I really just want to be a scholar

Chapter 633 Shimmer, execute Plan B!

Chapter 633 Shimmer, execute Plan B!

In Japan, in the hotel, in the room, Ning Qingyun was still writing calculations with dark circles under her eyes. This girl has tenacity, as long as she promises to do what she wants to do, she will work hard to complete it even if she doesn't eat or sleep.

Qin Ke persuaded her several times, but Ning Qingyun shook her head vigorously, insisting that time was limited, and she had to complete the entire new encryption algorithm before she would rest.

Qin Ke himself stayed up all night without closing his eyes. Seeing that Ning Qingyun's condition was getting worse, he dragged her to practice the Oriental Secret Code together.

This is also a compulsory course every morning and evening for two days.

They have been practicing the Oriental Secret Code together for many years, and the two of them can complete the entire practice process flawlessly almost with their eyes closed, and the feeling of spiritual connection is even more obvious.

Ning Qingyun's talent in science has been quietly rising. In addition to being stimulated to the limit of the talent potential inherited from his academician parents, it is also related to years of persistent practice of the Eastern Secret Code and his spiritual connection with Qin Ke.

After practicing the Oriental Secret Manual twice, both of them felt refreshed, and the exhaustion from the whole night was almost swept away.

After breakfast, the two encouraged each other and continued to devote themselves to their research.

Now hand over the optimization algorithm to Ning Qingjun, and Qin Ke himself will focus on the security upgrade of the Qingning operating system.

For a time, "challenging the black skull" became the most interesting topic and goal of many hackers who pursue technological breakthroughs and challenge powerful enemies.

Supercomputing center?Qin Ke was a little surprised.

After the "Black Skull" was intimidated by Qin Ke and discovered the real IP, in order to avoid being attacked, he would naturally change the IP and MAC address continuously. This is the basic vigilance and quality of a hacker, and it is also the most effective means to avoid network tracking.

"Forget it."

According to the information provided by Uncle Yang, there are more than a thousand members of the "Black Skull", distributed all over the world, and they rarely gather together. It is too big and the influence is too great, so the temporary elites from several nearby countries will gather together and work together.

Qin Ke didn't care what the relationship between the Supercomputing Research Institute and the "Black Skull" was. Since it was the enemy's temporary headquarters, it could be the best target for gift packages.

In a certain country, a certain supercomputing center, Dornier Sommer breathed a long sigh of relief, and quietly wiped the cold sweat from his forehead, and then he picked up the coffee and drank it slowly.

Moreover, all commonly used ports are closed, and only individual ports that are extremely difficult to attack are reserved.

In the eyes of outsiders, Du Guangfeng is a yellow-faced and thin otaku who hardly ever leaves home. In fact, he is a typical technical nerd, especially with a fanatical pursuit of hacking technology.

This made Du Guangfeng a little bit interested.

It's a pity that he stepped into Qin Ke's trap from the very beginning, and the anti-intrusion software deployed was "specially marked", just like a biological tracking chip inserted into the human body, no matter how he washed his face, changed his clothes, changed his hairstyle or even put on a mask Do not try to escape tracking if you cover it.

So Du Guangfeng tapped the keyboard quickly and began to attack one of the IPs.

……

The voice of "Shimmer" actually showed excitement in a humanized way: "Received!"

Before devoting himself to this work, Qin Ke has another job to do, which is to send a big gift package to the "Black Skull".

He randomly chose an IP to try, and found that it was a foreign IP, and it was not in the "White List Prohibiting Attacks" of the Honker League.

Du Guangfeng opens the "Challenge Edition Area", where people will post some difficult challenges, and the targets are often foreign company websites, including foreign network security company websites-as a group of hacker enthusiasts who pursue technical stimulation but keep the bottom line, Honker Alliance Posting challenges targeting domestic websites is generally prohibited.

He intends to streamline and shrink the third-generation "Xiaoguang" on a large scale, retaining only its functions and intelligence suitable for the operating system, as well as a certain learning mechanism, and form the third-generation "Xiaoqing" to replace the current one. A generation of "Xiaoqing".

When Qin Ke was building the Lime Technology data center, he also had the idea of ​​building a supercomputer center directly, but after inquiring about the cost, it basically cost more than 20 billion, far exceeding the capacity of Lime Technology, so he changed it to Build a data center consisting of more than 200 high-performance server clusters plus professional SSD storage.

Someone said disdainfully: "Send a big gift package? Talk as if you can find us."

Now the Lime operating system V3.5 version developed by Longteng Zaitian Company for the second time, whether it is the server version, the desktop version, or the mobile version, the core is the artificial intelligence "Xiaoqing".

Fortunately, Qin Ke also had the help of Shimmer. He handed over the several plans he had thought through to Shimmer for security attack and defense simulations. Finally, he chose a plan that even Shimmer could no longer find loopholes, and refined it into More than a dozen code tasks were sent to Yan Weizhou to arrange for more than 300 experts to implement them together and complete the details of the code rules.

"Have you found out their final location?"

Master, obviously the person who built the firewall is an extremely powerful master!
Du Guangfeng changed more than a dozen IPs for testing, and found that it was actually a defense line composed of multiple complex firewalls and anti-intrusion software!

The Honker Alliance is a large-scale hacker technology exchange website. The vast majority of website members are fanatical technology enthusiasts like Du Guangfeng. They generally do not pursue economic benefits as their goal, but challenge powerful opponents and improve technology. Happy, walking on the edge of gray.

At least from this moment on, they must be restrained so that they will not have the opportunity to launch a large-scale offensive against the Lime operating system.

Will this be the headquarters of the "Black Skull"?Or is it just temporarily serving as the headquarters for this attack on the Lime operating system?

And this work can only be done by Qin Ke. The other experts and professors don't know "Xiaoqing" and "Shimmer", so they have no way to do it.

This morning, Du Guangfeng ate instant noodles and logged into the website of the Honker Alliance as usual.

It’s just that the structure and performance of the mobile version are different from those of PCs and servers. Longteng Zaitian agreed with Qin Ke’s original “minimalist concept” and did not upgrade the security audit mechanism. It still retains the original V1.0. On the contrary, the version operating system is currently the safest and the least worrying about being attacked.

"At least 1000 units. Judging from the density of attacks, it is not even ruled out that there are more than [-] units." Dornier didn't know that it was Xiaoguang, who had more than [-] server resources, who was tracking and attacking him, so he could only proceed from the scale of the attack. estimate.

In this way, he assigned most of the work, leaving only the core and most important optimization work related to "Xiaoqing" to be completed by him.

Not just Du Guangfeng, this post has aroused the interest of most experts in the Honker Alliance, and more and more hacker experts have begun to join in this "tackling" operation.

Qin Ke decisively ordered: "Shimmer, implement Plan B, and induce technical hackers from all over the world to attack these IP addresses. You mix in it, and once you find a loophole in the defense line, you sneak in, throw our 'dirty bomb', and let the 'black Skull, try what it means to lose your wife and lose your army!"

"This guy sounds a bit loud, why don't we do it first, as long as we break through [-] to [-] of their websites, I'm not afraid that they won't bow their heads."

Even the artificial intelligence Shimmer, backed by more than 1000 high-performance server resources, said it could not break through, which also proved from the side that the defense here is solid and tight, and it is very likely that it is the temporary headquarters of the "Black Skull".

Du Guangfeng finally believed that this was most likely the IP of "Black Skull". Although he didn't know why the poster of this post could find out these IPs, since he had the opportunity to challenge the "scum" of the hacker world, he would naturally not miss it.

……

"Huh? This is...challenging the 'Black Skull'? Is it true?" Du Guangfeng soon discovered a post with the tag "Hot" on it, and the title was "Do you have the guts to challenge the 'Black Skull'?" "The so-called indestructible network defense line? ".

However, Qin Ke did not intend to transplant the entire third-generation "Shimmer" to the Lime OS. After all, the LV3 "Shimmer" is already a big resource eater, and dozens of high-performance servers may not be able to run. Not to mention a single server, computer and mobile phone.

"Yes." Shimmer replied, while giving a location: "This location has an extremely powerful firewall and security line, and I cannot break through it with my strength, but what is certain is that the current attack on the Lime operating system Exploring penetration and intrusion attacks, 70% of data traffic comes from this."

"Shimmer, what's the current situation of the enemy?"

If Du Guangfeng logged on to a few more hacker websites, he would find that the major hacker technology exchange websites in the world were all under the dark control of Shimmer, and similar posts appeared.

The workload of this job is very heavy, and Qin Ke estimates that it will take about fifteen hours at the earliest.

As he spoke, he glanced at Omer: "Of course, I also thank you for your assistance, otherwise I would not have retreated so easily."

Omer Barnetta next to him came over and patted him on the shoulder, and said unexpectedly: "Captain, why did you ask me for help just now? Did you carelessly underestimate the enemy?"

Of course, Du Guangfeng has heard of the world-renowned hacker organization "Black Skull", but he has always sneered at such an organization for the purpose of earning commissions, and feels that it is not worthy of being called "hackers who pursue freedom and the pinnacle of technology", and can only be called hackers The "scum" of the world.

Du Guangfeng opened the post and found that the content inside was very simple, a website link, which would dynamically update the IP addresses, and these IP addresses were the so-called "black skull" IPs.

In order to adapt to the development of the new era, and to make the Lime operating system more intelligent, easy to use, and safer, it is imperative to upgrade "Xiaoqing" across generations.

Shimmer quickly replied: "Report Master Qin Ke, the enemy has changed the real IP six times, the jumping machine has also changed a batch, and even the MAC address has been disguised many times, but the special mark we left is still there, he Can't escape."

But he also has to admit that the "Black Skull" is indeed a very powerful opponent. Many countries have been embarrassed by it. If they were not too mysterious and their identities were well hidden, they would have been caught out long ago. Or put in jail.

Unexpectedly, "Black Skull" can use supercomputers, whether it is self-built or rented, it is surprising enough. No wonder it can be called the most powerful hacker organization in the world.

Qin Ke nodded in satisfaction.

The choice here is probably also to complete the decryption of encrypted files with the help of supercomputing, and to assist in the decryption of the key for a large-scale network attack.

Now that he has retreated to the defense line of the headquarters, he is basically safe. Dornier relaxes. Seeing the curious gazes of more than a dozen partners around him, Dornier snorted: "The other party has prepared in advance. I was careless for a while, and the other party should have controlled more than [-] 'broilers', and turned to attack me, trying to take the opportunity to counter-hack my computer. Jurong."

Dornier's technology is not the highest among the more than a hundred partners in front of him, but it is also at the top three level, otherwise he would not be appointed by the leader of the organization as the "captain" of this commission mission.

Du Guangfeng couldn't help being funny, grandstanding, right? Will a top hacker organization like "Black Skull" be easily obtained IP?Fool people!
But the strange thing is that the moderator of Honker Alliance set this post as "verified"!
And there are dozens of replies below, all of which are saying that the defense of these IPs is extremely strong, and the level is indeed frighteningly high, and there are many master hackers that Du Guangfeng knows.

Although supercomputing is no longer a top-notch high-tech, those capable of owning supercomputing are basically relatively top research institutes or universities. After all, the cost of billions of dollars is not affordable for ordinary institutions.

He directly talks to "Shimmer" through the safe link channel.

After Qin Kelue's analysis, he felt that the latter was most likely the case.

Interestingly, Du Guangfeng became more interested, and he didn't have any worries about foreign IPs. He tried to analyze it with conventional intrusion analysis software, and found that this IP was a firewall, and the operating system it was equipped with was the most primitive and streamlined version of pure command-line version Linux. , which is often only a seasoned hacker will install such a streamlined, self-modifying pure command-line version on the firewall.

"According to the tracking of the data packets sent by the target, he had exchanged data with hundreds of suspected accomplices, and most of them were in the same country, city, and location as him. Based on online information searches, it was determined that It's a supercomputer center."

Qin Ke took a closer look and found that it was a supercomputing research institute in the West. Shimmer also opened the searched webpage information, showing that there is a supercomputer named "Camilla", which ranks in the list of the world's top 500 supercomputers No.19 is a very powerful supercomputer.

It's just that the security audit mechanism of Lime OS V3.5 was completed by a team. Now Qin Ke wants to optimize and upgrade it in just a day or two by himself, fix all the loopholes, and make it more secure. How easy is it to reach a new level?

There were mocking laughter all around.

Another partner was surprised: "Xia Guo still has such a master hacker? Can he control [-] 'broilers' at a time? Can he still force you to quit?"

The core artificial intelligence "Xiaoqing" in the server version, desktop version, and mobile version was originally a weakened and simplified version of the first generation "Shimmer". "In the past three or four years, only certain upgrades and optimizations have been carried out, which can barely match the first generation of "twilight", and the gap with the current third generation "twilight" is very far.

Not long ago, Dornier experienced a successful intrusion that he was extremely proud of, but was tricked by a mysterious "Q", and he was directly kicked out of the remote connection, and was traced to his real IP. If it wasn't for his experience Rich, the contact partner Oumai cooperated with the "Golden Cicada Escape Shell" six times in a row, and was almost invaded by the anti-invasion.

He shrugged: "The man also threatened to send us a big gift bag soon, to see if we can survive for four hours."

"That's right, Captain, let's go play first."

Dornier frowned and said: "Now the partners in other places are not ready yet, and the mission initiators prefer to reach an 'agreement' rather than let us blindly sabotage. Wait a little longer, let's do it in 24 hours." You guys are playing...Huh?"

He suddenly found that the defense software he wrote in the computer sent a reminder that someone was trying to invade the defense system here!

 Ask for monthly ticket recommendation tickets and full booking at the end of the month!

  
 
(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like