typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK426 Jedi Counterattack: Lightning Control

()ps: Preview, update tomorrow, the war begins! Brother Shitou, how will he deal with the International Intelligence Bureau of the Ministry of Foreign Affairs?

Supercomputer Lei ranked 19th in the world's top 500 supercomputers ranking in November 2006. The computing power reached 19.9tflops, which is equivalent to 42% of the supercomputer's energy.

In terms of xing energy, supercomputer is still a little short of it. After all, its safe call calculation volume is only 45 tflops, which is not as good as Dream Entertainment's supercomputer.

When Shi Lei fought with Raphael, he over-called supercomputer Yan 20tflops resources, completely defeating the supercomputer thunder. It was also that time that the secret of the supercomputer thunder was accidentally caught by the mysterious CPXjazz.

This caused Raphael's tragedy.

Therefore, it is absolutely dangerous to overuse the computing resources of supercomputers.

From the analysis of xing energy alone, Shi Lei's choice of supercomputer Lei is not a good choice. With the excellent xing energy of supercomputer Yan, Shi Lei can completely choose a more powerful supercomputer as his target... .

For example, in November 2006, the supercomputer ranked third in the world, BGW, which is the main computer of the Thomas Watson Research Center of ibm. The computing power reached 91.3tflops, almost twice the power of the supercomputer Yan!

Although it is very difficult to hack into bgw and control it, it is not impossible for Shi Lei to complete.

However, Shi Lei chose Supercomputer Lei!

Because the supercomputer thunder once belonged to Raphael, it can be used to do some good work!

In front of Server 1, Shi Lei's hands and fingers were jumping quickly on the keyboard, and commands were issued from Server 1.

At the same time, Shi Lei also ordered Yi Zuer in voice, "Yuer, monitor all activities of the supercomputer thunder. If you find any abnormal changes, remind me immediately!"

"Sir, the fuzzy command cannot be executed. Please define the abnormal range of changes in detail." Yi Zuer is only a low-level pseudo-artificial intelligence after all, and cannot use program definition to understand the fuzzy command.

Shi Lei used voice depressedly to determine the range of 'unusual changes' for Yi Zuer. "Yuer, monitors the calculation energy occupancy of supercomputer thunder, as if the calculation data occupancy suddenly increases. The value exceeds 20%.

, report immediately; monitor the network connection of supercomputer mines. If you find that the influx of data exceeds 80% of the total bandwidth, report immediately; monitor the data flow of the system, and once a program spys us, send deceptive information immediately.

And give a reward!”

"Sir, order accept!" With clear procedural conditions, Yi Zuer immediately accepted the order.

Yi Zuer helped Shi Lei monitor the situation of supercomputer thunder. Shi Lei could focus more on invading supercomputer thunder and analyzing the system architecture of supercomputer thunder.

Most of the supercomputers' caO systems use closed systems. The closed systems help protect the security of supercomputers and reduce the chance of being hacked.

At least, he is not the top hacker, and he is basically helpless about a closed system. But Shi Lei happens to be the top hacker!

Shi Lei analyzed the system architecture of supercomputer Lei and looked for system vulnerabilities. Even if it is a closed system, it is still a computer system, and there are system vulnerabilities.

Under the sniffing of the world's peak hacker, the system vulnerabilities of the supercomputer Lei were gradually discovered by Shi Lei one by one. However, the system vulnerabilities currently discovered are all irrelevant low-hazard vulnerabilities, and the core permissions that want to enter the system

Grouping is a waste of time.

This so-called waste of time is likely to take several days, or even more than ten days. Shi Lei does not waste so much time. He needs to teach the International Intelligence Bureau of the Ministry of Foreign Affairs as soon as possible and find some things for them to do!

"Sir, the system computing resources have been increased to 74% occupancy." Yi Zuer issued a reminder that the system resources occupied just now were only 51%, and suddenly increased the occupancy by 23%.

Supercomputer Lei is affiliated to the Lawrence Livermo National Laboratory of Ligand. This laboratory belongs to a comprehensive research laboratory that mainly studies life sciences and health, safety and energy, resources and environment, computing, chemistry, materials, etc.

As a comprehensive research laboratory, they need to calculate a lot of data, and the task of supercomputer thunder is very heavy.

Shi Lei ignored the prompt and continued to search for system vulnerabilities in supercomputer thunder.

"Sir, the system's computing resources have been increased to 97% occupancy, and the system is close to its limit!" Yi Zuer issued a prompt again. The computing tasks of supercomputer thunder are indeed very large. No wonder when Shi Lei and Raphael fought, he

Phileroe will expose supercomputer thunder.

Shi Lei, who was sniffing a system vulnerability, suddenly discovered a strange system vulnerability!

Shi Lei quickly checked the vulnerability. After some calculations, he found that the vulnerability was a serious system hazard. After checking the system's computing resource occupation rate by 95%, the system was temporarily seriously damaged.

Vulnerability.

Through this loophole, Shi Lei directly entered the permission group and obtained part of the permissions. After obtaining part of the permission group, Shi Lei immediately retrieved the entire permission group member list within the permission group.

Supercomputer Lei has a lot of permission groups. Shi Lei just searched to see if there were hidden permission users and did not intend to make any changes.

The process of retrieving the list of permission groups was very smooth. With Shi Lei's careful cao, no jing report settings were triggered. The entire permission group has a large number of B, C and D permission accounts, and there are a small number of A-level permission accounts above.

With three S-level permission accounts, and a hidden sa super administrator account.

Under normal circumstances, including S-level permission accounts, you cannot find the sa super administrator account. Shi Lei used special means to find the information of the sa super administrator account.

When querying the information of SA Super Administrator, Shi Lei blocked three triggers in total. If someone with a slightly worse technology comes, he will definitely be triggered.

After finding the information about the SA super administrator, Shi Lei did not take the overall approach of changing the permission group this time. After all, the overall approach of changing the permission group is very troublesome, and it also requires a complete analysis of the supercomputer Lei's CAO system. This is not a simple matter

Things, it takes a long time to analyze the details of a supercomputer's closed cao system.

Shi Lei did not want to master the supercomputer thunder for a long time, but planned to borrow the supercomputer thunder and do some disharmonious things, but just hold them for a short time.

Therefore, Shi Lei did not even change the situation of the permission group. He directly obtained the account password of the supercomputer Lei Sa super administrator through the vulnerability inside the permission group.

In other words, Shi Lei just borrowed the account password instead of establishing an account password for himself. Simply put, it is equivalent to Shi Lei stealing the account, and he can use the stolen sa super administrator's account and use the super computer leap.

All resources.

After obtaining the account password of the sa super administrator, Shi Lei first checked the correctness of the account and password. After confirming that the account is available, Shi Lei immediately used the permissions of the sa super administrator and began to modify the settings of the super computer Lei, as well as the sa super administrator.

Information about the administrator account.

All the modified information is hidden under the original information. If you do not thoroughly check, Shi Lei's modification will not be found.

When all the settings were modified, Shi Lei manually cleaned up various traces and said voice command: "Yu Er, assist in cleaning up the invasion traces."

"Sir, it's reasonable, please wait." Yi Zuer's speed of cleaning traces far exceeded Shi Lei's speed. In just seven or eight seconds, Yi Zuer issued a reminder: "Sir, cleaning traces

complete!"

Shi Lei checked it out with concern and found that Yi Zuer did everything he could to deal with various traces without any leakage, without any problems left behind!

As long as there is no hardware protection, Yi Zuer can clear out all invasion traces. Even with hardware protection, Yi Zuer will send a prompt.

After the invasion traces of the supercomputer thunder were cleared, Shi Lei withdrew from the supercomputer thunder. At this moment, the supercomputer thunder cannot be used. Release it temporarily to reduce the chance of being discovered.

After looking at the time in the lower right corner of the computer screen, it was almost twelve o'clock. I had to go to Ouyang Xiang early tomorrow morning. Shi Lei set an alarm clock, washed up and went to bed in a hurry.

Early the next morning, Shi Lei got up early and took a nutritious breakfast to Ouyang Xiang to take care of Ouyang Xiang for breakfast.

At around nine o'clock in the morning, Shi Lei was accompanying Ouyang Xiang and Bai Qiang's phone call. Shi Lei apologized and bitterly smiled at Ouyang Xiang, and then answered the phone.

"Brother Shi, where are you now?" Bai Qiang asked first.

"I'm in Shuanghu District." Shi Lei secretly guessed in his heart, could it be the matter of AIP artificial intelligence prosthesis?

Sure enough, Bai Qiang laughed dryly and then said, "Brother Shi, are you ready for artificial intelligence prosthetics?"

"Well, you're ready! Where will we meet?" Shi Lei took a set of leg and knee amputation versions of artificial intelligence prosthesis when he was in Shu'an Village last night and placed it in the trunk of Audi A4l.

"Brother Shi, you drive to Beiyu District immediately! We are waiting for you at Tianyue Hotel in Beiyu District." Tianyue Hotel is a well-known five-star hotel in Beiyu District, with very complete facilities and luxurious hardware configuration

.

"Now?" Shi Lei asked unhappily. If he had gone to Beiyu District now, there would definitely be no one to take care of Ouyang Xiang, what should I do at noon?

(To be continued.)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next