Hk426 Jedi Counterattack: Thunder Control
ps: Preview, update tomorrow, the war begins! Brother Stone, how will you deal with the International Intelligence Bureau of the Ministry of Foreign Affairs?
Supercomputer Ray, ranked 19th in the world's top 500 supercomputer rankings in November 2006. The computing performance reached 199tflops, which is equivalent to 42% of the performance of the supercomputer Yan.
In terms of performance, the supercomputer Lei is a little worse. After all, its safe call calculation amount is only 45tflops, which is not as good as the supercomputer that Dream Entertainment owns.
At the beginning, when Shi Lei and Raphael played against each other, he used the supercomputer Yan's 20tflops resources in excess, completely defeating the supercomputer Lei. It was also at that time that the secret of the supercomputer Ray was accidentally caught by the mysterious pxjzz, which caused Raphael's tragedy.
Therefore, excessive use of supercomputer computing resources is definitely a very dangerous thing. [
From the performance analysis alone, Shi Lei's choice of supercomputer Lei is not a good choice. With the excellent performance of the supercomputer Yan, Shi Lei can choose a more powerful supercomputer as a target.
For example, in November 2006, the supercomputer ranked third in the world, the bgw, which is the main computer of the Thomas Watson Research Center of the bm company. The computing performance reached 913tflops, almost twice the performance of the supercomputer Yan!
Although it is very difficult to hack into bgw and control it. But for Shi Lei, it is not impossible.
However, Shi Lei chose the supercomputer Lei!
Because the supercomputer Ray, once belonged to Raphael, can be used to make a good article!
In front of Server No. 1, Shi Lei had ten fingers on both hands. Rapidly beating on the keyboard, one after another command was issued from the No. 1 server.
At the same time, Shi Lei was still giving a voice command to Yizuer, "Yizuer, monitor all the activities of the supercomputer mine, and if you find any abnormal changes, immediately remind me!"
"Sr, I can't execute this fuzzy command, please define the abnormal range in detail." After all, Izuer is just a low-level pseudo-artificial intelligence, a fuzzy command. Laws are understood using procedural definitions.
Shi Lei used his voice depressedly to determine the range of 'abnormal changes' for Yizuer, "Yizure, monitor the computing performance occupancy of the supercomputer mine, as if the computing data occupancy suddenly increased. If the value exceeds 20%, Immediately call the police; monitor the network connection of the supercomputer mine. If it is found that the influx of data exceeds 80% of the total bandwidth, an alarm will be given immediately; !"
"Sr, the order is accepted!" With the clear procedural conditions, Izuer immediately accepted the order.
There is Yizuer helping Shi Lei to monitor the situation of the supercomputer Lei. Shi Lei can concentrate on hacking the supercomputer mine and analyze the system architecture of the supercomputer mine.
The operating systems of supercomputers are mostly closed systems. Closed systems help keep supercomputers safe and reduce the chances of being hacked.
At least. Not the top hacker, basically do nothing about closed systems. But Shi Lei happens to be the top hacker!
Shi Lei analyzed the system architecture of the supercomputer Lei, looking for loopholes in the system. Even if it is a closed system, it is still a computer system, and there are system loopholes.
Under the sniffing of the world's top hackers, the system vulnerabilities of the supercomputer Lei were gradually discovered by Shi Lei one by one. But the system loopholes discovered so far are all critical low-harm loopholes. It is a waste of time to enter the core permission group of the system.
This so-called waste of time is likely to take a few days, or even a dozen days. Shi Lei doesn't have so much time to waste. He needs to teach the International Intelligence Bureau of the Ministry of Foreign Affairs a lesson as soon as possible, and find something for them to do!
"sr, the system computing resources have increased to 74% occupancy." Izuer issued a reminder that the system resource occupancy level just now was only 51%, and the occupancy level suddenly increased by 23%.
Supercomputer Ray is affiliated to the Lawrence Livermore National Laboratory in Lijian. This laboratory belongs to a comprehensive research laboratory, which mainly studies life sciences and health, safety and energy, resources and environment, computing, chemistry, materials and so on.
As a comprehensive research laboratory, they need to calculate a lot of data, and the supercomputer Ray has a very heavy workload. [
Shi Lei ignored the prompt and continued to search for the system loopholes of the supercomputer Lei.
"sr, the system computing resources have increased to 97% occupancy, and the system is running close to the limit!" Izuer reminded again. The computing tasks of the supercomputer Ray are indeed very many. No wonder when Shi Lei and Raphael fought, Rafite exposed supercomputer mines.
Shi Lei, who was sniffing for system vulnerabilities, suddenly discovered a weird system vulnerability!
Shi Lei quickly checked the situation of this loophole. After some calculations, he found that the occurrence of this loophole was actually a serious system hazard loophole. Because the computing resource occupancy of the system has been checked after 95%, and the temporary serious damage to the system vulnerability occurs.
Through this loophole, Shi Lei directly entered the permission group and obtained some permissions. After obtaining part of the permissions of the permission group, Shi Lei immediately retrieved the list of members of the entire permission group within the permission group.
The supercomputer Lei has a lot of permission groups. Shi Lei just searched it to see if there were hidden permission users, and did not plan to make any changes.
The process of retrieving the permission group list was very smooth. Under Shi Lei's careful operation, no alarm settings were triggered. The entire permission group has a large number of B-level, level-level and level-level permission accounts, a small number of level-level permission accounts and three S-level permission accounts, and a hidden S super administrator account.
Under normal circumstances, including the s-level authority account, the s super administrator account cannot be found. Shi Lei used special means to find the information of the s super administrator account.
Shi Lei blocked a total of three triggers when querying the s super administrator information. If someone with slightly less technical skills came in, the alarm would definitely be triggered.
I found the information of the s super administrator, Shi Lei did not take the practice of changing the authority group as a whole this time. After all, it is very troublesome to change the authority group as a whole, and it is necessary to completely analyze the operating system of the supercomputer Lei. This is not a simple matter, and it takes a long time to analyze the details of a closed operating system of a supercomputer.
Shi Lei didn't want to master the supercomputer mine for a long time, but planned to borrow the supercomputer mine to do a little discordant thing, just hold it for a short time.
Therefore, Shi Lei did not even change the situation of the permission group, and directly obtained the account password of the super administrator of the supercomputer Lei s through the loophole in the permission group.
In other words, Shi Lei just borrowed the account password, instead of creating an account password for himself. To put it simply, it is equivalent to Shi Lei stealing the account, and he can use the stolen account of the s super administrator to use all the resources of the supercomputer Lei.
After obtaining the account and password of the s super administrator, Shi Lei first checked the correctness of the account and password. After confirming that the account was available, Shi Lei immediately used the authority of the s super administrator to modify the settings of the supercomputer Lei and the s super administrator. Information about the administrator account.
All the modified information is hidden under the original information. If it is not thoroughly checked, Shi Lei's modification will not be found at all.
When all the settings were modified, Shi Lei manually cleaned up various traces, and gave a voice command: "Yizul, assist in cleaning up the traces of the invasion."
"Sr, it's reasonable, please wait." The speed at which Yizuer dealt with cleaning up the traces far surpassed Shi Lei's speed. In just seven or eight seconds, Yizuer issued a prompt: "Sr, the traces are cleaned up!"
Shi Lei checked it again without worry, and found that Yizuer did a good job in dealing with various traces, and there was no problem left at all!
As long as there is no hardware protection, Izull can clean up all traces of intrusion. Even if there is hardware protection, Izull will issue a prompt.
After the intrusion traces of the supercomputer mine were cleaned up, Shi Lei withdrew from the supercomputer mine. The supercomputer mine is not used at the moment, so release it temporarily to reduce the chance of being discovered.
Looking at the time in the lower right corner of the computer screen, it was almost twelve o'clock. Tomorrow morning, he was going to Ouyang Xiang's place. Shi Lei set an alarm clock, washed and hurriedly went to bed.
Early the next morning, Shi Lei got up early, took a nutritious breakfast, and went to Ouyang Xiang's place to take care of Ouyang Xiang for breakfast. [
At around nine in the morning, Shi Lei was accompanying Ouyang Xiang when Bai Qiang called. Shi Lei smiled apologetically at Ouyang Xiang, and then answered the phone.
"Brother Shi, where are you now?" Bai Qiang asked first.
"I'm in Shuanghu District." Shi Lei secretly guessed, could it be a matter of artificial intelligence artificial limbs?
Sure enough, Bai Qiang laughed dryly, and then said, "Brother Shi, are you ready for the artificial-intelligence prosthesis?"
"Well, it's ready! Where do we meet?" Shi Lei took a set of artificial artificial limbs with an amputated leg and knee when he was in Shu'an Village last night, and put it in the trunk of the Audi 4l.
"Brother Shi, drive to Beiyu District immediately! We are waiting for you at Tianyue Hotel in Beiyu District." Tianyue Hotel is a well-known five-star hotel in Beiyu District, with complete facilities and luxurious hardware. configuration.
"Now?" Shi Lei asked unhappily. If he went to Beiyu District now, there would be no one to take care of Ouyang Xiang, so what would he do at noon?
(To be continued.)