SC081 APCS Conspiracy!
When Nanlin Guiyi develops software, she really hopes to obtain economic benefits through software. At the same time, Nanlin Guiyi will not give up using software and gain some gray benefits.
For example, a complete asynchronous parallel computing system is embedded in the software!
Once the user installs the software, an asynchronous parallel computing system will be automatically installed, and the computing power of the user's computer will be collected by the asynchronous parallel computing system.
Although the asynchronous disordered computing power collected by asynchronous parallel computing systems does not have a great effect in terms of utilization, it is not good to control more computing power?
As for hiding the asynchronous parallel computing system in the software, will it be discovered?
Excuse me!
According to Nanlin Guiyi's design, the asynchronous parallel computing system is completely integrated into the source code of the software and is impossible to be discovered. In addition, even if the asynchronous parallel computing system collects the computing power of the user's computer, it will not be discovered.
First of all, the asynchronous parallel computing system written by Nanlin Guiyi has very high logical judgment ability under Butler's control. If the user needs high performance of the computer, Butler will not collect the user's computing power.
What if users don’t need high performance of computers?
In today's era, the performance of computers has become very powerful. Taking the desktop platform central processing unit 52500 released this year as an example, as a four-core and four-thread model, the main frequency frequency is as high as 3337. For ordinary people, it is difficult to make it work more than 20 in daily use.
Unless it is in the testing stage, the user will have a working efficiency of more than 20 in the extreme performance of the test, or in some extreme environments.
Daily online chat, online games, etc., the usage rate will not exceed 20, or even 10!
In this case, if you are more conservative and the asynchronous parallel computing system hidden inside the software can completely capture part of the computing power and leave quietly.
For example, the asynchronous parallel computing system extracts the computing power of the user 60, and reserves 20 for the user, and uses less than 20 for the user. Then, this behavior of extracting computing power will not be discovered by the user at all.
For computer technology experts and even users of Internet technology-related companies, even if they cannot discover the asynchronous parallel computing system and extract part of the computing power, they can detect the abnormal data flow caused by the asynchronous parallel computing system when extracting the computing power.
Simply put, although asynchronous parallel computing system is very powerful, it always requires Butler to be connected to work properly, right?
Since there is a network connection and since there is data communication, data flow will definitely occur and can be detected. For computer experts, it is not a problem to detect the existence of data flow.
Some software even provide tools to monitor data flows so that ordinary users can see whether their network is normal. For example, a large Internet company in Xiaguo provides a butler software, which has a network traffic monitoring function, which allows users to clearly see the speed of data traffic that the computer is downloading and uploading.
If the user does nothing but the network is constantly uploading information, it means that the network is abnormal!
For such a situation, it is very difficult to conceal it. It is not that it is difficult to block software used by ordinary users to detect network traffic, but computer experts and Internet technology enterprise users will discover network abnormalities as soon as possible.
However, in the face of such a situation, Nanlin Guiyi was already prepared!
Nanlin Guiyi is not God and cannot solve the data flow abnormalities caused by network connections, but Nanlin Guiyi can legalize it.
That's right!
Nanlin Guiyi can indeed legalize it!
The software is a voice interaction software. In the software's terms of service, it is clearly stated that the software needs to be connected to the server of the Xisheng Company, and it needs to upload and download data.
If the terms of service are not accepted, the software can be used. Once the software is used, the terms must be accepted automatically. However, the vivid company promises that it will keep the user's data confidential and will not store the data.
But only Nanlin Guiyi knows whether the data will be stored!
In the software terms of service, Nanlin Guiyi clearly states that the software needs to upload and download data, asynchronous parallel computing system data channels, and complete software channels.
Even if a computer expert detects the data flow of an asynchronous parallel computing system, it is just a data flow of the software.
Nanlin Guiyi has further security settings, and the data flow of the asynchronous parallel computing system and the data flow of the software are all used for encrypted data flow.
It is almost impossible to crack the encrypted data stream. It is impossible to crack unless you get the password book of Nanlin Guiyi and convert the password into a clear code.
If you don't have a password password and want to crack the encrypted data stream, at least Nanlin Guiyi doesn't think anyone can do it easily. Unless you use a supercomputer, you can crack it in a very long time in units of year.
Otherwise, it is impossible!
It is precisely because of the hidden asynchronous parallel computing system in the software that Nanlin Guiyi has accelerated the construction of class structures. He now needs more computing power to crack supercomputers.
Although the computing power of supercomputer Jing is currently unparalleled in the world, Nanlin Guiyi masters more computing power, which is more conducive to finding the weaknesses of supercomputer Jing's firewall.
Nan Lin Guiyi is very clear that the supercomputer Jing is powerful and has the full 8162ps unified and orderly computing power, and it is completely capable of defeating anyone who is dissatisfied.
However, Nanlin Guiyi must invade the supercomputer Jing!
Because, by chance, Nan Lin Guiyi discovered a clue, and the target was directly aimed at the supercomputer Jing. If Nan Lin Guiyi wanted to know more information, he could only resolve the doubts in his heart by breaking the supercomputer Jing’s defense.
So even though the computing power of the supercomputer Jing reached 8162ps, Nanlin Guiyi still did not give up. He was planning to use the software to collect more computing resources, and at the right time, launch a wave of attacks on the supercomputer Jing to attract the security guards of the supercomputer Jing. He himself found a way to break through the defense of the supercomputer Jing.
However, just software collecting resources is not enough!
Nanlin Guiyi has a more evil plan
New book uploads, recommendation tickets are required, member clicks, collections, etc. Thanks for all support!
Follow the public: s5120 to learn more behind-the-scenes footage of the works and authors, as well as periodic popularization of computer knowledge.
Chapter completed!