Chapter 586 : Is it difficult to hack into a supercomputer?

The so-called protection server is a setting that protects the broiler network from being completely penetrated in an instant. For example. The International Intelligence Bureau of the Ministry of Foreign Affairs wants to track Chu Hao’s IP address, it must be based on the link IP address. Track through the broilers one by one.

When they tracked down the protection server. Will be blocked by the endless defense system, and thus be intercepted, so that Chu Hao has time to deal with other things without being entangled until he is caught.

“Izuel, scan this IP address. Determine the ports opened by the other party and whether there are loopholes.” Chu Hao continued.

Izuel is in charge of the dark magic software, which naturally includes port scanning and vulnerability scanning, and it is in the broiler network controlled by Izuel. With the help of a special cluster system, it quickly scans the open ports of the supercomputer mine.

A supercomputer has many open ports, and after about a minute, a large number of results are displayed on the monitor of the No. 1 server.

Chu Hao analyzed again one by one.Although Izuel can scan out the ports and even control the intrusion of dark software, Izuel will definitely be discovered because it does not have real artificial intelligence and cannot determine the attack method independently. Through the defense system, etc.

During the hidden invasion, Izuel can only help Chu Hao do some preparations!

‘Huh! Supercomputer mine’s defense is so much lower than supercomputer Yan! Even if I don’t know its system vulnerabilities, with the supercomputer Yan in hand, it is not difficult to intrude into the supercomputer mine!’ Chu Hao observes Thinking about the situation of the supercomputer mine secretly in my heart.

There is a certain gap between the supercomputer Thunder and the supercomputer Yan. After Chu Hao figured out the situation, he immediately tried data injection from an infrequently used port.

The port is like the door to the room. If the door is selected and the key is faked, then you can successfully enter the room!

Although the port chosen by Chu Hao is not commonly used, it is a port that is normally opened, and it is not a trap port for chamber-tank installation.

After a lot of effort, Chu Hao successfully bypassed the firewall of the supercomputer mine and entered the inside of the supercomputer mine.

However, just entering the supercomputer mine is not enough, this is just the first step!

Next, Chu Hao also needs to analyze the overall system of the supercomputer mine inside the supercomputer mine, so as to find a way to enter the permission group, obtain the highest permission of the permission group, and hide his highest permission before it is completed. Control of supercomputer mines.

However, this is the most difficult process!

But, is it really difficult for Chu Hao?.

Supercomputer mine, ranked nineteenth in the world’s top 500 supercomputer rankings in November 2006. The computing performance has reached 19.9TFLOP/s, which is equivalent to 42% of the performance of the supercomputer.

In terms of performance, the supercomputer mine is still a bit short, after all, its safe call calculation is only 4-5TFLOP/s, which is not as good as dreaming of entertaining your own supercomputer.



At the beginning, when Chu Hao and Raphael were fighting, they used the supercomputer Yan’s 20TFLOP/s resources excessively, which completely defeated the supercomputer mine. It was also that time that the secret of the supercomputer mine was accidentally caught by the mysterious CPXJazz, which caused the tragedy of Raphael.タ.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like