SC117 Physical Isolation!
In terms of encryption and decryption, Tutumen has very good technology. At the same time www.biquge.info he is also a world-class hacker.
Now, Tutumen has shown its rich side again!
The unified and orderly computing power of 20tflops, which shows Tutumen from the side, controls a powerful private server, which also shows that Tutumen is very tyrant.
Nanlin Guiyi spent $250,000, and the unified and orderly computing power under his control was only a little more than 7 tflops. It can be seen that Tutumen should indeed be a local tyrant!
Tutumen controlled the unified and orderly computing power of 20tflops, and easily smashed the official website of the Ministry of Education, Culture, Sports, Science and Technology defense, and defeated the official website of the Ministry of Education, Culture, Sports, Science and Technology for the second time.
However, the Divine Sun doesn't seem to be bad either.
The official website of the Ministry of Education, Culture, Sports, Science and Technology has not been affected at all, and it is obvious that there is also support for parallel fault-tolerant service clusters.
Regardless of how much the official website of the Ministry of Education, Culture, Sports, Science and Technology has the support of the parallel fault-tolerant service cluster, as long as the official website of the Ministry of Education, Culture, Sports, Science and Technology is not offline, he will break its defenses.
The third time!
For the third time, Tutumen broke the server defense system of the official website of the Ministry of Education, Culture, Sports, Science and Technology, and this time, the official website of the Ministry of Education, Culture, Sports, Science and Technology was finally taken offline. In this way, the parallel fault-tolerant service cluster only contains three server systems.
Under normal circumstances, a parallel fault-tolerant service cluster has only two server stacks. After all, it's very unlikely that both server stacks will be damaged together.
The official website of the Ministry of Education, Culture, Sports, Science and Technology is protected by a parallel fault-tolerant service cluster consisting of three server systems, which is already very, very strong.
But there are world-class hackers like Tutumen participating in the war, and they are world-class hackers who are not short of money. If Tutumen uses asynchronous disordered computing power to participate in the war, as long as the system that coordinates asynchronous disordered computing power is a little worse, it may be successfully defended.
After all, it's very, very difficult to perfectly orchestrate asynchronous and out-of-order computing power. That's why the world's supercomputers are always safe.
Otherwise, if a hacker group concentrates on collecting asynchronous and disordered computing power and collects the computing power of tens of millions of computers, can't it defeat a supercomputer?
In fact, it really can't be defeated!
Asynchronous and unordered computing power is very difficult to coordinate and control, and it is very easy to be defended by unified and ordered computing power, unless it is an absolute order of magnitude advantage.
For example, 100 tflops of unified ordered computing power is used against 1000 tflops of asynchronous and unordered computing power. Well, the difficulty is indeed a bit bigger.
However, after a certain order of magnitude, the asynchronous out-of-order computing power will become unadvantageous. For example, with 10,000 tflops of asynchronous and out-of-order computing power, there will be serious problems in how to allocate such a large amount of asynchronous out-of-order computing power.
Even the APCS system written by Nanlin Guiyi has serious flaws. What really makes up for the shortcomings of the APCS system is not Nanlin Guiyi's strong technology, it is just an auxiliary condition.
The core condition is Butler!
That's right!
The heart of the APCS system is indeed Butler!
Without Butler's handling of asynchronous out-of-order computing power, the APCS system would not have been able to efficiently complete the preparation and distribution of asynchronous out-of-order computing power, as well as the mobilization work.
Therefore, Tutumen, a local tyrant with a large number of unified and orderly computing power, is simply invincible in terms of technology when it is not weak.
After the official website of the Ministry of Education, Culture, Sports, Science and Technology was overthrown by Tutumen, he lost the management authority of the backend server to the high-level officials of the Houyi Alliance in the second-layer dark web space.
In the encrypted voice communication channel of the third-layer dark web space, Tutumen asked Nanlin Guiyi.
"Radiance Dominator, what's next? Hurry up, I'm looking forward to the last goal you said! The neutral voice that has been processed by voice change urges Nanlin to return to one.
Nanbayashi Guiyi threw out the internal network address of the Taiji Town Research Institute, "Are you still coming?" ”
"Of course!" Tutumon didn't care about the response, and got the intranet address of the Taiji Town Research Institute, and Tutumen immediately attacked.
This time, Nanlin Guiyi did not sit idly by, he followed behind Tutumen and reminded: "I'm with you!" ”
"Whatever you want!" Tutumen replied indifferently.
Minamibayashi Guiyi and Todomon invaded the internal network of the Taiji Town Research Institute, and the progress of the two of them was very fast. After all, Nanbayashi Guiichi has the back door to the internal network of the Taiji Research Institute.
When Nanlin Guiyi and Tutumen penetrated into the internal network of the Taiji Research Institute, Nanlin Guiyi took the initiative to guide Tutumen and signaled Tutumen to crack a document on the internal network of the Taiji Research Institute.
Once, Nanlin Guiyi also found that document, but that file was specially restricted, it could not be copied, moved, cut, and protected by a strong password!
Nanlin Guiyi is not very good at encryption and decryption, and if he can't crack the password, he naturally can't open the file. However, Tutumen is proficient in encryption and decryption.
"Tutumen, you try to open that dbs file." Nanlin Guiyi said directly, guiding Tutumen to crack the folder named 'dbs'.
Tutumen didn't ask much and started work directly.
However, less than ten seconds after Tutumen started, he explained: "This document uses a very advanced password protection system, and it will take at least a day to crack it." We are now... Damn, the other party disconnected from the network! ”
While Totumon was talking, the internal network of the Taiji Research Institute was actually disconnected from the Internet!
Nanbayashi Guiichi has the back door of the internal system of the Taijicho Research Institute, and he tries to connect to the internal network of the Taijicho Research Institute, but it is indeed impossible to connect, indicating that the Taijicho Research Institute is physically disconnected from the Internet.
"Well, I've already checked, and the other party is physically disconnected from the internet." Nanlin Guiyi smiled bitterly.
Disconnecting from the physical connection to the internet is always the most powerful move!
Some classified research institutes and laboratories, as well as internal security monitoring systems, are not connected to the Internet, one of the purposes of which is to avoid being attacked by hackers.
Without a physical connection to the Internet, even the pinnacle hacker in the pinnacle can't do anything.
After all, hackers are not gods!
"Radiance Dominator, the fourth target is overlooked, right? So, what about the fifth goal? Can you now talk about our fifth goal? Tutumen asked Nanlin Guiyi.
The fifth goal, which is...
————
PS: Has anyone speculated, the full name of the S organization? Also, Why did Organization S betray Nanlin Guiyi?
————
New book uploads, referral tickets needed, member clicks, favorites, etc., thank you for all your support!
————
Pay attention to the public: qms5120 to learn more about the behind-the-scenes footage of the works and authors, as well as popularize computer knowledge from time to time.
————