Chapter 587 : It happens to be the top hacker!

Therefore, it is absolutely dangerous to overuse the computing resources of supercomputers.

From the performance analysis alone, Chu Hao’s choice of supercomputer mine is not a good choice. With the excellent performance of the supercomputer, Chu Hao can choose a more powerful supercomputer as the target.

For example, in November 2006, the supercomputer ranked third in the world, BGW, which is the main computer of the Thomas Watson Research Center of IBM’s “77”. The computing performance has reached 91.3TFLop/s, which is almost twice the performance of the supercomputer Yan!

Although hacking into BGW and controlling it, it is very difficult. But for Chu Hao, it is not something that cannot be done.



However, Chu Hao chose the supercomputer mine!

Because the supercomputer mine once belonged to Raphael, it can be used to make a good article!

In front of Server No. 1, Chu Hao’s hands were ten fingers. Quickly beating on the keyboard, a series of commands were issued from the No. 1 server.

At the same time, Chu Hao was still invoking Izuel, “Izuel, monitor all the activities of the supercomputer mine, and find any abnormal changes, immediately remind me!



“Sir, the fuzzy command cannot be executed. Please define the abnormal range of change in detail.” After all, Izuel is just a low-level pseudo artificial intelligence, for the fuzzy command. Unable to use program definition comprehension.

Chu Hao used his voice depressed to determine the range of’abnormal changes’ for Izuel, “Izuel, monitor the computing performance occupancy of the supercomputer mine, as if there was a sudden increase in computing data occupancy.

If the value exceeds 20%, call the police immediately; monitor the network connection of the supercomputer mine. If it is found that the influx of data exceeds 80% of the total bandwidth. Give an alert immediately; monitor the data flow of the system, once there is a program to spy on us, immediately send deceptive information and give an alert!”

“Sir, the order is accepted!” With clarified procedural conditions, Izuel immediately accepted the order.

Izuel helped Chu Hao monitor the supercomputer mine. Chu Hao can invade the supercomputer mine more attentively and analyze the system architecture of the supercomputer mine.

Most of the operating systems of supercomputers use closed systems. Closed systems help protect the safety of supercomputers and reduce the chance of being hacked.

At least. Not the top hackers, they are basically helpless with closed systems. But Chu Hao happens to be the top hacker!

Chu Hao analyzes the system architecture of the supercomputer mine, looking for the loopholes in the system. Even if it is a closed system, it is still a computer system, and there are system loopholes.

Under the sniffing of the world’s top hackers, the system vulnerabilities of the supercomputer mine were gradually discovered by Chu Hao one by one. However, the system vulnerabilities discovered so far are all insignificant low-risk vulnerabilities. It is too time-consuming to enter the core permission group of the system.

This so-called waste of time is likely to take a few 5.1 days, or even more than a dozen days. Chu Hao doesn’t have so much time to waste, he needs to teach the International Intelligence Bureau of the Ministry of Foreign Affairs a lesson as soon as possible, and find something to do for them!

“Sir, the system computing resources have increased to 74% occupancy.” Izuel issued a reminder that the system resource occupancy just now was only 51%, which suddenly increased the occupancy by 23%. .

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like