I really just want to be a scholar

Chapter 634 Lime operating system will become the most secure operating system in the world in the c

Chapter 634 Lime operating system will become the most secure operating system in the world in the next ten years

Dornier quickly turned on the intrusion detection system and projected it on the big screen. Sure enough, it showed that dozens of people were trying to attack the network security defense system here. the majority.

Omer Barnetta's expression changed slightly: "How could someone find this place and carry out an attack?"

The rest of the people stopped laughing and became slightly nervous.

Their place is extremely hidden, and even the staff in the supercomputing center just thought that it was rented out to hold some kind of technical party, and it was impossible to know that this was the temporary headquarters of the "Black Skull" mission.

Are these attacks a coincidence?Someone just planned to attack this supercomputing center?

What is the goal?Is it them, or the supercomputer here?
The supercomputing itself also has a network, but it is relatively closed, and there are several firewalls. It is too difficult to invade the supercomputing, and the supercomputing is only a computer resource system for executing applications. Unless it is performing a confidential task, otherwise it does not have much information. worth stealing.

Even if the intrusion is successful, at most it can only detect what CPU, graphics card, memory, hard disk, etc. are used by the supercomputing, and how many CPUs, how much memory, how many graphics cards are connected in parallel, how much hard disk space, how many fiber optic network cards, etc. HBA card model and other information.

A lot of this information can be found on the official website of the Supercomputing Center, and there is no need to spend a lot of manpower and material resources to invade.

And want to find out the structure and technical principles of the supercomputing center for imitation?That's even more unreliable. It's not as practical and useful as hacking a supercomputer manufacturing company and stealing technical documents including design drawings and manufacturing processes.

However, it is not ruled out that some people vent their anger aimlessly or simply challenge technical problems.

"At present, this kind of people can't make a big deal. Let's conduct an intrusion analysis first to see who they are who dare to come to our territory to act wildly. After we find out, we will have fun with them until they doubt life!" Dornier gave the order with a sneer, and he didn't even suspect that "Q" was following him.

He is absolutely confident that he has thrown off Q's pursuit.

What's more, if it is an attack by Q, at least [-] to [-] attack threads will be launched at the same time, and it will not be an attempt by dozens of people.

Nearly [-] top hackers on the scene let out arrogant and weird laughter, and acted quickly. Some of them are good at intrusion inspection, some are good at sniffing and defense, some are good at password cracking, and some are good at making network viruses. At this time, they cooperate It is much more efficient than some solitary warriors formed by lone rangers.

Someone quickly analyzed it: "This is an intrusion from different IPs from several countries, and it should be an organization that wants to intrude here."

"A certain organization?" Dornier pondered for a while. There are countless hacker organizations in the world, but in terms of fame and overall strength, none of them can match their "black skull": "Give them a message, Say there is something important here, don't bother us, or we will play them to death afterwards!"

Unexpectedly, after the news was fed back, not only did the attack not stop, but it became more active as if it had been beaten with chicken blood, and there were still people controlling hundreds of "broilers" to attack individual ports opened by the firewall in an attempt to paralyze the attack. ports, force activation of alternate ports for new intrusion vulnerabilities.

Such a bold and reckless attitude completely angered the members of the "Black Skull" who had always been above the top. They quickly launched tracking and anti-invasion, and successively dealt with more than a dozen intruders through Trojan horses and viruses.

They have a large number of people, and their skills are superb, completely occupying the upper hand, and the attackers who fought on their own are retreating steadily.

But soon Dornier and the others realized that something was wrong. Why are there more and more attackers?
There were dozens of people at the beginning, and gradually increased to hundreds, even thousands, or tens of thousands of people, and most of them were hackers with a very high level.

"My God, what's going on, hackers from all over the world are coming to attack us?"

"It can't be done, the traffic flow of the attack is too big, the enemy has at least used millions of 'broilers' to attack us! The firewall has been paralyzed!"

"The management authority of the border defense equipment has been lost! At present, I have retreated to the second line of defense, requesting support!"

"All the outer fronts of the intrusion defense system collapsed!"

The companions have changed from laughing arrogantly at the beginning to shouting nervously and sweating profusely. Captain Dornier has realized that things will never be so simple. It is impossible for some organization to capture this supercomputing center, because Even if all of their "black skulls" were dispatched, they would definitely not be able to launch such a large-scale cyber bombing!

Enemies are targeting their "Black Skulls"!
Dornier's back was covered in cold sweat, and a thought flashed through his mind, could it be that "Q" who tracked him down and called these helpers?

But even if the entire Xia Kingdom's hacker community is mobilized, it is impossible to find so many hackers with outstanding skills to jointly launch an attack!
Dornier said anxiously while typing on the keyboard quickly: "Everyone, try harder and hold on, I will immediately ask the leader to send someone to support!"

Although this supercomputing center is only used by their leaders on a temporary lease using their personal relationship, in order to carry out this operation against the Lime operating system, they have prepared here for nearly half a year, and only developed attack software, Trojan horses, viruses, and ransomware. There are dozens of software and intrusion software, and the "broilers" under direct and indirect control have reached the million level. We just wait for the timing of activation. Once this is breached, all the hard work will be in vain. If you want to complete this reward amount The task of reaching $2 million is even more impossible.

Dornier can't and dare not give up the big piece of fat that has reached his mouth, otherwise the leader will never let him go, and neither will his associates in the organization—after all, the "black skull" is essentially a organization seeking money.

When contacting the leader, Dornier couldn't help but look at the time in the corner of the screen. It has only been sixteen hours since the "Q" threatened, and it has not been twenty hours. Could it be that this is really "Q" A big gift package delivered in advance?

No, it is absolutely impossible. In a mere Xia country, how can there be such a terrifying hacker, let alone have such a great influence, and can mobilize hackers from all over the world to collectively challenge the "Black Skull"!
……

Just when Dornier was nervous, anxious and suspicious, the atmosphere in Xiaguo, Chenghai Dahai Computer Laboratory Building Conference Center was also quite tense.

The time for the reply given by the "Black Skull" is getting closer and closer, and there are less than eight hours left. Everyone knows that Xia Guo will never compromise and agree to those harsh conditions unconditionally. The only hope It is the mysterious expert "Mr. Q" that Leader Yang said.

During these ten hours, more than 300 security experts worked almost without a break, and with great difficulty, they jointly completed more than a dozen tasks assigned by President Yan Weizhou. After packing, President Yan Weizhou sent it back to "Mr. Q" .

At that time, "Mr. Q" replied "Give me an hour for verification and integration" and then fell silent.

Now there are less than 10 minutes left before the "one hour" appointment, and the people who are worried about the result are not even in the mood to eat dinner.

Everyone is not a young man who has never seen the world and experienced great storms, but knowing that the results announced by "Mr. Q" will directly determine the survival and rise and fall of Xia Guo's domestic operating system in the next ten or even decades, who would Can you sit still?
The domestic operating system is the key to the country's independent and controllable information backbone!It is also the key for everyone present to "eat"!

During the one hour of waiting, some old professors and experts who couldn't stand it had already been helped to the temporary infirmary next to them with blue lips. These sudden hustle and bustle added a bit of tension to the atmosphere.

Suddenly the door of the meeting room was pushed open, and several gray-haired old men walked in accompanied by Yang Chengke, Chen Jingxue and other leaders.

Everyone was startled, and soon recognized the person who came, it was Zheng Hongming, Chen Zhiben and other old academicians from the Academy of Engineering!
These bigwigs were authorities in the computer industry when they were young. Most of the Tianhe series and Shenwei series supercomputers in China are inseparable from the life-long hard work of these old academicians!

No one expected that this incident would alarm these respected old academicians to rush over overnight, and everyone hurriedly got up to say hello.

"Hello, Old Academician Zheng! Hello, Old Academician Chen! Hello, Old Academician Hu..."

Zheng Hongming has white hair and age spots on his face, but his eyes are still bright behind the black-rimmed glasses. He waved his hand to signal everyone not to be too polite, and asked, "What's the situation now, what about that 'Mr. Q'?" Did you reply?"

Yan Weizhou, who stayed at the scene, hurried forward and replied: "Not yet, there are only a few minutes left before the agreed time limit, please wait a little longer."

Zheng Hongming said softly: "It's okay, we're here just to sign our names. It's you who have worked hard, so wait a little longer."

Sign a name?
Everyone looked at each other in blank dismay, seeing Lao Yang and Lao Chen sitting down with several old academicians, they also hurried back to their seats.

At this moment, a red "Q" character suddenly appeared on the big screen again, and then "Mr. Q" came from the loudspeaker. The speech rate was constantly changing, and a very strange mechanical voice was heard: "Everyone! Awaited."

All the people present sat up straight at once, and even a few old academicians looked at the "Q" character on the big screen with great interest. Academician Chen Zhiben asked Lao Yang in a low voice: "This is 'Mr. Q'? Assist in the development The one who bought Qiguang EDA?"

Yang Chengke nodded, and said in a low voice: "Yes. 'Mr. Q' is someone who can be completely trusted."

Academician Chen Zhiben smiled: "You can gain such trust from your two big leaders, and Qiguang EDA has made great contributions behind the scenes. How can we not trust him? If we don't trust him, we won't come here to sign. Okay, let's listen first. result."

After a short period of commotion, the audience completely fell silent. Everyone held their breath, waiting for the final "judgment".

Did the notification fail, or does it need to be modified?Or... no problem?

Several old professors who had been resting in the temporary infirmary insisted on coming out with the support of the medical staff, wanting to hear the final result.

Mr. Q didn't talk nonsense: "Let me just talk about the result. After everyone's joint efforts, I have integrated an update package here. After the update package is distributed and installed, the security of the original V3.5 Lime operating system Issues will be resolved in full, both on desktop server and mobile.”

"Even if the source code is leaked again, in the next ten years, no organization or individual will be able to break through the defenses of the Lime operating system. Including the current mainstream viruses, Trojans, and ransomware, none of them will be able to protect the system after the update. The Lime operating system takes effect."

"That is to say, Longteng Zaitian will not need to update or improve the security mechanism in the next ten years, and the Lime operating system will become the most secure operating system in the world in this ten years."

The audience was still silent, and everyone's eyes widened in shock. At first, everyone thought it would be enough to hear the sentence "the current loophole has been confirmed to be repaired", but Mr. Q actually said it so confidently and heart-warmingly. Words of surprise, even horror, and disbelief came.

In the next ten years, will the lime operating system become the most secure operating system in the world?
"Next, I will briefly talk about the updated content. First, the core of the lime operating system, the artificial intelligence assistant 'Xiaoqing' has been upgraded; second, the encryption and decryption algorithm has been optimized, and the desktop version of the algorithm The key is 32 bits - don't be nervous, this is not a regression, the 32-bit key is in the new algorithm, the security is equivalent to the 1024-bit key of the previous algorithm - the algorithm key of the server version is 64 bits, which is equivalent to the previous algorithm The algorithm has 2048 bits. Third, the security module has been redefined and multi-verified..."

Everyone present was completely dumbfounded.

Although Mr. Q presumably took security into consideration and did not explain the technical details, but only briefly mentioned the updated content, the updated content is really amazing.

The upgrade of "Xiaoqing" is shocking enough, but this is not mentioned in the dozens of tasks that everyone is responsible for. In other words, it is very likely that Mr. Q completed it independently!
The new encryption and decryption algorithm is even more terrifying. With a 32-bit key, can it be comparable to the current 1024-bit key in terms of security?A full increase of 32 times!
Before everyone digested the news, Mr. Q continued: "I have encrypted and packaged the update package and all related source code and documentation, and sent it to President Yan's mailbox. Please arrange to distribute this update package as soon as possible. Let me also explain that you don't have to worry about the 'Black Skull' launching an attack, they are already too busy to take care of themselves. That's it, thank you again for your cooperation."

After finishing speaking, Mr. Q's avatar disappeared immediately, and the big screen returned to its original state.

Everyone looked at me, and a thought flashed in their hearts - "Wow Cao, is this real or fake, so awesome?"

Another thought is——"Just because of Mr. Q's words, should all the computers, servers, and mobile phones installed with the Lime operating system in the country now install this update package? Does it need to be verified first in terms of security? "

At this moment, Zheng Hongming, Chen Zhiben and other senior academicians stood up and said with a smile: "It's really amazing. Well, let's sign and agree to this update. If there are technical problems, we will to take charge."

Only then did everyone know that the "signature" they were talking about was actually responsible for this nationwide update package distribution and installation operation!With these highly respected old academicians as guarantees, the update package can naturally be distributed as quickly as possible.

Everyone was moved not only by the noble character of several old academicians, but also by their courage and trust in Mr. Q.

Who is this Mr. Q, and why can he gain the unconditional trust of the bosses?
This question has always existed in everyone's mind.

 Continue to ask for monthly ticket recommendation tickets at the end of the month!
  
 
(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like