Font
Large
Medium
Small
Night
Prev Index    Favorite NextPage

Chapter 632 Shimmer, execute Plan B!(1/2)

In Japan, in the hotel, in the room, Ning Qingyun was still writing and calculating with dark circles under her eyes. This girl had a tenacity. As long as she promised to do something, she would work hard to complete it even if she didn't eat or sleep.

Qin Ke persuaded her several times, but Ning Qingyun shook her head vigorously and insisted that time was limited and she would not rest until she completed the entire new encryption algorithm.

Qin Ke himself had stayed up all night without closing his eyes. Seeing that Ning Qingyun's condition was getting worse and worse, Qin Ke took her to practice the Eastern Secret Code together.

This is also a required course in the morning and evening for two days.

They have been practicing Eastern Secrets together for many years. The two of them can complete the entire practice process flawlessly almost with their eyes closed, and the feeling of spiritual connection is even more obvious.

Ning Qingyun's talent in science has been quietly rising. In addition to the talent potential she inherited from her academician parents being stimulated to the limit, it is also related to the fact that she has been practicing the Eastern Secret Code for many years and has a spiritual connection with Qin Ke.

After practicing the Eastern Secret Code twice, both of them felt refreshed and the fatigue from the whole night was almost gone.

After breakfast, the two encouraged each other and continued to devote themselves to their research.

Now the optimization algorithm is handed over to Ning Qingyun, while Qin Ke focuses on the security upgrade of Qing Ning operating system.

It's just that the security audit mechanism of Lime Operating System V3.5 was completed by a team. Now Qin Ke wants to optimize and upgrade it by himself in just one or two days, fix all the loopholes, and make it more secure.

Reaching a new level is easier said than done?

Fortunately, Qin Ke also had the help of Wei Guang. He handed over several of his carefully thought-out plans to Wei Guang for security attack and defense simulations, and finally selected a plan that even Wei Guang could no longer find loopholes in, and refined it as follows

More than a dozen coding tasks were sent to Yan Weizhou to arrange for more than 300 experts to jointly implement them and complete the details of the coding rules.

In this way, he has assigned most of the work, leaving only the core and most important optimization work related to "Xiao Qing" to be completed by him.

Now the V3.5 version of Qing Ning operating system developed by Longteng Zaitian Company, whether it is the server version, desktop version or mobile version, the core is artificial intelligence "Xiao Qing".

However, because the architecture and performance of the mobile version are different from those of PCs and servers, Longteng Zaitian agreed with Qin Ke’s original “minimalist concept” and did not upgrade the security audit mechanism. It still retains the status of the original V1.0 version, making the mobile version

The latest version of the operating system is actually the most secure at present, and you don’t have to worry about being attacked the least.

The core artificial intelligence "Xiao Qing" in the server version, desktop version, and mobile version was originally a weakened and streamlined version of the first generation "Shimmer". Longteng Zaitian Company's talent reserve in artificial intelligence development was insufficient, making "Xiao Qing"

"In the past three or four years, only certain upgrades and optimizations have been carried out, and it is barely comparable to the first generation of "Shimmer", and is far from the current third generation of "Shimmer".

In order to adapt to the development of the new era, and to make the Qing Ning operating system more intelligent, easier to use, and more secure, it is imperative to upgrade "Xiao Qing" across generations.

This work can only be completed by Qin Ke. The other experts and professors do not understand "Xiao Qing" and "Shimmer" and have no way of starting.

However, Qin Ke has no intention of transplanting the entire third-generation "Shimmer" to the Lime operating system. After all, LV3's "Shimmer" is already a resource hog, and dozens of high-performance servers may not be able to run it.

Not to mention a single server, computer and mobile phone.

He plans to massively streamline and reduce the third-generation "Shimmer", retaining only its functions and intelligence suitable for the operating system, as well as a certain learning mechanism, to form the third-generation "Xiaoqing" to replace the current third-generation "Xiaoqing".

A generation of "young people".

The workload of this work is very large, and Qin Ke estimates that it will take about fifteen hours at the earliest.

Before dedicating himself to this work, Qin Ke still has another job to do, which is to send a big gift package to the "Black Skull".

He communicated directly with "Shimmer" through the secure link channel.

"Shimmer, what's the current situation of the enemy?"

Wei Guang quickly replied: "Report to Master Qin Ke, the enemy has changed the real IP six times, the springboard machine has also changed a batch, and even the MAC address has been disguised many times, but the special mark we left is still there, he

Can't escape."

Qin Ke nodded with satisfaction.

After "Black Skull" was intimidated by Qin Ke and discovered the real IP, in order to avoid being attacked, he would naturally constantly change IP and MAC addresses. This is the basic vigilance and quality of a hacker, and it is also the most effective way to evade network tracking.

It's a pity that he stepped into Qin Ke's trap from the beginning. The anti-intrusion software deployed was "specially marked", just like inserting a biometric tracking chip into the human body. No matter how he washed his face, changed clothes, changed his hairstyle or even put on a mask,

If you block it, you can't escape tracking.

"Has their final location been discovered?"

"According to the tracking of data packets sent by the target, he has exchanged data with hundreds of suspected accomplices, most of whom are in the same country, the same city, and the same location as him. Based on online information searches, it was determined

This is a supercomputer center."

Supercomputing center? Qin Ke was a little surprised.

Although supercomputers are no longer considered to be cutting-edge high-tech, those who have the ability to own supercomputers are basically relatively top research institutes or universities. After all, the cost of several billions is not something that ordinary institutions can afford.

When Qin Ke was building Qing Ning Technology's data center, he also had the idea of ​​building a supercomputer center directly. However, after asking about the cost, it was basically more than 2 billion, which was far beyond Qing Ning Technology's affordability, so he changed it to

Build a data center consisting of more than 1,200 high-performance server clusters and professional SSD storage.

Unexpectedly, the "Black Skull" can actually use supercomputers, whether it is self-built or rented, it is surprising enough. No wonder it can be called the most powerful hacker organization in the world.

This chapter is not finished yet, please click on the next page to continue reading the exciting content! "Yes." Shimmer replied and gave a position: "This location has extremely powerful firewalls and security lines, which I cannot do with my strength."

It will be broken, but what is certain is that 70% of the current penetration and intrusion attacks against the Lime operating system come from this."

Qin Ke took a closer look and found that it was a supercomputer research institute in the West. Shimmer also opened the searched web information, which showed that there was a supercomputer named "Camilla", which was ranked among the top 500 supercomputers in the world.

Nineteenth, it is a very powerful supercomputer.

Will this be the headquarters of the "Black Skull"? Or is it just a temporary headquarters for launching the attack on Lime Operating System?

Qin Ke made a brief analysis and felt that it was probably the latter.

According to the information provided by Uncle Yang, there are more than a thousand members of the "Black Skull", distributed in various countries around the world, and rarely gather together. This time it is probably because they have taken on a comprehensive attack on the Lime operating system. The scale is too large.

It was so big and the impact was so great that the temporary elites from several nearby countries were gathered together to work together.

I am afraid that I chose this place to complete the cracking of encrypted files with the help of supercomputing, and to assist in the key cracking of a large-scale network attack.

Even the artificial intelligence Shimmer, which is backed by more than a thousand high-performance server resources, said it could not break through. This also proves from the side that the defense here is strong and tight, and it is most likely the temporary headquarters of the "Black Skull".

Qin Ke didn't care what the relationship between this supercomputing research institute and the "Black Skull" was. Since it was the enemy's temporary headquarters, it could be the best target to send a big gift package.

At least from this moment on, we must contain them and prevent them from launching a large-scale offensive against Lime Operating System.

Qin Ke decisively ordered: "Shiguang, execute plan B and induce technical hackers around the world to attack these IP addresses. You are among them. Once you find a loophole in the defense line, you will sneak in and throw our 'dirty bomb' to let the 'black

Skull, try what it means to lose your wife and lose your troops!"

"Shimmer's" voice was actually humane and full of excitement: "Copy that!"



This morning, Du Guangfeng had eaten instant noodles and logged into the Hongke Alliance website as usual.

In the eyes of outsiders, Du Guangfeng is a sallow-faced and thin otaku who rarely leaves home. In fact, he is a typical technical otaku, especially with a fanatical pursuit of hacker technology.

The Honker Alliance is a large-scale hacker technology exchange website. The vast majority of website members are enthusiastic technology enthusiasts like Du Guangfeng. They generally do not pursue financial interests as their goal, but challenge powerful opponents and improve their technology.

Joy, wandering on the edge of gray.

Du Guangfeng opened the "Challenge Edition Area", where some people will post some difficult challenges, and the targets are often foreign company websites, including foreign network security company websites - as a group of hacker enthusiasts who pursue technical stimulation but retain their bottom line, the Honker Alliance

Challenge posts targeting domestic websites are generally prohibited.

"Huh? This is...challenging the 'Black Skull'? Real or fake?" Du Guangfeng soon discovered a post with the label "Hot", and the title was "Do you have the guts to challenge the 'Black Skull'?"

"That so-called impregnable network defense line?"

Of course Du Guangfeng had heard of the world-famous hacker organization "Black Skull", but he had always scorned such an organization for the purpose of earning commissions. He felt that he was not worthy of being called a "hacker who pursues freedom and the pinnacle of technology" and could only be called a hacker.

The "scum" of the world.

But he also had to admit that the "Black Skull" was indeed a very powerful opponent. Many countries had been embarrassed by it. If they were not too mysterious and their identities were not well hidden, they would have been caught and recruited long ago.

Or put in jail.

Du Guangfeng opened the post and found that the content inside was very simple. It was a website link with dynamically updated IP addresses, and these IP addresses were the so-called "Black Skull" IPs.

Du Guangfeng couldn't help but laugh. Are you trying to impress people? How can a top hacker organization like "Black Skull" easily obtain IP? Are you fooling people?

But the strange thing is that the moderator of Hongke Alliance set this post as "verified"!

And there are dozens of replies below, all indicating that the defense of these IPs is extremely strong and indeed of a frighteningly high level. Among them are some master hackers whom Du Guangfeng knows.

This made Du Guangfeng a little more interested.

He randomly selected an IP and tried it, and found that it was a foreign IP and was not in the "no attack white list" of the Honker Alliance.

Interestingly, Du Guangfeng became more interested. He had no worries about foreign IPs. He tried to use conventional intrusion analysis software to analyze and found that the IP was a firewall, and the operating system it was equipped with was the original and streamlined pure command line version of Linux.

, often only experienced hackers will install such a streamlined, purely command-line version that can be modified on the firewall.

Moreover, all commonly used ports are closed, leaving only individual ports that are extremely difficult to attack.

Expert, obviously the person who built the firewall is an extremely powerful expert!

Du Guangfeng changed more than a dozen IPs in succession for testing, and found that it was actually a defense front composed of multiple complex firewalls and anti-intrusion software!

Du Guangfeng finally believed that this was most likely the IP of the "Black Skull". Although he didn't know why the poster of this post was able to find these IPs, since he had the opportunity to challenge the "scum" of the hacker world, he naturally would not miss it.

So Du Guangfeng quickly typed on the keyboard and began to attack one of the IPs.

Not only Du Guangfeng, this post aroused the interest of most experts in the Honker Alliance, and more and more hacker experts began to join this "attack" operation.

This chapter is not finished yet, please click on the next page to continue reading the exciting content! If Du Guangfeng logs into a few more hacker websites, he will find that the world's major hacker technology exchange websites have appeared under the secret control of Shiguang

Similar posts.

For a time, "Challenging the Black Skull" became the most interesting topic and goal for many hackers who pursue technological breakthroughs and challenge powerful enemies.
To be continued...
Prev Index    Favorite NextPage