HK1552 weaknesses and Black Hand!

.

Three-Twenty Four-layer Protection Network consisting of four temporary bot servers and the Triple Defense Network consisting of three Supercomputers, the gapin the protection power aspect is really small.

However, when facing the mysterious invasion side, the Three-layer Protection Network collapsed like a avalanche. It seems that there is no resistance at all, just like the lamb facing the wolves, only the result of being slaughtered.

Instead, Shi Lei did not have high hopes for the Triangle Defense Network, which brought him unexpected surprises and successfully blocked the fierce innovation side, allowing Shi Lei to reverse analyze the attack data of the influence side.

By analyzing the attack data of the influence side, Shi Lei found some clues, the attack data of the influence side, not simply attack data, but the High Degree paralyzed Comprehensive Data.

The Triangle Defense Network consists of three Supercomputers, the Supercomputer at Li Jian Nation and Great Britain EmpIRE, belonging to the High-tech Company’s proprietary Supercomputer. This Supercomputer’s calculation task is very simple, just processing the Computing calculation Task, basically no other calculation Task.

The Supercomputer at Wo Sang Nation, affiliated with Osaka University, is an academic Supercomputer. The computational Task is mottled and the data task is very much processed.

Shi Lei analyzes the invasion data of the invasion side and finds that the invasion side’s intrusion strategy accurately stands as the normal computing Task data of the Osaka University Supercomputer, and the intrusion data is mixed in the normal computing Task data, thus trying to smoothly cross the sea.

But the mysterious invasion side didn’t think of it. Shi Lei didn’t care about the Controlling Right of the three Supercomputers. He used the Task simulator directly to take full control of the Supercomputer.

Also in other words, three Supercomputers, although the bright surface seems to be in the implementation of the respective calculation Task. But in fact, they don’t implement any calculation tasks at all, but instead put all the computing resources into the Defense System that Shi Lei needs.

When the mysterious invasion side, posing as the normal computing Task data of the Osaka University Supercomputer, tried to pass the Supercomputer’s defense policy with the Endless Defense System. When entering the Supercomputer, it was intercepted directly by the Endless Defense System.

If Shi Lei did not choose the option of burn both jade and common stone, squeezing all the computing resources of the three Supercomputers, but carefully retaining the calculations of the three computers, Endless Defense System would not prevent the Supercomputer’s normal calculation Task. The invasion side can quickly break through the Supercomputer’s defense policy and the Endless Defense System block by impersonating data.

The reason why the Three-layer Protection Network was quickly breached is precisely as stated for this reason. Killed directly by the mysterious invasion side. It is not Endless Defense System that does not work, but the weakness of the Endless Defense System’s defense strategy, which is exploited by the mysterious invasion side.

Of course, the Endless Defense System’s defense strategy is weak and can only be exploited on the external network. If you want to use the weakness of Endless Defense System in the Internal Network of Mirror Science and Technology Group, it is absolutely impossible.

Mirror Science and Technology Group Internal Network, fully in control of Izual’s. Izual controls all data calculation tasks, and Endless Defense System does not let any uncertified data enter the Mirror Science and Technology Group’s Internal Network.

and so. Endless Defense System’s defense strategy weaknesses can only be exploited by external networks. Also, once Shi Lei chooses burn both jade and common stone, Endless Defense System’s defense strategy weakness will disappear.

Determined the intrusion means of the mysterious invasion side. Shi Lei sighed in relief, invasion side is not omnipotent, Shi Lei can choose more solutions.

“Damn guy, I was almost scared by you, now it’s my turn to pack you up!” Shi Lei’s fingers in his hands brought a series of afterimages on the keyboard, and the source code of the large chunks was displayed on the screen.

The Triangle Defense Network consisting of three Supercomputers successfully resisted the invasion side. Although the computing resources were gradually improved with the invasion side, the Triangle Defense Network with IWNMiwang support did not show any signs of collapse.

Shi Lei taps the source code while looking at the invasion side. So far, the attack resources used by the mysterious invasion side have reached 200tflops. IWNMiwang injected into the Triangle Defense Network’s Loose Distribution Computing Resources to the extent of 800tflops.

According to the ratio of the two, the computing resources used by Shi Lei determine invasion side are Concentrated Distribution Computing Resources, which is the private Supercomputer on the invasion side.

Private Supercomputers with speeds up to 200tflops across the World are few in sight. Even though Supercomputer does not open to the public, there are only a handful of them.

Because maintaining the normal operation of the Supercomputer is a huge continuous investment, the Supercomputer is different from the personal computer, the continuous use cost of the personal computer is very low, the Supercomputer is different, and the Ordinary forces cannot afford a Supercomputer running cost of 200tflops. .

“Li Jian Nation Government?” Shi Lei First suspects that the target exactly as stated Li Jian Nation’s government, rumored that Li Jian Nation Government, secret has established a large number of Supercomputers, through these Supercomputers, making waves in the entire World Internet.

However, Shi Lei immediately denied such speculation!

The reason is very simple. The attack resource of the mysterious invasion side is stuck in 200tflops and has not continued to increase. If the mysterious invasion side is Li Jian Nation Government, the attack resources of the mysterious invasion side will definitely continue to increase until the Triangle Defense Network is completely destroyed.

But now, the Triangle Defense Network is impregnable, and the mysterious invasion side is blocked by the Triangle Defense Network. There is no way to go any further.

“Since it is not Li Jian Nation Government, who is it?” Shi Lei once again said to himself.

It is never a simple matter to want the identity of the investigate Hacker, especially the identity of Hacker Expert, which is the secret in the secret.

The mysterious invasion side is Expert, the absolute Expert, the other side sharply grasps the weakness of the Endless Defense System defense strategy, thus crushing dry weeds and smashing rotten wood. The general defeat of the Three-layer Protection Network has proved the identity of the other Expert.

There are only three ways to investigate each other’s identity.

First, Shi Lei reversely tracks the other party’s real IPaddress, thus investigate the side of the computer information and Reality address information. Determine the identity of the other party.

This method is not very reliable, the technical strength of the mysterious invasion side is very high, and Shi Lei wants to reversely invade the real IPaddress of the investigate. It is definitely not that simple.

The second method is even less reliable, and that is to ask directly who the other party is. Although this method has a certain chance of success, the odds are similar to the Big Prize.

The only reliable method is the only method of Third. That is, Shi Lei and the mysterious invasion side attack each other, and then through the opponent’s attack means, determine the possible identity of the other party.

If Shi Lei and Raphael are attacked each other, Shi Lei can determine it in a short time, and the opposite Hacker is Raphael.

If this time the mysterious invasion side is Shi Lei familiar with the Hacker, through each other’s attack. Shi Lei may determine the identity of the other party.

However, the other party is certainly not able to do this way, determine Shi Lei’s identity ! Because Shi Lei was born again, this world, there are very few Hackers who contact him. The Hacker, who knows the Shi Lei attack style, naturally has very few.

After determining the Action Plan, Shi Lei immediately called IWNMiwang’s computing resources to bypass the mysterious invasion side and the Triangle Defense Network battlefield. Start reverse tracking mysterious intruders.

Although the mysterious invasion side is Expert in Expert, Shi Lei is also the Hacker of World Summit Grade. Shi Lei stood at the High Degree of the Hacker World Summit, even though Shi Lei didn’t think that by tracking the mysterious invasion side in reverse, you could find the real IPaddress of the other person. Shi Lei did not give up.

IWNMiwang brings together 1700tflops’ computing resources, including 800tflops’ computing resources, to support the Triangle Defense Network against the mysterious invasion side.

Shi Lei transferred another 900tflops computing resources, which went straight down the attack data channel of the mysterious invasion side.

The huge reverse tracking data made the mysterious invasion side immediately aware of Shi Lei’s action. The mysterious invasion side responded quickly. The attack on the Triangle Defense Network was directly undone, and the 200tflops Concentrated Distribution Computing Resources was retraced. Lei invaded the data channel and attacked Shi Lei.

However, the mysterious invasion side underestimated Shi Lei, the mysterious invasion side of the reaction is indeed very fast, can have Izual-assisted Shi Lei, the reaction speed is also very fast.

On the mysterious invasion side, when retracing the attack data resources of the Triangle Defense Network, Shi Lei almost simultaneously commands Izual to put IWNMiwang’s 800tflopscomputing resources into the reverse tracking attack sequence.

The original mysterious invasion side with 200tflopsConcentrated Distribution Computing Resources, against 900tflopsLoose Distribution Computing Resources, has become somewhat stretched.

Now, 800tflopsLoose Distribution Computing Resources joined the attack sequence, and suddenly crashed the 200tflopsConcentrated Distribution Computing Resources on the mysterious invasion side.

Mysterious invasion side Faced with 1700tflops’ computing resources, it can only retreat, like the same start of the mysterious invasion side to break the Three-layer Protection Network, Shi Lei crushing dry weeds and smashing rotten wood’s constant breakthrough through the mysterious invasion side of the defense.

The mysterious invasion side is not without rebellion, but the mysterious invasion side is wrong. It is estimated that Shi Lei’s grasp of the computing resources, the struggle between Hacker, when the technical strength is similar, is often the war of hardware performance.

In Film and Television, the use of Notebook Computer to kill Supercomputers can only appear in the works of Film and Television. In Reality, unless Notebook Computer is just a front-end device, the background is connected to a huge computing resources Cluster. Otherwise, how can Notebook Computer break the Supercomputer’s defense?

In the increasingly modern era, the formerly Hacker War has evolved into a hardware war!

Shi Lei has a strong hardware resource, or Shi Lei has a strong hardware resource through Brave’s World and IWNMiwang. To some extent, Shi Lei is much stronger than the average World Summit Grade Hacker.

With Shi Lei’s reverse invasion, Shi Lei broke the mysterious invasion side one by one Defense System, and Shi Lei gradually guessed the identity of the mysterious invasion side.

The characteristics of the mysterious invasion side are obvious. First, you have the computing resources of 200tflops. At the same time, you have powerful Hacker technology, and you have a festival with Shi Lei. The identity of the mysterious invasion side is already clear!

(To be continued~^~)