Chapter 53: The Experiment Begins

The rest of the matter is logical.

David Smith, with his people and all kinds of supplies, came to Liu Junhe's base, and at the same time, faced with the increasing population. Liu Junhe decided to use more door panels to expand the area of the base. At the same time, it includes setting up some special rooms to carry out the work.

All the work was carried out in an orderly manner.

According to Stephen Chu, he will give Liu Junhe a live demonstration to certify his so-called technology. However, first of all, Stephen Chu said that he would give some explanations first.

Stephen Zhu chose two computers, and in order to ensure the fairness of this experiment, Liu Junhe and his own account were logged in to these two computers.

After a series of preparations, the experiment began. Liu Junhe carefully compared the gap between the internal information of the two accounts. Stephen Chu began his operation.

After all, Liu Junhe also has some understanding of computers, so in this process, he watched the whole process.

First of all, Stephen Chu opened an application based on his computer: "Let me introduce you, this is developed by me." Because there was originally a vulnerability, it was too small to enter in a normal way, so I chose a piece of software, of course, which I created myself, and he could amplify this small problem and form a vulnerability that could be hacked in a conventional way. ”

Liu Junhe directly asked: "You can magnify small problems, what kind of operation is this?" ”

Stephen Chu patiently explained: "You should know that there is a very important component in the computer park at present, and his name is the Marne Ensemble. You don't need to know the actual content of this collection. But you should know that this Manx convergence is the biggest gap that separates computers from computing clouds.

The main work of the Manx aggregate is to increase the amount of computing on the computer, so as to assist the host computer to complete various tasks. In addition to increasing the amount of computation, it also has another function, which also relies on the amount of computation to form a data shielding network. You should know this principle, it is equivalent to a race, and if your speed is not as fast as the calculation speed of this Manx aggregate, your invasion will be very difficult.

Therefore, there are many types and models of Manx aggregates in the world, but the main point is the amount of calculation. The more computationally intensive, the stronger the compute cloud. The computer cloud system will also be stronger.

Of course, when it comes to this place, I have to mention one more thing. That's the ultimate Manx ensemble for computer network systems. This is equivalent to the sum of the saddle aggregate of each subcomputer under the network system. Its function, which you should also understand, is to monitor and calculate the entire computer network, and its purpose is to accommodate the amount of computing generated by all computers. This is equivalent to a core guarantee of many national security network systems.

But this final saddle assemblage is inside a space prison, so it's completely different. It differs from the ultimate marne aggregate of the average national security network system in that it has a number of other functions. These features include the capability of the self-test system and the strength of the external resistance technology.

What's more, the ultimate Manx ensemble in the space prison is not a single one, but is arranged in four phased arrays to form a large combination. Despite this, his actual operation is about the same as that of a typical national security network system. The main thing is that most of these systems are built into artificial intelligence and replaced. Some of the operations of the general Ultimate Marne Aggregate do not require artificial intelligence to operate.

The main reason is the impact of the Manx aggregate on some mechanical intelligent manufacturing. But we know that the space prison is a system of its own, and artificial intelligence must intervene, so there is a little bit of a problem in between. There is a little bit of friction between artificial intelligence and the system of the space prison itself, which is masked by some people in some special ways.

That's how I discovered it, and that's why I came up with those previous ideas. ”

Liu Junhe was a little confused when he heard it. He still understands some things related to computing clouds, but when he heard some words from this guy, he was instantly blindfolded again

Zhu Xingchi swallowed a mouthful of saliva and continued: "Looking at your expression, I may know what you are thinking, do you want to talk about the mutual guidance core.

Indeed, this thing is indeed a solution to some of the conflicts between some systems of the Manx aggregate and the system of the artificial intelligence itself. Because we know that artificial intelligence, its built-in system is not allowed to be large, and it is mainly related to his working relationship. After all, there is no omnipotent artificial intelligence, although artificial intelligence is powerful, at most it will be in a certain field, so this limits some of his artificial intelligence development and technological prospects, of course, this is also related to some things in the market.

But the artificial intelligence in the space prison is completely different. The builders have endowed them with considerable wisdom, as well as the ability to work. Although there is a bit of friction with the highest-level cybersecurity system built into the space prison, this does not affect the normal operation of the artificial intelligence, because the builders have designed a very unique command and instructions.

Some of the space prison's commands to artificial intelligence are indirect. ”

Indirect!

Liu Junhe, at this time, decisively raised his question: "Indirect, how is it possible?" Is there another process to be added in the middle? In this way, wouldn't it be possible to add some program software or application operations and the like? ”

At this time, Zhu Xingchi's expression became extremely strange, he seemed to be happy, but more excited: "What I want to say next is my biggest discovery in the space prison." At the same time, it is also related to the operation that I found that can add internal information between people for traffic exchange.

We know that there are two levels of space prisons. But you may not know the dividing line, but it's pretty obvious. Whether it's the dividing line in geography, or the dividing line on the Internet, or everything else, he is separated. Unlike other spacecraft, he was literally separated.

The main details are like this.

The interior of the space prison is self-contained, some of his information and some energy to replenish and maintain some of the settings of this system homeostasis, and he is in the outer layer. However, creating an environment for criminals like us, including some cargo robots dropping supplies, and some armed robots doing things to maintain order, etc., he did it internally.

And in this process, it is the outer layer of the space prison that gives orders to the inner layer. In other words, although there are artificial intelligence inside and outside the space prison, the relationship between the two is more like the relationship between an executor and an orderer.

They used something like a converter to input this command into the space prison in a special way. But at the same time, there is no way to transmit internal information to the outside. Regarding those that are important, the builders of the space prison have completely thought about it. Some of the parameters and all kinds of systems, they have been completely debugged externally, and if anything happens internally, the external can solve the problem by controlling the internal artificial intelligence.

But in the process, something went wrong. You can understand that a closed electromagnetic system is formed inside our space prison. Moreover, when they transmit it is one-way, it is absolutely impossible to reverse it. But in fact, the space inside and the equipment that needs to be run is much larger, larger than the outside. As a result, the internal computer network system is more powerful than the outside world.

It's the same as when water flows down, and if there is a difference in the water level at sea, the high end of the water level will quickly move towards the low water level. But the space prison seems to violate this principle. They forcibly cut it all off by transmitting information.

In order to calculate the amount of computation for the combination of four saddle assemblages inside the computer. The game inside the space prison occupies a very large and important place. ”

Liu Junhe, at this time, listened very carefully, although there were some things he didn't understand, but he still understood the general meaning: "You mean to say that the game in the space prison is big enough to meet the computation of the four Marne aggregates to form a combination. ”

Zhu Xingchi nodded and said with certainty: "The current situation is indeed the case. Although the games we are encountering now seem simple and rare, it does not rule out that at the top level, there may be bigger games. This is something I discovered by accident when I was researching the information. ”

Liu Junhe felt that his brain was now a little up: "I still have some doubts, how did you amplify that?" ”

At this time, Zhu Xingchi pretended to be mysterious: "Let me ask you a question, if you want to make the water flow a little faster and the height difference has been determined, what kind of way will you take?" ”

Liu Junhe, this point reaction is relatively fast: "Of course, the width of the river is shortened as much as possible. ”

"Yes!" Zhu Xingchi seemed a little excited at this time, and he seemed to have found someone who could let him finish his words seriously: "But in fact, this method is difficult to adopt. Some of the operations I use are actually like this in principle, but the actual operation is very difficult. And there is a probability. You know, the computer model we currently use is mainly quantum and molecular network computing clouds.

The world's most advanced computers almost cover both systems and use them at the same time. Again, the two systems are perfectly integrated.

I'm actually building a stand-alone old integrated circuit network computer. In fact, it is a trap, a trap for integrated circuit networks. He doesn't have a lot of computation himself, so I made a dead logic of computation. And this dead logic can only be generated on the integrated circuit network. It can extract a large part of the huge amount of computation of the Manx aggregate and integrate it into my computer for infinite loop computation. ”

Liu Junhe looked very surprised at this time: "No, how can the amount of computation such as the saddle aggregate be limited by a dead logic?" Even if you can limit some of it, it shouldn't be that big, right? ”

At this time, Stephen Chu laughed: "I'm sorry, it's almost impossible for this method to be put in the real world, but you are a space prison." In this huge system, there are games and users with a huge amount of data, so he has to allocate a large part of the running volume to complete the operation of other computers. So, it's a limit on the amount of computation per computer. And this limitation is just enough to get stuck in the dead logic limit of a computer.

Wait until the computational amount of these four Marne combinations is all limited by dead logic. I was able to use this path to hack into the actual internal systems of the four Marne combinations.

Then use this as a breakthrough to run another program of mine to hide what I do. Perform data queries as an external artificial intelligence. Then find your information and extract it, at this time turn off the dead logic program. The computer's system self-check starts working again, and at this point it will clear the state I'm currently in as garbage.

Then the information goes back to my computer. However, in your own computer, your information is still kept. At this time, two computers should be combined to form a small system. Then the internal information is simply reorganized and integrated.

Then I can transfer your information to my internal information. But at this time, your computer will actually show you whether or not to save your internal information. Just click Save and copy the information you got on my computer. As for some of the computer's internal self-check systems, he will treat this additional piece of information as if it were the original message, and if you didn't have one before, it will also have one by default.

That's the whole process. ”

After Liu Junhe listened, he sighed silently.