Chapter 33: Foreigners
At the Wisconsin Supercomputer Center, staff are nervously debugging procedures.
The Kraken had a terrible weekend, and its defenders had a nightmare.
A large amount of data was lost and not to mention, it took two working days just to restore the abnormally shut down system to normal. Not to mention disassembling the hardware, resetting the functional compartment and other trivial matters.
Professor Huck almost lived in the center, busy like a little bee who had just started a business. And he knew very well in his heart that no matter how hard he tried, the honey he collected could only be consumed by others. Most of the time I will wear the brand of tenured professor and die in a certain laboratory building.
Despite this, Huck persisted here, hoping to make up for his lack of talent with hard work - although he was already one of the most talented people in the world.
But there are people who have the truth of people, and the more advanced people in the world, the more they can understand.
Standing at the peak, you know how high the sky is.
"Give me a glass of water." Huck, who had been staring at the drawings for two hours, reached out and shouted, rubbing his eyes at the same time.
As far as the eye can see, some red lights suddenly flash and then quickly go out, indicating that there is an exchange of information with the outside world. He immediately stood up and waved his hand, "Is there any problem?" ”
Then, as if remembering something, he shouted, "Are you connected to an external network?" ”
A staff member replied loudly: "I have connected to the auxiliary center, do you have an external network ......?"
The supercomputer auxiliary center is an extension of the supercomputer, which is still an intranet and has strict security measures such as firewalls. External networks, on the other hand, include the intranets of other schools and research institutes – and only when they are connected can expensive supercomputers come into play. As for the Internet in the narrow sense, they don't actively connect.
In the huge brewing hall, there seems to be an echo.
Huck felt that something was wrong, and wanted to stop but couldn't give a reason, so he had to say, "Check all the security settings again, and notify me of any changes, any changes." ”
Several experts rolled their eyelids and agreed. They could understand the tremendous pressure on Huck, but they didn't want to check the same thing once, twice, three times.
Professor Huck hurriedly began to look for the problem, supercomputers are different from ordinary home computers, even the temperature of an integrated circuit version can be monitored theoretically, but the machine is as huge as a mountain, occupying the entire building, and the monitoring data is always too much, not too little.
Eventually, federal officials were in charge, and Huck had to order the Kraken to be restored to normal working order.
At this time, 36 hours had passed since the attack of "Poseidon".
Rows of red lights began to flicker, and Huck sank into his chair with a sense of fear.
He remembered what Clinkham had said before he left. If "Poseidon" really embeds a small program and enters the deepest part of "Kraken" by restarting it, then what is the way to find it yourself?
There seems to be no way to stop the Kraken for more than a week - such a condition in itself means that it is impossible, and half of the North American research institute cannot tolerate a one-week stoppage. Especially for some unwarranted speculation.
However, Huck is well aware that such things have not happened in history. However, the purpose of the predecessors was mainly to obtain the huge data and information in the supercomputer. Poseidon is different, judging from his previous performance, he has been crazy about gaining control of the "Kraken" since the beginning, the so-called administrator rights.
Huck continued to think weakly that if "Poseidon" had really obtained administrator privileges, as long as the imaginary applet really existed in the supercomputer, he could do even less than the other party.
Don't look at the huge supercomputer in front of you, but in addition to a limited number of hardware functions, what rights do you have?
"Unexpectedly, I fell into the same situation as Clinkham was at the beginning." Huck said almost to himself: "If Poseidon succeeds, we won't know, because it's a backdoor; If Poseidon had failed, we wouldn't have known, because there was no backdoor and it looked like I was going to lose. ”
The "Kraken's" dim red light continued to flash.
Outside of everyone's supervision, a command from afar entered the supercomputer.
In the Jiangning Computer Association, Chen Yi snorted lightly: It was really connected.
I actually have a supercomputer!
And you don't have to pay for it, there is a special person to maintain it.
Chen Rongxi, who was sitting opposite with another notebook, stared at the second brother with a strange expression, and finally couldn't help asking, "Succeeded?" ”
"Success what?" This time it was Chen Yi's turn to be stunned.
"Hack them...... Did it work? Chen Rongxi made a mouth shape, and his hands kept tearing and pulling on his neck.
Chen Yi let out an "oh" and smiled without worry.
The existence of supercomputers is like a heavy machine gun in the Stone Age, whether it is beating a mammoth or hunting a saber-toothed tiger, you can ignore the existence of intelligence and rush up in a daze.
He recalled a little about his poor computer education, as well as the experience accumulated a few days ago, first linked to the host of the Jiangning University Computer Association, and then ......
Brute force with a supercomputer!
Computer security experts most often like to use slogans such as "100 years can't brute-force crack" to describe their strong security defenses. But in fact, their so-called "100" years will always be 100 years of non-development, just like the law that "oil will run out in 50 years" has been propagated since the 60s of the 20th century.
Those password defenses that were made in the early 90s and "cannot be brute-forced" are now a thing of the past, and many home computers can complete the task of brute-force cracking. And today, 10 years later, the host of an ordinary computer club composed of students is even more vulnerable in front of the world's top supercomputers.
Especially with the hacker dictionary provided by Chen Rongxi, the cracking speed is even more amazing.
Ten minutes later, Chen Yi got the 12-digit password, handed it to Xiaomei, and said, "Here you go." ”
"So fast? What kind of broiler chicken do you use, not afraid of being discovered? Chen Rongxi was inexplicably surprised, she was ready to wait for half a day.
"Shhh......hhh
Every supercomputer is specially designed, and the "Kraken" that the American political axe has put so much effort into creating is really in vain if it can't crack the ordinary password of a student. Even the gentlemen at the Wisconsin Supercomputer Center didn't see anything from this. Once the "Kraken" is opened, the needs of all parties are one after another, and its resource allocation is also trying to operate with maximum efficiency, and no one is aware of it for a few minutes.
Chen Yi closed the notebook with a smile and let Chen Rongxi connect to the association's host computer with a portable PDA (handheld computer).
The little sister ran to the front, and Chen Yiyou followed behind, only to see that she looked like a child who had just received a toy, turning off the air conditioner, opening the doors and windows, and being busy - it is sometimes not a good idea to link all the devices to the network
A few minutes later, the wind with the smell of fallen leaves and lake water whistling in.
Xiao Yu shivered coldly, and then glared angrily: "Whoever opened the window, close it quickly." ”
"The computer is disobedient." Another student tinkered with the remote control, and the Computer Association deliberately installed tall and large windows and controlled them electronically when renovating the house in order to be unconventional, which was the focus of their presentation to the school leaders, known as "future technology to improve life".
It's just that once it is hacked, life is ruined, and you have to find a ladder to climb up such a high window.
"The air conditioner also stopped, and the host kicked out all the administrators." Someone reported while shaking.
The lonely small building is quiet, but it is also very cold.
Xiao Yu felt a big loss of face, and hurriedly went to the host to get up, but naturally it was useless.
"I'll do it." The little sister suddenly stood up.
"Don't bother you......" Xiaoyu resisted unwillingly, that is, he did not let Chen Rongxi touch the computer. He glanced at Chen Yi, who was full of innocence, and had an ominous premonition in his heart.
Chen Rongxi took the opportunity to solemnly say: "As the executive vice president of the association, I have an unshirkable responsibility. ”
A group of people all looked at Xiao Yu with strange eyes, and even more unresponsively shouted: "Yushen, you lost?" ”
They all knew about the bet between the two. After all, Xiaomei is the age of a junior high school student, if it weren't for a coincidence, where would she have the opportunity to come to the Computer Association of Jiangning University.
Comrade Vice President's face was full of shame and said, "If you lose, call me Xiaoyu in the future." ”
Steinecker asked, in a foreigner's tone, "What's going on?" I didn't expect the computer club to be so interesting, can I join? ”
At the same time, Lin Xiuli, a member of the club, briefly introduced him to two sentences, and immediately asked: "Do you want to join the Computer Association?" We usually only accept students from Jiangning University. ”
"Of course, I've transferred to Jiangning University." Steinecker smiled again and said, "I also joined the fencing club and the swimming club. ”
The girls who followed let out all kinds of exclamations, and their eyes became greener and greener.
……