HacKer

Chapter 1884



Final-076 is impossible! ! !

The basis of the aon network comes from computer equipment infected with the Vengeance virus, not the computer equipment installed by the Brave World client. ±

The way aon network extracts computing resources is basically no different from the way iwn secret network extracts computing resources.

Up to now, the aon network has taken a very large amount of computing resources, and it has taken 80% of the remaining resources of the computer system without affecting the normal use of computer users, leaving 20% ​​of the calculation. Resources to respond to the sudden demand of computer users.

At the same time, if the computer user needs to call more computing resources, the aon network will also actively release a part of the computing resources to meet the needs of computer users.

However, the basis of the aon network is, after all, the Vengeance virus!

With computer viruses as the base point, is it necessary for computer users to consider when necessary?

The answer is naturally no!

The aon network forcibly blasts, which is directly 100% of the computing resources of computer equipment infected with the Vengeance virus.

Although 100% of the computing resources of the computer system will be discovered by computer users, and most computer users have a high probability to choose to restart the computer, but this situation has long been in the calculation of Shi Lei!

Once the aon network has been forced to explode, it will force 100% of the computer equipment infected with the Vengeance virus to provide 100% computing resources for the aon network.

Even for computer users, click the warm-start reboot button. There will be no change!

Because the Vengeance virus is embedded in the source code of the operating system. When the user clicks the reset button, the computer system simulates the restarted screen. Including the boot process, etc., but in fact, the computer system does not restart at all, still operating at full power, providing the largest computing resources for the aon network.

When the reboot is complete, the computer user is unable to pass the task manager and discovers the computing resources of the computer system, which is being called 100%. But computer users can still feel it. The operation of the computer system is delayed, and the reaction speed is stuck.

At this time, if the computer user, restart again. Then, the computer system still performs a false restart cycle just like the previous operation.

But if, say, the computer user chose to turn off the computer. Whether through the option to turn off the computer provided by the operating system, or by pressing and holding the power button directly. It is impossible to shut down the computer when you shut down the computer!

The reason is that Shi Lei still expected such a situation!

After the computer user has selected the option to turn off the computer, the computer system simulates a computer shutdown. This includes cutting off the power supply of the central processor’s heatsink, powering the main hard drive light, and forcibly cutting off the power supply of the discrete graphics card. Even changing the speed setting of the hard disk, forcibly reducing the speed of the hard disk. This reduces the noise generated by the hard disk when writing or reading data.

In summary. Once the user has selected the option to turn off the computer, the computer system performs an analog computer shutdown, but the computer is still powered and is still providing computing resources for the aon network.

If the computer user chooses to force shutdown after starting the computer device again, it will still enter a loop, the computer system will not get any improvement, and will only provide computing resources for the aon network.

Even in the computer user, the power of the computer is cut off. If the computer user plugs in the power again, the computer system will still restart automatically.

This is because the Nemesis virus writes a program that is started periodically for the computer, and it breaks the setting limit. According to every minute, it is a node, and all the restart programs are written.

Although it is said that forcing computer equipment to simulate the shutdown state and turning off the fans of various types of radiators will cause the hardware temperature of the computer equipment to be extremely high, the aging speed is accelerated, and even the computer equipment is directly damaged.

But what does it have to do with Shi Lei?

Other people’s computer equipment, damaged and not damaged, completely has no relationship with Shi Lei, and can’t let Shi Lei pay compensation on a global scale?

It is not a question of compensation amount, but Shi Lei created the Vengeance virus, which created a problem of network catastrophe. Shi Lei does not want to be an enemy of the whole world.

That is absolutely an idiot, will choose the practice!

“Private r, the system is configuring aon network forced burst program! It is expected to take 30 seconds to complete the configuration, is counting down, 30, 29, 28…” Yi Zhuer reported the situation.

Thirty seconds is not long or short, and as time decreases by one second, Shi Lei has already clenched his fist.

Victory and defeat are here!

Shi Lei is absolutely impossible to accept the result of a loss!

The virtual transparent screen of the lip lens type information processor shows the countdown of the forcing of the aon network. When the last second countdown is completed, the aon network forcibly opens up!

The computing resources provided by aon network, from the level of 18 million tflops, directly exceeded 30 million, to the extent of 34 million tflops, almost doubled!

Shi Lei understands that such a huge computing resource is built on a 100% computer device that has captured the Vengeance virus.

Those computer equipment, in the case of simulated shutdown, how long can support, Shi Lei does not know, Shi Lei can only race against time!

Any time-wasting behavior, at this point in time, is a huge luxury!

The computing resources of the aon network, together with the computing resources of the iwn secret network, were mobilized by Shi Lei three people under the coordination of Yizheer, impacting the last unknown ip address, which is the address of the darpa internal network.

Unprecedented huge computing resources directly broke through the defense of darpa’s internal network. Shi Lei also confirmed that the last unknown ip address, which is exactly the same as his initial guess, is indeed the internal network of Darpa Advanced Bureau. It’s just not an open internal network, but another confidential internal network.

……

Inside the darpa advanced office.

When Shi Lei controlled 35 million tflops of computing resources and broke through darpa’s internal network defense, Dawson exclaimed.

“Damn, we are finished! We are finished!” Dawson looked at the computer screen with pain.

Mandalay exclaimed, “Completed, I finished! Mysterious virus killer, I developed it!”

Ryan, the head of cyber security at dapra, calmly said: “Mandalay, execute the killer plan! Dawson, cut off our connection to the Internet!”

The important subnet system attached to the darpa internal network has completely disconnected from the darpa internal network, and dapra’s internal network does not need to stay connected with the Internet!

Even if the link to the Internet is now disconnected, there will be no serious consequences. Instead, it will save darpa’s internal network, and it will be scanned by Shi Lei.

“Understand!” Dawson took a sigh of relief and took the initiative to cut off the connection between darpa’s internal network and the Internet world. The darpa internal network was directly disconnected from the Internet world.

When Shi Lei three people entered the darpa internal network, with a huge amount of computing resources, has scanned a part of the content, but still did not find Butler’s trace.

However, Shi Lei firmly believes that Butler must be hidden in the internal network of darpa. However, Shi Lei, who is full of confidence, has endured the darpa’s dedication!

The darpa internal network has broken the link to the internet world!

If the network link of the Butler mother server is hidden in the darpa internal network, when the darpa internal network disconnects from the Internet, Butler will directly expose it.

However, darpa’s internal network disconnected from the Internet, but the network link of Butler’s mother server did not appear!

This can only explain one thing!

The real IP address of the Butler mother server is not hidden in Darpa’s internal network. Shi Lei’s haystack plan is completely defeated!

Even if Shi Lei searched the global Internet world, he still did not find Butler!

This result is beyond the imagination of Shi Lei. Shi Lei can’t understand why he searched Butler in the global Internet in the way of a needle in a haystack. He didn’t even find Butler!

Could it be that the organization has survived the core members? And got the super administrator rights of Butler? If this is the case, then it can be explained why in the Internet world, the real IP address of the Butler mother server can not be found.

Because, Butler’s mother server, has been off the assembly line!

It does not exist in the Internet world, and naturally it cannot be found in the Internet world!

Tao Wenxian and Raphael looked at Shi Lei with concern. I don’t know how to comfort Shi Lei, or how to open Shi Lei.

In the end, Tao Wenxian said: “The stone brother, the festival is sad!”

Butler is the ‘key’ to save Ling Yumo. If you can’t find Butler, why talk about saving Ling Yumo? The current situation is that Butler is not found, and I don’t know how to find Butler.

Equivalent to Ling Yumo, they are 100% dead!

Shi Lei snorted and glanced at Tao Wenxian, taking a deep breath: “The festival is a fart! It is not over yet!”

Raphael gnawed his teeth: “stone, we really can’t find the organization’s pseudo artificial intelligence system! Don’t know, how to find it! Face it!”

“We can’t find it, but some people can find it! If no one can find it, I can only say very regrettable that when the Chaos Snake did not finish things, I will help him to complete it!” Shi Lei said indifferently!

The meaning of Shi Lei is already very obvious…

(To be continued, please search for astronomical literature, the novel is better updated faster!


Tip: You can use left, right, A and D keyboard keys to browse between chapters.