HacKer

Chapter 1881



Final-073 Breaking through the resources

Worldwide, the total number of computer devices infected with the Nemesis virus has exceeded 800 million!

An exaggerated data!

Nemesis virus is a desperate chip of Shi Lei, designed by Shi Lei to be extremely extreme, and uses extremely novel source code hiding means, even if it is the world’s peak hacker, it is difficult to find the source code of the Vengeance virus. ⊥

Because, Shi Lei hides the source code of the Vengeance virus in the system source code!

Although the source code of the system and the source code of the Nemesis virus cannot be exactly the same, the letters that make up the source code are standard and universal.

Shi Lei designed a new grammar, directly calling the source code of the operating system, generating the final Vengeance virus, so that the Vengeance virus, avoiding all scans, caused a kind of Vengeance virus in the computer, but not in the computer. The illusion.

Although the Vengeance virus is not a resident virus, you can remove the Vengeance virus by formatting the hard drive and reinstalling the system.

However, the transmission of the Nemesis virus is very powerful. Even if the computer system is reinstalled, the Vengeance virus is temporarily removed. The environment is full of the Vengeance virus, which may be re-infected anytime and anywhere.

Therefore, even if the Vengeance virus is temporarily removed, it has no effect!

On July 14, the past five o’clock in the morning.

Shi Lei is fast knocking on the keyboard. The Vengeance virus has infected so many computer devices. How could Shi Lei waste it?

“Well, build a unified botnet. How long does it take?” Shi Lei asked about the clothes.

More than 800 million computer devices will be built into a huge botnet. If Shi Lei is done alone, it will be an impossible task.

fortunately. You can finish it!

The botnet that Shi Lei tried to build is essentially no different from iwn. However, iwn secret network’s base point iwn color ed, built in the brave world client, directly accepted by the player.

The base point of the botnet is the Vengeance virus!

As of now, the Nemesis virus has not shown malicious behavior, neither deleting the user’s data nor tampering with the user’s application.

therefore. The reputation of the Vengeance virus is limited to the Internet security community and the Internet hacker community. It is not known among ordinary Internet users.

After all, ordinary users don’t understand, the Vengeance virus is so powerful, it seems that there is no harm at all, just in the computer system, installed a useless program.

Inside the ordinary user’s computer system, it is used by other software. Is there a lack of secretly installed programs?

“Private r, complete the global unified botnet, it takes about 30 minutes. Please, later, the system is configuring detailed parameters.” Yi Zhuer responded to Shi Lei.

Even if it is as powerful as a pseudo-artificial intelligence system like Yizheer, it handles more than 800 million computer equipment. It also takes half an hour.

In the past, one minute and one second, Shi Lei did not worry. Instead, I wait patiently. In the waiting time, Shi Lei is a global unified botnet. I chose a nice name.

All-one-!

Referred to as aon!

The name of Xia Guoyu is named by Shi Lei, and it is named ‘one net’.

At 0:36 in the morning, the aon network was built!

The virtual transparent screen of the lip lens type information processor shows the number of access users of the aon network, reaching 838, 731, 902.

This one data is changing anytime and anywhere, and overall, it shows a trend of rapid increase. After all, the Nemesis virus is constantly infecting computer equipment worldwide.

Shi Lei looks at the data of the total computing resources of the aon network through the virtual transparent screen of the lip lens type information processor. Suddenly, Shi Lei’s face showed a strong smile.

The total computing resources of the aon network can transfer up to 11 million tflops of computing resources without harming most users!

That’s right!

11,000,000 tflops!

The computing resources of the aon network are about 11 times that of the iwn secret network.

Inferred by the simplest conversion method, iwn secret network scans the global Internet takes 200 hours, then the aon network can complete the global Internet scan in less than 20 hours.

However, in fact, the time that the aon network scans the global Internet does not need 20 hours or even two hours!

Because aon network and iwn secret network, there is the most fundamental difference. The base point of the aon network, that is, the computer equipment infected by the Vengeance virus, has been scanned once by the aon network, which is a normal security target and is excluded from the scanning range.

Therefore, only the computer equipment that has not been infected by the Vengeance virus is the target of aon network scanning. Together with the Vengeance virus on the side, it will continue to infect more computer equipment, and how can it take so long scanning time. ?

According to Shi Lei’s inference, after a maximum of two hours, the base point of the aon network will exceed 1.2 billion data. By then, the computing resources of the aon network will skyrocket again, and the suspected targets in the world will suddenly plummet. There is not much need for Shi Lei to personally explore.

“Jie Zheer, optimize the computing resources of the aon network!” Shi Lei told the singer, according to the distribution of computing resources of the aon network, began to reduce the optimization of the delay.

Shi Lei turned to look at Tao Wenxian and Raphael and asked: “Do you have any findings? Unknown level ip address, how much backlog?”

Raphael replied voluntarily: “There is no discovery! Unknown level ip address, backlog of more than a thousand, we are dealing with it quickly.”

“Forget it, let me come!” Shi Lei did not say much, controlled the computing resources of the aon network, and with the help of the clothes, began to scan the haystack plan and found the unknown ip address.

The aon network aggregates more than 11 million tflops of computing resources, and every minute is increasing rapidly. When Shi Lei controls the computing resources of the aon network and starts to handle the haystack plan, the unknown level IP address is found to have accumulated more than More than 1000 unknown ip address records were quickly determined.

Tao Wenxie and Raphael looked a little dazed!

Although the two understand that Shi Lei must have done something earth-shattering, but the current situation seems to be a bit too exaggerated?

Tao Wenxian couldn’t help but ask: “Shi Ge, what have you done?”

Shi Lei made a snap and said: “Well, share the information!”

The company immediately shared the information of the aon network with Raphael and Tao Wenxian through the virtual transparent screen of the lip lens type information processor.

The two looked at the aon network and gathered more than 11 million tflops of computing resources, all of them were scared!

Is this Nima not an illusion?

In particular, Rafael, who became the world’s top hacker, surpassed Tao Wenxian, who knows more ‘common sense’ information.

The world’s top 500 supercomputers announced in June 2008, the number one is the supercomputer made by IBM, called road breast nner.

This supercomputer named after the ‘Clown in the Desert’ has a stable computing speed of 1026 tflops and a peak calculation speed of .

The aon network aggregates computing resources, equivalent to more than 10,000, the world’s number one supercomputer. Although it is just a loose distributed computing resource, that level of computing resources is still terrible!

“Raphael, I have hallucinations?” Tao Wenxian said involuntarily.

Raphael shook his head and then played a look at Tao Wenxian’s eyebrows. “If you have hallucinations, I must have an illusion. However, I think we certainly have no hallucinations.”

Having said that, Rafael looked at Shi Lei and asked: “stone, this is…”

Shi Lei nodded affirmed: “Yes! This is a super virus I made! A super virus that simulates iwn color ed. Through these computing resources, we can find the real IP address of the Butler mother server before dawn!”

Tao Wenxian swallowed, “Do we still carry out a haystack plan?”

Shi Lei took a look at Tao Wenxian. He knew that Tao Wenxian meant nothing more than trying to work with the aon network instead of continuing to implement the haystack plan.

However, according to the current situation, the haystack plan can be suspended, and the remaining tasks are performed by the aon network.

“Control aon network action together!” Shi Lei said.

Tao Wenxian nodded excitedly. “Great, stone brother, we found Butler’s time, never wait too long!”

The three first integrated the iwn secret network and the aon network to form a cluster of distributed computing networks, then mobilized all computing resources and scanned the Internet space that had not yet been scanned.

I have given an estimated time, and it takes only one hour to complete the global Internet scan. By that time, 99.9 percent of the network ip addresses will be excluded.

The remaining goal is Butler’s hiding place!

This time, Butler could never escape again. After all, Shi Lei’s plan is a plan for a needle in a haystack. Shi Lei’s entire Internet world has been turned upside down. Can’t find Butler?

That is absolutely impossible!

Even if Butler has the best hiding ability, it is impossible to escape Shi Lei’s search!

(To be continued, please search for astronomical literature, the novel is better updated faster!


Tip: You can use left, right, A and D keyboard keys to browse between chapters.