Chapter 189: Hacking a Supercomputer
When Fang Yuan returned home with Xinxin, Fang's father and Fang's mother hadn't gone out yet, but Daddy Sand and Mama Lan were gone.
When the little guy saw his grandparents, he first ran over and hugged Fang's mother's leg and asked her if she could sign up for the dance class, but she couldn't say anything, Fang's mother was confused, and finally Fang Yuan explained it to her.
Although Fang's mother was a little surprised, why did she ask her about this, she still nodded and agreed.
The little guy cheered when he heard this, and ran to Fang Yuan, strongly asking to go back and sign up now, and finally after Fang Yuan's repeated explanations, he reluctantly agreed to go to their house when Aicai came back in the afternoon.
Fang's father and Fang's mother were going to go to the property, but Fang Yuan asked them to bring the little guy with them, but the little guy naturally didn't want to stay at home, so he happily went out with them again.
When they went out, Fang Yuan returned to the study and turned on the computer, he wanted to check from the Internet who the next door was.
With the development of science and technology, as long as people live in this world, they will more or less leave their own traces, in addition to government departments, there are surveillance cameras everywhere, there is always a place to take a picture of you, leaving your shadow.
But because this data is too huge, and there is no good identification software, it completely relies on human eye recognition, so few people find someone through such a stupid method, unless there is a major criminal case, and the police have no clues, it is possible to organize a lot of manpower to analyze the video one by one.
But Fang Yuan doesn't need it, because the sweeping robot he wrote has a very complete identification system, and it is precisely because of this function that it can quickly identify garbage.
So Fang Yuan first uploaded the photos taken together on the beach to the computer, and then imported the appearance and body shape data of their family of five into the recognition system.
The rest is to access the police database, of course, this does not refer to the domestic ones, but to the Japanese police station, because their family does not say that they are from Japan? Not to mention that Toshio Utsumi also worked as a policeman, so there must be his file in the Japanese police.
Of course, if you want to access the database of the Japanese police station, it is certainly not a conventional means, and the exclusive network used by the police, the civilian network is generally not linked, but there are exceptions to everything, there are so many police in Japan, there is no one who will not access the external network? As long as one is enough.
Any programmer can be said to have a hacker dream, and even many people become programmers because they worship hackers.
Fang Yuan is no exception, since they learned the DH language, he used it to practice and wrote many gadgets, these things are actually no different from some hacking tools circulating on the Internet, but because of the different algorithms, its functions have become more powerful and more hidden.
Therefore, Fang Yuan first had to scan the entire Japanese network, especially the official websites of local police stations, which was the fastest way to find out the vulnerabilities.
But no matter how powerful Fang Yuan's software is, this amount of data is still huge, and no matter how high the utilization rate of his broken computer is, it is not enough, so he first scanned the domestic network, grabbed a few broilers, and then used this as a springboard to control several computers in Japan, and finally invaded the Japanese Gyoukou computer.
The computer, owned by Japan's Marine Geoscience and Technology Agency, is the successor to the supercomputer called Earth Simulator and ranked 69th on the Supercomputing 500 list in June 2017.
Based on 1,250 Intel Xeon 16-core processors and Infiniband EDR interconnects, the majority of the supercomputing's power consumption comes from the 19,840,000 cores in the Pezy-SC2 accelerator. In terms of speed, 14,130 trillion calculations can be made per second.
As such a powerful supercomputer, its defense system is naturally very good, but to Fang Yuan, it is like paper paste, and it can be broken when stabbed.
No matter how powerful the defense system is, it is also based on the existing computer technology, but when it encounters a new technology like Fang Yuan, it is naturally impossible to defend against it.
So Fang Yuan quickly controlled a small part of the computing memory, and used the Gyoukou supercomputer to sniff the Japanese network, the speed was not too fast, and he quickly scanned out the vulnerabilities and external network link IPs of the Japanese police station, and then he accessed the internal database through these vulnerabilities and IPs.
Fang Yuan first searched for the name Toshio Utsumi, and found that there were thousands of people in all of Japan, so he added professional conditions, and now the scope was narrowed down to dozens of people, and Fang Yuan quickly found the information he wanted.
Unexpectedly, this Toshio Utsumi looked stupid, but his resume was very awesome, not only proficient in Muay Thai, boxing, karate and taekwondo, but also his grades in the police academy were almost perfect, he was simply a new star in the police world, but there was no record of his marriage in the file, nor did he record the reason for his resignation, which made Fang Yuan a little surprised.
So Fang Yuan retrieved the names of Xiao Tear, Xiao Tong and Xiao Ai, and there was no record of them.
At this time, Fang Yuan's recognition software came in handy, and the face recognition comparison of this database, even if Gyoukou was fast in calculation, it would take a while to compare, Fang Yuan got up and ran a cup of tea for himself, and found that the comparison had not been completed, so he casually flipped through the Gyoukou supercomputer, and unexpectedly found that he was not the first to come, before him, someone had already accessed this computer, and left two back doors.
Fang Yuan's heart moved, and instead of clearing the two back doors, he attached a hidden tracker to them, and whenever they visited again, the tracker would record their real address.
But these two back doors also gave Fang Yuan an inspiration, and he carefully carved out a place from the computer and established an independent enclosed space, which he called the "empty house", which was completely his empty house.
After these were done, Fang Yuan found that the recognition program had been completed, but he had scanned hundreds of pieces of data, which made Fang Yuan feel very strange, you must know that his program recognition rate was very accurate, this should not happen.
But when I opened it, I found that there was really nothing wrong, there were dozens of identity materials for the three of them, although the names were different, the ages were different, and the looks on the photos were slightly different, but under the fault tolerance function of the recognition software, they had nothing to hide.
What was left was not identification material, but photos and videos taken in the theft, which also changed in appearance but were still recognized.
"Caught you?" Fang Yuan smirked.
He looked through the files and videos one by one, and found that the three women turned out to be very clever snitches, no wonder they were so rich.
I also found their real names living in Japan, it turned out that they also opened a coffee shop in Japan, and their conduct was unexpectedly good, welfare homes, orphanages, pet rescue centers, etc., not only did they donate a lot of materials, but also often participated in social welfare activities.
And the things they stole originally belonged to a German painter and collector named Mikael Heinz, which is interesting.
Just as Fang Yuan was cleaning up the traces of the visit and preparing to quit the supercomputer, a piece of data suddenly appeared out of thin air in the "empty house" he had just done, and someone was accessing the supercomputer ...... like him.