Chapter 243 - Close the door
After the black cover soft-faced copy was leaked, a crisis of trust broke out. The two new and old discipline inspection committee secretaries had to work together to shoulder the burden. One was responsible for coping with the pressure in the officialdom, while the other found a way to decrypt and crack the contents of the soft-faced copy.
The angry and fierce reactions of the jackals and tigers made the experienced old man Wang recognize the value of this soft copy. Once the secret is solved, it is very likely to kill a circle of people.
For the former Discipline Inspection Commission Secretary Ji, what else can be more happy than catching a bunch of official apes to drink? Thinking about the beginning, my team had just opened, and only a dozen people came in total, seven or eight guns... The old man was excited to sing a paragraph "Shajiabang".
After finishing the call with the current Discipline Inspection Commission Secretary Ji, Old Man Wang put his cell phone on the desktop in front of him and said to everyone in the conference room: "Two days, no matter what method you use, there are only two days! Two days later, I, you, and people outside, will either become heroes or be penniless forever."
After arranging some people and some things, Old Man Wang had no worries anymore. Now he was completely willing to give it a try. It was like this, and his whole body was almost about to burn.
Everyone in the conference room was shocked, which was both a challenge and an opportunity for them.
If the decryption can be successfully decrypted and made contributions to this, everyone will share many unthinkable benefits.
These benefits are not only visible cash rewards, but more of non-substantive future benefits, which is what they want more.
For example, if the superiors attach great importance to it, they are recorded in their personal files, and have strong political awareness. If they have the opportunity to get a promotion and salary increase in the future, they may be easier than others.
Someone said stutteringly: "We can use the satellite antenna pot in the school to try to make several high-frequency transceiver antennas and form a closed LAN, so that we will not be afraid of hackers from the Internet."
"Then do it!"
Old Man Wang doesn't understand any of those professional terms, but he knows that the suggestions put forward by professionals can often effectively solve the problem.
Even if it cannot be solved, it will not be worse than the current situation.
Leaders don’t need to know everything, just let those who know how to do it.
"I'll prepare now!"
The technician immediately informed his ideas to colleagues from several other universities and was unanimously recognized.
After agreeing on the bandwidth, encryption method and communication protocol, the technicians from each school immediately began to take action.
Although setting up a private high-power wireless signal station is an illegal act, other people will be responsible for solving these problems.
Technical personnel are responsible for technical issues, and legal personnel are responsible for legal issues.
Those jackals, tigers and leopards who are struggling dyingly cannot completely cover the sky, so there are naturally some people on Old Man Wang who are responsible for restraining them.
The satellite pot located on the top of several teaching buildings slowly rotated, aiming at the directions of the other universities, aiming at the far side of the big pot and the small pot being closest, and several additional sets of fish bone antennas were added to enhance the signal-receiving ability.
Below the antenna, several sets of specially made signal modems are connected to transmit and receive wireless signals of a specific bandwidth. The distance can reach a maximum distance of 20 kilometers, which is the effective communication distance of the ground wave of high-frequency short-wave electromagnetic signals.
If you want to be farther away, you can only aim at the sky and use the ionosphere to refract it to a longer distance. However, the distance between several colleges and universities is not too far away. At such a close distance, too much pursuit of sending signals to farther places will easily form signal blind spots nearby, similar to darkness under the light, which increases the difficulty of signal reception.
High-frequency short-wave communication technology is mature, with convenient networking, low power consumption and low cost. It is usually used as a teaching method and is most suitable for setting up temporary star topological high-frequency short-wave communication networks between several universities.
The professional teachers in the school are all experts. With the help of students, there are many people and great power, and the technical transformation project does not take much time. With the successful first debugging, the high-frequency short-wave communication LAN was quickly formed.
In order to ensure sufficient bandwidth, high-frequency short-wave signals that occupy multiple channels will cause some interference to nearby mobile phones, walkie-talkies and other wireless devices. However, the data encryption method and structure are different. Even if there is interference, the impact will not be too great. Like previous analog signals, there will be serial numbers. This is also the advantage of digital communication.
Qianjiang University has the most computing resources, so it has become the core of the entire topological structure, and it is circulating a lot of data from other colleges and universities.
As universities gradually cut off external Internet links, the raging hacker invasion came to an abrupt end, leaving only some malicious programs that successfully invaded were still resisting. Their final whine will soon be swept away by highly skilled programmers.
The number of offline terminals that have fallen sharply has been quickly curbed and has begun to slowly recover. Students are working hard to restore the terminal nodes of distributed computing, and those damaged computers are reconnected to the distributed computing network.
The hackers' methods have not reached the level of destroying hardware, so they have fallen and got up again. "The number of terminals has recovered to 31,732, and are still increasing in single digits. Huh? What is this? Mobile phones? Even mobile phones are involved. Who did it? It's amazing!"
The technician who was monitoring the entire distributed computing system suddenly burst into tears and exclaimed, and he retrieved the unusual terminal ID name.
Some people have a lot of ideas and actually wrote special app applications, using mobile phones as terminals for distributed computing.
Although the computing power of a mobile phone cannot be compared with that of a personal computer processor, it can also be used to form a tower, accumulate a small amount and add up to a large number, and the number will definitely not be smaller than the number of personal computers. The computing power provided to the entire distributed computing system is like hundreds of more personal computers with good performance.
The completely closed large wireless LAN brings together extremely large computing resources, and the number of processors alone is no less than that of supercomputers.
Without any disturbance, the computing power is close to that of a large computer, and the data processing power of full-load computing is amazing.
Two days, perhaps less than two days, the ciphertexts of the digital copy on the soft black cover will be completely deciphered, and the doomsday of the jackals, tigers and leopards is about to come-
In a tall 58-story office building in the city center, the spacious and bright conference room was almost filled with endless smoke.
The ashtray was filled with cigarette butts. Some of them were not even finished smoking. The remaining half was pressed into it. There were a few disposable paper cups scattered nearby, with some water filling it inside, and the cigarette butts were also stuffed with cigarette butts. The water used to extinguish the fire had already turned black.
The paint surface of the brand new conference table was spotted with cigarette butts, and the same was true on the carpet. The originally expensive price dropped sharply due to these spots.
Five or six red-skinned soft Chinese were removed and sealed, thrown on the table in a row for people to use.
At most two hours, they will become part of the ashtray, paper cups and trash can.
There were two air filters in the corner, which were running weakly. The smoke that seemed too dense made them weak.
The figures in the conference room were still sucking in the clouds and mist. They either stood, sat, walked back and forth, or whispered together, and whispered together, completely without caring about the harm of the smoke on their bodies.
"It's broken, it's broken! The people we invited can't get in."
A middle-aged man wearing a light blue shirt and black trousers pushed the door open and was choked by the smoke coming from his face. He waved his hand and waved the smoke in front of him. It took him a while to see the situation in the conference room.
The thick smoke escaped part of it and scattered into the office area outside.
The white-collar workers who were rushing to the rows of desks began to cough violently, and they were choked.
A big belly man sitting at the top of the conference table asked calmly, "What's broken? Why can't he get in?"
The middle-aged man in a light blue shirt explained: "Those universities have pulled out the network cables!"
Of course, this is just an explanation. The optical fiber is not easy to pull out. At most, the gateway device will be turned off and powered off. This operation is enough.
"Disconnection? It's cruel enough! But they can't crack it smoothly!"
A person who had been standing by the glass curtain wall and looking out the building suddenly turned around, seemingly a little excited.
Once several universities cannot join forces, the divided distributed computing will greatly reduce efficiency, and at least there is no way to parse those numerical ciphertexts in a short period of time.
"No, no, they're still calculating."
Middle-aged man in light blue shirt shook his head straight.
The big-bellied poop at the top of the conference table frowned and said, "What is going on? Explain it clearly at once."
"According to the reports of the students who informed us, several universities have formed a large short-wave communication LAN, which is completely isolated from the external network. The masters we invited have no way to invade."
The middle-aged man in a light blue shirt also looked worried. He had an advantage before, but once the internet was cut off, the hackers could only stare at him.
The man standing next to the glass curtain wall asked anxiously: "Is there any way to enter their short-wave communication LAN?"
"We don't know their signal keys and encoding methods. If we want to crack it, it will take more time and more experts."
Middle-aged man in light blue shirt has consulted with professionals.
I'm afraid there is no way to invade this short-wave communication LAN in a short period of time. If the other party also uses frequency hopping technology, the difficulty will increase by geometric level. You should know that frequency hopping technology has already involved the military field and it is difficult to crack it in the civilian field.
"Then what should we do? Wait for the old guy to crack the secret text? Then he invites us to the jail one by one?"
The man with a big belly slapped the table hard and looked very angry.
Old Man Wang likes to invite people to prison meals. Everyone once knew about it.
"But there is a way!"
The middle-aged man in a light blue shirt suddenly became hesitant after saying this.
"When is it? If you have anything to say, if you are afraid of offending someone, I will help you!"
The big belly stared at the other person.
"Someone suggested to me that it would be a simple electromagnetic bomb to burn all the computers and other electronic devices..."
The middle-aged man in a light blue shirt was a little embarrassed, but he still said it.
"That's great. As long as you can solve it with money, it's not a problem. Find someone to make this bomb and blow that old guy up to the sky."
The man who was originally standing next to the glass curtain wall waved his fists excitedly, boom and other things were the most loving.
The man with a big belly had a gloomy face and shook his head after a blush and a white moment.
"no!"
Throwing bombs to school, even if they are just non-destructive electromagnetic bombs, do you think you are not dying fast enough?
The school has always been one of the government's reverse scales. It will kill you when you touch it. It will be severe and fast. There is no possibility of being spared. The king of heaven will still be dragged onto the target and shot for five minutes.
University is a special existence. No matter how the outside world fights, it is difficult to burn the fire inside.
Although some rules can be used to make trouble reasonably, it is only limited to making trouble.
Do those guys who pinch the power grid dare to go to campus to cut the thread head?
Even if you borrow ten courages, you dare not!
How could you be beaten to death by a student? It would be in vain!
If you are not convinced, you can review the May Fourth Movement.
There are more than one guy who was caught in the sky in history -
8)
Chapter completed!