home

search

Swallows return with the spring breeze

  Swallow Returns Below

  The super user of the supercomputer Yan has super privileges and is independently protected by a chip, which is indeed very difficult to handle!

  It can even be said that it is unmanageable!

  However, Shi Ke is a world-class top hacker and has controlled the supercomputer Yan before. As for Yan's situation, it's as familiar to him as his own hands!

  The developer of the independent protection chip is the well-known chip giant Intel, and its quality is very reliable. Not only does it have a good hardware encryption system, but also anti-static interference, overcurrent protection, etc., ensuring the safety of the chip itself!

  However, it is precisely because of its tight security that a usable plan can be provided!

  In his previous life, Shi Ke was also blocked by this independent protection chip. In a fit of rage, Shi Ke assembled the supercomputer's internal software that managed power distribution and used a massive current to blast the independent protection chip, causing it to enter overcurrent protection in an instant and forcing it to restart.

  From automatic shutdown due to overcurrent protection, to independent chip reboot, there is a gap of about three seconds. During these three seconds, the super privilege user is in an unprotected state.

  In the past, later supercomputers did not adopt independent protection chips, precisely because of this reason. Setting up overcurrent protection makes it easy to be attacked by overloading and rebooting. However, if no overcurrent protection is set up, it will be directly burned out by current!

  Overcurrent protection method is a good way to resist independent protection chip. However, only a few people know this method now, Shi Lei also relied on the advantage of rebirth to know that this was not a vulnerability.

  Each supercomputer is a behemoth. The host of the supercomputer Swan occupies an area of two hundred square meters. The power consumption of each supercomputer is also an absolutely terrifying number. Therefore, inside the supercomputer, there is an independent power management program that allocates power consumption to different regions. Shi Lei carefully enters the power management program of the supercomputer Swan and searches for the power management subprogram of the independent protection chip.

  When he found it, Shi Ke immediately felt relieved!

  The power management subprogram of the independent protection chip, although locked, can be unlocked by removing the entire power management program with level one authority, thereby unlocking the power management subprogram of the independent protection chip.

  Shi Ke used his first-level authority without hesitation, unlocking the entire power management program and then opening the power management subprogram of the independent protection chip.

  After the preparations were done, Shi Ke did not immediately attack the independent protection chip. Because the independent protection chip's overload protection only had a short three-second time limit. Shi Ke had to establish his own account and upgrade it to super privileges within these three seconds to prevent the independent protection chip from sending an alarm message to the security guards. Otherwise, he would likely be discovered!

  In his previous life, Shi Ke was hacking into the independent protection chip of the supercomputer Yan when Xia Guo's hackers launched a large-scale invasion of Wo Sang Guo. The supercomputer Yan was the main target of their attack. Although Shi Ke had hacked into the independent protection chip, after it restarted, it sent out an alarm message. However, the security personnel guarding the supercomputer Yan were too busy dealing with Xia Guo's hackers to notice the alarm from the independent protection chip. As a result, Shi Ke repeatedly hacked into the independent protection chip and eventually obtained the highest authority of the supercomputer Yan, manually clearing the alarm information from the independent protection chip.

  In this life, Shi Ke didn't have many chances, he only had one chance!

  Within three seconds, seize super privileges and use the super privileges to block the alarm information of the independent protection chip. All this must be done within three seconds!

  Otherwise, everything will fail!

  Shi Ke was so anxious to obtain super privileges, not like the way he handled the Aike Xin company's server group, directly integrating the permission system within the server system. This is because the server group of Aike Xin company adopted a simple system program, while the supercomputer Yan's system was not only professionally developed and closed, but also extremely complex, Shi Ke simply didn't have time to integrate the permission system. Even if he had time, Shi Ke couldn't guarantee success!

  Therefore, Shi Ke had to go to great lengths to obtain super privileges and then use the super privileges to modify the permission system inside the system.

  Shi Ke, inside the supercomputer Yan, began writing malicious programs. First, he invaded and elevated privileges, making himself a first-level privileged user, writing his own malicious invasion program, so that after the program successfully invaded, it automatically elevated privileges to become a super-privileged user.

  Then a message interception program was written and connected to the malicious intrusion program, waiting for the intrusion program to upgrade its privileges to super privileges, thereby obtaining the authorization of the super privileged user, intercepting the alarm information sent by the independent protection chip, and deleting the records of overcurrent protection.

  Finally, use a super privileged user to search for the permission system inside the system and then change the permission system to hide its own super privileged user!

  After two small programs were done well, Shi Ke connected them together and then opened the power management subprogram of the independent protection chip.

  "It's up to you whether to eat meat by the mouthful or drink the cold northwest wind!"

  In the room, Shi Kei clasped his hands together in a gesture of prayer, pretending to be a devout follower, and begged for blessings from all the gods in heaven.

  The power management subprogram of the independent protection chip has been adjusted to five times its normal level. Once Shi Lei presses confirm, the independent protection chip will enter overcurrent protection and restart.

  Shi Ke connected two malicious programs to the server cluster of Aike Xin company, using this server cluster to counterattack the supercomputer Yan. Capturing the supercomputer Yan requires a high-performance server as a back-up, and it is precisely because of this step! Once the server serving as the back-up has insufficient computing power, it cannot infiltrate the super-privileged group within three seconds and elevate user privileges, then everything will be over!

  "You must succeed!" Shi Ke muttered under his breath, with a nervous heart, and pressed the Enter key to confirm!

  In the first second, a large amount of data flashed rapidly on the computer screen and kept scrolling.

  In a split second, the screen was still flooded with a large amount of data. Shi Lei's forehead was covered in cold sweat as he prayed that Aike Xin Company's server would hold up!

  Third second, all data streams stop, at the bottom of the screen, two English words appear!

  Privilege.Escation!

  Privilege escalation!

  At the sight of these two words, even Shi Lei couldn't help but cheer up!

  Privilege escalation, meaning primary privilege, elevated to super privilege!

  Captured Supercomputer Swallow, succeeded ninety-nine percent!

  Unless Shi Yue suddenly becomes brain-dead or takes the wrong medicine and goes crazy, Supercomputer Yan will soon return to Shi Yue's arms!

  After obtaining super privileges, the message interception program successfully blocked the independent protection chip from issuing an overcurrent alarm and deleted this record.

  Shi Ke first used the super permission user to start clearing his traces of operation in the system log. Whether it was to elevate Aike's permissions, establish his own new account, or unlock the power management program, all these operation records were deleted.

  After erasing all traces, Shi Ke did not relax his vigilance, but instead used the super permission user to enter the system source code core, then switched the system engineering mode, and searched for the system's authority system.

  Having super privileges is indeed a very refreshing thing, the computing speed of the supercomputer Yan makes Shi Lei finally regain a bit of the world's top hacker feeling.

  System privilege system, in engineering mode, was extracted by super privilege user.

  Shi Ke effortlessly modified the permission system of the supercomputer Yan, just like he had done with the Aike Xin company's server permissions. He thoroughly hid his own superuser account, making it impossible for the original superusers of the supercomputer Yan to detect.

  Then set up a backdoor in the system, allowing Shi Lei to freely enter and exit the supercomputer Yan. Even after Aike Xin's computing tasks were completed, Shi Lei could still come and go as he pleased.

  With a smile on his face, Shi Lei finished writing the code, established a brand new authority system for the supercomputer Yan, and created multiple backdoors. He finally let out a sigh of relief. At this point, the supercomputer Yan was 99.9% his!

  The last 0.1% is the system log in engineering mode.

  This log belongs to a special protection mechanism of supercomputers and is protected by independent hardware, even if the user with super privileges is used, it cannot be modified!

  However, that's just for ordinary people. Users with super privileges can't even delete the logs in engineering mode. But Shi Lei is now a world-class top hacker who has mastered the supercomputer!

  Controlling the supercomputer Yan, Shi Lei directly used the supercomputer Yan again, using the trick of overcurrent protection to put the hardware that protected the engineering mode log into self-protection due to overcurrent. Then he quickly deleted the record of his modification of the system permission system and also deleted the record of the hardware that protected the engineering mode log.

  When the last record was deleted by Shi Lei, he tapped on the code and let Supercomputer Yan list out the real permission user group. His own super permission user did not show up, but he could still use Supercomputer Yan's super management authority. This represented that Supercomputer Yan had been successfully captured by Shi Lei!

  In 2006, the world's ninth-ranked supercomputer, the pride of Wosan country, the pride of Tokyo Institute of Technology, was successfully acquired by Shi Lei!

  Thank you to the country of Japan, thank you to Tokyo Institute of Technology, for helping Shi Lei take care of the supercomputer Yan, allowing Shi Lei to use the world's ninth-ranked supercomputer without spending a single penny!

  Captured the supercomputer Yan, Shi Lei will supercomputer Yan, internal Aike Xin company application records, one by one clear away, then back to Aike Xin company, their server internal records, also cleared away. Only, Shi Lei did not let go of Aike Xin company's server group.

  After all, this is a server cluster that can rival small supercomputers, how could they possibly give it up?

  Is there any reason to spit it out after eating?

  He cut off the network connection with Wosang, Shi Ke returned to Server No. 1, he opened the music player with a smile on his face. The speaker once again emitted pleasant music.

  "The flowers bloom for whom? A year's spring has gone and another comes, the flowers say they are waiting for someone."

  "Unable to help as flowers fall, like a familiar acquaintance, swallows return..."

  ——————————————————————————————————————

  PS: The recommendation task is still a little short~ But everyone can definitely reach it! Ask for recommendations, collections, and clicks!

  Is there a reward or evaluation?

  The second small activity, I don't know why, the post was locked and failed to pass the review, waiting for the review!

  ——

  [Appreciation reward] Business association's big shopkeeper, rewarded 200. The fish is very fat. Friendly reward

  .

  .

  .

Recommended Popular Novels