Life Dungeon Game
Page 654
He Ao crouched down and ran his axe blade across the ground, leaving only a shallow mark on the alloy gate.
The mysterious person was quite generous; the hardness of this alloy was close to that of a C-grade alloy, and such a large piece must be worth a lot of money.
Meanwhile, on the other side of the elevator shaft, some people dressed in research institute uniforms came out.
They seemed to have been waiting here for quite some time.
"Jace, you lunatic, what are you doing here?"
The researcher at the front rushed towards He Ao, injected a gene serum into his body, and then leaped up, brandishing a small knife and stabbing He Ao in the chest.
A massive axe cleaved through the sky, splattering blood onto the pristine white lab coats around them.
He Ao tightened his wristband and looked at the 'familiar' faces around him.
Several of these people were from the lab that Jess used to run, where he worked with Jess on developing gene-based drugs.
At this moment, they were all in an unusually excited state.
The stench of blood in the air grew even stronger.
-
"What are you doing?"
In the brightly lit room, a man in an officer's uniform appeared on the screen.
"I don't have many people I can command to stop him. The data transfer is faster than I expected. I have ten minutes left. My men will stop him. I hope you don't mess things up."
"That was just an accident. The computing power I can mobilize here is far greater than outside. I will keep them all out."
The thin man's hands were both connected to data cables. A powerful glow flowed over his body, and the heat from the overclocking caused a slight disturbance in the air around him. He no longer had the energy to speak to the man in the officer's uniform.
"I won't fall into the same trap twice."
Chapter 584 Uncle Jess, I think I heard something strange.
"The underlying data exchange on the Internet is actually the transmission of data packets. Various kinds of information are encapsulated in these data packets and then transmitted to various computer terminals for processing."
"Our current attack method can be understood as sending data packets containing control programs to the enemy's computer. Once these data packets successfully enter the enemy's computer, we can try to gain control of the enemy's computer."
"A firewall is a protective measure that separates the internal network from the external network. It can effectively filter which data packets come from allowed users and which come from unauthorized users, thereby blocking data packets from 'malicious' users from entering the computer."
"The role of antivirus software is to identify malicious data packets and programs after they enter the computer and remove them from the computer."
"Of course, this is just a brief overview. The actual situation is much more complicated than that. Um... Uncle Jess, am I going into too much detail?"
Vianna paused, seemingly deep in thought.
"Ah, I've got it, Uncle Jess. You can think of it this way: we're currently engaged in a siege just like in the novels."
"My friend and I, whose symbol is E in the underlying data, are the attackers, while the hacker on the other side is the defender. The firewall is the city wall, and the antivirus software is the defensive force inside the city."
"This city is not just one big city; they also have many satellite cities, which are the small computer terminals on the outskirts."
There is normal exchange of people and goods between large cities and satellite cities; this is just ordinary data transmission.
"These satellite cities and large cities form a cluster of cities, which is a secondary intranet, and there is also a larger firewall outside."
"When we first broke through the network of that laboratory outside, Uncle Jess, you first bypassed the firewall and entered the urban cluster of these satellite cities, allowing E to occupy a satellite city with weak defenses first."
"Then, by leveraging the communication between this satellite city and other satellite cities, she quickly conquered the other satellite cities."
"After occupying these satellite cities, we can mobilize their computing power, that is, their urban resources, and bypass the external firewalls to send more of our data packets, that is, our soldiers, in through the network."
"At the same time, we can also have our soldiers disguise themselves as normal soldiers in this satellite city and try to infiltrate the big city, which is the core server. The function of the city walls, or firewalls, is to filter out who are normal soldiers and who are our disguised 'spies'."
"The network computing power of the peripheral laboratory we attacked earlier was not high. If our 'spy' infiltrated the core server, even if the hacker himself had strong computing power, he would be no match for the data surge generated by E's powerful computing power."
"The 'anti-virus' forces inside the city will be easily defeated by us, and then the city will be occupied by us."
"
The hacker probably knew this too, so he used most of his computing power to maintain the firewall and improve its filtering capabilities.
"At the same time, he is also diverting a portion of his 'troops' to eliminate the satellite cities that we control."
"Theoretically speaking, once all the terminals we control on the internal network are cleared by him, we will no longer be able to send 'troops' in from the outside to attack the core server."
The girl paused for a moment, then asked, "Uncle Jess, do you understand my analogy?"
"I understand, but it doesn't seem like I fully understand."
He raised his bone axe and cleaved another attacker injected with gene serum in two as he charged towards him, then swiftly moved forward.
Viana knew all this knowledge, as did Heo, who inherited Viana's memories, but Jess shouldn't have.
"So you're basically playing some kind of strategy game where we win by destroying the enemy's main city, and they win by clearing out all our occupied territories?"
"Well, you can understand it that way."
Viana was still typing away on her keyboard.
Due to her work, this girl seemed to rarely communicate with others, but once she started talking, she couldn't stop.
"So what about the 'trap' you mentioned earlier?"
He Ao then asked.
"That's easy,"
When asked about her scheme, Vianna seemed pleased and quickly answered,
"Isn't that hacker on the other side trying to divert computing power to destroy the strongholds we've established? But his total computing power is limited. The more computing power he diverts, the less computing power he has left to defend the core servers."
"In response to this characteristic, I first set up three terminals as the first layer of 'traps'. These three traps are progressively deeper, with the aim of disguising a high-throughput 'critical network terminal'."
"In fact, the vast majority of federal smart devices now support simultaneous connections to both internal and external networks."
"Many computer terminals in the lab above also support this function, which means they can connect to both the intranet and the external network provided by the communication service provider, so that when there is a problem with the intranet, they can use the external network to temporarily maintain work."
"Furthermore, in this case, smart devices typically use corporate accounts, which can be used to collectively access the external network."
"However, all the equipment in this laboratory has its external network access function turned off. After we enter the internal network and control the terminal, we also turn on the external network access function at the same time to send more remote computing power in."
"Generally speaking, attackers don't have enough computing power, well... not as exaggerated as E. So in order to concentrate computing power, they usually only send external computing power through one or two terminals. These terminals are called 'critical network terminals'."
“In such battles, it usually takes time to rebuild after a ‘critical network terminal’ is destroyed. In this situation, our computing power may not be able to keep up, allowing the enemy to turn the tide of the battle.”
"But in fact, because of 'E's' powerful computing capabilities, all our network terminals are 'critical network terminals,' but the hacker on the other side didn't know that, so he kept trying..."
We are searching for our 'critical network endpoints'.
"Using this feature, I used a series of traps to disguise a fake 'critical network terminal'."
"The purpose of those three interconnected traps is only one thing: to draw the hackers' attention to other network terminals and 'protect' our disguised 'fake critical network terminals'."
“That hacker was very clever. He identified my three traps and then determined the location of my disguised ‘critical network terminal.’ So he mobilized a lot of computing power to destroy that ‘critical network terminal’ directly.”
At this point, Vianna chuckled, her tone becoming lighter, "Then he fell into my trap. Because the computing power protecting the core server was reduced, E easily broke through his defenses and took control of the core server."
"I also found the data channel connecting his above-ground and underground labs. Unfortunately, he moved too fast and shut down the port the moment the server was breached. Otherwise, we could have stormed in directly without having to deal with the firewall here."
The little girl sighed, "This guy is still reinforcing the firewall."
In summary, Viana created a fake target to attract the hacker's attention, and then used a few small traps to mislead the hacker into believing that the fake target was real.
Then the hacker mobilized his forces to severely injure Viana and Eve in one fell swoop, but unexpectedly fell into Viana's trap and Eve instead stole their base.
"It's okay, we'll find a way."
He Ao swung the axe, and bright red blood flowed down the blade. In front of him were the last two researchers. Blood covered the gate of the horizontal partition elevator shaft beneath He Ao's feet.
These researchers were already waiting here when Heo landed on the gate, each with a dose of Class D gene serum.
They were probably sent up before the gate closed, and their purpose was likely to prevent He from going any further when He found this place. Now, only the last two of them are left.
"You devil, you're a devil..."
At this moment, the two researchers were trembling as they retreated, instead of rushing forward like the researchers before them.
He switched the headset to Eve's one-way communication, "Eve, how long will it take to break through the firewall?"
"It is estimated that it will take another 15 minutes and 30 seconds."
Eve's voice was unusually calm.
"Fifteen minutes is too much,"
He Ao paused slightly, realizing the other party was frantically transferring data. "Is there any way to bypass the firewall?"
"Retrieving data,"
Eve paused for a moment, "According to the data from the core server of the outer laboratory, there is a 90% probability that there is only one core router connected to the external network inside the hidden laboratory, and the other devices have no network access capabilities."
In other words, He Ao's method of simply finding any computer, implanting the control program compiled by Eve, and bypassing the firewall will not work.
Those terminals cannot connect to the external network and do not have Eve's external computing power support. If they only control one or a few terminals, they will most likely be easily eliminated by that hacker.
However, in this situation, after brute-forcely breaching the firewall, it's highly likely that the hidden entity can be directly controlled.
The core server of the laboratory, unfortunately, fifteen minutes is still too long to break through the firewall.
"What about the data port that Viana mentioned that connects the internal and external labs? Is there any way to restart that port?"
He asked again.
If the data channel between the internal and external laboratories is reopened, Eve can deploy computing power through the network of the external laboratory and directly input it into the internal network of the hidden laboratory, thereby bypassing the internal network firewall of the hidden laboratory and continuously delivering computing power.
This allows us to repeat what we did in the external lab, greatly reducing the time required to control the core server.
"Reading building construction drawings... Simulating possible wiring layouts... Simulation successful... Possible locations of internal and external network smart switches have been marked..."
As Eve's voice rang out, Heo's bracelet vibrated.
A 3D image appeared on his wristband projection, indicating his current location, which was above the elevator shaft gate.
Not far from this gate, at almost horizontal position, there is a closed emergency passage connecting the ground and underground. According to Eve's markings, there is a 73% chance that the intelligent switch between the inner and outer laboratories is behind a hidden door in the middle of this emergency passage.
He touched the projection with his finger and glanced at the surrounding structure.
The gate of this emergency passage should also be made of the same alloy as the gate he is standing on now, making it difficult to break through in a short time.
If he took the normal route, Heo would need to return to the ground, find the closed gate of the emergency passage on the other side, and break through the gate before he could enter the emergency passage.
You'll Also Like
-
Ancient Dragon in Arknights
Chapter 109 17 hours ago -
Hogwarts: I'm the only cultivator here!
Chapter 153 17 hours ago -
I'm really not the number one slacker in Soul Society.
Chapter 193 17 hours ago -
This demon is highly suspicious.
Chapter 448 17 hours ago -
I'll kill you after I finish this game!
Chapter 1250 17 hours ago -
Tokyo: My Hundred Demon Scroll
Chapter 452 17 hours ago -
Lu Mingfei doesn't want to be a superhero
Chapter 174 17 hours ago -
Snow: The Crown Prince of Chu, forced into marriage by the Minister of the Southern Palace with his
Chapter 287 17 hours ago -
People are in Honkai Impact 3rd, there's a villain simulator.
Chapter 166 17 hours ago -
Crossover Anime: Starting with Adopting the Homeless Melon God
Chapter 247 17 hours ago