Chapter 372: Stealth Mode (
After a week of negotiations, Yuanhang and Haixi City finally reached a preliminary intention, with Haixi land and Yuanhang money, and the two sides jointly build a game theme park in Haixi, but this plan may take at least five years to complete, and the first step is to build a game experience hall first. 【Full text reading】Collection ~ top * point * book city book friends whole ~ Li Ti ~ for
This is completely in line with the exhibition positioning of Haixi City, tourists to Haixi, in addition to traveling and watching concerts, there will be a very interesting place at that time, that is, to go to the game experience hall, with trendy equipment, play games that have never been played before, and even go to make a game addiction themselves, and turn the long-term ideas in their hearts into reality.
The boss is in charge of the negotiations, and Hu Yifei has spent the week hiding in the data center, deploying the final software link.
The first phase was put into operation, with 50,000 servers, and Figo's unique operating system allows these 50,000 servers to be used as a service...... The server can be used as a 50,000-strong server, which can be turned into a whole and can be reduced to zero, regardless of where the large data center will go in the future. nbsp; Figo Security is already invincible.
All supporting facilities are connected to the eighthnbsp; nbsp; The rest is to test Hu Yifei's military command system in the actual combat, and the doctor's military command system is called global meteorological analysis software, and then it is justifiably installed in the data center, saying that it is used to test the computing power of the data center.
The data center has a test schedule, and the first few items on the list are the operation of the test hardware and the coordination of the operating system. Security of data storage mechanisms. Rigid refrigeration system efficiency. Hu Yifei's meteorological analysis software "was scheduled for the evening of the second day, and he was responsible for testing it himself."
The next nightnbsp; nbsp; Hu Yifei drove to the data center.
Because there are already a large number of devices coming in; nbsp; Figo Security hired professional security guards to develop a series of security measures. nbsp; In order to ensure the security of the data center, a temporary iron fence has been erected around the data center.
Hu Yifei is the top person in charge of Figo security, and when he enters the door, he has to go through at least one security check. In front of the last gate, the card was swiped, and a confidential project serial number was fed back on the computer screen at the door, and the security guard looked at it to confirm that the time of the project was correct, and the person in charge checked that Hu Yifei was correct and let him in.
Hu Yifei is very quiet in the data center at this time; nbsp; There's no such buzz as a large number of machines running in a data center.
This is also the ingenuity of Figo Security, when there is no operation task in the data center, the machine will automatically adjust the number of operations; nbsp; Some will shut down, some are in hibernation, when there is a task, the operating system will immediately analyze a basic number, and the dormant machine will instantly join the calculation, which is not enough to support the operation. The system will also wake up the machine that is in a shutdown state.
Machines in one state will maintain an optimized ratio according to the specifics of the data center; nbsp; Don't waste power or get distracted by sudden computing tasks.
Hu Yifu casually woke up a machine, and there was no master computer in the data center, so to speak, every computer was the master control. nbsp; This is a feature of the first program, but also greatly ensure the work efficiency of the data center, the probability of a machine problem may be very large, but the probability of 50,000 machines at the same time nbsp; It's almost minimal.
I found the program I installed and checked it, but no one has touched it, in fact, except for Hu Yifei, no one can run this program.
Hu Yifei took out a miniature disc from his pocket. Inside, the unique encapsulation programmer of the Dr. Language can only run through its encapsulated program.
Hu Yifei clicked on the package and pressed the button for a few seconds. nbsp; The encapsulation is complete.
This is the most perfect program in Bo Shi's heart," Hu Yifei has this emotion and excitement. nbsp; I don't know what kind of amazing program that that tech genius has made.
Taking a deep breath, Hu Yifei ran the master control program.
After a short dozen seconds, a program box appeared on the screen. nbsp; The program has been started and is analyzing the available computing power"
Yaynbsp; nbsp; ”
Hu Yifei clenched his fist vigorously, this *** program was finally started, he had run it on his own machine, and there was no such prompt.
As soon as the fist was released, a strong buzz suddenly erupted in the entire data center, and the sound came from all directions, and all the 50,000 machines in the data center started at this moment, and the refrigeration equipment overhead automatically entered the running state.
Hu Yifei was shocked by this scene. Isn't it really so powerful that it takes 50,000 machines to handle its computing needs?
After a little more than a minute, all the gangs were in full operation, and the data on the rack flickered non-stop.
Hu looked at the screen again and again, and a new prompt appeared in the program box in front of him. nbsp; The computing ability test is completed to meet the second-level computing requirements of the system"
At the same time as the prompt appeared, half of the machines in the data center suddenly stopped computing, and immediately after. Half of them stopped computing, and in less than a minute, the data center was back to its previous state, with only a few hundred machines running. nbsp; Ninety percent of them were still dormant, and the giant water-cooled equipment overhead also stopped working after a bang.
Hu Yifei was dumbfounded, he didn't know what was going on, and in just a few minutes, the machine here went from almost all resting to full operation, and then returned to the same state, which really made people feel weird.
The data center was quiet again, except for the muffle of the machines running in front of them
Sound.
The prompt on the computer screen changed again at this time, and the network environment of the system began to be tested. nbsp; ”
After a few secondsnbsp; nbsp; The system is in a non-military environment and cannot be connected to the network normally"
Hu Yifei finally got this idea; nbsp; The system has just woken up all the machines, which should be to test the computing power of the data center, and if there are computing tasks in the future. nbsp; The system can immediately determine how many machines need to be put in, which is somewhat similar to the data center operating system. After that, because there is no homework tasknbsp; nbsp; The system automatically shuts down most of the computing power.
Counting the numbers in front of him, Hu Yifei was shocked to find that it was not necessary to play a lot of computing power to run this huge military command system, could it be that the system had a basic computing requirement when it was running for the first time, otherwise why couldn't he run it when he was in Dongyang?
Hu Yifei was staying at the time, and the prompt changed again
Looking for links to non-normal channels"
Breaking link limits"
The next moment the machine that was dormant was immediately put into action. In the second well, the other batch of machines began to start, and slowly said that the dormant state was suffocated, and the ugly backup state was ugly.
Hu Yi was dumbfounded, and the abnormal connection channel was not normal. What a channel that's in.
But in the blink of an eye, Hu Yifei was nbsp; nbsp; I relied on a sound and a layer of fine sweat oozed from his forehead, what channel is the turtle son, the key is what it wants to link to, it will not really be a beautiful ** thing, command the network.
Thinking of this, Hu Yifei's little heart pounded angrily, "jumped wildly, and beat like a drum, making Hu Yifei dizzy for a while."
Do you want to unplug the network cable? Hu Yifei was a little apprehensive in his heart; nbsp; In case this turtle son is really linked to the United States**.com, isn't Lao Tzu finished? This data center, which has just invested $200 million, will also have to be finished, and the American devils will be angry and can shoot a laser weapon directly from a military satellite in outer space, which can wipe out the data center.
But Lao Tzu hasn't really seen what a military network is, so don't take a look at it; nbsp; Isn't it a hacker for nothing, why can't McKinnon see it? Besides, in case it doesn't crack the military network
Hu Yifei was thinking about it there, and the system was cracked with lightning speed, leaving only Hu Yifei with an amazement in his head.
The screen now displays a selection prompt
Completed cracked can be linked UAV automatic command system is linked. ”
The crack has been completed, and it is possible to link the military concave positioning system whether it is linked. ”
The horse completes the crack can link the strategic command center or not. ”
Cracks that have been completed can be linked; nbsp; ”
Hu Yifei was directly stupid, facing this slippery choice on the screen, he was really stupid, if he shuddered, he didn't know what the consequences would be. nbsp; It's just that most of this posture doesn't seem to be fake, at least there are a lot of names in it; nbsp; I've never heard of the mystery of the race, and it's also very professional.
I was stunned in front of the screen for half a minute. nbsp; In the end, Hu Yifei swallowed a big mouthful of saliva with difficulty. chose to abandon the link, he didn't know the system, and he really didn't dare to take this risk.
When you click Cancel, a prompt pops up on the screen. nbsp; After completing the configuration of the initial environment of the system", you will enter a screen with the link option of the military facility still retained, and begin to display the basic functions and information of this one.
Hu Yifei looked at it, it seemed that it was all outdated news, and it should have been in the system. Data used for testing. Flipped through it casually. Hu nbsp; nbsp; Fly to find a combat deduction module after clicking on it; nbsp; The system prompts whether there is no real-time battle situation and whether it is a deduction of a hypothetical battle situation.
clicked OK, and there were various preset battle situation settings inside, and Hu Yifei didn't understand this. I randomly selected a location, selected two military forces built into the system, and began to deduce. Who knows, there will be endless settings to go all the way down for five minutes. The setting of the battle situation has not been completed.
Hu Yifei lost patience and had to give up. Stand there and sigh with emotion; nbsp; It seems that the military is drumming. It's not generally complicated; nbsp; ”
After looking for a while, I finally found a simple project, or deduction, but it was just a deduction of what happened after the missile hit the target. Hu Yifei chose Loma's logo; nbsp; Then a random tool target was selected; nbsp; Who knows, but the system prompts that it is not connected to the reconnaissance satellite, and the target information is out of sync.
After forcibly clicking confirm, the system began to deduce that the fighter flew out from the most suitable base, and launched the missile from an altitude of Mi Mi Mi meters, just avoiding the monitoring of the anti-missile system of the time side. nbsp; After the missile hits the target; nbsp; The target was hit by a huge shock wave, and what it looked like, including the direction of the collapse of the building, and the broken bricks, can be clearly seen from the deduction effect, and this kind of data is probably to provide a basis for decision-making in subsequent military operations.
No wonder this system is so huge, it turns out that a lot of parameters of military equipment are built into it. and the geographical details of many of the targets. It can be imagined that if it is really linked to the military network just prompted, the amount of information to be processed by this system will be huge, and the light is information synchronization. nbsp; It's not something that can be done by ordinary procedures.
I'm afraid it's a rendering of being hit by a missile. None of this can be done by ordinary programs.
Hu Yifei had to admit that so far, the doctor is still an existence that makes himself look up to the mountains, although he can't reach it, but his heart yearns for it.
It took Hu Yifei a night to decide to give up his research on the system and prepare to move out of the data center, and he only understood a small part of the situation in the system, and at the same time, he had to be careful not to connect the system to the American devils
Hu Yifei put his own observations on this thing. And this perception and judgment are all written down in the notebook, and then ready to shut down the system.
The system pops up a prompt at this time. nbsp; When turned off, the system will enter stealth mode"
Stealth mode. "Hu Yifei doesn't know what this stealth mode is, but it seems that there is no other option; nbsp; I clicked to confirm.
The system interface disappeared immediately, and the system files that Hu Yifei put into the data center machine also disappeared.
I damn it."
Hu Yifei slapped the keyboard nbsp; nbsp; Military systems don't lurk in data centers. How can I do this in my day; nbsp; If this guy is connected to anything, he doesn't know what will happen to him.
took out the tool to detect the ** program, Hu Yifei began to check, and then he was dumbfounded, all the machines in the data center were marked by the system that was unique to the ** program, but the strange thing is that the program disappeared completely, and the existence of the program was not detected in all the data.
Hu Yifei's mind suddenly popped up with a word shadow program
This is by no means the shadow folder on the second-hand hard drive, which can now detect the spit folder, this is the real shadow program, the program is ubiquitous, but it doesn't exist at all.
No way, Hu Yifei can't deal with the shadow program now, he has seen the relevant information in the doctor's notes, but he didn't expect this thing to be really made, and the doctor made it, and it doesn't use the military system.
shrugged his shoulders, Hu Yifei was helpless; nbsp; It seems that the 50,000 machines in front of me can only be used as collector's items for the time being, and after studying the shadow program by themselves. Let's put them into operation.
After cutting off the power to these 50,000 machines. Hu Yifei left the data center, and he had a headache. What kind of reason to prevaricate?
Relying on Lao Tzu is the boss of Figo's safety. Lao Tzu said that this machine is not used, do you still have to find a reason? ”
Hu Yifei gritted his teeth and got into the car. I went back to Hercy.