Chapter 12 Data Spillover

It took Su Meng and Su Tian about four hours to finally find the trajectory of the first satellite, Su Meng wrote a search software that can automatically control the rotation of the antenna and adjust it up and down according to this experience, and then the six antennas automatically rotate together, and the searched satellite is continuously recorded.

The first four hours, although only the simplest things were done, or even only one satellite was found, but it was an extremely crucial step because of experience.

It is precisely because of the first four hours that the next step can directly enter the process of automatic search.

Looking at the search program that was running automatically on the desktop, the information of each satellite appeared, all satellites had passwords, and they had to be connected with passwords, and Su Meng was facing a new problem.

Su Meng has never learned how to decipher passwords, but before she analyzed the source code of the computer's operating system, she had a deep understanding of the transformation and encryption of some data, even some senior engineers, could not compare with her.

Su Meng first observed the login interface, which was similar to the login interface of the Argos system, indicating that the Argos system was used on the other party's satellite.

This system has a strong defense capability, and if you want to force it from the data level, the possibility is infinitely close to zero.

So Su Meng can only find another way.

Su Meng began to write a data scanning port software, which was quickly written, and then began to scan the port of the other party's IP address.

After scanning, it was found that there were more than six different entrances on the opponent's satellite, and one of the entrances had the weakest defense, Su Meng continued to write software for overflow attacks, and began to carry out data overflow attacks on satellites.

Soon, Su Meng found that the attack power of his computer was too weak, at least 10,000 times more computing power, to be able to achieve an effective overflow attack, but at the same time, there is another problem, that is, Su Meng's current antenna is not able to carry so many signals, after all, flying from the earth to space, the strength of the signal and information will be lost a lot, Su Meng must have an antenna ten times the size of the current antenna, that is, an antenna with a diameter of 60 meters, in order to carry out an effective data overflow attack, and it is not yet one, It's ten.

Su Meng looked at her current energy, there was a total of 100,000 standard energy, which meant 100 tons of manufacturing capacity, of course, she could also directly devour matter and convert it into energy, and there was only a small loss of mass energy conversion.

At this moment, it was already dark, and Su Tian was accompanying Su Meng by the side, and she was already sleepy at the moment.

Su Meng looked at Su Tian and said to her, "Sister, you go back to the room to rest first, and my sister will go to sleep with you later." ”

Su Tian nodded: "Sister, then I'll go to sleep first." ”

"Hmm," Su Meng nodded.

Su Tian went upstairs to get it, opened the door and walked in.

Seeing Su Tian return to the room, Su Meng continued to write about the software.

This time to write more code, she wants to write a satellite control system similar to the Argos system, when the overflow attack causes the satellite system to restart, the system will be flashed into the satellite's hard disk, and the original system of the satellite will be overwritten, the consequence of this is that the data in the satellite will be lost by more than 80%, but Su Meng doesn't care, she just needs to use this satellite to search for survivors' signals, and the confidential data in it is of no use to her.

The system to be written this time is more than 100 trillion in size, and Su Meng wrote it until the early morning of the next day, and he was only halfway through it, and with a yawn, Su Meng closed his eyes and rested.

After the evolution, the body's need for sleep has decreased a lot, and Su Meng closed her eyes and rested for about half an hour, and then she felt that all the fatigue in her body had disappeared.

After the break, Su Meng continued to type on the keyboard.

Fingers are flying, and the characters on the keyboard are increasing as if the program is running automatically.

In the morning, Su Tian woke up, Su Meng took some time to make her a good breakfast, and then continued to busy her own affairs.

Around noon, the satellite control system was finally written, leaving some automatic control programs in it, as well as remote control programs, Su Meng ran the encryption program, quickly wrapped the package, and wrote a more than one trillion underlying driver, which took more than ten minutes.

Now that the program is ready, it's time to build the antenna and mainframe computer.

Su Meng decided to adopt a parallel structure, using a combination of GPU and CPU modules for architecture, of course, the core does not need too many, it is expected that only more than 1,000 computing cores from 2 to 3G are enough.

Su Meng closed her eyes and began to simulate and optimize the mainframe computer she was about to build in her consciousness.

It took about sixty seconds to determine the architecture of the mainframe computer.

Then there is manufacturing, this part is relatively simple, Su Meng spent about five thousand standard energy to build a mainframe computer, which looks like a cabinet placed on the floor, placed next to an electron microscope, and then made a cable and connected it to his desktop.

Su Meng made another slightly larger nuclear fission battery, placed it next to the mainframe computer, and energized it.

Due to the use of water cooling to dissipate heat, the heat generated is extremely large, so after the power is turned on, Su Meng obviously feels that the temperature in the room has increased by more than 1 degree.

However, this temperature is nothing, Su Meng walked to the courtyard of the villa and began to build a new antenna.

Ten antennas with a diameter of 60 meters, when two were built, the open space of the villa was already occupied, so Su Meng built a giant steel frame, and built the remaining antennas on the steel frame.

Su Meng stepped on the suspended track pedal driven by electromagnetic force under his feet, and made an antenna on top of the steel frame.

A twinkle of energy lit up the clearing.

The electromagnetic pedal moves left and right along the track, and the antennas appear one by one.

Finally, on the hollowed-out steel frame, eight giant antennas with a diameter of sixty meters completely appeared, and Su Meng's energy was almost completely consumed.

Su Meng stepped on the suspension track pedal back to the ground, touched the fine sweat on her forehead slightly, and then returned to the villa.

Looking out from the villa at this moment, in the sky of the entire villa, eight giant antennas block the sunlight, which looks magnificent.

Su Meng clicked on the installer on the computer and began to install the new driver of the giant antenna.

Dozens of seconds later, the new driver was installed, and Su Meng opened the device manager and checked the status of the giant computer.

With all 1824 cores online, it's time to start a data overflow attack.

Su Meng imported the data from yesterday's satellite, and then began to carry out data overflow attacks.

This time, Su Meng wants to obtain the control authority of a civilian communication satellite, although the other party's satellite must have no ground support, but in order to prevent the destruction of the satellite, you still have to be careful.

The picture of the data overflow attack was running on the computer, and Su Meng's breathing became rapid.