HacKer - Chapter 1670
HK1649 OverSeed!
.
The Dream Entertainment Official Gamer Forum was attacked by the Publishing Content Type Attack near the 13,000 name user.
This kind of attack that can’t be considered a Hacker attack, in fact, will not affect the Dream Entertainment Official Gamer Forum. Even the order of the Official Gamer Forum will not be affected.
Because the Dream Entertainment Official Gamer Forum belongs to the Worldwide Forum and is managed by Izual. How to distinguish between the Forum, what posts are meaningful, what posts are meaningless, all by Izual automatically preliminary determine.
For example, in the Brave’s World game section, it is subdivided into a lot of Little Section. Including Storyline Discussion, Character Discussion, Task Classification Discussion, MapInformation Inquiry, Equipment AppreCIA tion, and so on.
Among the many Little Sections, there are more detailed Sub-sections. Take the Task Classification Discussion as an example. In the Task Grade Little Section, there is a Sub-section corresponding to Task Grade.
Tasks of different Grades need to be published in different Sub-sections, but not in sections. If a post is posted across the board, it will be operated by Izual implement ‘Mobile Post’. At the same time, part of the Forum points will be lost.
If a Gamer is said, the content of the distribution will not be severely punished by Izual’s.
Of course, in the Dream Entertainment Official Gamer Forum, a ‘Freedom World ‘Big Section is specially provided for the convenience of Gamer from all over the world, Freedom’s watering, some uncertain gossip, and even some ad information.
Currently, Ten Thousand of the Implement Publishing Content Type Attack has more than 2,000 users, all of which are all Izual restricted in the ‘Dim Abyss ‘Sub-section of the ‘Freedom World ‘Big Section branch.
The so-called ‘Dim Abyss’, which represents the post information inside this Sub-section, basically does not make sense. Belongs to a post waiting for System to delete.
In general, no Gamer enters the ‘Dim Abyss ‘Sub-section to view Forum messages.
So, Ten Thousand’s more than two thousand user class attacks will not cause any loss to the Dream Entertainment Official Gamer Forum.
However, Shi Lei will not let this behavior ignore. Shi Lei told Izual to randomly select one hundred users. Then reversely track the other party’s real IPaddress.
If you reversely track the real IPaddress of the ordinary user, for Izual, there is no difficulty, just as it is difficult to calculate 1+1.
Even though simultaneously reverse tracking the real IPaddress of a hundred users, the difficulty will not increase too much, and at most it becomes the difficulty of 1+1+1.
However, the original thing was ten. But there is an abnormal situation!
“Sir, System cannot determine the real IPaddress of the random selection user!” Izual reports to Shi Lei through the LIPLens-type Information Processor.
Shi Lei smiled. “I can’t determine which user’s real IPaddress?” Shi Lei immediately asked, this is a clue, as long as the specific person is determined. Based on this clue, we can continue to dig deeper.
However, Izual shows the information on the computer screen. But Shi Lei’s face changed dramatically.
Because Izual cannot determine the user of the real IPaddress, it is not a user. It is not two users, but one hundred users randomly selected, all of which cannot determine the real IP address!
Randomly extract one hundred users from the 13,000 name user. It can represent the characteristics of the entire group.
This means that the real IPaddress of the 13,000 name user, Izual can not be directly confirmed!
“Izual, block this hundred users, and randomly extract one hundred users from the remaining users. Then, reversely track their real IPaddress!” Shi Lei told again.
If this time, a hundred users randomly selected, once again can not determine the real IPaddress, it can only explain one thing.
The user who is close to the 13,000 name to launch the Publishing Content Type Attack is not a normal user at all! If they are not normal users, are all registered with Virtual Identity?
But is the real-name registration mechanism of the Dream Entertainment Official Gamer Forum so easy to bypass?
In less than ten seconds, Izual gave feedback to the information, “Sir, Second batch randomly extracted the real IPaddress of a hundred users, and System could not reverse the compliance.”
“What is the reason for the inability to track?” Shi Lei asked in detail.
Izual’s Virtual transparency screen on the LIPLens-type Information Processor shows the detailed reason. When Izual used Black Magic Subsystem to reversely track the real IPaddress of the user, it immediately met the powerful Defense System.
Even though Izual’s Black Magic Subsystem, with the cooperation of IWNMiwang and Supercomputer Lightning, reached the level of World Grade Hacker and still could not break the Defense System.
To make matters worse, whether it is a hundred users randomly selected by the First batch or a hundred users randomly selected by the Second batch, Shi Lei finds that their Defense System is originated in the same Defend the Server.
In other words, Izual reversely tracks two hundred randomly selected users, all of which track the same Defend the Server.
This situation confirms Shi Lei’s guess!
That’s close to the 13,000 name user, and it’s all corpse user, not what Shi Lei originally guessed, but the real user who is paying for it.
Only corpse user is possible to centrally manage and then converge on the same Defend the Server against Izual’s reverse tracking!
“Defend the Server of the other party, what Defense System is used?” Shi Lei frowns said.
The Dream Entertainment Official Gamer Forum has been exposed to a strange atmosphere. Originally just a joke like the Publishing Content Type Attack, but there seems to be a hidden plot behind it.
“Sir, Unfend the Server in Unable to Judge attack, what Defense System is used. After System preliminary determination, Defend the Server on the invasion side, 300tflops’ Concentrated Distribution Computing Resources has been called against System Reverse Tracking.” Izual responded Specific data.
“Damn?” Shi Lei sucked in a cold breath!
300tflopscomputing resources !
300tflopsConcentrated Distribution Computing Resources !
This means that the control of the numerous corpse user, implement the ridiculous Publishing Content Type Attack’s mysterious invasion side, even the EQ uivalent to Supercomputer Lightning the same Supercomputer, or Supercomputer Cluster!
Throughout the World. There are only a handful of Supercomputers with speeds in excess of 300tflops. Even though the powerful Angel Parliament does not have so much computing resources.
Therefore, Jehovah of the Angel Parliament, completely suppressed by Shi Lei and Raphael, has no resistance. When the technology is not much different, the computing resources that are mastered determine everything.
Shi Lei exclaimed after a cry. Put your hands on the keyboard and see Defend the Server on the mysterious invasion side.
When Shi Lei launches the tentative attack, Shi Lei synchronizes the data detection. With the increasing resources called by Shi Lei, Supercomputer Lightning’s 300tflopsConcentrated Distribution Computing Resources has been overtaken by Shi Lei over 90%. But the Defend the Server on the mysterious invasion side has nothing to do at all.
At this time, Shi Lei detected the computing resources of Defend the Server. It does reach the level of 300tflops. Although I confirmed the information of Izual feedback and confirmed the strength of the enemy, Shi Lei did not have too much frustration.
In fact, Shi Lei has a bit of fun!
Shi Lei attack Defend the Server calls the computing resources, only the 280tflopsConcentrated Distribution Computing Resources provided by Supercomputer Lightning.
Defend the Server on the mysterious side of the mystery. Against the Shi Lei invasion, 300tflops’ Concentrated Distribution Computing Resources was called.
This means Defend the Server on the mysterious invasion side, using the Defense System, against the attack. Basically, you need to invest in computing resources in a one-to-one ratio. To fight the invasion.
For the Defense System, this ratio is not outstanding.
A truly Outstanding Defense System, such as the Endless Defense System owned by Mirror Science and Technology Group, is usually the case. Can achieve a ratio of one to five. Even in small-scale intrusions, Endless Defense System’s defense investment and intrusion can reach an exaggerated level of one to ten.
However, as the amount of computing resources climbs, this ratio will gradually decline. After a certain order of magnitude, Endless Defense System’s defense and intrusion ratio can only reach one to five.
Don’t assume that the ratio of one to five defenses to intrusion is not exaggerated. This ratio is very exaggerated, Endless Defense System is known as World First’s Defense System, and it is understandable!
“Izual, coordinated calculation of IWNMiwang’s overall structure seed base point, ready to activate IWNMiwang’s overall resources.” Shi Lei told Izual to prepare IWNMiwang.
After telling accomplish, Shi Lei considered it and finally bite his teeth and continued to command: “Detect IWNSeed, second confirmed GoodSeed, pre-launch the OverSeed operation!”
“Sir, warning, OverSeed belongs to the danger operation, please authorize the operation.” Izual reminded Shi Lei to ask Shi Lei to give the operation authorization.
The so-called IWNSeed, precisely as stated is the Brave’s World user that provides computing resources for IWNMiwang. Each user represents the base point of an IWNMiwang, which is an IWNSeed.
GoodSeed’s opinion is a user with well-configured computers, especially Gamer with Personal Game Server, which is definitely GoodSeed.
As for the OverSeed operation scheme, it is defined as the danger operation. This is because the OverSeed operation scheme will increase the number of computing resources that IWNMiwang obtains IWNSeeduser.
Pre-launching the OverSeed operation is also forced to act. After all, Shi Lei analyzed some of the danger cases…
(To be continued~^~)
PS: OverSeed, oceaned!