Font
Large
Medium
Small
Night
Prev Index    Favorite NextPage

Chapter 633: Lime Operating System will become the most secure operating system in the world in the next ten years(1/2)

Dornier quickly turned on the intrusion detection system and projected it on the big screen. Sure enough, it showed that dozens of people were trying to attack the network security defense system here. Among them, sniffing and cracking the account passwords of network boundary devices such as firewalls accounted for 10% of the total.

A majority.

Omer Barnetta's expression changed slightly: "How could someone actually find this place and carry out an attack?"

The others stopped laughing and became slightly nervous.

Their place is extremely hidden, and even the staff in the supercomputing center just thought it was rented out to hold some technical party, and there was no way they knew that this was the temporary headquarters for the "Black Skull" mission.

Are these attacks a coincidence? Someone just planned to attack this supercomputing center?

What is the target? Is it them, or is it the supercomputer here?

The supercomputer itself also has a network, but it is relatively closed and has several firewalls. It is too difficult to invade the supercomputer. Moreover, the supercomputer is only a computer resource system for executing applications. Unless it is performing a confidential task, it has no data.

Worth stealing.

Even if the intrusion is successful, at most it can only detect what CPU, graphics card, memory, hard drive, etc. the supercomputer uses, as well as how many CPUs, how much memory, how many graphics cards are connected in parallel, how much hard drive space, and how many fiber optic network cards are used.

HBA card model and other information.

Much of this information can be found on the official website of the supercomputing center, and there is no need to spend a lot of manpower and physical effort to intrude.

And want to find out the structure and technical principles of the supercomputer center and imitate them? That is even more unreliable. It is more practical and useful to invade the supercomputer manufacturing company and steal technical documents including design drawings and manufacturing processes.

However, it is not ruled out that some people vent their anger without any purpose or simply challenge technical difficulties.

"Currently, these people can't make a difference. Let's conduct an intrusion analysis first to see who are the people who dare to come to our territory and run wild. After we find them, we will have fun with them until they doubt their lives!"

Dornier sneered and gave the order. He had no doubt that "Q" was following him.

He was absolutely confident that he had escaped Q's pursuit.

What's more, if it were Q's attack, at least 30,000 to 40,000 attack threads would be launched at the same time, and it would not be an attempt at the level of dozens of people.

Nearly a hundred top hackers present let out arrogant laughter and acted quickly. Some of them were good at intrusion detection, some were good at sniffing defense, some were good at password cracking, and some were good at creating network viruses. At this time, they cooperated

It is much more efficient than a group of lone rangers.

Someone soon analyzed it: "This is a different IP intrusion from several countries. It should be an organization trying to invade here."

"An organization?" Dornier pondered for a moment. There are countless hacker organizations in the world, but in terms of fame and comprehensive strength, none of them can match their "Black Skull": "Give them feedback.

Say there is something important here, don't interfere with us, otherwise we will kill them afterwards!"

Unexpectedly, after the news was fed back, the attack not only did not stop, but became more active, as if it had been given a shot of blood. There were also people controlling hundreds of "broilers" to launch large-traffic attacks on individual ports opened by the firewall in an attempt to paralyze the system.

Port, force activation of backup ports to find new intrusion vulnerabilities.

Such a bold attitude completely angered the members of the "Black Skull" who had always been high-minded. They quickly launched tracking and anti-intrusion, and successively eliminated more than a dozen intruders through Trojan horses and viruses.

With their large numbers and superb skills, they completely had the upper hand, forcing the attackers who were fighting on their own to retreat steadily.

But Dornier and the others soon discovered that something was wrong. Why were there more and more attackers?

There were still dozens of people at the beginning, but gradually increased to hundreds, even thousands, or tens of thousands of people, and most of them were very high-level hackers.

"Oh my god, what's going on? Hackers from all over the world are attacking us?"

"No, the attack traffic is too great. The enemy has used at least millions of 'broilers' to attack us! The firewall has been paralyzed!"

"The management rights of the border defense equipment have been lost! I have now retreated to the second line of defense, requesting support!"

"The entire perimeter of the intrusion defense system collapsed!"

The companions went from arrogant and weird laughter at the beginning to nervous shouting with sweating profusely. Captain Dornier has realized that things will never be that simple. It cannot be that some organization wants to capture this supercomputing center, because

Even if all of their "Black Skulls" were mobilized, they would never be able to launch such a large-scale cyber bombing!

The enemy's target is their "black skull"!

Dornier's back was covered in cold sweat, and a thought flashed through his mind. Could it be that "Q" who had tracked him down and called these helpers?

But even if the entire Xia Kingdom’s hacker community is mobilized, there won’t be so many skilled hackers to join forces to launch an attack!

Dornier quickly typed on the keyboard and said anxiously: "Everyone, if you try harder and hold on, I will immediately ask the leader to send someone for support!"

Although this supercomputing center was only temporarily rented by their leader using his personal relationship, in order to implement this operation against the Qing Ning operating system, they had been preparing here for nearly half a year. They only developed attack software, Trojans, viruses, and ransomware.

There are dozens of software and intrusion software, and the number of "broilers" directly and indirectly controlled has reached millions. All we have to do is wait for the opportunity to launch. Once this place is breached, all the hard work will be in vain. I want to complete the reward amount.

The task of reaching $200 million is even more impossible.

With the big piece of fat already reaching his mouth, Dornier cannot and does not dare to give up, otherwise the leader will never let him go, and neither will his friends in the organization - after all, the "Black Skull" is essentially a human being.

An organization seeking money.

This chapter is not over yet, please click on the next page to continue reading! When contacting the leader, Dornier couldn't help but look at the time in the corner of the screen. Only sixteen hours had passed since that "Q" issued the threat.

Less than twenty hours later, is this really a big gift package sent by "Q" in advance?

No, it's absolutely impossible. How can a hacker with such terrifying strength come from a mere Xia Kingdom? It's even less likely that he has such great influence and can mobilize hackers from all over the world to collectively challenge the "Black Skull"!



Just when Dornier was nervous, anxious and suspicious, the atmosphere in the Chenghai Dahai Computer Laboratory Building Conference Center in Xia State was also quite tense.

The time for the reply given by the "Black Skull" is getting closer and closer. There are less than eight hours left. Everyone knows that Xia Guo will never compromise and will unconditionally agree to those harsh conditions. This is the only hope.

He is the mysterious expert "Mr. Q" that Leader Yang calls.

During these ten hours, more than 300 security experts worked almost non-stop, and finally completed more than a dozen tasks assigned by Chairman Yan Weizhou. Chairman Yan Weizhou packaged them and sent them back to "Mr. Q"

”.

At that time, "Mr. Q" replied "Give me an hour for verification and integration" and then became silent again.

Now there are less than ten minutes left before the "one hour" agreement, and everyone who is worried about the result doesn't even have the heart to eat dinner.

Everyone is not a young man who has never seen the world and has not experienced big storms, but they know that the results announced by "Mr. Q" will directly determine the survival and rise and fall of Xia's domestic operating system in the next ten or even decades.

Who can sit still?

Domestic operating systems are the key for the country to straighten its backbone of independent and controllable information! It is also the key for everyone here to "eat"!

During the hour of waiting, some old professors and experts who couldn't stand it had been helped to the temporary medical room nearby with pale lips. These sudden bustles added a bit of tension to the atmosphere.

Suddenly, the door of the conference room opened, and several gray-haired old men walked in accompanied by Lao Yang, Lao Chen and other leaders.

Everyone was startled and quickly recognized the person who was coming. It was Zheng Hongming, Chen Zhiben and other senior academicians from the Academy of Engineering!

These big guys were authorities in the computer industry when they were young. Most of the domestic Tianhe series and Sunway series supercomputers are inseparable from the lifelong efforts of these old academicians!

No one expected that this incident would alert these respected old academicians to come over night, and everyone stood up to say hello.

"Hello, Academician Zheng! Hello, Academician Chen! Hello, Academician Hu..."

Zheng Hongming had white hair and age spots on his face, but his eyes were still bright behind his black-rimmed glasses. He waved his hands to signal to everyone not to be polite and asked: "What's going on now? What's going on with that 'Mr. Q'?"

Have you replied?"

Yan Weizhou, who was staying at the scene, hurriedly stepped forward and replied: "Not yet. There are only a few minutes left before the agreed time limit. Please wait."

Zheng Hongming said warmly: "It doesn't matter. We are here just to sign our names. It's you who have done the hard work, so just wait."

Sign your name?

Everyone looked at each other in shock. When they saw Lao Yang and Lao Chen sitting down with several old academicians, they quickly returned to their seats.

Right here, a red "Q" character suddenly appeared on the big screen again, and then "Mr. Q" came from the loudspeaker. The speed and frequency of his speech kept changing, and he heard an extremely weird mechanical voice: "Everyone, please wait.

waited."

Everyone present sat up straight. Even several old academicians looked at the "Q" character on the big screen with interest. Academician Chen Zhiben asked Lao Yang in a low voice: "Is this 'Mr. Q'? Assist in development

The one who got Qiguang EDA?"

Lao Yang nodded and whispered: "Yes. 'Mr. Q' is a person who can be completely trusted."

Academician Chen Zhiben smiled and said: "How can we not trust him if we have such trust from you two leaders and are behind the scenes of Qiguang EDA? If we didn't trust him, we wouldn't come here to sign. Okay, let's hear it first.

result."

After a brief commotion, the whole place became completely quiet. Everyone held their breath, waiting for the final "sentence".

Did the notification fail, or does it need to be modified? Or is it...no problem?

Several old professors who were resting in the temporary medical hospital also insisted on walking out with the support of medical staff, wanting to hear the final result.

Mr. Q didn’t waste any time: “Let me tell you the result directly. After everyone’s joint efforts, I have integrated an update package. After this update package is distributed and installed, the security of the original V3.5 Lime operating system will be improved.

The problems will all be solved."

"Even if the source code is leaked again, in the next ten years, no organization or individual will be able to break through the defense of Qingning operating system. And including the current mainstream viruses, Trojans, and ransomware, they will not be able to attack after the update.

The Lime operating system takes effect."

"In other words, Longteng Zaitian Company will not need to update or improve the security mechanism in the next ten years, and Lime OS will become the most secure operating system in the world in this decade."

The whole place was still silent, and everyone's eyes widened in shock. Originally, everyone thought that hearing "The current vulnerability has been determined to be repairable" would be enough, but unexpectedly, Mr. Q actually said it with such confidence one after another.

Words of surprise, even shock and disbelief came.

In the next ten years, Lime OS will become the most secure operating system in the world?
To be continued...
Prev Index    Favorite NextPage