HacKer - Chapter 1860
Final-061 starts with search!
.
Shi Lei’s did have an information channel inside Abdiel and it became the interface for Abdiel’s basic communication, which was basically not discovered.
However, Abdiel and Butler are in one!
Before the integration, Butler was already a High Grade Pseudo ArtifiCIA l Intelligence System. After the integration of Abdiel, Butler went one step further.
Although Butler did not reach the level of the True ArtifiCIA l Intelligence System, it also exceeded the restriction of the High Grade Pseudo ArtifiCIA l Intelligence System.
Even if Butler doesn’t have Izual then niú bāi, it’s definitely not too far!
This level of Pseudo ArtifiCIA l Intelligence System, in addition to no real creativity and human emotion, in the logical thinking aspect, and true humans, there will never be much difference.
Therefore, Shi Lei first time obtained the Organization Pseudo ArtifiCIA l Intelligence System and the information on the online by reserving the information channel inside Abdiel.
When Shi Lei continued to send the implement command and asked Abdiel to reply to the real IPaddress, it merged with Abdiel’s Butler and immediately found an exception.
Abdiel and Butler’s Fusion System, Butler is in the dominant status, Abdiel’s Core Source Code is basically fused by Butler, and the underlying code has been largely retained.
Shi Lei’s reserved information channel is in the base code.
However, the base code implement command needs to pass the Core System’s Audit. When Butler finds the underlying code left by Abdiel’s formerly, it asks implement to send the actual IPaddress information and immediately determines the exception state.
Butler first blocked the information channel reserved by Shi Lei, and then followed the channel of Shi Lei send message, tracking Shi Lei’s real IPaddress, ready for active counterattack.
Shi Lei currently awaits Abdiel feedback on information. When Butler reversed the tracking and was about to trace to Shi Lei’s, Izual discovered Butler’s reverse tracking information.
“Sir, System found the reverse tracking data of the information channel, is it counterattack?” Izual asked Shi Lei, Izual did not understand. Butler’s counterattack represents Shi Lei’s exposure to the information channel inside Abdiel. It also means that Shi Lei cannot determine the true IPaddress of the Parent Server where Butler is located.
Shi Lei’s expression changed, frowns said: “Phinney, Jazz, the situation has changed. Ready to fight! Let’s track the reverse tracking data flow of the Organization Pseudo ArtifiCIA l Intelligence System, which currently tracks my real IPaddress!”
After Shi Lei finished, he got up and prepared to go to the transformation, the information war room.
Although the LIPLens-type Information Processor is a Virtual keyboard. It can also support three people for information operations, but the Virtual keyboard does not have a real sense of touch, as well as keystroke feedback, etc., resulting in three people using the Virtual keyboard to input source code. The hand speed will drop a lot.
So, face the important Cyber War time. They will choose the real keyboard and computer to conduct the information battle.
Inside the information war room, three computers, nine screens start accomplish. Each computer is equipped with three screens for easy display of more data information.
“Are you ready?” Shi Lei asked. “If you are ready, we will access the data flow of the reverse tracking!”
“Prepare for accomplish!” Tao Wenxian responded.
“OK!” Raphael simply responded that it is ready to go into the information battle.
Shi Lei took a deep breath, “Our actions, only success, no failure!”
“Understand!” Tao Wenxian and Raphael are the same.
Shi Lei ordered: “Izual, the reverse tracking of the data flow, into our Zombie Server!”
Blitz, which incorporates Abdiel, currently tracks the end of the information channel that Abdiel is ready to send to the real IPaddress, which is Shi Lei’s real IPaddress.
Izual reversed Butler’s reverse tracking and jumped to the Zombie Server where the three people were connected. When Butler’s reverse tracking entered the Zombie Server, the three people would reverse the Butler back.
“Come on!” Shi Lei snorted, Zombie Server underwent reverse tracing data flow temptation, and Shi Lei three people began to tapthe keyboard, in Butler’s reverse tracking data, trying anti-reverse tracking!
Izual plays Shi Lei’s real IPaddress and tries to get rid of Butler’s tracking, which sets a trapfor Butler, giving Shi Lei three people a chance to grab Butler’s real IPaddress.
“Izual, ready to deploy IWNMiwang resources, start OverSeed program, get the most IWNSeed computing resources without affecting Gamer!” Shi Lei ordered Izual and began to harvest IWNMiwang’s computing resources.
Organization Supercomputer, what kind of computing resources, Shi Lei has been taught before!
Supercomputer Amon13, computing resources reached 500Tflops; Supercomputer Amon14, computing resources reached 1200Tflops!
The combination of the two, Concentrated Distribution Computing Resources, reached the level of terrifying 1700Tflops!
What about Mirror Science and Technology Group?
The Mirror Science and Technology Group’s Ten-thousand Mu Headquarters was ruined, and the new Supercomputer was directly tragedy. Currently, Supercomputers in the hands of Mirror Science and Technology Group are only Supercomputer Origin and Lightning.
Supercomputer Lightning’s computing resources, with 300tflops, achieves a few percent of Amon13’s Sixty, which is quite good.
But Supercomputer Origin’s computing resources, but only the extent of poor 10tflops!
Supercomputer Amon13 and Amon14 are both proprietary Supercomputers of Organization. In other words, Organization’s Pseudo ArtifiCIA l Intelligence System Butler can 100% and unscrupulously call the computing resources of two Supercomputers without worrying about being discovered.
Shi Lei is currently in the hands of Concentrated Distribution Computing Resources, only 310tflops. About 18.24% of the computing resources controlled by Butler, which is less than one-fifth of the area.
With Supercomputer Origin and Lightning alone, Shi Lei can’t compete with Butler! Even if Butler does not have Super Admin assistance, and Shi Lei is a World Summit Grade Hacker, plus the same level of Pseudo ArtifiCIA l Intelligence System Izual, there is still no chance of winning.
When the computing resources reach a certain level of difference. There is almost no possibility to make up for the gapin technology.
Therefore, Shi Lei only sent Hope to IWNMiwang and extracted Loose Distribution Computing Resources from IWNMiwang to compete with Supercomputer Amon13 and Amon14.
IWNMiwang’s computing resources are generated by every computer that has Brave’s World client installed, regardless of the computer on which Brave’s World client is installed. Whether or not Brave’s World is running, I will receive computing resources from IWNMiwang.
However, IWNMiwang has very few computing resources, and users will not find it.
As of now, Brave’s World’s has registered the total number of Gamers. It has already surpassed 60 Million, which is about 6 thousand 5 Million data.
The current number of online users also exceeds the 45 Million level!
Although most of Gamer’s computer configurations are terrible, basically. The Computer System used by Gamer, the average total computing resources. About the extent of 20Gflops, which is what 0.02Tflops looks like.
With such a poor total computing resources, how much more can you save in addition to the daily application of Gamer?
usually. After the CPU CPU usage exceeds 90%, the calculation of Task slow and unresponsive occurs.
This situation is more obvious in the low-end CPU. The higher the high-end CPU, the higher the aspect tolerance in the usage, because the higher-end processor has a higher cardinality, and even though it reaches 99%. To the extent, the remaining 1% is still more than 10% of the computing resources of the low-end processor.
Although Shi Lei commands Izual to maximize the interception of IWNSeed’s computing resources, Shi Lei also sets the premise that the maximum amount of computing resources can be obtained without affecting users.
Why should you care about the user feeling?
It is not how no of Shi Lei, in the case of such a crisis, it is still considered for the user, but Shi Lei is worried about the large-scale discovery of IWNMiwang by the user, which causes the IWNMiwang to collapse.
If there is a big crash in IWNMiwang, for the current situation, it is definitely the result of human life!
Shi Lei naturally does not happen like Hope!
However, even though without affecting the user, the maximum amount of computing resources, IWNMiwang obtained the computing resources, is still very terrifying!
According to Izual’s statistics, the current IWNewang activity IWNSeed, about 52 Million, excludes the ultra-low-end user close to 500,000, and then 5150 million IWNSeed.
The remaining 5150 million IWNSeed, according to the rules of global average calculation, each can provide about 0.001tflops of computing resources.
Then, the entire IWNMiwang will provide 51,500tflops’ computing resources. If you do not consider the difference between Concentrated Distribution Computing Resources and Loose Distribution Computing Resources, only IWNMiwang provides more than 30 times more computing resources than Supercomputer Amon13 and Amon14!
However, there is a large performance gapbetween Loose Distribution Computing Resources and Concentrated Distribution Computing Resources. Especially in the aspect of data consistency, Task synergy, computing delay, etc., there is a very serious performance gap.
However, even though so, the total number of Three Thousand gaps is enough to bridge the gapbetween the two!
“Izual, launching the Neutrino Communications Network and assisting IWNMiwang to transmit data!” Shi Lei told.
Mirror Science and Technology Group has established the complete Neutrino Communications Network across five continents to eliminate the delay of network communication between continents.
After all, the transmission speed of Seabed Optical Fiber Cable is greatly affected by external influences. IWNMiwang collects computing resources. If it passes through Seabed Optical Fiber Cable and then transmits into Xia Nation, the resulting network delay will be scary.
So, Shi Lei used the Neutrino Communications Network to link IWNMiwang on five continents, which would significantly reduce the network delay. Only with the help of the Neutrino Communications Network, IWNMiwang’s computing resources can be applied to the Cyber War competition in Large-scale.
“IWNMiwang OverSeed is launched, Neutrino Communications Network is launched, and IWNMiwang will provide 51,000Tflopscomputing resources!” Izual reports.
The computing resources actually collected by IWNMiwang are lower than expected. This is because some ultra-low-end Computer Systems can get too little computing resources. Although theoretically, they can provide computing resources. However, after Izual’s actual testing, they cannot provide computing resources.
Shi Lei took a deep breath and nodded at Tao Wenxian and Raphael, indicating that they started searching for the Pseudo ArtifiCIA l Intelligence System of Organization, and the location of Butler’s Parent Server.
This action, as Shi Lei said, can only succeed, not fail!
They can’t afford it!
After all, the cost of failure in action is too high and too high!
(To be continued~^~)