation is beyond the expectations of Shi Lei’s!

It was not a tragic situation, but a good result. The Triangle Defense Network succeeded in resisting the attack on the invasion side. The Triangle Defense Network steadily blocked the invasion and there was no difficulty at all.

Shi Lei asked a bit of disbelief: “Izual, Triangle Defense Network is not brokenthrough?”

“Sir, Endless Defense System successfully resisted the attack on the invasion side. The Triangle Defense Network has not been broken through, but System detected that the invasion side currently rapidly increases the computing resources of the invading data. The load of the Triangle Defense Network is rapidly increasing.” Izual responded to Shi. Lei.

Shi Lei quickly said: “Access IWNMiwang’s computing resources and reinforce Triangle Defense Network!”

“Yes, Sir!” After Izual responded, he immediately began to mobilize IWNMiwang’s Loose Distribution Computing Resources over 1700tflops and gradually invested in the Triangle Defense Network.

When Shi Lei told Izual’s, the load on the Triangle Defense Network has reached 80%, and the load is still increasing rapidly.

If Shi Lei did not promptly access the resources of IWNMiwang, I am afraid that the Triangle Defense Network is about to collapse. At that time, even if the Triangle Defense Network was not compromised, it had to exit the defense sequence.

As IWNMiwang’s resources entered the Triangle Defense Network to assist the defense, Endless Defense System successfully resisted the invasion side, and Shi Lei finally had the opportunity to analyze the situation of the invasion side.

When Shi Lei analyzes the attack data of the invasion side, Shi Lei discovers the approach of the three-layer Protection Network.

(To be continued~^~)