Chapter 254: Fighting, Winning (Part II)
When the American web began to be chaotic. Pen ~ fun ~ pavilion www.biquge.info
There is a team in the Eye of God that is quietly using more than 100 billion computing resources per second to find the true body of AK47.
In a sense, the battle of hackers in the new era is basically a performance competition of supercomputing.
Of course, the premise is that you have the ability to call on supercomputing resources and organize effective attacks or defenses.
In the circle of hackers, strength has always been paramount, and it is not uncommon for people to be easily slaughtered by the top hackers with supercomputers.
It's like a baby holding a knife and an adult is bare-handed, and the winner must be an adult.
…… If the United States knew that the Chinese authorities did not license any supercomputing to AK47 at all, then they might have directly judged that AK47 would definitely fail.
For example, two people whose physical fitness gap is not particularly large, one with a gun and the other with a fist, it is clear who wins and who loses.
Of course, some people in the outside world or the United States also know that AK47 must have its own supercomputing broiler in its hands, and it is likely that there is more than one.
…… Under the eyes of countless hackers around the world.
The meaningless battle in which the United States was the battlefield, which was entirely based on a declaration of war, soon came to an end.
It ended with a big victory for the United States.
Seeing that nothing could be done, the troublemakers on the Huaxia side of the carriage also hibernate very tacitly and silently entered the onlooker mode.
No one is stupid, and most of them can see that AK47 doesn't seem to be here.
AK47's defense is not very strong, and rightfully so, all eyes are on the primary root nameserver......
------
It's a long story, but it's all going on very fast on the Internet.
At the moment when Mr. Hammer gave the order, Gnakra in the other compartment tapped the enter key without any hesitation.
The program that has been written for a long time automatically performs the operation of blocking all domain names in China on the primary root name server.
Needless to say, after this operation is completed, part of Huaxia's network will disappear.
Of course, because there are 12 other root nameservers and 6 mirror nameservers in China, there are still many web pages that can continue to provide services.
However, in the first step of the United States' pre-design, when the primary root nameserver blocks all the top-level domains of ChinaAMC, it will be automatically updated, and the twelve root nameservers will also be updated in real time.
At that time, Huaxia will disappear from the eyes of other countries in the online world......
While waiting for the return result of the program execution in Gnakra.
But suddenly.
A hidden program on the primary root nameserver has moved......
"Drop~"
A short, rapid prompt sounded.
Gnakra did not wait for the return result of the successful execution of the procedure.
However, I waited for the alarm that the primary root nameserver was under extremely violent attack.
The thought in Gnakra's head was only a momentary turn.
Immediately command, defend with all your might, and mobilize all computing resources to track down as quickly as possible.
The CIA, NSA, FBI, and the Eye of God, four massive, best-of-the-art, legitimately identified hackers, reacted quickly in less than a second.
Defend, and, with all your might, find the trail of AK47.
At that moment, the supercomputers in more than 100 core computer rooms in the United States were running wildly, energy consumption was increasing, and computing resources were being utilized.
Combined with the previous results of the Eye of God tracing team, this time, they vaguely touched the traces of AK47's true body.
"Ding~"
There was another soft sound in the computer speakers controlled by Gnakra.
Gnakra, who was tracking with all his might, was shocked, the program was executed!
Presumably, Huaxia has begun to appear that web page access is invalid and paralyzed.
Gnakra casually glanced at the return result of the program execution window in the background.
The gaze was in vain.
A simple English exclamation point appeared in his pupils.
“Failed!”
He understands that any result of the return of this program written by himself means that the program has failed to execute!
Gnakra didn't even froze for a second, and shouted in an angry, extremely fast voice.
"Quickly go to the taproot background control, something happened!"
At the same time, more than 30 percent of domain names in the United States have failed.
The large-scale network was paralyzed, and it was almost only a moment that was perceived by all netizens, and things began to move towards an uncontrolled development direction.
"Apple's official website is inaccessible? What?!!'s going on?"
"Microsoft's official website is inaccessible?"
"Google official website failed?"
"Facebook is also inaccessible?"
"Amazon ......"
Countless netizens in the United States were originally scrolling through Facebook, posting jokes, and shopping online by the way.
Suddenly, I found that Facebook couldn't be refreshed, and the online shopping page couldn't be opened......
------
Zhuang Chun is a shrewd person.
It had been prepared for a long time, and at the same time as the high-profile declaration of war, even before the Red Wall, it had quietly invaded the primary root nameserver.
If there's one site in the world that's the best place to find, it's the primary root nameserver.
Of course, this is for hackers.
On the one hand, Zhuang Chun declared war in a high-profile manner in the name of AK47, and on the other hand, he had already invaded the primary root nameserver, and at the same time, hijacked many large websites in the United States.
Messing around on the primary root nameserver alone will not have an immediate effect.
Only by kidnapping the URL can the web page be inaccessible as quickly as possible.
As for the twelve root nameservers, he didn't need to do anything at all, and spontaneously synchronized the updates issued by the primary root nameservers.
That is, at this moment, thirty percent of the cyber areas in the United States of America disappear in the online world.
At the same time, the Pentagon, the North American Air Defense Headquarters, and so on were attacked by a number of important units.
Zhuang Chun was able to roughly calculate the area of computing resources that could be called in the United States, and in order not to be suspected by some people, he called almost all the idle resources of the dozen or so supercomputing centers in China, and called all the computing resources of Dongying 'Jing' and 'Oakforest-PACS', which had long been the first computing performance of Dongying that Ermei had already taken as his own.
and more than 70 percent of the computing resources of Supercomputing Center No. 2.
In other words, the Eye of God, the NSA, the CIA, and the FBI do not share as many computing resources as he does, and in addition, he operates through the virtual window of the system, backed by the endless computing resources of the system, it is normal for him to attack so many targets in a short period of time!
After all, no one thought about it.
AK47 This great god is actually, so, so shameless!
When you show your face two or three times, aren't they all grandiose and domineering?
Why is this time so shameless......
ps: I'm too tired, I came out with my eyelids on my eyelids, and I really only have one shift tomorrow......