HK426 Jedi Strikes Back
PS: Preview, update tomorrow, the war begins! Brother Shi, how will you deal with the International Intelligence Agency of the Ministry of Foreign Affairs?.
In November 2006, the supercomputer Lei ranked 19th in the ranking of the world's top 500 supercomputers. The computing performance reached 19.9 TFLop/s, which is equivalent to 42% of the performance of the supercomputer Yan.
In terms of performance, the supercomputer mine is still a little worse, after all, its safe call calculation is only 4-5TFLop/s, which is not as good as dreaming of entertaining its own supercomputer.
At the beginning, when Shi Lei was fighting against Raphael, he overused the resources of the supercomputer Yan 20TFLop/s, completely defeating the supercomputer mine. It was also on that occasion that the secret of the supercomputer thunder was accidentally caught by the mysterious CPXJazz, which caused Raphael's tragedy.
Therefore, it is absolutely dangerous to overuse the computing resources of supercomputers.
From the performance analysis alone, Shi Lei's choice of supercomputer mine is not a good choice. With the excellent performance of the supercomputer Yan, Shi Lei can choose a more powerful supercomputer as a target.
For example, in November 2006, BGW, which ranked third in the world in terms of supercomputers, is the main computer of IBM's Thomas Watson Research Center. The computing performance reached 91.3TFLop/s, which is almost twice the performance of the supercomputer Yan!
Although hacking into BGW and controlling it, the difficulty is very huge. But for Shi Lei, it's not something that can't be done.
However, Shi Lei chose the supercomputer mine!
Because the supercomputer Thunder, which once belonged to Raphael, can be used to make a good article!
In front of the No. 1 server, Shi Lei's hands were ten fingers. Quickly beating on the keyboard, one command after another was issued from Server One.
At the same time, Shi Lei was also voice commanding Yi Zuer, "Yi Zuer, monitor all the activities of the supercomputer mine, and if you find any abnormal changes, remind me immediately!" ”
"Sir, this fuzzy command cannot be executed, please define the abnormal change range in detail." After all, Yishuer is just a low-level pseudo-artificial intelligence, for fuzzy commands. It is not possible to use program definition comprehension.
Shi Lei's depressed use of voice determined the scope of 'abnormal changes' for Yishuer, "Yishuer, monitoring the computing performance occupancy of supercomputer mines is like a sudden increase in computing data occupancy. If the value exceeds 20%, call the police immediately; Monitor the network connection of the supercomputer mine. If the amount of data ingress exceeds 80% of the total bandwidth. Alerts are given immediately; Monitor the flow of data in the system, and send spoofing messages and alerts as soon as a program spies on us! ”
"Sir, order accepted!" With clear procedural conditions, Yishuer immediately accepted the order.
There is a situation where Yi Er helps Shi Lei monitor the supercomputer mine. Shi Lei can concentrate more on invading supercomputer mines and analyzing the system architecture of supercomputer mines.
The vast majority of supercomputer operating systems use closed systems. A closed system helps keep supercomputers safe and reduces the chance of being hacked.
At least. Not the best hackers are basically helpless against closed systems. But Shi Lei happens to be the top hacker!
Shi Lei analyzed the system architecture of the supercomputer mine and looked for the vulnerabilities of the system. Even if it is a closed system, it is still a computer system, and there are system vulnerabilities.
Under the sniffing of the pinnacle hackers in the world, the system vulnerabilities of the supercomputer mine were gradually discovered by Shi Lei one by one. However, the system vulnerabilities found so far are all irrelevant low-harm vulnerabilities, and it is too time-consuming to enter the core permission group of the system.
This so-called waste of time is likely to take several days, or even more than ten days. Shi Lei doesn't have so much time to waste, he needs to teach the International Intelligence Bureau of the Ministry of Foreign Affairs a lesson as soon as possible, and find something for them to do!
"Sir, the system computing resources are increased to 74% occupancy." Yishuer issued a reminder that the system resource occupation just now was only 51%, and the occupancy suddenly increased by 23%.
Supercomputer Ray is part of the Lawrence Livermore National Laboratory in the country of Liberty, which is a comprehensive laboratory that focuses on life sciences and health, safety and energy, resources and environment, computing, chemistry, materials, and more.
As a comprehensive research laboratory, they need to calculate a lot of data, and the work of supercomputer mines is very heavy.
Shi Lei ignored the prompts and continued to search for system vulnerabilities in the supercomputer mine.
"Sir, the system computing resources have been increased to 97% occupancy, and the system is running close to the limit!" Eater prompted again. The calculation tasks of the supercomputer mine are indeed very numerous. It's no wonder that when Shi Lei and Raphael were fighting, Rafige would expose supercomputer mines.
Shi Lei, who was sniffing out the system vulnerability, suddenly discovered a strange system vulnerability!
Shi Lei quickly checked the situation of this vulnerability, and after some calculations, he found that the generation of this vulnerability was actually a serious vulnerability of the system. After the computing resource occupancy of the system has been checked by 95%, the system vulnerability is seriously endangered temporarily.
Through this vulnerability, Shi Lei directly entered the permission group and obtained part of the permissions. After obtaining part of the permission group, Shi Lei immediately searched the list of members of the entire permission group within the permission group.
There are many lists of permission groups in supercomputer mines, and Shi Lei just searched to see if there were hidden permission users among them, and did not plan to make any changes.
The process of retrieving the list of permission groups was very smooth, and under Shi Lei's careful operation, no alarm settings were triggered. The entire permission group has a large number of B-, C-, and D-level permission accounts, as well as a small number of A-level permission accounts, three S-level permission accounts, and a hidden SA super administrator account.
Under normal circumstances, including S-level permission accounts, the SA super administrator account cannot be found, and Shi Lei used special means to find out the information of the SA super administrator account.
When querying the information of the SA super administrator, Shi Lei blocked a total of three triggers, and if he changed to someone who was slightly less skilled, the alarm would definitely be triggered.
After checking the information of the SA super administrator, Shi Lei did not take the overall change of the permission group this time. After all, it is very troublesome to change the permission group as a whole, and it is also necessary to completely parse the operating system of the supercomputer mine. This is not a simple matter, and it takes a long time to analyze the details of a supercomputer's closed operating system.
Shi Lei did not want to master the supercomputer mine for a long time, but planned to borrow the supercomputer mine and do something discordant, just to hold it for a short time.
Therefore, Shi Lei did not even change the situation of the permission group, and directly obtained the account password of the supercomputer Lei SA super administrator through the vulnerability inside the permission group.
In other words, Shi Lei only borrowed the account password, instead of creating an account password for himself. To put it simply, it is equivalent to Shi Lei stealing the number, and he can use the stolen SA super administrator's account to use all the resources of the supercomputer mine.
After obtaining the account password of the SA super administrator, Shi Lei first checked the correctness of the account and password, and after confirming that the account was available, Shi Lei immediately used the authority of the SA super administrator to start modifying the settings of the supercomputer mine and the information of the SA super administrator account.
All the information that has been modified is hidden under the original information, and if you don't check it thoroughly, you won't find Shi Lei's modifications at all.
When all the settings were modified, Shi Lei manually cleaned up all kinds of traces, and commanded with a voice: "Yi Zuer, assist in cleaning up the traces of invasion." ”
"Sir, it's reasonable, please wait." The speed at which Yi Zuer processed and cleaned up the traces far exceeded Shi Lei's speed. In just seven or eight seconds, Yi Zuer sent out a prompt: "Sir, the traces are cleaned up!" ”
Shi Lei checked it uncomfortably and found that Yi Zuer did a good job of dealing with various traces, and there were no remaining problems at all!
As long as there is no hardware protection, Epjull can clean up all traces of intrusion. Even if there is hardware protection, Yishuer will give a prompt.
The intrusion traces of the supercomputer mine were cleaned up, and Shi Lei withdrew from the supercomputer mine. At this moment, you don't need a supercomputer mine, so release it temporarily to reduce the chance of detection.
Looking at the time in the lower right corner of the computer screen, it was close to twelve o'clock, and he would go to Ouyang Xiang's side early tomorrow morning, Shi Lei set an alarm clock, washed up and went to bed in a hurry.
Early the next morning, Shi Lei got up early, took a nutritious breakfast, went to Ouyang Xiang's side, and took care of Ouyang Xiang for breakfast.
At nine o'clock in the morning, Shi Lei was accompanying Ouyang Xiang, and Bai Qiang's phone called. Shi Lei smiled apologetically at Ouyang Xiang, and then connected the phone.
"Brother Shi, where are you now?" Bai Qiang asked first.
"I'm in the Twin Lakes area." Shi Lei secretly guessed in his heart, could it be the matter of AIP artificial intelligence prosthesis?
Sure enough, Bai Qiang laughed dryly, and then said, "Brother Shi, the matter of artificial intelligence prosthetics, are you ready?" ”
"Yes, you're ready! Where do we meet? "Shi Lei last night, when he was in Shu'an Village, he took a set of artificial intelligence prostheses with amputated leg knees and put them in the trunk of the Audi A4L.
"Brother Shi, you should drive to Beiyu District immediately! We are waiting for you at Tianyue Hotel in Beiyu District. "Tianyue Hotel is a well-known five-star hotel in Beiyu District, with very complete facilities and luxurious hardware configuration.
"Now?" Shi Lei asked a little unwillingly, if he goes to Beiyu District now, there will definitely be no one to take care of Ouyang Xiang here, so what should he do at noon? .
(To be continued.) )