Chapter 55 (2/2)
After connecting to Supercomputer Swallow, Shi Lei first transferred the calculation task extracted from the Access Company Server group to Supercomputer Swallow.
Supercomputer Swallow, choose to accept the Access Company’s files, Yan will automatically detect the file’s safety first, then its internal Safety On-duty Personnel, will be manually detected again. If the file does not have an issue, it will be handed over to Supercomputer Swallow to run the calculation in the Sandbox environment.
Shi Lei does not have any hands or feet in the files that need to be calculated. After all, the other party will go through several tests. If an issue is found, then the Tokyo University of Technology will definitely notify the Access Company, and the Access Company will suspect that they will not apply to the Supercomputer Swallow for any calculation of the Task. The only possibility, exactly as stated Server, was exploited by Hacker!
Therefore, the file uploaded by Shi Lei is really the calculation file of Access Company. He then uses the Access Company himself to connect to the Superful Swallow’s Lawful channel and go directly to Supercomputer Swallow’s Critical System Flaw!
The most difficult step in capturing Supercomputer Swallow is the First step, how to connect to Supercomputer Swallow! Without a normal connection, it will be rejected by Supercomputer Swallow. If you use the Hacker attack, you will be alarmed by the other party’s Safety On-duty Personnel.
Only like Shi Lei, find the Lawful connection path, sway the Supercomputer Swallow, and then attack the Supercomputer Swallow’s serious System Flaw!
Supercomputer Swallow, after entering the field of business cooperation, there is a serious flaw in System, the cooperative commercial user can use System Flaw to promote its own authority!
Shi Lei previous life, convenient to use this flaw, to promote your authority, promoted to Super Authority user!
After the Access Company’s files are tested, they are sent to Supercomputer Swallow’s Sandbox environment and the implement calculation is started. And Shi Lei, carefully in the Supercomputer Swallow, found the serious System Flaw!
After finding System Flaw, Shi Lei didn’t attack immediately, but tried it out to see if this was a Honeypot TrAP. Although the Supercomputer’s defense is very reliable, it still does not rule out the possibility of the other party setting up a trapon the periphery of the server.
After a temptation, Shi Lei determined that this was the one, he knew the serious System Flaw. Shi Lei hits the code and attacks the flaw directly according to the pre-set plan.
Since previous life has invaded this flaw, Shi Lei is familiar with the real internals of Supercomputer Swallow from the flaw, rather than the external business cooperation space!
After entering the interior of Supercomputer Swallow, Shi Lei first used the flaw, the account of the Access Company, and started the promoted authority. When the Access Company’s authority is promoted to the Third Grade authority and a new user can be created, Shi Lei immediately creates a brand new user and reduces the Access Company’s authority to the Ordinary business collaboration user.
Then, Shi Lei put the user he created, through the promote promoted authority to the First Grade authority, and then immediately stopped. This serious System Flaw can only be promoted to the First Grade authority without the Super Authority. If you use flaw, try to promote Super Authority, it will trigger the Super Authority user protection mechanism, the entire Supercomputer will immediately issue an alarm!
After Shi Lei has the First Grade authority user, he can enter the authority user group normally, and can also manage the low authority user with limited management. With First Grade authority, Shi Lei accesses the System’s Safety policy through the First Grade authority and uses the First Grade authority to begin changing the Supercomputer Swallow’s System settings.
The First step that needs to be changed is precisely the protection mechanism of the Super Authority user, and the protection mechanism of the Cancelled Super Authority user must be licensed by the Super Authority user. If the protection mechanism of the Super Authority user is not enabled, once the Super Authority user is started, the protection mechanism will be triggered and the Supercomputer will issue an alarm internally.
This is an infinite loop!
There is no Super Authority, the French cancelled protection mechanism, the French cancelled protection mechanism, and the Super Authority is not available!
The Super Authority user protection mechanism is protected by a separate hardware chip. It is independent of the Supercomputer System and is not affected by System interference. It only accepts Super Authority user commands!
Shi Lei looked at the computer screen and showed the Super Authority user protection mechanism, showing a sneer look!
Ps: The current ticket 9950, target is 10300, which is the day of today, reaching the level of 600 votes! Hope everyone supports the mountains and mountains, so that the tickets for the mountains and mountains are a little more! Reach target 20: 06 plus! [
Then, according to the requirements of everyone, the book evaluation area small event will be opened again. The prize has a seven-digit yy account, an eight-digit QQ|Penguin account, and a QQ|Penguin couple account. For details, please see the book review area and make it before this afternoon.
Seeking collections, members click, reward, comment, everything!
[Thank you for your appreciation] In the wind, smile again and enjoy 100