Chapter 55 (1/2)
hk055 swallows back
In the Room, Shi Lei has ten fingers in his hands, as if he had brought up afterimage, and quickly tapped on the keyboard. Fortunately, the keyboard that Shi Lei bought is a silent keyboard. Otherwise, the sound of pī pī pā pā will be connected.
Within the Access Company’s Core Server group, Shi Lei has entered the System and broke a System gap, injecting his own Authority System into the Core Server’s lnuxSystem instead of the original Authority System.
For lnuxSystem, Shi Lei knows very well that without causing the overall system crash of the Server group, the new Authority System is injected into the Server Group System!
After the new Authority System, the original two Super Authority users were reduced to First Grade authority, but their Management Authority did not change, and it was the same as the previous Super Authority user. The only difference is that they are retrieve to the authority group, Shi Lei newly created the only Super Authority user!
Unless they thoroughly check the Server group System and find that the Authority System has been replaced. Otherwise, Shi Lei mastered the Access Company’s Server group and made this Small-scale Exceed Grade computer its own First Grade Zombie! [
After successfully establishing his own Super Authority user, Shi Lei immediately uses the Super Authority user to start changing the Access Company’s Server group and Create System Back Door to facilitate the next direct top secret entry.
Since the Super Authority user was at hand, the Access Company’s Safety On-duty Personnel did not find anything wrong, and Shi Lei founded the System Back Door. Since then, even if Shi Lei swayed into the Access Company Server group, the Safety On-duty Personnel would not be suspicious. Because Shi Lei has acquired the Super Authority of the Server group, it has changed from Hacker to normal access.
The Access Company’s Server group will be Shi Lei’s First Station First Grade Zombie. The so-called First Grade Zombie, specifically as stated High Grade Server Zombie. The strength of a Hacker is largely determined by the quality of the Zombie in hand, as well as the quantity.
For example, a Hacker has mastered the 1 Million Ordinary PC, as a corpse Zombie, which is quite terrifying! After all, this 1 Million corpse Zombie, just launching the most primitive violent flood osattack, is also enough for a general server to drink a pot!
Of course, if you want to use the violent flood flow attack Supercomputer, it is probably not possible. The famous Supercomputer, which one does not have a hardware FIRE wall? Filtering osattack is a breeze. Unless you can launch 10 million corpse Zombie, carry out simultaneous attack!
But if someone really controls the corpse Zombie above 10 million, this person will definitely be harmonious with the relevant departments of Nation as long as they are not gods!
The order of the network is based on the fact that there is no deadly threat to Nation. If a Hacker really threatens Nation’s Core interests, don’t underestimate the power of Nation. Nation is sincere to find someone, and really few people can escape.
Even Shi Lei, now dare not say that 100% can escape Nation’s pursuit. Because of the Top Level power of Hacker World, most of the First Generation Hackers have been transformed into Cyber Security Specialist, or accept Nation Zhaoan as Nation Cyber Security personnel. The strength of First Generation Hacker is definitely too high and deep to be measured !
However, if Shi Lei captures Supercomputer Swallow, he has confidence that anyone who wants to grab his paddress is absolutely impossible!
Under the control of Shi Lei’s, with Supercomputer Swallow alone, no one can breakthrough!
Within the Access Company Server group, Shi Lei uses the Super Authority user to modify the Server’s Safety policy. Although Access Company also has its own Cyber Security Specialist, these Specialists are still larger than Shi Lei.
After modifying the Safety policy, Shi Lei copied the Boulder FIRE wall from the Number One Server. Access Company’s Norton FIRE wall has been damaged by Shi Lei, leaving only an empty shelf. Shi Lei is going to use the Access Company’s Server to sneak into the Supercomputer Swallow directly. How can I not repair the FIRE wall?
In the unlikely event that his invasion of Supercomputer Swallow was exposed, with Access Company’s Server and Boulder FIRE wall, Shi Lei could escape safely without being hunted by Supercomputer Swallow.
Although the Norton FIRE wall has only an empty shelf, Shi Lei did not abandon it. Instead, he used this empty shelf to incorporate the Boulder FIRE wall. As a result, from the user interface of the FIRE wall, it is still the Norton FIRE wall. But in fact, its internal Core Source Code is the Boulder FIRE wall written by Shi Lei. Even the Access Company’s Safety On-duty Personnel, which opened the Norton FIRE wall, they won’t find the FIRE wall, it’s already an issue!
After the Boulder FIRE wall was installed, Shi Lei finally checked the Access Company’s Server group. Then, Shi Lei controls the Server group, and from the inside of the Server group, extracts an item that the Access Company needs to calculate data, and sends a connection request to Supercomputer Swallow.
Access Company has applied for partial access to Supercomputer Swallow from the Tokyo University of Technology, and they have a Lawful Pass for Supercomputer Swallow!
In Tokyo University of Technology, Supercomputer Swallow, after receiving the application from Access Company, immediately searches the authority of the Access Company and the system resources that can be used in the internal authority group, and then responds to the Access Company Server group, allowing it to connect. .
When Shi Lei controlled the Access Company’s Server group and connected to Supercomputer Swallow, he was excited. Previous life ,Supercomputer Swallow ,exactly as stated Shi Lei’s First Supercomputer Zombie !
This world, Supercomputer Swallow, finally has to return to his arms! [