HacKer

Chapter 1875



Final-067 is still not enough!

The haystack plan is the only solution that can discover the real ip address of the Butler mother server. ≤

Although this one program will consume huge resources, Shi Lei does not care!

Shi Lei only cares, can you find the real IP address of the Butler mother server, and when can you find the real IP address of the Butler mother server.

Shi Lei’s confidante has entered the line of sight of death. If he wants to save them all, they must compete with the **** of death.

Especially Ling Yumo, she only has less than 115 hours of life!

The clothing pilot started the haystack plan, the logic analysis program has started, and began to analyze the Internet world, each ip address, and the subnet under the ip address.

The most important thing in a haystack plan is the grading system!

The so-called grading system divides the ip addresses inside the Internet into different categories and divides different degrees of attention according to different levels.

Through the grading system, the workload of the haystack plan is effectively reduced. As with the work of screening soybeans, if black beans are mixed in, the black beans must be excluded first.

Now, the grading system for the haystack plan is to divide the different ip addresses and what users belong to them. According to the restrictions set by Shi Lei, the grading system first excludes the ip segment of individual users, and then excludes related ip segments from known institutions, enterprises, government departments, and so on.

After excluding the ip segments of individual users, business users, and government agencies, the remaining ip addresses that need to be analyzed are greatly reduced.

Through the grading system. The workload of the haystack plan can be reduced by at least half!

An ip address that has not been excluded. It will also be graded. According to the level of threat, from low to high. Separate security level, unknown level, suspect level.

Among them, the security level is 100% certain, it is definitely not the real IP address of the Butler mother server, it will be put into the security level.

The unknown level is after the initial scan of the clothes, and it is impossible to determine the situation and will be included in the unknown level. Because, after a preliminary scan by the clothes, it is impossible to determine the situation, if it is said that the scan task is further carried out. More computing resources will be needed, which will drag down the overall progress of the needle in a haystack.

In order to avoid such a situation, Shi Lei set up to find the ip address of the unknown level, directly listed in the unknown level, notify the system administrator, and the system administrator personally scans the analysis.

The last suspect level is that after the initial scan, the ip address is directly found, which may be the real ip address of Butler’s parent server.

The number of suspects. Certainly not too much, set this level, just to prevent it!

“The grading system has been completed, and the haystack plan is officially opened!”

Inside the virtual transparency screen of the lip lens information processor. It shows that the plan for a needle in a haystack is officially started. The first screening area of ​​the haystack plan was chosen by Shi Lei in Lijian Country!

After all, whether it is an organization. It is also the Angel Council, both of which are rooted in the Lijian State. Another journey in life. Shi Lei knows that Abertil’s parent server. It is located in the Lijian country.

The computing resources gathered by iwn secret network, all through the private neutrino communication network of Mi Rui Technology Group, all flooded into Li Jianguo and began to scan the entire Internet world of Lijian.

More than 1 million tflops of computing resources, flooding into the Internet world of Li Jianguo, almost slammed the CIA Central Intelligence Agency and f forcing the FBI’s network security department!

Such a huge computing resource, whether it is the CIA Central Intelligence Bureau or the FBI, cannot guarantee that they can block 100%.

Even those computing resources are just loose distributed computing resources. When loose distributed computing resources are brought together to a certain extent, they are still very slim.

fortunately!

The Central Intelligence Agency of Cia and the cyber security department of the FBI, found that millions of computing resources influx into the world of Lijianguo network, just scanning the cyberspace, it seems that there is no intention to destroy, they are temporarily loose Tone.

Li Jianguo is a democratic and open country, at least on the surface!

The CIA is also good, f is forced to force the FBI, or their boss nsa National Security Agency, or even the big brother darpa advanced bureau, their internal network, in the Internet world, there are access ports, even open Access port.

All well-known hackers know all about their internal network access.

It is not a secret that includes the network of the Likins government and the military network, and the access ports in the Internet world. The server that truly stores the non-light data is determined to be isolated from the Internet environment, even without electronic data.

Therefore, the Central Intelligence Agency of Cia and the cyber security department of the FBI found that the influx of millions of computing resources was just a sigh of relief when searching for ip address information in the online world.

If the actual controller of this million-level computing resource wants to conflict with Lijian, or wants to steal confidential information from Lijian, it is absolutely impossible to scan the IP address in the online world. Directly determine the target of the impact of the sleeve.

Now, millions of computing resources, the behavior shown, clearly illustrates one thing, millions of computing resources are looking for hidden targets, and should be private grievances, rather than stealing the official secret information of Li Jianguo.

The results of this analysis have made the CIA Central Intelligence Agency and the FBI, the experts in the cyber security department, feel at ease, but they are secretly worried.

After all, millions of levels of computing resources have rushed into the online world of Lijian, even if it has not shown maliciousness, but in case it shows maliciousness?

No one can guarantee that the other party is malicious?

In order to prevent millions of computing resources from invading the official network of Lijian, even the military network, the CIA and the FBI began to prepare for the response.

If Shi Lei knows their worries, Shi Lei will definitely sneer at it. How can Shi Lei waste time and computing resources and invade Li Jianuo’s network system?

Don’t be kidding!

How precious Shi Lei’s time is, in such a situation, it is absolutely impossible to waste time with them!

“Stone brother, the unknown ip address, has been marked 27, which one do we start to analyze?” Tao Wenxian asked Shi Lei.

“Just these two!” Shi Lei directly selected two of the addresses, as the first batch of unknown ip addresses for manual analysis.

Tao Wenxian reveals an incomprehensible look. Is Shi Lei the two addresses that he chooses casually?

Rafael replaced Shi Lei and explained: “The two ip addresses are New York!”

Tao Wenxian coughed up. He obviously didn’t have the hobby of remembering the ip address. Anyway, investigating the actual address corresponding to the ip address is not a difficult thing. Why remember?

In order to conceal his own embarrassment, Tao Wenxian ordered: “Jie Shier, all the unknown ip addresses, all marked with attribution.”

Shi Lei did not make fun of Tao Wenxian. After all, there is no regulation. It means that the world’s top-level hackers need to record the attribution of the ip address.

Of course, quite a few hackers do record the ip address attribution, which is convenient for directly and directly determining the area where the ip address belongs.

The two ip addresses chosen by Shi Lei in New York City are mainly because of the Abertier of the Angel Council and the parent server is located in New York City.

Don’t think that New York City is too prosperous, the goal is too big, and the Chaos Snake will not put Butler’s mother server in New York City.

In fact, such a possibility may exist completely!

As the saying goes, the big hidden in the city!

What if Butler’s mother server is in New York City?

The answer to this question, no one can determine the answer until the final result comes out!

Shi Lei three people quickly scanned and analyzed two unknown ip addresses, one of which was an unknown ip address, and was also invaded by three people. It was found that the unknown ip address was a rigorous cross-border website, mainly providing privacy for overseas. Love action art movie download service.

Shi Lei is very kind and has not falsified the other’s data server. After all, this kind of good person has served too many otaku who need it, and can’t break the otaku welfare, right?

The two unknown ip addresses selected by Shi Lei have no relationship with Butler. For such a result, Shi Lei has no surprise.

If this is so simple, I found Butler’s real ip address. How does Shi Lei need to make a big move?

There is no result in the preferred target. Shi Lei three people began to analyze each unknown ip address. As the three people worked in sync with each other, one after another ip address was cracked, but still did not get an answer.

Shi Lei took the time to look at the progress of the plan for the needle in a haystack. It is now at half past twelve, and the plan for a needle in a haystack is executed for half an hour, but the progress is very poor!

The first screening area for the haystack plan is Li Jianguo. In half an hour, the screening progress is only less than 3 percent!

This means that it is only a Lijian country. It takes at least 20 hours to completely traverse every IP address of the Lijianguo network world!

The whole world is so big, the real ip address of the Butler mother server, there may be cyberspace in any place.

How can Shi Lei have so much time, slowly, one area to find?

In short, the computing resources that Shi Lei masters are still not enough!

(To be continued, please search for astronomical literature, the novel is better updated faster!


Tip: You can use left, right, A and D keyboard keys to browse between chapters.