SC081 APCS conspiracy!

When Nanlin Guiyi developed the ANC software, it really hoped to obtain economic benefits through the ANC software. Pen | fun | pavilion www. biquge。 At the same time, Nanlin Guiyi will not give up the use of ANC software to obtain some gray benefits.

For example, the ANC software embeds a complete asynchronous parallel computing system!

Once the user installs the ANC software, the asynchronous parallel computing system is automatically installed, and the computing power of the user's computer will be collected by the asynchronous parallel computing system.

Although the asynchronous and disordered computing power collected by the asynchronous parallel computing system does not play a greater role in the utilization of unified and ordered computing power, isn't it good to control more computing power?

As for hiding the asynchronous parallel computing system in the ANC software, will it be discovered?

Excuse me!

According to the design of Nanlin Guiyi, the asynchronous parallel computing system is completely integrated into the source code of the ANC software, and it is impossible to find it at all. In addition, even if an asynchronous parallel computing system collects the computing power of the user's computer, it will not be detected.

First of all, the asynchronous parallel computing system written by Nanlin Guiyi, under Butler's control, has a very high logical judgment ability. If the user needs the high performance of the computer, Butler will not collect the user's computing power.

What if you don't need the high performance of a computer?

In today's era, the performance of the computer has been very powerful, taking the desktop platform CPU i5-2500 released by Intel this year as an example, as a quad-core four-thread, the main frequency is as high as 3.3-3.7GHz powerful CPU, for ordinary people, in daily use, it is difficult to make it work at more than 20% efficiency.

Unless it is in the testing process, the user is testing the extreme performance of the CPU, or in some extreme environments, the CPU work efficiency will exceed 20%.

Daily online chatting, playing online games, etc., the usage rate will not exceed 20% at all, or even 10%!

In this case, if you are conservative, the asynchronous parallel computing system hidden in the ANC software can completely capture a part of the computing power and quietly leave.

For example, the asynchronous parallel computing system extracts 60% of the overall computing power of ANC users, reserves 20% for users, and uses less than 20% for users. Then, this kind of behavior of capturing computing power will not be noticed by users at all.

For computer technology experts, and even users of Internet technology-related enterprises, even if they cannot discover the asynchronous parallel computing system and extract a part of the computing power, they can detect the abnormal data flow caused by the asynchronous parallel computing system when extracting computing power.

To put it simply, asynchronous parallel computing systems are powerful, but they always have to be connected to Butler to work, right?

Since there is a network connection, since there is data communication, there will be a flow of data, and it can be detected. For computer enthusiasts, it is not a problem to detect the presence of a data stream at all.

Some software even provides tools to monitor data flows, so that ordinary users can check whether their network is normal. For example, a large Internet company in Xia Guo provides a housekeeping software, which has a network traffic monitoring function, which can allow users to clearly see the speed of data traffic that the computer is downloading and uploading.

If the user is doing nothing, but the network keeps uploading information, it means that the network is abnormal!

In such a situation, it is very difficult to hide it. It's not that it's difficult to block the software used by ordinary users to detect network traffic, but computer experts and Internet technology enterprise users will be the first to notice network anomalies.

However, in the face of such a situation, Nanlin Guiyi has also been prepared!

Nanlin Guiyi is not a god and cannot solve the abnormal data flow caused by the network connection, but Nanlin Guiyi can legitimize it.

That's right!

Nanlin Guiyi can indeed legitimize it!

ANC software is a voice interaction software, and in the terms of service of ANC software, it is clearly stated that ANC software needs to be connected to the server of ANASE, and it is necessary to upload and download data.

If you do not accept the Terms of Service, you may not use the ANC software. Once you use the ANC software, you will automatically accept the terms. However, the company promises to keep users' data confidential and will not store it.

But whether the data will be stored or not, only Nanlin Guiyi knows!

In the terms of service of ANC software, it is clearly stated that ANC software needs to upload data and download data, the data channel of the asynchronous parallel computing system, and the channel of ANC software.

Even if a computer whiz detects a data stream from an asynchronous parallel computing system, it is just the data stream of ANC software.

Nanlin Guiyi also has further security settings, the data flow of the asynchronous parallel computing system and the data flow of the ANC software all use encrypted data flow.

It's almost impossible to crack an encrypted data stream. Unless you get Nanlin Guiyi's codebook and convert the cipher code into a clear code, it will be possible to crack it.

If you don't have a codebook with a cipher code, if you want to crack the encrypted data stream, at least Nanlin Guiyi doesn't think anyone can do it easily. Unless the supercomputer Jing is used, it will be cracked for a long time on a yearly basis.

Otherwise, it is impossible!

It is precisely because of the asynchronous parallel computing system hidden in the ANC software that Nanlin Guiyi has accelerated the construction of VIE-like structures, and he now needs more computing power to crack the supercomputer Jing.

Although the computing power of the supercomputer Jing is currently unparalleled in the world, the more computing power Nanlin Guiyi has, the more conducive it is to find the firewall weaknesses of the supercomputer Jing.

Nanlin Guiyi knows very well that the supercomputer Jing is powerful, and it has a unified and orderly computing power of 8162tflops, and it is fully capable of fighting any dissatisfaction.

However, Nanlin Guiyi must invade the supercomputer Jing!

Because, by chance, Nanlin Guiyi found a clue, and the target was directly to the supercomputer Jing. If Nanlin Guiyi wants to know more information, he can only solve the doubts in his heart by breaking the defense of the supercomputer Jing.

Therefore, even if the computing power of the supercomputer Jing reached 8162tflops, Nanlin Guiyi still did not give up, he was ready to use ANC software to collect more computing power resources, and at the right time, launch a wave of attacks on the supercomputer Jing, attract the security personnel of the supercomputer Jing, and then find a way to break through the defense of the supercomputer Jing.

However, it is not enough for the ANC software to collect resources!

Nanlin Guiyi has an even more evil plan...

————

New book uploads, referral tickets needed, member clicks, favorites, etc., thank you for all your support!

————

Pay attention to the public: qms5120 to learn more about the behind-the-scenes footage of the works and authors, as well as popularize computer knowledge from time to time.

————