HacKer

Chapter 1869



Final-061 starts in search!

Shi Lei did reserve an information channel inside Abertier and simulated it as the port of Abertier’s basic communication, which was basically not discovered. ¢£

However, Abertier and Butler are one!

Before the merger, Butler was already an advanced pseudo-artificial intelligence system. After the integration of Abertil, Butler went one step further.

Although Butler did not reach the level of a true artificial intelligence system, it also exceeded the limits of advanced pseudo-artificial intelligence systems.

Even though Butler is not so sloppy, it will never be too far apart!

This level of pseudo-artificial intelligence system, in addition to no real creativity and human emotions, in terms of logical thinking, and true humans, there will never be much difference.

Therefore, for the first time, Shi Lei obtained information on the organization of pseudo-artificial intelligence systems and still online through the information channel reserved in Abertier.

When Shi Lei continued to send an execution order and asked Abertier to reply to the real ip address, he merged with Butter’s Butler and immediately found an abnormal situation.

Abertil and Butler’s fusion system, Butler is in a dominant position, Abertier’s core source code is basically fused by Butler, and the underlying code has been largely retained.

The information channel reserved by Shi Lei is in the basic code.

However, the basic code execution command needs to be audited by the core system. When Butler discovers the basic code left by Abertil and asks to execute the information to send the real IP address, it immediately determines the abnormal state.

Butler first blocked the information channel reserved by Shi Lei. Then follow the channel of Shi Lei to send information, tracking the real IP address of Shi Lei. Prepare for an active counterattack.

Shi Lei is waiting for Abertier to feed back information when Butler reverses the tracking. When I was about to trace Shi Lei, I found the reverse tracking information of Butler.

“Private r, the system finds the reverse tracking data of the information channel, is it counterattack?” Yi Zhuer asked Shi Lei, and he did not understand that Butler’s counterattack represented the information that Shi Lei reserved inside Abertier. Channel exposure also represents that Shi Lei cannot determine the real IP address of Butter’s parent server.

Shi Lei’s expression changed. Frowning: “Fini, jazz, the situation has changed, ready to fight! We are tracking the reverse tracking data flow of the organization pseudo artificial intelligence system, it is tracking my real ip address!”

After Shi Lei finished speaking, he got up directly and prepared to go to the information war room before the transformation.

Although the virtual keyboard of the lip lens type information processor can also support three people for information warfare. However, the virtual keyboard has no real touch, and the feedback of the keystrokes, so that when the three people use the virtual keyboard to input the source code, the hand speed will drop a lot.

and so. In the face of important cyber wars, they will choose real keyboards and computers for information operations.

Inside the information war room. Three computers, nine screens are booted. Each computer is equipped with three screens. Convenient to display more data information.

“Ready?” Shi Lei asked. “If you are ready, we will access the reverse tracking data stream!”

“Ready to finish!” Tao Wenxian responded.

“ok!” Rafael simply replied that he was ready to go into information operations.

Shi Lei took a deep breath, “Our actions, only success, no failure!”

“Understand!” Tao Wenxian and Raphael are all the same.

Shi Lei ordered: “The clothes, the data stream that will be reversed, will be introduced into our broiler server!”

Butler, who combined Abertier, is tracking the end of the information channel that Abertier is preparing to send a real ip address, which is Shi Lei’s real ip address.

In a reverse transfer, Butler jumped to the broiler server that was connected to the three-person. When Butler reversely tracked into the broiler server, the three would reverse the Butler.

“Come on!” Shi Lei sighed softly, and the broiler server was subjected to reverse tracing data flow test. Shi Lei three people began to tap the keyboard, in Butler’s reverse tracking data, try anti-reverse tracking!

She is playing the real ip address of Shi Lei, trying to get rid of Butler’s tracking, thus setting a trap for Butler, so that Shi Lei three people have the opportunity to seize Butler’s real ip address.

“Well, ready to deploy iwn secret network resources, start over color ed program, in the case of not affecting the player, the maximum access to iwn color ed computing resources!” Shi Lei ordered the clothes, began to harvest iwn secret network Computing resources.

The organization’s supercomputer, what kind of computing resources are there, Shi Lei has already learned!

Supercomputer a touches n13, computing resources reach 500tflops; supercomputer a touches n14, computing resources reach 1200tflops!

The combination of the two, intensive distributed computing resources, reached a level of 1700 tflops of terror!

What about Mi Rui Technology Group?

The 10,000-acre headquarters of the Mirei Technology Group was destroyed, and the new supercomputer was directly tragedy. At present, the supercomputers in the hands of the Mirui Technology Group are only supercomputer origin and lightning.

Supercomputer lightning computing resources, with 300tflops, reached 60% of a touch n13, still quite good.

But the computing resources of the supercomputer originate only to the extent of poor 10tflops!

Supercomputer a touches n13 and a touches n14, both of which are private supercomputers of the organization. In other words, the organization’s pseudo artificial intelligence system Butler can call the computing resources of two supercomputers with 100% unscrupulous. Don’t worry about being discovered.

Shi Lei is currently in the hands of intensive distributed computing resources. With only 310 tflops, it is only about 18.24% of the computing resources controlled by Butler. One-fifth of the district can’t reach it.

With the supercomputer origin and lightning, it is impossible for Shi Lei to fight against Butler! Even if Butler does not have super administrator assistance, and Shi Lei is a world-class hacker, plus the same level of pseudo-artificial intelligence system, there is still no chance of winning.

When the computing resources reach a certain level of difference, there is almost no possibility to make up for the gap in technology.

Therefore, Shi Lei only hopes to iwn the secret network, from the ion13 and a touch n14 confrontation.

The computing resources of iwn secret network are generated by each computer that has installed the client of the brave world. No matter whether the computer of the brave world client is installed or not, the computing world will be used by iwn.

However, iwn secret network has very few computing resources, users will not find it.

As of now, the total number of registered players in the Brave World has exceeded 60 million. It is about 60.5 million pieces of data.

The current number of online users has also exceeded the level of 45 million!

Although most of the players’ computer configurations are terrible, basically, the computer system used by the player. The average total computing resource is about 20gflops, which is 0.02tflops.

Such a poor total computing resource. In addition to the daily application of the player, how much is left?

usually. The CPU usage of the CPU is over 90%. There will be a situation in which the calculation task is stuck.

This situation is more obvious in the low-end CPU. The higher the high-end CPU, the higher the tolerance in terms of usage, because the high-end processor has a higher base, even if it reaches At the level of ninety-nine, the remaining one percent is still more than 10% of the computing resources of the low-end processor.

Although Shi Lei ordered the smuggling of the iwn color ed computing resources to the maximum extent, Shi Lei also set the premise, that is, to obtain the maximum possible computing resources without affecting the users.

Why should you care about the user experience?

It is not how noble Shi Lei is, but in such a critical situation, it is still considered for the user, but Shi Lei is worried about the large-scale discovery of the iwn secret network by the user, which causes the iwn secret network to collapse.

If there is a big crash of iwn secret network, for the current situation, it is definitely the result of human life!

Shi Lei naturally does not want to see such a situation!

However, even if the computing resources are maximally captured without affecting the users, the computing resources obtained by iwn secret network are still terrible!

According to the statistics of the clothes, the iwn color of the iwn secret network activity is about 52 million, and the ultra-low-end users of nearly 500,000 are excluded, and then 51.5 million iwn colors are left.

The remaining 51.5 million iwn color ed, according to the global average calculation rules, each can provide about 0.001 tflops of computing resources.

Then, the entire iwn secret network will provide 51,500 tflops of computing resources, if you do not consider the difference between intensive distributed computing resources and loose distributed computing resources, only thirty times of ion14!

However, there is a large performance gap between loose distributed computing resources and dense distributed computing resources. Especially in terms of data consistency, task synergy, computational latency, etc., there is a very serious performance gap.

However, even so, the total gap of 3,000 percent is enough to bridge the gap between the two sides!

“Jie Shier, start the neutrino communication network, assist iwn secret network to transmit data!” Shi Lei told the road.

The Mire Technology Group has established a complete neutrino communication network throughout the five continents to eliminate the delay in network communication between continents.

After all, the transmission speed of submarine cables is greatly affected by external influences. iwn secret network collects computing resources. If it passes through submarine cables and then transmits into Xiaguo, the resulting network delay will scare people.

Therefore, Shi Lei uses the neutrino communication network to link the iwn secret network of the five continents, which will greatly reduce the network delay. Only with the help of the neutrino communication network, the computing resources collected by iwn secret network can be applied to large-scale network warfare.

“Iwn secret network over ed start, neutrino communication network starts, iwn secret network will provide 51,000 tflops of computing resources!” Yi Zhuerhui reported.

The computing resources actually collected by iwn secret network are lower than expected. This is because some ultra-low-end computer systems can get too little computing resources. Although they can theoretically provide computing resources, they can’t provide computing resources after the actual test.

Shi Lei took a deep breath and nodded to Tao Wenxian and Rafael, indicating that the two together, began to search for the organization’s pseudo artificial intelligence system, Butler’s parent server location.

This time, as Shi Lei said, it can only be successful, not failure!

They can’t afford it!

After all, the cost of failure in action is too high and too high!

(To be continued, please search for astronomical literature, the novel is better updated faster!


Tip: You can use left, right, A and D keyboard keys to browse between chapters.