The Goddess Shines on America

Chapter 386: , Entry test, how do you hack here

One second to remember 【】, to provide you with wonderful novel reading.

"Very well, then sign this document." Seeing that little Ida nodded, as if by magic, Alice instantly took out a set of documents from behind!

So, just listening to Billy Horne behind him whispered to Bob: "Boss, this is already ready."

The staff's interaction was not noticed by Ada, she just took the file and read it very seriously. Of course, this is a very formal non-disclosure agreement, which is exactly the same as any company's agreement that employees need to sign, except that the specific confidential content will be stipulated, which is nothing unusual in itself.

Therefore, after satisfying her initial curiosity, Ada quickly signed her name on this document.

"Ada... Wang?" Looking at the girl's last signed name, Alice's smile became more and more interesting: "It seems that we are really fate, okay, yes, Ada, wait for me. Test it on you personally? If I have a qualified IQ, maybe I will hire you as my personal secretary."

"If you want to violate the child labor law," Ada's voice was immature, but she was unambiguous: "Then Miss Alice, now you can tell me what interesting experiments are being conducted in your laboratory. Right?"

"Yes, but don't forget, you have already signed a contract with me." From the beginning, Alice, who bit the word "contract", looked like an old witch who abducted children. Under the silent laughs of several other colleagues, I took Ada's hand and walked out of here: "So, if you dare to tell the secret here, MI6 will take you to the FBI for it..."

Children who have not graduated from elementary school are stupefied after all, holding Ada's hand, Alice triumphantly walks towards the elevator.

Then, go straight to the second underground floor.

"There is still underground," Ida said in a low voice while standing in the elevator, watching the indicator light rapidly decrease the number, "I didn't pay attention last night."

Alice smiled silently, her eyes swept all the way from the fifth of the floor button to B2.

With a ding sound, the door opened.

"As a local, you also know this when you want to come. When did the laboratory start." It was still a familiar road and a familiar way to open the door. Alice did not listen to her as she did what she should do: "But what is more important to understand is that the laboratory is different from the school after all. It does not have to start work after everything is ready. Therefore, regardless of whether the overall building was finally completed in April, it is only now in May, but the research itself is It started long ago."

Listening to a completely understandable explanation, when the metal door was opened after fingerprint verification, Ada's eyes widened immediately.

Brand-new supercomputer arrays are located here, and the size of each cabinet is no less than the largest refrigerator, and the number is more than dozens. This is the computer room. Ada realized it immediately, and what made her feel more excited was that this huge set of machinery was obviously working, the buzzing fan sound filled this space, and the sultry heat was the absolute main theme. Even if there must be a ventilation system here.

"Supercomputer..." She marveled at one of the chassis and said: "Miss Alice, you really make sense. Just this big guy, surely it can't be revealed to outsiders casually, right?"

"Well... it depends on what angle you consider. From the perspective of the external publicity research institute's strength and the recruitment of more research institutes and funding consortia, we still need to disclose its existence."

Alice is explaining, but Ada, who has just signed the confidentiality agreement, has an absolutely different mindset from ordinary people: "Then what if a competitor sneaks in here and steals data from the computer?"

The little girl brought more and more surprises, and Alice really felt that she did not know her in vain: "Oh, that's a good idea. How about I take one of your questions now?"

Ida looked left and right, the huge computer room was full of chassis, but no one else was there: "Well, come on!"

"Okay, please listen to the question." Alice walked holding the girl's hand: "If this research institute undertakes some high-end computing tasks of IBM, or Cisco, or Microsoft, or NASA or Lockheed, then their Competitors learned of this news and wanted to come to my research institute to make trouble. It is known that their methods of making trouble are to terminate the operation and steal the operation data. Ask, how do we defend it?"

This test question was customized for the two of Ada. Although they knew each other for more than a day, Alice really wanted to train this amazing girl of the same race. After all, it wasn't a ten-year-old kid who could steal a stolen car in the middle of the night and drive a few kilometers all the way to infiltrate. Now that she came across such a strange flower, of course she would not let it go easily.

"Well, this..." So, standing in the computer room on the second basement floor, Ada started thinking very seriously. This short-haired girl hugged her arms and lowered her head. While thinking, her mouth kept moaning. When she saw it suddenly, she was really pretty.

Then, she quickly gave the answer.

"The most violent way to terminate the operation of the computer is to directly shoot the case with a machine gun, or use RPG to bombard the basement indiscriminately."

Alice: "..."

"Of course, this is the least intrusive method. So the second violent method is to cut off the power directly. And cutting off the power is divided into two methods, one is to sneak into the second underground floor and directly perform a forced shutdown of the computer; the other It is to find out the power supply system of the institute and realize remote power-off by opening the switch."

Alice: "If it were you, what would you do?"

Ada recalled the process of walking into the computer room and nodded vigorously: "I first need to know the structure diagram of the research institute, otherwise I must not even be able to do the computer. Then, now that I know the structure diagram, knowing the power supply system is also It's very simple. Rather than going through the anti-theft door and facing the host computer in person, the remote power-off of the switch is obviously more feasible. So the second question, what if you want to steal computing data? "

Ida thought about it again and paused for half a minute. Then she said: "I will consider network intrusion first. If this computer is connected to an external network, whether it is the research institute’s internal LAN or the wider outside world, I will directly select the target. Computer, carry out network intrusion on this supercomputer to obtain data..."

Alice couldn't help but interject: "Did the ‘Exchange Gate’ incident give you the inspiration?"

"Yes," Ada nodded seriously: "Miss Alice, don't look at my age, this incident didn't happen in my previous life."

Alice chuckled: "Indeed, indeed, you were eight years old at the time and you could remember this with your heart. What if there is no internet connection?"

This is the most difficult problem. The absence of an Internet connection means that the intruder may really need to use various means to personally come to this computer room on the second floor of the basement to carry out the closest physical intrusion.

"There is no internet..." So, Ada was not embarrassed immediately, frowned and thought about it. Alice was watching, of course not interjecting at random, just waiting to see Ada can say something more.

"Impossible!" However, after a while, Ada directly rejected the situation.

"It is impossible not to connect to the Internet, at least this one is absolutely impossible. If it is not connected to the Internet, your employees must always stay in the computer room and stay in front of the main console when using it. But this is obviously a kind of The unrealistic situation, at least in this research institute, requires the entry of a dozen digits of passwords and fingerprint verification anti-theft doors. It is clearly stated that people are not allowed to enter and exit casually!"

Ada spoke to Aida with air, and at the end, she lifted her head to look at Alice: "This is my answer!"

A good answer, a good analysis, Alice is really surprised. She simply asked a technical question, but Ada used behavioral psychology to answer it. It's not just thinking about how to "invade", but on-site inspections and specific analysis of specific issues. It is not unusual for older people, but this girl is only ten years old after all.

"Very good." But watching Edming look like she wanted to be praised, Alice simply gave a symmetrical compliment.

"So as you can see, Ada, this ETA10-G/8 is the world's first supercomputer with a computing speed of tens of billions per second. In order to buy the first test machine back to my own research institute, I But with extremely high costs, the advance payment is tens of millions. Then guess what is it doing now?"

A supercomputer in operation, Ida had seen the lights flashing everywhere. God knows when this calculation started, and God knows what it is calculating~www.readwn.com~ So Ida immediately guessed that there is definitely a next step for Alice's problem.

"You named the research institute only as a'computer research center'." She said: "But the development of computers only depends on the improvement of hardware functions, and the focus is on basic technology. In terms of software, you can already develop that... …That Microsoft operating system, there is definitely no need to set up a special research center for this, so it is definitely not the software aspect."

Regarding the information she currently has, Ada analyzes it carefully and step-by-step. In this whole process, what Alice does is to watch. It is impossible for the little girl to think so far in the development of ternary computers, so what answer can she come up with?

If this girl can really get the answer she wants, then maybe she can really reuse this potential...

"After all, the name of the Computer Research Center is very vague." I only heard Ada say: "So, this institution is actually just a blindfold. What are you really doing secret experiments that you can't let the outside world know!? "

With her back to the busy array of supercomputer cases, Alice smiled with satisfaction. (To be continued.) Mobile phone users, please browse and read for a better reading experience.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like