Chapter 48: The Ultimate Hacking Plan!

(Thank you for your support from the book friend "Heaven and Earth Shengong"!) Take a bow! Today is May Day, I wish you all a happy holiday, and by the way, ask for a recommendation ticket.^^ everyone use the ticket to destroy me! )

At this moment, Feng Xiaotian was in a daze at the computer, although he was kicked out of the LAN by the other party again, he was not depressed, and at this moment he was thinking about a way to solve the supercomputer.

Just when Feng Xiaotian was thinking hard, the lights in the room suddenly flickered, which was caused by voltage fluctuations, Feng Xiaotian was afraid that the computer would be damaged because of voltage instability, so he immediately looked down at the chassis, fortunately, the voltage fluctuation was still within the range that the computer could bear, so the computer did not have any faults.

- Wait! Voltage...... Computer...... Voltage...... Computer......

Feng Xiaotian suddenly thought of something, only to see him staring intently at the computer case, thinking nervously about something in his mind, and after a while, he jumped up from the chair and cheered in his mouth: "There is a way!" There's a way! ”

What did Feng Xiaotian think of? The answer is simple: by controlling the power supply of this supercomputer, it will cause voltage fluctuations, which will affect the processing speed of the computer itself, and as long as the processing speed of the computer becomes sluggish, he can accomplish his goal.

Speaking of which, we have to mention the working principle of the computer, as we all know, the computer is constructed by hardware and software, the relationship between the two is inseparable, in which the software is responsible for the processing of information, but the software wants to process the information, it needs the hardware to provide support.

The performance of a computer depends to a large extent on the configuration of the computer hardware, using different processors, or different motherboards, will affect the performance of the computer, one of the most critical, that is, the computer's CPU, which is commonly known as the "processor".

The processor belongs to the computer hardware, but it is quite closely related to the computer software, the computer is binary (there are other bases, but these bases will also be converted into binary in the data processing of the computer), any information, is through the "0" and "1" two numbers superimposed and converted, it can be said that all the accessories of a computer, including software, are built on this basis, software wants to complete information processing through "0" and "1", it must go through the processor.

On the processor, densely covered with many tiny transistors, after receiving the message sent by the software, the processor will control these transistors, so that they keep turning on or off, so that the current passes through different channels inside the processor, and the software will get the corresponding results according to the channel through which the current passes, which also realizes the information processing of the computer, the channel through which the current passes, in fact, is a logical operation process, each channel represents a different result, and the software is based on these results. to get the final result.

Feng Xiaotian thought of the solution is based on this principle, as long as the voltage of the processor is unstable, the processor itself will be disordered, if the software sends out the operation instruction is one plus one equals several, maybe the result given by the processor will be any wrong number, so that the computer's operating system will also have problems, at that time, Feng Xiaotian can take advantage of the void.

Who would have thought of this solution? Hackers are procedural, but who would do such in-depth research when it comes to hardware? That is, Feng Xiaotian will be like this, since he got this computer, he has studied from all aspects, in order to connect the computer to the wireless network, he also went to the library to do in-depth study, so it is not surprising that he can think of this.

Of course, there are practical reasons for this, if it weren't for the flickering of the light bulb caused by the unstable voltage, he would have to think of this very hard, all in all, this genius idea has been formed in Feng Xiaotian's mind, and the next thing he has to do is to implement this plan, which is also Feng Xiaotian's most difficult plan, if this plan still doesn't work, he is ready to give up, because he can't think of a better way.

Feng Xiaotian first took the IP of the North American Air Defense Command as a node, searching the adjacent network, he did this to find the power plant that provided power to the North American Air Defense Command, Feng Xiaotian knew that the United States is a very modern country, in many fields have realized computer integrated management, the power plant should use a computer, which can control the power supply more intelligently, so as to achieve the purpose of energy saving.

A few minutes later, Feng Xiaotian found the power plant, but to his shock, it was actually a nuclear power plant!

It has to be said that the North American Air Defense Command, as a unit that holds the secrets of the US nuclear bomb, is really strong in its own configuration, and it uses nuclear power plants.

Feng Xiaotian paused for a while, and then made a decision: Things have come to this point, it's a pity to give up, I just control the voltage of the hacker organizer, and it has no impact on the nuclear power plant, so ...... Let's keep going!

The network of the nuclear power plant is not connected to the outside world, but Feng Xiaotian still successfully invaded, because they still have telephones after all, as long as there is a network information transmission channel, Feng Xiaotian can complete the invasion, which he has tested on the North American Air Defense Command, the method and principle are the same, Feng Xiaotian did not take much effort, he secretly infiltrated the central control system of the nuclear power plant, and then he observed the execution procedures in the system, and after a while, he retreated.

Based on the information he observed, Feng Xiaotian wrote a program on his computer, which had only one purpose: to frantically change the voltage of the electricity usage unit.

This program is very simple, it is just a small instruction program, Feng Xiaotian only took three minutes to write, and then he infiltrated the central control system of the nuclear power plant again, put this program in a very hidden place, and the next thing he had to do was to get the opportunity to talk to the "fortress" computer, which required him to hack into the other party's network again.

James had ordered all physical cables to be cut off, he thought that this would completely cut off the invasion of Feng Xiaotian, was this really the case?

The answer given by Feng Xiaotian is no! At present, there is only one intrusion path left, that is, the wireless signal transmitted by the satellite, to complete the intrusion!

This can also be explained as the reason why he didn't feel frustrated when he was kicked out of the LAN after being kicked out of the LAN, because he also knew that the last way was to connect his own computer to the Internet through wireless signals, and in order to do this, he didn't know how much energy Lu Dao spent, which made him very impressed, and he wanted to forget, how could it be?

Unbeknownst to NORAD, a huge storm of invasion is coming, and this is the biggest threat this organization has faced since its establishment!