SC117 Physical isolation!
Tutumen has very good technology in encryption and decryption. At the same time, it is also a world-class hacker.
Now, the Tutumen has shown a rich and powerful side again!
The unified and orderly computing power of 20tflops reveals Tutumen from the side and controls powerful private servers, which also shows that Tutumen is very rich.
Nanlin Guiyi spent 250,000 US dollars, and the unified and orderly computing power controlled is only a little more than 7tflops. It can be seen that Tutumen should indeed be a local tyrant!
Tutumen controls the unified and orderly computing power of 20tflops, easily breaking the defense of the Ministry of Culture and Science, and defeating the Ministry of Culture and Science, for the second time.
However, the Holy Sun seems to be bad either.
The official website of the Ministry of Culture, Culture, Science and Technology has not been affected at all, and it is obviously supported by parallel fault-tolerant service clusters.
Tutumen does not care about the official website of the Ministry of Culture, Science and Technology, and there are many parallel fault-tolerant service clusters to support it. As long as the official website of the Ministry of Culture, Science and Technology is not offline, it will break its defense.
The third time!
Tutumen broke the server defense system of the official website of the Ministry of Culture and Science for the third time. This time, the official website of the Ministry of Culture and Science for the Ministry of Culture and Science for the Ministry of Culture and Science for the Ministry of Culture and Science for the Ministry of Culture and Science for the Ministry of Culture and Science for the Ministry of Culture and Science for the third time. It seems that the parallel fault-tolerant service cluster only contains three server systems.
Under normal circumstances, there are only two server systems in parallel fault-tolerant service clusters. After all, the possibility of two server systems being damaged together is very small.
The official website of the Ministry of Culture, Science and Technology is protected by a parallel fault-tolerant service cluster composed of three server systems, and is already very, very strong in defense.
But why are world-class hackers like Tutumen participating in the war and are not short of money? If Tutumen uses asynchronous and disordered computing power to participate in the war, as long as the system of asynchronous and disordered computing power is coordinated, it is possible to be successfully defended if it is a little bit worse.
After all, it is very, very difficult to perfectly coordinate the asynchronous disordered computing power. It is also because of this that supercomputers around the world are always safe.
Otherwise, a hacker organization would concentrate on collecting asynchronous and disordered computing power and collecting the computing power of tens of millions of computers. Can't it defeat a supercomputer?
In fact, it really can't be defeated!
Asynchronous disordered computing power is very difficult to coordinate and control, and it is very easy to be defended by unified and orderly computing power unless it is an absolute order of magnitude advantage.
For example, using a unified and orderly computing power of 100tflops to combat the asynchronous and disorderly computing power of 1000tflops. Then, the difficulty is indeed a bit high.
However, asynchronous disordered computing power will become unfavorable after a certain order of magnitude. For example, 10,000 tflops of asynchronous disordered computing power will have serious problems in how to allocate such a huge distribution system of asynchronous disordered computing power.
Even the ACPCS system written by Nanlin Guiyi has serious flaws. What really makes up for the defects of the ACPCS system is not Nanlin Guiyi's powerful technology, it is just an auxiliary condition.
The core condition is Butler!
That's right!
The core of the APS system is indeed Butler!
If Butler does not handle asynchronous disordered computing power, the ACPs system will not be able to efficiently prepare and allocate asynchronous disordered computing power, and mobilize the work.
Therefore, when Tutumen, a tycoon who has a large number of unified and orderly computing power, is not weak in technology, it is simply a rhythm that is always unfavorable.
After the official website of the Ministry of Culture and Science was overthrown by Tutumen, he threw the management permissions of the backend server to the senior management of the Houyi Alliance in the second layer of dark web space.
In the encrypted voice communication channel of the third layer of dark web space, Tutumen asked Nanlin Guiyi.
"Light dominator, what about the next target? Faster speed, I'm looking forward to the last target you mentioned!" The neutral voice that has undergone voice change urges Nanlin to be reincarnated.
Nanlin Guiyi threw out the internal network address of the Taidi Town Research Institute, "Are you still here?"
"Of course!" Tutumen responded without caring, and got the intranet address of Taidi Town Research Institute, and Tutumen immediately launched an attack.
This time, Nan Lin Guiyi did not stand by and watched. He followed behind Tutumen and reminded: "I'll be with you!"
"It's up to you!" Tutumen responded indifferently.
Nanlin Guiyi and Tutumen invaded the internal network of the Taidi Town Institute together, and the two of them made a very fast progress. After all, Nanlin Guiyi owns the backdoor of the internal network of the Taidi Town Institute.
After Nanlin Guiyi and Tutumen drilled into the internal network of the Taidi Town Research Institute, Nanlin Guiyi took the initiative to guide the Tutumen and signaled the Tutumen to crack a document on the internal network of the Taidi Town Research Institute.
Once upon a time, Nan Lin Guiyi also discovered that document, but that document was particularly restricted, unable to be copied, moved, unable to be cut, and protected by a strong password!
Nanlin Guiyi is not very good at encryption and decryption. If you cannot crack passwords, you naturally cannot open files. However, Tutumen is very proficient in encryption and decryption.
"Tutumen, try to open the dbs file." Nan Linguiyi said directly, guiding Tutumen to crack the folder called 'dbs'.
Tutumen did not ask much and started construction directly.
However, in less than ten seconds before Tutumen began, he explained: "This document uses a very advanced password protection system and it takes at least one day to crack it. We deserve to die now, the other party has disconnected the network!"
While talking at Tutumen, the internal network of the Taidicho Research Institute was disconnected from the Internet!
Nanlin Guiyi has the back door to the internal system of the Takimachi Institute. He tried to connect to the internal network of the Takimachi Institute, but it was indeed impossible to connect, indicating that the Takimachi Institute physically disconnected from the Internet.
"Well, I've found out that the other party has disconnected the physical connection from the Internet." Nan Lin Guiyi said with a wry smile.
Disconnecting physical connections from the Internet is always the most powerful move!
Some confidential research institutes and laboratories, as well as internal security monitoring systems, will not be connected to the Internet. One of the purposes is to avoid being attacked by hackers.
Without physical connection with the Internet, even the peak-level hackers at the peak would not have done anything.
After all, hackers are not God!
"The light dominator, is the fourth goal ignored? Then, what about the fifth goal? Can you tell me about our fifth goal now?" Tutumen asked Nanlin Guiyi.
The fifth goal is
———
ps: Someone has speculated that the full name of the S organization? In addition, why did the S organization betray Nanlin Guiyi?
———
New book uploads, recommendation tickets are required, member clicks, collections, etc. Thanks for all support!
———
Follow the public: qms5120 to learn more behind-the-scenes footage of the works and authors, as well as periodic popularization of computer knowledge.
———
Chapter completed!