Shi Lei repeatedly investigated the clues of the invasion of the supercomputer lightning. He originally thought it was an internal crime, but through the security monitoring system, he determined that the internal crime was not met.
After excluding the internal crime, Shi Lei had no choice but to accept that the supercomputer lightning was invaded by external invasion. Moreover, the external invaders had unknown means to bypass the external defense of the endless defense system and Yi Zuer's verification and directly entered the interior of the supercomputer lightning.
Shi Lei is very confident in the endless defense system and Yi Zuer. According to Shi Lei's prediction, even the number one giant in the Angels Council cannot break through the defense of the supercomputer lightning.
So what kind of hacker is breaking through the defense of supercomputer lightning?
"Yuzhuer, logically reasoning the identity of the intruder." After more than an hour of investigation, Shi Lei still found no evidence. He could only treat the dead horse as a living horse and ordered Yizhuer to logically reason the identity information of the intruder.
Logical reasoning of the identity information of a hacker mainly relies on judging the intruder's operation command characteristics to judge possible identities.
"Sir, based on system logic reasoning, the intruder may be the Big Penguin Company." Yi Zuer gave a possible answer.
Shi Lei frowned. Shi Lei knew the technical strength of Big Penguin Company very clearly. They would never be able to bypass the endless defense system and enter the supercomputer lightning.
If Big Penguin Company had such technical strength, they would not have been defeated so miserably when competing with Dream Entertainment!
"How likely is this?" Shi Lei asked.
"There is no way to give accurate data, and there is no comparison benchmark, and there is only one answer for system logical reasoning." Yi Zuer could not answer Shi Lei's question. This question cannot be numerical in detail.
Shi Lei rubbed his temples. Although he didn't believe that the big penguin had such technical strength, he was still preparing to investigate, at least this was a clue of evidence.
In terms of language, you can despise the Big Penguin Company, but in the action, you must not be too disdainful to the Big Penguin Company!
"Yuzhuer. Integrate the iwn secret network resources!" Shi Lei operated the No. 1 server and obtained the iwn secret network resources, from a secondary web page under the Big Penguin Company to the internal network of Big Penguin Company.
The stall set up by Big Penguin Company is a bit big. With Shi Lei's strength, he casually broke into their internal network. In the internal network, Shi Lei ordered Yi Zuer to inquire about information related to supercomputer lightning.
If Shi Lei inquired by himself, it would be as difficult as finding a needle in a haystack!
About two minutes later, Yi Zuer issued a prompt that an abnormal information content was found in the internal network of Big Penguin Company.
"Sir, I found that the suspicious connection IP address system records the log. After system comparison, the connection IP address is the network address of the supercomputer Lightning!"
Yi Zuer's prompt made Shi Lei stunned. A display interface popped up on the screen of the No. 1 server. It showed the system log record information obtained by Yi Zuer from the internal network of the Big Penguin Company.
Looking at a server of Big Penguin Company, which was directly connected to the supercomputer Lightning, Shi Lei's expression was a bit strange.
"Is it really the Big Penguin Company that the Big Penguin Company is making trouble?" Shi Lei said to himself. Yi Zuer discovered the server of Big Penguin Company and connected to the supercomputer lightning. Shi Lei also began to suspect that the invasion of the supercomputer lightning was related to the Big Penguin Company.
Shi Lei personally investigated the system record log of the server in the internal network of Big Penguin Company. Shi Lei checked it very carefully. Although the previous system record log was deleted by the system. However, Shi Lei extracted most of the system record logs through deep disk recovery technology and fragmented information integration technology.
Through the analysis and recording of logs in the system, Shi Lei discovered a suspicious point.
That is, the server of Big Penguin Company, although it is directly linked to the supercomputer Lightning, it is not the source of intrusion. It is just a transit server, that is, the broiler server.
Long before Shi Lei investigated the Big Penguin Company, the Big Penguin Company's server had been invaded and controlled by other personnel. If Shi Lei's data recovery technology was not good enough to restore most of the deleted system log information, then Big Penguin Company would have been framed, and Dream Entertainment and Shi Lei would only vent their anger at Big Penguin Company and would not continue to investigate.
‘Scandal guy!’ Shi Lei snorted in his heart, and based on the server of Big Penguin Company, he began to investigate the black hand that framed Big Penguin Company again.
Shi Lei did not think that the other party was so troublesome, just to frame the Big Penguin Company. In this weird invasion, the Big Penguin Company was just a trick behind the scenes, trying to interfere with Mirui Technology's subsequent investigation.
The hacker who really invaded the supercomputer lightning is still hidden in the fog!
'Who is it? Although Big Penguin Company is not very powerful, it is not something that can be bullied by cats and dogs. The other party can actually control Big Penguin Company's servers as a transfer springboard, and not be discovered by Big Penguin Company, and can deliberately leave the IP address connected as a trap. This guy is definitely not simple!'
Shi Lei's brows were frowned into the word "chuan".
If you want to play Big Penguin Company in the midst of applause, you need at least a world-class hacker expert. However, if you want to invade the supercomputer Lightning silently, Shi Lei doesn't know what level of hackers can do it.
The world's peak-level hacker will definitely not be able to do it!
The world's peak-level hackers among the first generation of hackers cannot do it!
To put it in an exaggeration, even the origin of the Internet, Darpa Advanced Bureau could not silently break the endless defense system and deceive the advanced pseudo-artificial intelligence system.
unless…
Shi Lei suddenly thought of a situation and his face changed drastically!
Before rebirth, 99% of the world's top 500 supercomputers used server CPUs produced by Intel, and very few supercomputers used server CPUs of Amd Company, which are comparable to "national treasures".
It is precisely because of this situation that Shi Lei subconsciously ignored that the supercomputer lightning was built using the server CPU produced by Amd.
In the last life, the server CPU produced by Amd Company was difficult to be elegant. It was more used in small and medium-sized enterprises. During a hacker technology discussion conference, a hacker made his new discovery, that is, the server CPU produced by Amd Company. There was a fatal hardware vulnerability.
That's right, it's a hardware vulnerability!
There is an extremely fatal hardware vulnerability in the server CPU of Amd. As long as you master this hardware vulnerability, hackers can directly enter. The server built with the server CPU of Amd. It completely ignores any firewalls and security systems, and directly disguises itself as the core program of the CPU, avoiding all troubles.
‘Is it the hardware vulnerability?’ Shi Lei thought in his mind. He tried hard to recall which hacker who published the CPU hardware vulnerability of the AMD company server?
Based on the current situation, the person who invaded the supercomputer Lightning should be the hacker.
Although the other party announced the hardware vulnerability of the CPU server of the amd company. It was several years later, no one was sure when the hacker discovered the hardware vulnerability.
Shi Lei’s memory is very good. If it is important information, as long as you recall it slowly, Shi Lei can remember it.
‘I remembered it! It was Maha Kamal!’ Shi Lei showed a hint of joy on his face, put his hands on the keyboard, and quickly typed the name of ‘Maha Kamal’.
This name is not the real name, but the name of the hacker's "vard".
"Yuzul, search for information about 'Maha, Kamal' on the Internet! By the way, the other party is an Inca, mainly focusing on the Inca region's investigation information." Shi Lei ordered.
Maha Kamal is an Inca, Shi Lei will not remember this mistake. At the initial hacker technology discussion meeting, every participant had to log in with a real vest. When Maha Kamal introduced himself, he took the initiative to admit that he was an Inca.
The overall national strength of Inca is far inferior to that of Xia, but in terms of software technology strength, the Incas are very strong. They have built a world-renowned software industry chain and become software outsourcing service providers all over the world.
After analyzing the possible suspects, Shi Lei breathed a sigh of relief.
A powerful enemy is not terrible. What is really terrible is an unknown enemy! That kind of unknown enemy makes people feel powerless.
"Maha Kamal, hum!" Shi Lei's tone was disdainful. Maha Kamal's hacking technology has reached world-class level, but it is far from the peak level in the world.
As long as Shi Lei knows the other party's methods, he is not afraid of the hardware-level vulnerability that the other party has mastered. The other party has made this vulnerability public and Shi Lei has also personally verified it.
In later generations, supercomputers and large servers that use the AMD company's server CPU basically did not exist. This hardware-level vulnerability is very useless, so Maha Kamal announced it and increased his reputation.
Shi Lei tried to use hardware vulnerabilities as a breakthrough to invade the supercomputer lightning. As Shi Lei guessed, he easily entered the interior of the supercomputer lightning, neither causing a counterattack from the endless defense system nor causing Yi Zuer's alarm.
"It's true!" Shi Lei sighed.
After finding the crux of the problem, Shi Lei immediately began to write corresponding defense auxiliary programs to solve the hardware vulnerability of the amd company's server CPU, and use the defense auxiliary programs to completely block this hardware vulnerability.
Moreover, once someone uses a hardware vulnerability again and attempts to enter the supercomputer lightning, it will be counter-tracked by defense auxiliary programs until the other party's real IP address is found.
After dealing with the defense auxiliary program for hardware vulnerabilities, Shi Lei began to look forward to it. He wanted to see how capable Maha Kamal has!
.(To be continued...)
ps: Shanshan: I guessed the ending, but I didn’t guess it! Germany won the championship, but it was in overtime! Damn Asian handicap! Automatic update to the settings tonight. Goodbye, I’m going to go to the rooftop!