The Strongest Hacker

Chapter 482: Strong waist (middle)

"Do you want to transfer all the data?" Looking at the yes and no on the computer screen, Zhang Yang is still a bit tangled. The supercomputer of the Star Group has been modulated, but the entire supercomputer is now just a system originally brought by IBM, and there is no The latest operating system. Zhang Yang has already greeted the gang of guys in the technical department, he has prepared the latest operating system long ago.

So although the supercomputer was modulated as early as yesterday, it did not transfer the server data from the official website for the first time, but waited for Zhang Yang to complete the system. To be honest, Zhang Yang is still a bit tangled. If it is not transferred, the data of the infected insects will still be kept in several spare satellite servers in the United States, which is undoubtedly very safe.

But this is not absolute. The waist of Chapter 482 should be strong (middle). In case the day is that the person in charge of the safety of these satellites on the side of the space agency takes a wind for a surprise inspection, although it may not be exposed. , But the risk of exposure is undoubtedly great. More importantly, if it is really leaked at once, the data transfer of the infected insects is too late!

However, the US government has other ways to directly shut down the satellite data transmission. If the infected insects are really lost, Zhang Yang will be too late to cry. However, if the infected insects are transferred to the supercomputer of the Star Group, then there is no doubt that there is another risk. The pros and cons of a system can be analyzed by using the current analysis software.

More importantly, because Zhang Yang has never seen the Adam system, he does not know how much the infectious insect system after the mutation is similar to the Adam system. If in the case of ananbis, the star group system has Adam on it If they are the shadows, I am afraid they will have a goal to deal with.

The reason why anubis does not show any strong power now is because they cannot find the person gscsd. If they find that there is a shadow of the Adam system in the server system of the Star Group, then their goal is Chapter 482 If the waist is strong (middle), it will definitely be aimed at the Starry Sky Group. Even if gscsd is not in Star Group, it must be connected with Star Group. "

But undoubtedly, if the infection is transferred to the server of the Star Group, then the benefits are also great. First, the chance of the Star Group’s official website being invaded will be infinitely close to zero, and any people who are mischievous and try to play the Star Group’s idea are infected. Under the surveillance of insects, there will be nothing to escape.

More importantly, Zhang Yang’s use of infected insects is not as subject to the previous writing of many software including Star Group, and can be used to assist in calculations. This will undoubtedly maximize the efficiency of Star Group’s technical department. For a long time, looking at the big yes and no on the screen, Zhang Yang finally hit the Enter key in his hand.

Starry Sky Group has reached the point where it is today. Even if it does not come today, it will come one day sooner or later. It will undoubtedly still face such a topic. This step must be stepped out. Stepping out early has the advantage of stepping out early.

Now that there is a decision, Zhang Yang will not hesitate. In the past few days, the entire Star Group's official website, servers, etc. should have issued a system announcement to the outside world that the Star Group will replace the server and add the latest supercomputer as the company's operating host.

The data of infected insects is no longer the original more than 100 G, but the size of more than a thousand G, but the size of the occupied hard disk is not a big problem for Zhang Yang. The hard disk capacity of the entire supercomputer has Thousands of T right, enough to use.

As Zhang Yang knocked down the carriage return, the data in the entire server immediately began to update madly, because he had greeted in advance, so at the moment, the little fat man who saw the entire computer room server started to run crazy was not surprised that they knew that this was Zhang Yang. Do the system.

But the fat guys and others are still quite curious. The performance of supercomputers is too powerful. To use these performances perfectly, you need a logical thinking system. If a system like our ordinary home computer is installed in the supercomputer On the computer, you don’t need to do anything every day, just keep the entire system running, input and process various commands, etc. I am afraid that dozens or hundreds of technicians must handle it 24/7.

This is why so many companies in the world have the ability to buy supercomputers, but few can use them. At first, they thought that Zhang Yang would also buy IBM's system, or Microsoft's Apple supercomputer system. Both of the latter two have a cooperative relationship with Star Group.

But they did not expect to kill them. Zhang Yang actually said that he had already written a system himself. This system can be completely different from what Linux system or the like! Think about it to control hundreds of tons of countless hardware, and fully exert the performance of these hardware, this is not a simple matter. If anyone can write a system, then Microsoft will not be the only one for so many years.

Although it has been a long time since the infection system, Zhang Yang does not have an intuitive understanding of the infection system. Because there are thousands of dedicated gigabit optical fibers pulled in the equipment room. Although there is a lot of data, it does not take long, that is, it can be copied in about ten minutes.

The copy progress bar on the screen soon came to an end, and a new prompt box appeared directly on Zhang Yang's screen: "Are you sure to load all the databases and the system?" Zhang Yang clicked on the confirmation without hesitation, with the button of Zhang Yang At the same time, the entire computer screen immediately starts to swipe the screen, and a variety of instructions and buttons to control the success of various hardware areas appear.

This lasted for about half an hour or so before all the data finally came to an end. "After all hardware testing is completed, the hardware performance meets one-third of the database and system functions, whether it is optimized and hardened." The crisp prompt of the infected insect finally sounded, this time it was directly prompted by voice, and Zhang Yang nodded quickly. Gave a positive answer.

Because the server is connected to the supercomputer, the data in the server also needs to be run by the infected system, and these have to be set up in advance.

It wasn't until the infected insects started to optimize the performance of all the hardware and centralized processing, Zhang Yang was curious to scan the current server system with his own analysis software.

The results of the scan quickly appeared on Zhang Yang’s analysis software and scanner, but Zhang Yang was a bit surprised to see this analysis result, because although the infected system was located in several satellite servers, it was not the main system of the satellite server. It's just using the performance of these satellite servers, so Zhang Yang simply has no way to confirm what the Aegis system looks like.

After the scan, the result made Zhang Yang very surprised. It was quite unexpected. The infecting insects have completely replaced the entire supercomputer and the main system of the server. There is only one system in the entire supercomputer, but after scanning, Zhang Yang found that the scan The results have much in common with the Linux system, but there are also differences. In fact, the linux system does not actually have a fixed model, because its source code is public. In the hands of all software engineers around the world, each person has a unique linux system, the same is only its kernel That's it.

Of course, infecting insects do not have to worry about this, or whether the software on the market is compatible with the system. Infecting insects running software or programs will automatically find programs that match it. Strictly speaking, infecting insects themselves are more like themselves. Is a software.

After the scan, Zhang Yang thought about it, and then entered the core program of the infected insect. After entering the core password of up to 32 digits, Zhang Yang directly unlocked the authorization of the first sequence.

"You need a name now, you need a code name, and you will be called Starry Sky in the future!" The first thing that Zhang Yang did was to change the name of the infected system. After all, it is now the main system of the Star Group server. In the future, it will not only be used to advertise a person. It is necessary to give it a name. It is too easy to expose it if it is called an insect.

"Are you sure to change the main system identification ID to starry sky?" "Confirm!"

"Do you want to re-record the voiceprint atlas as the core password of the first sequence?" "Confirm!" With Zhang Yang's modification~www.wuxiahere.com~ Soon, most of the core permissions of the infected insects were changed by Zhang Yang. Now the starry sky controls only the company's supercomputer. In the future, with the completion of the new starry sky industrial park, the entire park's lighting system, monitoring system, security system, and even the entire building's ventilation system, power system, etc. will all be attributed to the starry sky. Under control.

When checking the entire system just now, Zhang Yang discovered that when the anubis group designed Adam, it was obviously designed according to the intelligent systems in science fiction movies. All of these have interfaces and related database reading data inside the starry sky system. In the future, as long as the control system of these things is connected to the system, the starry sky can immediately recognize and control these things.

When setting up the logical thinking ability of the starry sky, Zhang Yang can be said to have racked his brain. In the end, Zhang Yang still uses its logical thinking library to open to everyone except the first sequence, and can only use one fifth. The so-called logical thinking ability, that is to say, when others give commands to the starry sky by voice, how to make others not feel the logical thinking ability of the starry sky system, how to make other people think that the starry sky system is the ordinary ones There is no difference in rigid computer systems. ! ! ! ;

;

--------------

--------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like