SC127 Dissatisfaction?
Nanlin Guiyi and Tutumen were forced into a desperate situation by the security guards of the supercomputer Beijing, and their situation was very dangerous.
Fortunately, Nanlin Guiyi's unique technology, shadow loop protection network, has finally been established!
"Tutumen, enter the following IP address!" Nan Lin Guiyi immediately gave the shadow loop protection network IP address, allowing the Tutumen to enter it.
When the Tutumen entered the shadow loop protection network, he couldn't help but exclaim, "Damn it! Damn it! I was so scared! I just came in, and my last protection server was broken after three seconds! Three seconds, just three seconds, I almost hang up!"
Nan Lin Guiyi reminded, "Okay, don't talk nonsense, quickly clear the last traces and leave the protection network. I guess my protection network will not last long!"
"Okay!" Tutumen did not talk nonsense and began to clean up the last traces. In less than three minutes, Tutumen completed all the cleaning work. "Brother of Light Dominator, I'm done, where are you?"
"I'm still a little short, it will take two minutes." Nan Lin Guiyi responded, the disadvantages of asynchronous disordered computing power were once again exposed. There is more work to deal with in terms of subsequent cleaning of traces.
Fortunately, Nanlin Guiyi's unique skill, the shadow loop protection network is powerful enough. The security guards of two waves of supercomputers, jointly tracked the shadow loop protection network, and then fell into a maze and began to crack endlessly.
Tutumen said with lingering fear, "Fortunately, you are, otherwise, this time I will be dead! By the way, Brother Light Dominator, what the hell is your last network protection? It has been withstood for so long? How many protection servers have you used?"
Nanlin Guiyi checked the cycle count of the shadow loop protection network. In less than four minutes, it actually cycled 11 times!
Each cycle requires breakthroughs of 28 protection servers, which means that in less than four minutes, the security guards of the supercomputer Beijing reverse tracking exceeded 308 protection servers.
This kind of protection server is worth a hacker worldwide, and you can count it with one hand!
Nan Lin Guiyi knew a hacker, and the other party liked to set up a large number of protection servers. No matter what situation he encountered, he could retreat calmly.
But 99:99% of hackers do not set up so many protection servers. After all, who is fine and biting reverse tracking like a mad dog?
Ahem!
Nanlin Guiyi and Tutumen were tragically tracked by the "mad dog" this time!
It’s still a “mad dog” with great combat power!
"At present, the other party has broken through 320 protection servers!" Nan Lin Guiyi said with a smile.
Tutumen made a cough, and was obviously choked by Nanlin Guiyi's answer, "What's the situation? 320 protection servers? Brother Light Dominator, how many protection servers have you set up?"
"No more, no less, enough to block the other party!" Nanlin Guiyi has no transparent loop to protect the network information. There are some techniques that are reserved as trump cards, which is always a good choice.
In almost three minutes, Nanlin Guiyi finally completed all the trace cleaning work. At the same time, the reverse tracking team of Supercomputer Jing also broke through nearly 600 protection servers.
Nanlin Guiyi ordered Butler to remove the rebirth of the shadow system, and the shadow loop protection network immediately collapsed. The security guards of the supercomputer Jing finally broke out of the "protect server cluster".
Choosing to unlock the shadow loop to protect the network is a great move!
Because Nanlin Guiyi and Tutumen both ran away, unlocking the shadow loop protection network can cover up the secret of the shadow loop protection network. Otherwise, can the security guards of the supercomputer Jing not find any problems after running thousands of protection servers inside?
Therefore, actively removing the shadow loop to protect the network can confuse the security guards of supercomputers.
After leaving the shadow loop protection network, the security guards of supercomputer Jing found that they had lost traces of Nanlin Guiyi and Tutumen, and they were unwilling to expand the query scope.
But the Internet is boundless, and even the computing power of 4,000 tflops is like a headless fly flying around, and it can only end up disappointingly.
The third layer of dark web space, encrypted voice communication channels, only Nanlin Guiyi and Tutumen are left.
"Tutumen, the opponent has left, and we have also figured out the opponent's reality and reality. This attack cannot continue, and we cannot defeat the opponent." Nan Lingui kept saying nothing.
The security guards of supercomputer Beijing have mobilized 4,000 tflops of unified and orderly computing power. How can they fight?
It must have been beaten by them!
"Brother of Light Dominator, I have a question, can you answer it?" Tutumen hesitated for a moment and asked Nanlin Guiyi on the encrypted voice communication channel.
"Tell me!" Nan Lin Guiyi was determined to win over the Tutumen, and his attitude was naturally good, and he did not speak ill of the same harsh words as he was against the Duke of Darkness.
Tutumen was silent for a moment before asking a question, "You really don't know that our target supercomputer is that powerful? In addition, Brother Light Dominator, what information do you want to obtain within it?"
Nan Linguiyi responded directly, "First, I really don't know it is so powerful. Second, I accidentally got a message that there is a data on the RB government's human experiments within it, and I want to get that data."
Tutumen immediately retorted: "But, if you don't know, the target supercomputer is so powerful, why are you prepared to protect the network so powerfully?"
This is a vicious cycle!
Just as Tutumen analyzed, if Nanlin Guiyi didn't know that the supercomputer Jing was so powerful, why did he prepare a powerful protection network?
Nan Lin Guiyi is not prepared for the technical problem of the Explosive Loop Protection Network. He just responded calmly: "I have always had a strong protection network! I just reversed tracked by the other party and broke nearly 600 protection servers. How many protection servers do you think I have left?"
Under normal circumstances, if the protection server is broken by the reverse tracking team, it will naturally be a scrapping rhythm. Because, the protection server is destroyed by the system and the actual owner of the protection server will definitely find an exception.
Nanlin Guiyi means asking Tutumen to judge how many protection servers he has left after nearly 600 protection servers are destroyed?
Nanlin Guiyi has already considered how to deal with the inquiry from Tutumen!
———
New book uploads, recommendation tickets are required, member clicks, collections, etc. Thanks for all support!
———
Follow the public: qms5120 to learn more behind-the-scenes footage of the works and authors, as well as periodic popularization of computer knowledge.
———
Chapter completed!