Chapter 912 - Insidious

Ten days later, the large computing unit group arrived at Zihong Star, using four large cargo starships.

The volume of the device is already quite large, and it also has to prevent collisions and squeezes, four starships are really not much.

There is no problem with the security of the cargo, and the insurance company itself has arranged for the escort of the armed starship.

After the equipment arrived, a special fleet arrived at Ping An headquarters and began the intense installation and commissioning.

Just this construction period, the estimate is 20 days, no way, the equipment is too sophisticated.

At this installation site, Duoduo has personally asked "Lord Huangtian" to install it in a small building in the landscape?

After asking Qu Jianlei, Hua Scorpion said, just install and debug it at your headquarters, and we will handle and assemble it ourselves.

Duoduo didn't think this answer was very surprising, and the team that could rub the extractor by hand certainly had no technical problems.

It's really great to be able to hide the whereabouts of adults.

In fact, Qu Jianlei had already made corresponding arrangements.

He is indeed very confident, but he will definitely not be blindly arrogant, and arrange Xiaohu to watch the whole process of installation and commissioning in advance.

Even when he is free, he will ask Xiaohu to call up the video and audio of the scene to observe and learn.

He is a man in two lives, and it is the first time he has taken out a loan to buy a large item, so he must be cautious.

Of course, he also noticed that Taiping was doing something for Ping An again, but he didn't bother to pay attention to it at all.

Qu Jianlei knew very well in his heart that Taiping was likely to be the main mastermind behind the Ping An - there was no one.

The relevant information is not available on the Internet, but Xiaohu can still penetrate personal terminals.

However, if Ping An didn't speak, Qu Jianlei didn't bother to care, and the team charged the guardian fee to be a bodyguard, not a nanny.

That is to say, from installation to commissioning, this equipment has been under the attention of Xiaohu and Qu Jianlei.

Because Ping'an's cooperation was in place, the construction period of 20 days was completed in only 16 days.

Next, there is the manufacturer's training of operators, but Qu Jianlei and Xiaohu ignored it.

- Just get a set of training materials and videos, there's no need to waste that time.

The big-headed butterfly sighed a little, "The installation and debugging are too simple, right?" In the past sixteen days, I have seen that my days have really been like years. ”

When it says this, it means that it is disassembled and then assembled, and there is no problem at all.

"I know that you learn quickly," Qu Jianlei replied disapprehantly, "The key is to optimize the handling plan and save space." ”

Since installation and commissioning are simple, of course, there are other things to consider.

For Qu Jianlei, the space occupation of four large cargo starships is also unbearable for him.

Although the team has a lot of charms, the space is not such a waste!

However, if you want to make reasonable use of space, you need to reduce packaging, which is equivalent to increasing the probability of parts colliding and crushing.

Therefore, this is also a system project, which requires a lot of calculations, and it must be a small lake.

The big-headed butterfly turned around, "I'm already counting, I'm designing special-shaped parts, which can effectively save space." ”

If you don't say that this guy is also quite hard, now he thinks that the standard parts on the computing unit group are in the way, and they have to be replaced by special-shaped parts.

If you understand a little bit of modern industry, you will know the importance of standard parts, which are easy to disassemble, repair and replace parts.

But Xiaohu would rather sacrifice these conveniences and replace them with special-shaped parts, in order to save a little space.

That's right, it's really only a little bit, not too much – it's already racking its brains and doing everything.

And it dares to modify it so freely, also because it has a boss with extremely hands-on ability.

"Let it go," Qu Jianlei firmly supports, "if necessary, the overall unit layout can be re-planned." ”

"No problem," the big-headed butterfly whirled excitedly, "I also think there's something wrong with the overall layout." ”

"That's the interface with expansion and spare parts," Qu Jianlei struck it coldly.

"But we don't need to," replied Big-Headed Butterfly without hesitation, "and we can change these structures at any time." ”

Well, you have a point...... Qu Jianlei was speechless for a moment, Xiaohu was really right.

The fixed layout is indeed convenient and easy to use, but it does not mean much to a handicraft expert who can disassemble and assemble the machine at any time.

And Qu himself is such a master.

So he could only remind it, "Be careful to monitor the backdoor program, don't ignore it." ”

"Don't worry, I have a dedicated data fragment to monitor ......"

The next moment, the big-headed butterfly's rotating body came to an abrupt end, and the soft voice was full of disbelief.

"Well, wouldn't it? This weird packet ...... Boss, has your mouth ever opened? ”

"Huh?" Qu Jianlei originally just mentioned it casually, but he was also stunned when he heard the words, "There is a problem with the data packet?" ”

"There must be a problem, but I don't know the size of the problem," Xiaohu replied dryly, "It's a bit tricky to decipher......

It is indeed necessary to be cautious in deciphering abnormal packets.

With Xiaohu's intelligence and computing power, the probability of winning a move is not very large, but if you disturb the other party, it is already very unworthy.

Qu Jianlei was very calm, "Let's judge the source of the information first." ”

The big-headed butterfly's body turned so fast that he couldn't care about answering the question, "Such a shameful thing, uncle can bear it!" ”

Now Xiaohu's computing power support comes from 80 million computing units.

Although compared with the newly purchased 1.6 billion huge units, the difference in computing power is hundreds of times, but it is also very remarkable.

In about five minutes, it found out the source.

The other party used the central control system of Ping An Headquarters as a springboard, which can be traced all the way back to the relay signal tower of Zihong Star.

In short, nine out of ten chances, the attack came from an alien planet.

Although Xiaohu does not have an independent personality, he has quite a lot of condition settings and execution settings, and his logical judgment ability is very strong.

When it discovers that the packet is from an alien, the self-protection setting is automatically turned on and a series of responses are made.

First of all, the first element is to play dead, so that the other party cannot find out that it has been exposed.

Other things can come slowly, and the most fearful thing about this kind of thing is that it can't be discovered, as long as it can be discovered, it's easy to do.

Next, Xiaohu completely abandoned the structural design of the computing unit and concentrated on analyzing the data packets.

It had been negligent before, and in its words, "the invasion was set up too simplistic and a bit formalized".

Now, once it gets serious, it immediately gathers a lot of news.

First of all, this kind of data packet is used to dismember the data chain, and the main feature is an "ablation function".

To put it simply, this process is a bit like the white blood cells in the human body, which first engulf the target and then dissipate itself.

This theory based on biomimicry is not unusual, but it is very difficult to implement in terms of digital applications.

Second, packet gobbling is quite intelligent and is mainly aimed at blocked backdoors.

In addition to backdoors, it also devours data links on digital barriers, which are highly targeted.

Xiaohu has a high opinion of this kind of data packet, "It looks simple, but the recognition and triggering mechanism is very clever." ”

It's also a loss to Qu Jianlei, who can understand these words, "It means that there is an artificial intelligence behind the other party that is not weaker than you?" ”

The big-headed butterfly turned twice and replied proudly, "It's impossible to be stronger than me, otherwise it would have discovered me a long time ago." ”

Qu Jianlei felt that this guy was a little floating, and deliberately poured cold water, "But the family is from an alien planet, and it is limited by the transmission channel." ”

The big-headed butterfly turned around twice, "That should also be powerful in computing power, I'm just ...... Alas, the children of the poor are in charge of the house. ”

Invest so much in you, you say I'm poor? Qu Jianlei felt aggrieved.

"Could it have found you, just pretending not to?"

"Impossible, absolutely impossible!" The big-headed butterfly spun wildly, and it shouted in a soft voice.

"I was very careful when I analyzed the packets, and it looked like they were all naturally dissipating from peak-to-valley errors."

Peak-to-valley error values are common in analog signals and are less heard of in digital signals.

In the digital signal of Blue Star, it is nothing more than "yes" to "not" or "zero" and "one", emphasizing whether there is or not.

The presence of current is "1", and the absence of "0".

The same is true even if the Empire's digital signal is ternary, "1", "0", and "-1".

The difference between ternary and binary is mainly due to the generation difference in mode and hardware.

But in fact, digital signals are also strong and weak, such as "yes" and "seems to have, but may not be".

It's just that this error is not only small, but also not easy to capture, so people generally believe that digital signals have nothing to do with analog.

Generally speaking, it is indeed irrelevant, and the errors that trigger these are nothing more than sudden failures or external interference.

But Xiaohu can use fake external interference to quietly swallow the other party's data packets, I have to say, it is very clever.

Anyone who has ever done a data hack knows it...... Forget it, I won't go into details.

Anyway, the average intruder must first cover up his provenance so as not to be discovered - "I'm rough, you invade me!" ”

It's really going to be a face-to-face digital confrontation, that's another scenario.

Therefore, throwing out a large number of data packets to congest the other party, and at the same time quietly doing something bad is the right way.

If you don't use a trick to hide the world, how can you slip through the thick of the world?

You know, digital warfare also talks about "local operations" - the local is wired, and the distance is very close.

If outsiders can't enter the wire, they can only use wireless transmission, and how can they win in terms of the transmission capacity of the medium?

Filled with water again...... Well, the intruder uses a huge amount of data and is doomed to be impossible to achieve "one package and one tube".

At least in the normal data transmission of the Bluestar network, packet loss is not unusual, and it can be found during the inspection and made up in time.

As for the reason for the packet loss, only God knows.

Then, those intruders who are quietly mimi are even less likely to find out the reason for the loss of each package.

(Updated to, Summoning Commuter Passes, Catch-up Tickets, and Referral Tickets.) )

(End of chapter)