The Strongest Hacker

Chapter 482 The Waist Should Be Strong (Part 2)

"Do you want to transfer all the data?" Looking at the yes and no on the computer screen, Zhang Yang is still a little tangled. The supercomputer of the Star Group has been adjusted, but the entire supercomputer is now just a system that IBM originally had, and there is no The latest operating system. Zhang Yang has already greeted the guys in the technical department, and he has already prepared the latest operating system.

Therefore, even though the supercomputer was adjusted as early as yesterday, it did not transfer the server data of the official website immediately, but waited for Zhang Yang to complete the system thoroughly. To be honest, Zhang Yang is still a little tangled. If it is not transferred, the infected data will still be kept in several backup satellite servers in the United States, which is undoubtedly very safe.

But this is not absolute, Chapter 482 The waist must be strong (middle) In case the person in charge of the safety of these satellites at the NASA side makes a surprise inspection one day, although it may not be exposed , but the risk of exposure is undoubtedly great. What's more, if it is really leaked all of a sudden, it will be too late to transfer the data of the infected bug!

The U.S. government has other ways to directly shut down the data transmission of the satellite. If the infected bug is really lost, Zhang Yang will not even have time to cry. But if the infected bugs are transferred to the supercomputer of the Star Group, there is undoubtedly another risk. The pros and cons of a system can be analyzed by using the current analysis software.

More importantly, because Zhang Yang has never seen the Adam system, he doesn't know how similar the mutated Infector system is to the Adam system. If there is a shadow, I am afraid they will have a target to deal with.

The reason why Anubis didn't show any strong power now is because they couldn't find the person gscsd. If they found the shadow of the Adam system in the server system of the Star Group, then their goal was Chapter 482. If the waist is strong (middle), it will definitely be aimed at the Star Group. Even if gscsd is not in the Star Group, it must be connected with the Star Group. "

But there is no doubt that if the infection bug is transferred to the Star Group's server, the benefits will be great. First of all, the chance of the Star Group's official website being hacked will be infinitely close to zero, and anyone who has malicious intentions and tries to play the Star Group's idea will be infected. Under the monitoring of insects, there will be nothing to hide.

More importantly, Zhang Yang's use of infestation bugs is not as popular as before. Including Starry Sky Group's software writing, etc., can use infestation bugs to assist calculations, which will undoubtedly maximize the strength of Starry Sky Group's technology department. efficiency. After a long time, looking at the huge yes and no on the screen, Zhang Yang finally hit the enter key in his hand.

The Star Group has reached the point where it is today. Even if this day does not come today, it will come one day sooner or later. At that time, it will undoubtedly have to face such a topic. This step must be taken,

Stepping out early has the benefit of stepping out early.

Now that he has made a decision, Zhang Yang no longer hesitates. In the past few days, the entire Star Group's official website, servers, etc. should have issued maintenance system announcements to the outside world, indicating that Star Group will replace servers and add the latest supercomputers as the company's operating hosts.

Now the data of the infected bug is no longer the original 100+G, but has risen to more than 1,000G, but the size of the hard disk is not a big problem for Zhang Yang. The hard disk capacity of the entire supercomputer is Thousands of tons are enough for use.

As Zhang Yang hit Enter, the data in the entire server immediately began to be updated crazily, because the greetings had been made in advance, so it is not surprising that the little fat man and others who saw the server in the entire computer room started to run crazily at this moment. They knew that this was Zhang Yang. Do system.

However, Fatty and others are still quite curious. The performance of supercomputers is too powerful, and to use these performances perfectly, you undoubtedly need a system with logical thinking ability. If a system like our ordinary home computer is installed on a supercomputer On the computer, you don’t have to do anything every day. Just maintaining the operation of the entire system, inputting and processing various commands, etc. may require tens or hundreds of technicians to deal with it around the clock.

This is why there are so many companies around the world that are able to buy supercomputers, but few can use them. Originally, Little Fatty and the others thought that Zhang Yang would also buy IBM's system, or the supercomputer system of Microsoft and Apple, and the latter two had a cooperative relationship with Star Group.

But they didn't expect that Zhang Yang actually said that he had written a system himself. This kind of system is completely different from any linux system! Thinking about the fact that it needs to control hundreds of tons of countless hardware and fully utilize the performance of these hardware, this is not an easy task. If anyone can write a system at will, then Microsoft will not be the only one for so many years.

Although he has had the Infestation System for a long time, Zhang Yang actually does not have an intuitive understanding of the Infection System. Because there are dedicated gigabit optical fibers pulled in in the computer room, there are thousands of them. Although there is a lot of data, it doesn't take long, that is, it can be copied in about ten minutes.

The copying progress bar on the screen was coming to an end soon, and a new prompt box appeared directly on Zhang Yang's screen: "Are you sure to load all databases and systems?" Zhang Yang clicked confirmation without hesitation, and with Zhang Yang's button , The entire computer screen immediately began to swipe the screen, and there were various operation instructions and buttons to control the success of each hardware area.

This lasted for about half an hour, and all the data finally came to an end. "All the hardware has been tested, and the performance of the hardware satisfies one-third of the database and system functions. Whether to optimize and strengthen it." The crisp notification sound of the infection bug finally rang, this time it was directly prompted by voice, Zhang Yang nodded quickly Gave an affirmative answer.

Because the server is connected to the supercomputer, the data in the server also needs to be infected with the worm system to run, and Zhang Yang has to set these up in advance.

It wasn't until the infected bug started to optimize the performance of all the hardware and perform centralized processing that Zhang Yang curiously scanned the current server system with his own analysis software.

The scanning results quickly appeared on Zhang Yang's analysis software and scanner, but Zhang Yang was a little surprised to see the analysis results, because although the infected system was located in several satellite servers, it was not the main system of the satellite server. It's just using the performance of these satellite servers, so Zhang Yang has no way to confirm what the latent sensor system looks like.

Now after scanning, Zhang Yang was surprised by the result. It was quite unexpected. The current infected bug has completely replaced the main system of the entire supercomputer and the server. There is only one system in the entire supercomputer, but after scanning, Zhang Yang found that the scanning The result has a lot in common with the linux system, but there are also differences. In fact, the linux system does not have a fixed model, because its source code is public. In the hands of all software engineers around the world, everyone has a different linux system. The only thing that is the same is its kernel. That's all.

Of course, you don’t have to worry about this, and you don’t have to worry about whether the software on the market is compatible with the system. The running software or program will automatically find a program that matches it. Strictly speaking, the virus itself is more like is a software.

After the scan, Zhang Yang thought for a while, and then entered the core program of the infected bug. After entering the 32-digit core password, Zhang Yang directly unlocked the first sequence of operating permissions.

"You need a name now, you need a code name, from now on you will be called Xing Kong!" The first thing Zhang Yang did was to change the name of the infected system. After all, it is now the main system of the Star Group's server, and it will not only be used by Zhang Yang in the future. It is necessary to give it a name, and it will be too easy to be exposed if it is called Infection.

"Are you sure to change the main system identification ID to Starry Sky?" "Confirm!"

"Do you want to re-record the voiceprint map as the first sequence of core authority passwords?" "Confirm!" Following Zhang Yang's modification, most of the core authority infected with bugs were quickly modified by Zhang Yang. Now Xingkong only controls the company's supercomputer. With the completion of the new Xingkong Industrial Park in the future, the lighting system, monitoring system, security system, and even the entire building's ventilation system, power system, etc. will all belong to Xingkong. under control.

When checking the entire system just now, Zhang Yang discovered that when the gang of Anubis designed Adam, they obviously designed it according to the intelligent systems in science fiction movies. All of these have interfaces and related database reading data in the Xingkong system. In the future, as long as the control systems of these things are connected to the system, Xingkong can immediately identify and control these things.

When setting up the logical thinking ability of the starry sky, Zhang Yang racked his brains. In the end, Zhang Yang still opened his logical thinking pool to everyone except the first sequence, and only one-fifth of it could be used. The so-called ** its logical thinking ability, that is to say, when other people give orders to Xingkong through voice, how to make others not feel the logical thinking ability of Xingkong system, how to make others feel that Xingkong system is just ordinary. Those rigid computer systems in the world don't make any difference. ! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like