At ten o'clock in the morning Eastern Time of Citigroup, some experimenters in white coats walked back and forth in Yuanshan Laboratory. In one of the lab's innermost rooms, five white workers gather around a table where the God of War has been disassembled and all the parts labeled and numbered.

Someone scraped some polymer paint off the coating on the part and took it for analysis. Some are using three-dimensional laser mapping for each component, taking measurements, and preparing to make three-dimensional drawings.

His main control circuit board was also placed separately on an electrostatic isolation pad. The experimenter carefully connected the power supply and connected the chip debugging interface on the circuit board to a server with a data cable.

After turning on a switch, the debugger on the server started to receive a lot of garbled data.

The experimenter changed a variety of decoding software one after another, and finally guessed the encryption method.

"Mr. Smith, you have to come and take a look." The experimenter called his superior.

Mr. Smith, a white man in his early fifties with a gray beard, looked more like a security guard than a technician.

A Mobius ring pattern on the decoding program is rolling back and forth. If you look carefully at the pattern, you can see that the composition of the pattern is some hexadecimal data, which changes every three minutes.

"Mr. Smith, this data seems to be encrypted. We put the decoded data into the server cluster for decryption calculation, and the time is completely insufficient. According to our current cluster computing capabilities, it takes a key to get the key and unlock the encryption. months. This data has long been useless."

"Make sure only the key can unlock the following data."

"Yes, Mr. Smith."

"Then I'll handle it." Smith walked out of the laboratory and returned to his office. He turned on his laptop and logged on to the laboratory's supercomputing application webpage. He skillfully created a work order, and because there were too many people using it, the supercomputer control center arranged for him after ten o'clock in the evening.

At 9:40 p.m., the required software has been installed. The following work is to wait for the first change of the Ares circuit board after 10:00 p.m. to transmit the acquired data to the supercomputer, and then start the computer. Super computing power.

It is hoped that the decryption calculation can be completed within a minute, so that there is still some time to enter the code of God of War.

Just give them ten seconds, and all the source code of God of War will be converted into standard language.

It's past ten o'clock, and the resource utilization rate of the supercomputer has dropped, and it is already waiting for the next command to enter.

Immediately after the data of the Mobius ring changed, the send button on the decoding software automatically turned gray, and a blue progress bar quickly moved to the far right.

A rapidly filled Mobius ring also appeared on the supercomputer monitoring platform, and then the fans in the supercomputer room began to increase their horsepower, and thousands of CPUs inside began to enter the computing state.

Ten seconds, twenty seconds, the Möbius ring was gradually untied, and it seemed that the decryption was successful when it turned into a straight ribbon, and the key would be displayed at the same time.

In 30 seconds, the supercomputer completed the calculation of a normal server cluster for a month, and a string of 512-bit keys was displayed on the screen.

All the experimenters present smiled. It was very easy. Citigroup's high-tech world number one is not bragging.

The key was transferred from the cluster to the decoding software, and the experimenter copied this string of keys into the software dialog box, and now began to decrypt the source program.

In the background of the supercomputer, a 2K program fragment was quietly separated from the running Mobius ring.

There was only a small spike in the resource monitoring window for a moment, and then it disappeared.

Program fragments were quietly attached to the kernel program, quickly infecting all subsystems of the supercomputing system. It is waiting for a time, and Zhou Lei has set a trigger mechanism for it to start at 3 o'clock in the middle of the night.

"Youarefoolish!" This was the result of the decryption, and the faces of the people present became ugly.

"Go check the code!" Smith yelled. It was annoying that a group of doctoral students couldn't figure out a program written by a kid.

The experimenters buried their heads in typing on the keyboard for ten minutes, checked all the cases that could be checked, and they found that the key only unlocked the outermost layer of encryption. Moreover, they found that there are at least two layers of encryption in the source code, and each layer of encryption is interdependent. The closer to the core, the shorter the time for cracking. The supercomputing can continuously calculate these three layers of encryption, which is completely impossible according to the current computing power of the supercomputing.

Even if it is the most powerful machine in the world, it still takes at least four minutes.

You can't spend tens of billions of dollars to build the world's number one supercomputer for a potentially useful program. This is an uneconomical behavior, and no capitalist will pay for it.

"Give me a report, I will need it after work tomorrow morning." Smith closed the door of the laboratory heavily and left. He still has to face the doubts of the big boss tomorrow. He hopes that the idiots under his command will write a better report and try to push the supercomputing performance as much as possible.

There are fewer and fewer people in the laboratory. After twelve o'clock, there are only a few operation and maintenance personnel on duty, and there are patrolling security guards.

At exactly three o'clock, the screen of the supercomputer monitoring platform lit up, and an epiphyllum composed of lines appeared on the screen.

On the large monitoring screen of the operation and maintenance, the sub-window monitoring the supercomputing in the corner also appeared short-lived.

"There are still calculation tasks at this time?"

"I looked at the schedule, um..., there should be none, and there will be no task arrangements until five o'clock."

"Hurry up and check the supercomputer, is there anyone who sneaked up without applying?" The operation and maintenance personnel said, because some experimenters are relatively lazy, they do everything possible not to fill out the complicated application form, and they have to hire the management of the third and fourth floors Gang came to sign, and finally got dozens of minutes of use time.

So when the supercomputer is idle, their program will secretly connect to it and run for a while, and it is called not to waste resources.

"There is no remote connection, and no new user login." The operation and maintenance opened the monitoring page to check.

"Look at any abnormal progress."

"No, no, I checked that the CPU resources and memory resources occupied by the operating system have exceeded our set value."

"Hurry up and call Boss, saying that there is something abnormal about the supercomputer."

The phone calls in the operation and maintenance room were continuously dialed out. At this time, the CPU resources of the supercomputing had taken up all the IDLE resources, and the memory was also hovering on the verge of overflowing.

But the design of the supercomputer is that you can't turn it off quickly, and you need multiple people with sufficient authority to operate on the console in the computer room.

The operation and maintenance personnel found that they were forcibly disconnected by the supercomputer, and when they tried to log in again, they found that the password was wrong.

"No, we have been hacked. Call the big boss." The operation and maintenance personnel shouted in panic.

"Can the remote still turn off the power?"

"It's gone, the control system of the power module has been offline, and the controller of the UPS room has no control rights."

"Hurry up and go to the computer room to manually power off the UPS. When the supercomputer's power management program is triggered, it will automatically shut down."

They entered the gate of the computer room, walked through the long corridor, and swiped vigorously at the door of the supercomputer room with the key card. There was always a red light, swiping the card, swiping fingerprints, and taking iris photos. All the security systems were useless.

They threw the card on the floor, "It's over, we can't even get in the door."

With a bang, the air conditioner in the computer room was turned off.

"They want to burn the supercomputer. It's over. At least tens of billions of losses." The operation and maintenance personnel took out their mobile phones and wanted to call outside. Then he remembered that the computer room had installed an electromagnetic shielding layer. It doesn't work either.

He broke open the fire box and took out the fire phone inside, which seemed to be working.

He picked up the microphone, and heard a female voice sneering from inside.

He threw the phone on the ground fiercely, put his head in his hands, and squatted on the floor. Now they can't get in or get out, the two of them are locked in the corridor outside the computer room.

Then when they wanted to go out, they found that the outside door was also locked, and the door card could not be swiped out.

But the last trick is to press the fire button, and when the fire extinguishing gas starts to be sprayed in the computer room, all the doors will automatically open.

But no one dares to press this button. If you press it, it will cause tens of billions of losses. This will be counted on your own head.

The two walked back and forth in the hallway, banging their heads against the wall. There is no other way.

At this time, there was some smell coming from the supercomputer room, and it seemed that some components had overheated.

Now, there are 911 fire trucks parked outside the laboratory, and a large number of firefighters entered the laboratory with oxygen cylinders and fire extinguishers on their backs.

They were demolishing the door of the computer room made of alloy steel. It was too strong. They had to work hard to open a gap and stuff the jack inside.

The oil pump is turned on, and the gap is getting bigger and bigger, and now one person can get in.

The firefighters entered through the gap. It was already five o'clock in the morning, and it had been more than an hour since the operation and maintenance personnel were locked inside.

The firefighters found two operation and maintenance personnel who were entangled in the corridor full of thick smoke and did not dare to press the fire button, but now they don't have to continue to entangle.

God called them to heaven to continue doing operation and maintenance work.

The firefighters moved the two bodies out, and they continued to demolish the computer room of the supercomputer.

This door is not as perverted as the outer door. It is just an ordinary iron door. It was broken in a few minutes in front of a high-hardness cutting tool, like butter meeting a hot knife.

The firefighters stood at the door, and everyone shook their heads. There was no need for rescue inside. The room was full of flames, and the whole room was covered by thick smoke. It was impossible to see what else was inside.

Some blown cable ends were crackling and sparking, and a row of power cabinets in the corner suddenly made a loud bang, which seemed to be that the power supply was officially cut off outside.

"Extinguish all open flames."

"Received!" The firefighters spread out in groups of two and extinguished the open flames one by one with the dry powder fire extinguisher in their hands.

Several other groups of people opened the door and ventilation ducts of the computer room, and the sight in the computer room became better at this time.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like