. Supercomputer Lei ranked 19th in the ranking of the world's top 500 supercomputers in November 2006. Its computing performance reached 19.9 TFLop/s, which is equivalent to the performance of the supercomputer Yan 42.
In terms of performance, the supercomputer Lei is still a bit behind. After all, its safe call calculation amount is only 4-5TFLOp/s, which is not as good as the supercomputer that dreams of entertaining oneself.
When Shi Lei fought against Raphael, he overused the resources of supercomputer Yan 20TFLop/s and completely defeated supercomputer Lei. It was also at that time that the secret of supercomputer Lei was accidentally captured by the mysterious CPXJazz.
lived, thus causing Raphael's tragedy.
Therefore, excessive use of supercomputer computing resources is definitely a very dangerous thing.
From a performance analysis alone, Shi Lei's choice of supercomputer Lei was not a good choice. With the excellent performance of supercomputer Yan, Shi Lei could choose a more powerful supercomputer as his target.
For example, BGW ranked third in the world in supercomputer ranking in November 2006. It is the main computer of IBM's Thomas Watson Research Center. Its computing performance reached 91.3TFLOp/s, which is almost twice the performance of the supercomputer Yan!
Although it is very difficult to hack into BGW and control it, it is not impossible for Shi Lei.
However, Shi Lei chose the supercomputer Lei!
Because the supercomputer Ray once belonged to Raphael and can be used to do a good job!
In front of Server No. 1, Shi Lei's hands and fingers were beating rapidly on the keyboard, and commands were issued from Server No. 1.
At the same time, Shi Lei was still giving voice commands to Yi Zuer, "Yi Zuer, monitor all activities of the super computer Lei, and if you find any abnormal changes, alert me immediately!"
"Sir, this fuzzy command cannot be executed. Please define the abnormal range of changes in detail." After all, Yi Zuer is just a low-level pseudo-artificial intelligence. For fuzzy commands, it cannot be understood by program definition.
Shi Lei used his voice depressedly to determine the scope of the 'abnormal changes' for Yi Zuer, "Yi Zuer, monitor the computing performance occupancy of the super computer Lei. It seems that the calculation data occupancy suddenly increases, and the value exceeds 20. Immediately
Alarm; monitor the network connection of the supercomputer Lei, and if it is found that the influx of data exceeds the total bandwidth of 80%, an alarm will be given immediately; monitor the data flow of the system, and once there is a program to spy on us, deceptive information will be sent immediately and an alarm will be given! "
"Sir, order accepted!" With clear procedural conditions, Yizuer immediately accepted the order.
With Yi Zuer helping Shi Lei monitor the situation of super computer Lei, Shi Lei can focus more on invading super computer Lei and analyzing the system architecture of super computer Lei.
Most of the operating systems of supercomputers use closed systems. Closed systems help protect the security of supercomputers and reduce the chance of being invaded by hackers.
At least, he is not the top hacker. He is basically helpless against a closed system. But Shi Lei happens to be the top hacker!
Shi Lei analyzed the system architecture of supercomputer Lei and looked for loopholes in the system. Even if it is a closed system, it is still a computer system, so there are system loopholes.
Under the sniffing of the world's top hackers, super computer Lei's system vulnerabilities were gradually discovered one by one by Shi Lei. However, the system vulnerabilities discovered so far are all insignificant and low-harm vulnerabilities that want to enter the core permissions of the system.
Group, it's a waste of time.
This so-called waste of time will most likely take several days or even ten days. Shi Lei doesn't have that much time to waste. He needs to teach the International Intelligence Bureau of the Ministry of Foreign Affairs a lesson as soon as possible and find something to do for them!
"Sir, the system computing resource occupancy has increased to 74." Yi Zuer issued a prompt. The system resource occupancy was only 51 just now, and suddenly the occupancy increased to 23.
The supercomputer Lei is affiliated with Lawrence Livermore National Laboratory. This laboratory is a comprehensive research laboratory that mainly studies life sciences and health, security and energy, resources and environment, computing, chemistry, materials, etc.
As a comprehensive research laboratory, they need to calculate a lot of data, and the supercomputer Lei's work is very heavy.
Shi Lei ignored the prompt and continued to search for system vulnerabilities in super computer Lei.
"Sir, the system computing resources have increased to 97 occupancy, and the system is running close to the limit!" Yizuer prompted again. Supercomputer Lei's computing tasks are indeed very many. No wonder when Shi Lei and Raphael fought, Lafite
Heat can expose supercomputer mines.
Shi Lei, who was sniffing for system vulnerabilities, suddenly discovered a weird system vulnerability!
Shi Lei quickly checked the situation of this vulnerability. After some calculations, he found that the occurrence of this vulnerability was actually a vulnerability that seriously harmed the system. Because the system's computing resource usage exceeded 95, a temporary vulnerability that seriously harmed the system was
.
Through this vulnerability, Shi Lei directly entered the permission group and obtained part of the permissions. After obtaining part of the permissions of the permission group, Shi Lei immediately searched within the permission group for the list of members of the entire permission group.
Supercomputer Lei had a large list of permission groups. Shi Lei just searched it to see if there were any hidden permission users and did not intend to make any changes.
The process of retrieving the permission group list was very smooth. Under Shi Lei's careful operation, no alarm settings were triggered. The entire permission group has a large number of B-level, C-level and D-level permission accounts, as well as a small number of *-level permission accounts and three-level permission accounts.
An S-level authority account, and a hidden SA super administrator account.
Under normal circumstances, even accounts with S-level permissions cannot find the SA super administrator account. Shi Lei used special means to find the information about the SA super administrator account.
When querying the SA super administrator information, Shi Lei blocked three triggers in total. If someone with slightly less technical skills came in, the alarm would definitely be triggered.
After finding the information about the SA super administrator, Shi Lei did not take the approach of changing the permission group as a whole this time. After all, changing the permission group as a whole is very troublesome and requires a complete analysis of the supercomputer Lei's operating system. This is not a simple matter.
,It takes a long time to analyze the details of a ,closed operating system of a supercomputer.
Shi Lei did not intend to master the super computer mine for a long time, but planned to borrow the super computer mine to do something disharmonious and only hold it for a short period of time.
Therefore, Shi Lei did not even change the status of the permission group, and directly obtained the account password of the super administrator of the supercomputer Lei SA through the loopholes within the permission group.
In other words, Shi Lei just borrowed the account password instead of creating an account password for himself. Simply put, it is equivalent to Shi Lei stealing his account. He can use the stolen SA super administrator account to use the supercomputer Lei's
All resources.
After obtaining the account and password of the SA super administrator, Shi Lei first checked the correctness of the account and password. After confirming that the account was available, Shi Lei immediately used the authority of the SA super administrator and began to modify the settings of the super computer Lei and the SA super administrator.
Administrator account information.
All the modified information was hidden under the original information. Without a thorough inspection, Shi Lei's modifications would not be discovered at all.
After all the settings were modified, Shi Lei manually cleaned up various traces and gave a voice command: "Yizur, assist in cleaning up traces of intrusion."
"Sir, it's reasonable. Please wait." Yi Zuer's speed in cleaning up traces far exceeded Shi Lei's. In just seven or eight seconds, Yi Zuer issued a prompt: "Sir, the traces are being cleaned up."
complete!"
Shi Lei checked it worriedly and found that Yizuer had done a perfect job in dealing with various traces, and there were no remaining problems at all!
As long as there is no hardware protection, Yizuer can clean up all traces of intrusion. Even if there is hardware protection, Yizuer will issue a prompt.
After cleaning up the intrusion traces of Super Computer Mine, Shi Lei exited Super Computer Mine. There was no need for Super Computer Mine at this moment, so he temporarily released it to reduce the chance of being discovered.
Looking at the time in the lower right corner of the computer screen, it was already close to twelve o'clock. He had to go to Ouyang Xiang's place early tomorrow morning. Shi Lei set an alarm clock, washed up and went to bed in a hurry.
Early the next morning, Shi Lei got up early, took a nutritious breakfast, and went to Ouyang Xiang's place to take care of Ouyang Xiang for breakfast.
At around nine o'clock in the morning, Shi Lei was accompanying Ouyang Xiang when Bai Qiang called. Shi Lei smiled apologetically at Ouyang Xiang and then answered the phone.
"Brother Shi, where are you now?" Bai Qiang asked first.
"I'm in Shuanghu District." Shi Lei secretly guessed, could it be about the AIP artificial limbs?
As expected, Bai Qiang laughed twice and then said: "Brother Shi, are you ready for the artificial intelligence prosthesis?"
"Well, you're ready! Where shall we meet?" Shi Lei took out a set of artificial intelligence prosthetics with leg and knee amputation last night when he was at Shu'an Village and put them in the trunk of the Audi A4L.
"Brother Shi, drive to Beiyu District right away! We are waiting for you at Tianyue Hotel in Beiyu District." Tianyue Hotel is a well-known five-star hotel in Beiyu District, with very complete facilities and luxurious hardware.
Configuration.
"Now?" Shi Lei asked unhappily. If he went to Beiyu District now, there would definitely be no one to take care of Ouyang Xiang. What would happen at noon?
(To be continued. Please search Piaotian Literature, the novel will be better and updated faster!)