Chapter 56 (1/2)
hk056 Yan returns
Supercomputer Swallow’s Super Authority user, which is protected by the chip, is really difficult to handle!
It can even be said to be a law!
However, Shi Lei is a World Summit Grade Hacker and formly controls Supercomputer Swallow. For the case of Yan, as you know your own hands, you know very well!
The developer of the independent protection chip is the well-known chip world Boss ntel, which is of very reliable quality. Not only has an excellent hardware encryption system, but also anti-static interference, current overload protection, etc., to ensure the chip’s own safety!
However, because of its thorough safety, it provides a solution that can be utilized! [
Previous life, Shi Lei was also blocked by this independent protection chip. Shi Lei mobilizes the internals of the Supercomputer, manages the power distribution software, protects the chip independently with a huge current bombardment, and instantly protects the chip, enters the current overload protection, and restarts the independent protection chip.
From the automatic close of the current overload protection to the restart of the independent protection chip, there is a gapof about three seconds. In these three seconds, the Super Authority user is in a state of protection.
Previous life, later Supercomputer, did not use independent protection chip, exactly as stated for this reason. Set up current overload protection, which is easy to restart by overload attack. However, if current overload protection is not established, it will be directly burned by the current!
The current overload protection method is a good way to combat independent protection chips. Only now that there are only a few people who know this method, Shi Lei also took advantage of rebirth to know that this is not a flaw of flaw.
Every Supercomputer is a giant. Supercomputer Swallow’s main processor covers an area of two hundred square feet. The amount of electricity consumed in each Exceed Grade calculation is also a terrifying number. Therefore, inside the Supercomputer, there is an independent power management program that allocates power consumption for each area. Shi Lei carefully entered the Supercomputer Swallow’s power management program, and retrieves the chip’s power management subroutine independently.
When found, Shi Lei immediately rejoiced!
The power management subroutine of the independent protection chip, although locked, can be used to unlock the power management subroutine of the independent protection chip by releasing the entire power management program through the First Grade authority.
Shi Lei without the slightest hesitation uses its own First Grade authority to unlock the entire power management program and then turns on the power management subroutine of the independent protection chip.
After the preparations were completed, Shi Lei did not immediately protect the chip. Because the independent protection chip overload protection is only a short three seconds. Shi Lei must promote his own account to the Super Authority within three seconds, preventing the independent protection chip from alerting the Safety On-duty Personnel to the information. Otherwise, it will fall short and it is very likely to be discovered!
Previous life, Shi Lei bombardment When protecting the chip independently, it was the Xia Nation’s Hacker, when it was invaded by Wo Sang Nation. Supercomputer Swallow is the object of being taken care of. Although the Shi Lei bombardment protects the chip independently, an alert message is sent after the independent protection chip restarts. However, Supercomputer Swallow’s Safety On-duty Personnel, which is nervously dealing with Xia Nation’s Hacker invasion, did not notice the alarm of the independent protection chip. Therefore, Shi Lei repeatedly protects the chip by repeated bombardment, finally captures the Highest Authority of Supercomputer Swallow, and manually clears the alarm information of the independent protection chip.
In this world, Shi Lei has not had many opportunities, he only has one chance!
Within three seconds, seize the Super Authority and use the Super Authority to block the alarm protection of the independent protection chip. All this must be accomplish within three seconds!
Otherwise, everything will fail!
Shi Lei is so frustrated to get the Super Authority, instead of directly following the Access Company Server group, the Identity System inside the Branched Server System. That’s because the System program of the Access Company’s Server group is not complicated, and the Supercomputer Swallow System is not just a professionally developed closed system, but also complicated to die. Shi Lei has no time to graft. Authority System. Even if there is time, Shi Lei can’t guarantee success!
Therefore, Shi Lei has to do everything possible to obtain a Super Authority, and then use the Super Authority to modify the Internal System of the System.
Shi Lei inside the Supercomputer Swallow, began to write malicious programs, the first is to invade the promoted authority, write his own First Grade authority user, into the malicious intrusion program, after the program successfully invaded, automatically promoted authority, become Super Authority user .
Then wrote a message interception program, access to the malicious intrusion program, wait for the intrusion program promoted First Grade authority to the Super Authority, then obtain the authorization of the Super Authority user, intercept the alarm information issued by the independent protection chip, and will protect independently The chip overload protection record is deleted.
Finally, use the Super Authority user, retrieve the internal authority system, and then change the authority system to hide your Super Authority user!
After the two small programs are done, Shi Lei connects them together and then opens the power management subroutine of the independent protection chip. [
“Is it a big mouthful of meat, or a cold northwest wind, I’ve looked at it all the time!”
In the Room, Shi Lei puts her hands together and pretends to be a false believer.
The power management subroutine of the independent protection chip has been adjusted to five times the normal standard. Once Shi Lei is pressed, the independent protection chip will be protected against current overload and restarted.
Shi Lei connects two malicious programs to the Access Company’s Server group and uses this Server group to combat Supercomputer Swallow. Capturing Supercomputer Swallow requires a high-performance server to back it up, precisely because of this step! Once the server is backed up, the computing power is not enough. In three seconds, the law invades the Super Authority group and promotes the user authority. That is all over!
“Must be successful!” Shi Lei snorted, with a heart, pressed enterconfirmed!
First seconds, on the computer screen, the amount of numerous data flashed past and kept brushing.
Second second, still numerous data In the screen, Shi Lei’s forehead has a cold sweat, in the heart praying for Access Company’s Server, must be awesome!