HK258 Catch broiler, hole!
PS: In June, the rules will be added, 5W will be red and 1 chapter, and 100,000 will be red.
In the sixth year of the year, Xia Guo had a total of two cyber wars against Voxang, and Vosang took revenge once, but he retreated in a hurry.
This is because when Shi Lei didn't know what to do, CNS intervened, and their official security expert team tracked down the members of the Sakura group, so that the hackers of the Wosang Kingdom lost their leader, so the hackers of the Wosang Kingdom retreated after a short attack.
Pink Sakura's original public opinion offensive was too sharp, pointing directly at the society that existed in Xia Kingdom. The problem made the leaders of Xia Guo very unhappy.
Fortunately, the pink cherry blossoms ran fast, and the CNS only dispatched an official team to chase after them. If it is a pink cherry blossom, it is still in the network of Xia Guo, and it is not guaranteed that the twelve expert groups of CNS will collectively besiege the pink cherry blossoms.
That pink cherry blossom must definitely kneel!
In the cyber world of the country of Vausan, Raphael provoked Shi Lei's vest Mr. M, Shi Lei successfully got the endless defense of the anti-virus firewall, and after having the premise of protecting himself, he was also a little nervous.
In the first two wars of the Xia State against the Wosang Kingdom, although Shi Lei participated. But he is either fueling the flames, or he is behind the shadows, and he has not fought head-on once!
This time, the moon virus was raging in the country of Wassan, and Raphael provoked, so Shi Lei decided to prepare to bully Raphael!
If you want to bully people, you must first make perfect preparations, such as catching broilers.
There are only two fixed broilers in Shi Lei's hands, the first is the core broiler supercomputer Yan, Yan is the absolute trump card in Shi Lei's hands. With the supercomputer Yan in hand, and the endless defense, Shi Lei is not afraid of anyone at all!
Of course, not being afraid of anyone doesn't mean you can mess with anyone. For example, CNS in Xia Kingdom. The International Intelligence Agency of the Ministry of Foreign Affairs of Vassang, the CIA and the FBI of the Liberian State, and so on.
Supercomputer Yan with Endless Defense can indeed resist them, but this will undoubtedly expose the supercomputer Yan.
If he loses the supercomputer Yan, Shi Lei's strength in the Internet will be reduced by at least half!
Shi Lei's other broiler chicken is the public server of Shuangqing University, this broiler is very weak, it can only be said to be Shi Lei's small toy, and it can be used to perform daily tasks. Want to be at a critical moment. Borrowing the public server of Shuangqing University, there is not much possibility at all.
During the second cyber war between Xia and Wosang Kingdom, Shi Lei abandoned the first-class broiler of Aixin Company, and gave up the Rock Firewall just to protect the supercomputer Yan. That lesson. It also made Shi Lei remember deeply.
So before bullying Raphael, Shi Lei was ready to catch a few more broilers. Be prepared.
Use a supercomputer swallow. In the Internet world scanning of the country, Shi Lei himself also used the search engine of the country to check the official websites of some high-tech companies to look for opportunities.
On the search engine, I searched for it, but I didn't find a suitable object. Shi Lei touched his stomach. After staying up all night and sleeping all day, he was indeed a little hungry now.
Glancing at the scanning progress of the supercomputer Yan, Shi Lei stood up. Find something to eat in the fridge, i.e. bread and milk.
Microwaved the bread and milk, although it was not delicious, Shi Lei's own cooking skills were even worse, and he missed Ouyang Xiang's cooking skills a little!
Reluctantly finished eating the bread and milk, Shi Lei washed his hands and sat back in front of the No. 1 server.
The scanning of the supercomputer swallow has fed back good news. Supercomputers are rented out, and some enterprises that need supercomputers have purchased supercomputer Yan's computing services.
Most of these companies that need supercomputers are high-tech companies, and their own servers are quite powerful. With the help of the supercomputer Yan, Shi Lei has the permission to connect to the servers of those high-tech enterprises, and reversely tracks from the supercomputer Yan to several high-tech enterprises.
Among these high-tech enterprises, Shi Lei screened two companies with superior server performance and low server usage.
These two companies, like the original Aixin, rented the supercomputer Yan, just to enhance the company's popularity, not to really use the supercomputer Yan.
Shi Lei, through the authority of the supercomputer Yan, first attacked a company called Leyu Company. This company, mainly for other businesses, provides computer service support.
Their servers are clustered. The so-called cluster mode is a cluster server. To describe a cluster server simply as to enable multiple servers to work as if they were a single server.
For example, Leyu's cluster servers have a total of eight independent servers, which improve stability and computing power through the cluster system.
There are many advantages of using cluster servers, such as server upgrades, old servers can not be discarded just like this, and the problem of service continuity should also be considered.
Another benefit of clustered servers is that if there is a problem with one of the standalone servers in the cluster, the other servers can take on the fault-tolerant task of isolating the failed server from the cluster system through dedicated software, and the remaining servers can be re-load-balanced through the load transfer mechanism between the servers. At the same time, the security personnel on duty are given to remind the existence of the faulty server.
Leyu's cluster system uses the UNIX system, which can accommodate up to eight independent servers, and they have also configured eight independent servers to reach the limit.
Shi Lei knows that another cluster system can reach the support of 96 independent servers, that is, Compaq's OpenVMS!
It's just that as early as 02, Compaq has been acquired by Hewlett-Packard, which has caused HP's servers to become more and more powerful.
The Unix cluster system used by Leyu is equipped with eight independent servers with a computing speed of 0.2TFLop/s, and the combined cluster server has about 60% more computing power than the server group of Aixin.
With the help of the supercomputer Yan, Shi Lei successfully invaded the cluster server of Leyu Company and began to execute his own intrusion plan.
The advantages of clustered servers are obvious. But there are also disadvantages.
Since the cluster servers have fault-tolerant tasks with each other, when an independent server runs an application that fails, or an independent server fails, other servers will open the application again because of the fault-tolerant task, take over the data area located on the shared disk cabinet, and then let the faulty application run again.
This mechanism is good and one of the advantages of clustered servers. But this is also one of the disadvantages of clustered servers.
The process of applying takeover generally requires three steps.
The first step is to detect the fault-tolerant task and determine whether the fault really exists. The second step is to restart the faulty application on one of the servers in the cluster. The last step is to take over the data area of the shared disk enclosure.
If an application error occurs on a dedicated server. It takes a certain amount of time for other servers in the cluster to take over the application. And this time. It depends on the size of the app that is having problems. The bigger the app, the more time it takes!
In view of this mechanism, which is both an advantage and a disadvantage, Shi Lei found a large-scale application running in the cluster server of Leyu Company.
After forcibly aborting the large application and isolating the independent server, the cluster server of Leyu is managed by the fault-tolerant task mechanism, and the application is started by another independent server. Then the load shifting mechanism starts to adjust the load balancing of the remaining seven servers.
During load balancing and allocation, the system resource utilization of the cluster system is the highest, and the system defense capability is the weakest. Take advantage of this moment. Coupled with the power of the supercomputer Yan, Shi Lei invaded the core of the cluster system and captured the super authority!
Get the super permission of the cluster system, that is to say, master the cluster server of Leyu Company, and make him his own broiler!
Shi Lei laughed and numbered the newly arrived Leyu Company's broiler chicken as the No. 2 server, which was convenient for him to remember.
After getting the Leyu company, Shi Lei did not stop and continued to move towards the second goal.
The second target, named Pukong Technology, is a scientific research enterprise, and their servers are also cluster servers.
It's just that Pukong Technology's cluster server is different from Leyu's. Leyu's cluster server consists of eight independent servers working together under the Unix cluster system to form a whole. The cluster server of Pukong Technology is simply composed of two servers, one main server and one standby server.
This architecture is another form of clustered server, where the primary server takes over all the services, and only when the primary server fails, the standby server takes over all the tasks of the primary server.
Shi Lei checked that the performance of the main server reached 1TFLop/s, and the standby server also reached 0.5TFLop/s. Combined, the two servers are also more powerful than the core server group of Aixin!
For this kind of cluster server, Shi Lei can be said to be handy!
Shi Lei invaded the perimeter of the main server, wrote a message simulating a problem with the primary server, and delivered it to the standby server. The standby server immediately starts to take over the task of the primary server, and the two servers activate the priority judgment process of the cluster system because of the moment they take over.
The primary server is not down and needs to execute all the applications; The standby server, on the other hand, needs to take over all tasks because it receives a failure message from the primary server.
When there is a conflict between the primary server and the standby server, the cluster system will activate the priority judgment program to verify whether the primary server is healthy.
This conflict time and verification time are very short, but it is enough for Shi Lei, who is the pinnacle hacker in the world, to break through and enter the cluster system of Pukong Company.
After successfully entering the system, Shi Lei tried to get super permissions, and he actually found a classic vulnerability!
Pukong's cluster system is also a Unix system, and Shi Lei only analyzed it for a moment before laughing.
"What an idiot! Such a big mistake was made! ”.
(To be continued.) )