Is HK437 arrogant?
. The Naha base in the country of Vosang basically had no resistance in the face of ATACMS-2 army tactical missiles.
And coupled with the erroneous order of the logistics officer of the base, some soldiers on duty at night were asked to urgently rescue supplies, and when they were attacked by ATACMS-2 army tactical missiles, they caused casualties.
The target of the attack on the Naha base is still the daily fuel depot, and at the moment when the fire rises, the Naha base seems to have fallen into an abyss of endless darkness!
The last ATACMS-2 army tactical missile flew towards the Ginowan Marine Large Oil Storage Plant, which had no air defense system because the entire oil storage plant was all fuel, and it was not a military base.
The ATACMS-2 Army Tactical Missile hit the Ginowan Marine Large Oil Storage Plant, and in the chain explosion reaction of the oil, the entire marine large oil storage plant was completely reduced to rubble.
Not only that, but a large amount of oil leaked from the large oil storage plant in the broken sea, threatening the surrounding military factories, causing great losses.
In the cyber world, due to the hardware protection of the ATACMS-2 Army Tactical Missile System, and Shi Lei's unfamiliarity with the ATACMS-2 Army Tactical Missile System, the data was uploaded back to the local Ministry of Defense of the Republic of China by the ATACMS-2 Army Tactical Missile System.
The incident at the Futenma base had a great impact on the Ministry of Defense of the Liber Country. The military's tracking experts immediately tracked Shi Lei according to the information reserved by the ATACMS-2 Army Tactical Missile System.
Sitting in front of the No. 1 server, Shi Lei tapped the keyboard calmly and calmly, hiding from the search and arrest of one military tracking expert after another in the cyber world.
The computing speed of the supercomputer mine is quite impressive, and the supercomputer mine has the trust license of many hosts. Shi Lei escaped between various hosts through a supercomputer mine, causing a lot of trouble for the military to track experts.
Xia Guo time is half past one in the morning, and Li Jianguo time is one and a half in the afternoon, which is a good time for work. In terms of time, it is more beneficial for the country.
According to Xia Guo's famous saying, Li Jianguo is an advantageous factor when occupying Litian. In terms of geographical advantages, it should be Shi Lei who occupies the supercomputer mine as the advantage of the home field.
“Sir。 At present, the number of trackers has reached 27, and after simulation calculation, we will be intercepted by trackers in 37-39 minutes. "Messer has the latest statistics. And calculate what is possible.
Shi Lei never underestimated military experts, and military experts are definitely not inferior to FBI security experts.
"Ephr. Activate the endless defense system of the supercomputer mine. Load the SA super administrator privilege of the supercomputer mine, start the task simulator, load all the projects currently running by the supercomputer mine in the task simulator, and prepare to control all the system computing resources of the supercomputer mine at any time. Shi Lei said a series of orders.
The so-called task simulator is a deceptive software. You can extract all the tasks in the supercomputer mine in the task simulator, so that the computer administrator can view the progress of the task. Extract virtual task progress from the task simulator. The supercomputer mine is simulated to work normally, which is convenient for Shi Lei to call more system computing resources.
It's just that the task simulator also has weaknesses, for example, a certain task, showing that it is about to be completed, but in fact, the mission simulator is just an illusion, and the real task is not about to be completed.
One or two tasks may not be enough, but if multiple tasks show completion, but the results of the calculations cannot be extracted, then the computer administrator will find that there is a problem. As a result, the supercomputer's system was thoroughly inspected, and it was discovered that someone had stolen the supercomputer's access to it.
It is precisely for this reason that Shi Lei only arranged a task simulator on the supercomputer mine. Anyway, the supercomputer mine, Shi Lei has no intention of keeping it.
Even the supercomputer mine reached the nineteenth place in the world's supercomputer ranking in 2006. But in Shi Lei's eyes, it's not shit!
Before the rebirth, in 2012, the computing performance of some personal computers reached 5TFLop/s, or GPU, and the supercomputer thunder was only 19.9TFLop/s.
In the 2007 era, the performance of computers was a little too bad after all!
"Sir, the order has been completed. The endless defense system is deployed, and the supercomputer mine can be used as the main battlefield at any time. Eater prompted.
Shi Lei did not hesitate, and immediately entered the supercomputer mine, after all, the tracking of more than 20 military tracking experts made him under great pressure!
Lijianguo, Ministry of Defense.
A tracking expert wearing gold-rimmed glasses suddenly yelled: "Seize the other party's IP address, the other party controls the supercomputer mine of Lawrence Livermore National Laboratory, immediately notify Lawrence Livermore National Laboratory, let them activate the SA super management authority, and directly investigate the hacker's connection IP address!" ”
After a while, an assistant said cautiously to the tracking expert of the gold-rimmed glasses: "Professor Lawton, the SA super management authority of Lawrence Livermore National Laboratory has been controlled by the other party, and it is currently in the hands of the other party for the time being. The head of the Lawrence Livermore National Laboratory asked, is it possible to cut off the network connection of the supercomputer mine? ”
If the network connection of the supercomputer mine is cut off, then Shi Lei will directly lose contact with the supercomputer mine.
Cyber tracking expert at the Department of Defense Lawton. Doyle immediately denied, "Don't cut off the network connection, the other party must have a back hand." If you simply cut off the Internet connection, you will never be able to catch the IP address of the other party. ”
In fact, it's like Tired. Doyle guessed that in that way, Shi Lei had already instructed Yi Shuer to set up various planning tasks in the supercomputer mine.
Once the supercomputer mine disconnects from the network and cannot connect to the Internet, the pre-set planning task will automatically erase the recorded information and start the virus information that destroys the hardware.
Not just after disconnecting from the network, but also after a power outage and restart. Planning tasks will still be carried out. Even if the hard disks in the disk array cabinet are removed one by one after the power is cut off and the hard disks are replaced to start the machine, the resident disk virus will still be triggered and the data in the hard disk will be destroyed.
"Professor Lawton, the defense of the supercomputer mine is unprecedentedly strong, and we can't break through!" Another tracking expert asked Lawton. Doyle pleaded.
Lawton. Doyle immediately said to the assistant in front of him: "Contact Lawrence Livermore National Laboratory and ask them to collect the firewall data of the supercomputer mine." All of them were passed on to our Ministry of Defense. ”
"Yes!" Lawton's assistant quickly responded and immediately contacted Lawrence Livermore National Laboratory.
About ten minutes later, the Department of Defense received an e-mail from Lawrence Livermore National Laboratory, containing all the information about the supercomputer thunder firewall.
After being viewed by many tracking experts. Once again, an attack was launched on the supercomputer mine. It's a pity that they don't know anything about it. Supercomputer mine current defense system. It has been replaced with an endless defense system.
The tracking experts of the Ministry of Defense are still unable to break through the defense system of the supercomputer mine!
Lawton. Doyle snorted coldly, "Damn hackers, dare to offend the great United States, no matter where you are, we America will definitely extradite you back to China." Let you be sanctioned by a court-martial! ’
Lawton. Instead of immediately joining the fight, Doyle sought outside help and contacted the F.B.I. to join the hunt for hackers.
After the FBI's security experts joined. With the supercomputer equipped by the FBI, Shi Lei's supercomputer mine immediately withstood huge pressure.
"Sir, found the FBI FBI IP information, the system computing resource occupancy of the supercomputer mine reached 84%, of which 82% is used for the endless defense system, and the remaining 2% is used to maintain the basic operating system, and the mission simulator is expected."
After the FBI and the FBI joined the operation of the Department of Defense, Yi Zuer immediately gave Shi Lei a hint.
Shi Lei smiled slightly, Shi Lei was not surprised by the addition of the FBI and the FBI. Domestically, the FBI, the FBI and the Department of Defense military are close; The C.I.A. and the Justice Department are getting closer; There is also a larger integrated intelligence agency that reports directly to the President of the Liberian State.
"Yi Zuer, control the first-class broilers of the country to access the supercomputer mine, and clean up the connection record between the No. 1 server and the supercomputer mine. Also, ready to start the destruction supercomputer mine at any time, I have other things to deal with. Shi Lei immediately took control of Server No. 1 and disconnected from the supercomputer Lei.
Eater cleared the connection record information between Server No. 1 and the supercomputer mine, and then invested 95% of the system's computing resources into the Endless Defense System to fend off the Defense Department of the Republic of China and the FBI and the FBI.
Shi Lei secretly connected to the supercomputer Yan, attacked the FBI FBI in reverse, and successfully took part of the authority of the official FBI website.
Changed the homepage of the official FBI website directly to the background of Uriel's Hell Flame Angel, and then wrote a declaration that shocked the whole world.
Dear Liber and FBI FBI,
Hello!
First of all, I would like to introduce myself, I am Uriel!
A high-level hacker in the world, a friend of Raphael, we belong to the same organization, and as for the name of the organization, it will be kept secret for the time being.
With regard to the Futenma Marine Corps Base in Riken Province, Kadena Air Base in Riken Province, Naha Base in Owasan Province, and Ginowan Marine Large Oil Storage Plant, I declare that I am responsible for the sneak attacks on the above four areas!
The above four areas, because I controlled the missiles at the Futenma base, and then launched missiles at the other three areas. As for the results, welcome to the major media reports!
Finally, I solemnly warn the noble and respected United States and the shrewd and heroic FBI that you will be acquitted of Raphael by 20 p.m. on January 18, 2007, and publicly apologize to Raphael!
Otherwise, the destination of the next missile launch, maybe New York, maybe Washington, maybe Los Angeles, or even
(To be continued.) For mobile phone users, please go to read. )
PS: I've been in a bad mood with my family lately, and I'm not in a good mood, so it's possible to set up automatic updates, please forgive me. 【Thanks】jsczjt,Tip 7776.Oh NO I don't understand,Tip 588.Snow Ridge Romance,Tip 200.lancer2,kakuwinter,Luxi Fair,Tip 100.