Chapter 5149: Break the system
-
Battlefield Contractor
- Don't do it
- 1144 characters
- 2021-04-11 05:41:48
"If we talk about war, we can still help. But the computer..." Lin Rui looked at everyone else, and could only grinned bitterly. "I guess we are at most browsing the web and sending and receiving emails.
We really have no way to think about this. "
Jimmy frowned, "In other words, you can complete the cracking, but the cracking time may be longer. What if there are other computers that can assist in the calculation?"
"That would have to be a mainframe. A personal computer like ours is totally useless." Cobain shook his head.
"I know there is another place on this island with a mainframe." Jimmy whispered, "Have you heard of virtual currency mining stations?
Recently, the value of virtual currency has been rising. A group of people are organizing the use of large computers for virtual currency mining on this island. These places are commonly known as virtual currency mining stations. "
Cobain's eyes lit up, "Virtual coin mining stations? I understand, they need a large computer to mine virtual coins, and they need a very powerful display core, that is, the computing power of the GPU.
Use the powerful computing power of these GPU display cores to mine virtual coins. If we can find similar equipment.
I can use the computing power of the GPU display core of these devices to assist our cracking operations. Why didn't I think of this? "
Kuaima stood up immediately, "Where are those virtual currency mines standing? I think we have to do some work."
"At the seaside, because the equipment generates a lot of heat during calculations, and the temperature at the seaside is relatively low, it is also convenient to set up a water cooling system." Jimmy whispered, "If you want to do it, I can take you there."
"Stop talking nonsense, get on the road right away." Sergey waved his hand. "Goodbye, computer genius. I'll bring you what you want for a few hours at most. But you'd better make sure it's useful and don't let me risk it in vain."
Jimmy turned his head and looked at Lin Rui. Lin Rui looked at his watch and nodded in agreement, "Be careful. Our goal is equipment. I don't want any casualties."
An hour later, Jimmy drove a truck and Sergey, Kuaima and others used a crane to hoist a large piece of equipment from the truck.
"This thing is really big, big and heavy. I haven't stolen such a heavy thing." Sergey shook his head as he got out of the car.
"Genius! Come and see, does this thing meet your requirements? There are several big houses over there that are all piled up." Kuaima asked Cobain.
Cobain quickly checked, "Okay, well done. This is a professionally customized, multi-installed display core array.
This thing is used to play computer games, and it must be so cool to fly. But coupled with the computing power of this GPU, it is enough to help us complete the cracking.
I have to say you guys are so beautiful! "
"Do you still need to say it?" Sergey looked disdainful.
"You'd better work quickly, maybe the news will be broadcast tomorrow morning. The gangster attacked the virtual coin mining station and snatched the large equipment." Jimmy spread his hand.
"What about you?" Quickly asked back.
"I have to wipe your clean, so that I can't leave any traces that can be traced." Jimmy sighed, "This is called aftermath work, and this is what I do."
Lin Rui nodded to him.
Mr. K’s informant is really right, not only has outstanding ability, but also is thoughtful.
And judging from Jimmy's skill, he is likely to be more than just an informant.
It is likely that he himself also has an intelligence agency background.
Lin Rui turned his head and asked the mercenaries to cooperate with Cobain to unload the equipment and help him complete the installation and connection.
At this time, the time was approaching, and at nine o'clock in the evening, there was not much time left for them.
Then Kobain went online urgently, calling on his many brothers on the Internet to work together to start the cracking process.
With the blessing of large computers, the progress of cracking has been hundreds or thousands of times faster than before.
Soon they discovered that the progress bar, which had been stopped at 80%, had finally begun to slowly move forward.
"It's done." Cobain, who had been staring at the computer screen, breathed a sigh of relief. "But can you complete the entire cracking process during the night?
I can't make a guarantee yet.
All I can say is hopeful, well done, guys. This is true teamwork. "
Indeed, as Cobain said, such brute force cracking requires a lot of patience.
Even with the blessing of large computers and the full assistance of multiple hackers.
They are also worthy, and the cracking was completed within the specified time.
There is a time limit for the use of large-scale commercial computers. But they at least finished it before this time limit.
Cobain had no idea which cup of coffee he had drunk, and his eyes were already red. But still can't hide his excitement.
"The crack was successful. We breached Bradley's most advanced security defense system overnight.
It is a pity that this matter cannot be made public. If you want to make it public, this is definitely another myth in the history of hackers. "Cobain danced with excitement.
"Well, genius. I knew you could do it a long time ago. But you'd better come up with a way to help us in the action." Lin Rui patted him.
"No problem. After the system is successfully cracked, I can use technology to create a virtual host.
Then connected their security system to my virtual host. All commands issued by the security system will enter this virtual host for verification.
And all the signals sent by my virtual host will be marked as legal behaviors for testing.
In this case, the security system will not be triggered by default, and all defenses of the entire security system will be in a disarmed state.
Including their AI-controlled monitoring equipment, alarm devices, and partition defense programs.
All will fail.
Because this remote host here will tell the system that all this is legal.
And their security defense system will default to my virtual system, which is the main server of the security company. "Cobain explained.
"Let me interrupt, can you say something I can understand?" Sergey said dumbfounded.
"Well, to put it simply. Their security defense system is controlled by me. All automatic security defenses are completely ineffective.
But you still have to avoid the cameras, because those cameras are likely to be directly connected to the screens in the security office.
For example, other infrared monitoring, or camera monitoring all controlled by AI, will all fail. It doesn't matter if you dance to the camera in the surveillance area.
The system will not trigger an alarm. But even so, you still have to be careful of guards on duty.
I can control the computer system, but I cannot control the guards. "Cobain replied.