Section 242 - Decryption of the Great Battle
When they saw that there was another guy with a bitter expression on the exit seat in the lecture hall, many people were confused, was he a wolf or a sheep?
Why is there no sign at all!
The most confused are the hunter students, who were originally gearing up and ready to do a big job, but except for the first wolf, before they could be happy, the results of the following results all became points.
Hey, hey, it's not like that, they're hunters, they're not here to hunt soy sauce.
"Senior, is that a wolf or a sheep?"
The teacher was lecturing on the podium, and the puzzled little girl No. 115 secretly asked Li Da Devil.
After being by her before, those wolves and moles are hidden even deeper, and it is difficult to tell what the role of the new guy sitting on the cold bench is without clues.
"Wolves!"
Li Bai's gaze did not leave the lecturer at all.
After losing interest in werewolf killing games, only the content of daily lessons can attract him.
"Senpai, how do you know?"
The little girl was very curious, if she could distinguish her identity just by looking at her face, there would probably be no bad people in this world.
Yiduo is not pressing, she really wants to learn from her predecessors again.
The logical judgment tricks learned before are almost making No. 115 have the title of fiery eyes, but what Li Bai taught her is tailor-made skills, and it does not have a wide range of versatility.
If you want to kill all kinds of situations, you have to draw inferences from each other and understand it deeply, and there are many things to learn.
"I did it, don't tell anyone. ”
Li Bai explained.
Although the werewolf killing game is no longer interesting, he also wants to see if there will be other variables, if the big devil appears, everyone sings coolly, this is not playable!
"Seniors are amazing!"
The little girl quietly gave a thumbs up, and the hunter senior either didn't make a move, or he would hit the target as soon as he shot.
However, the truth is not what she imagined.
-
At the same time, the computer rooms of several local colleges and universities in Huxi, such as Qianjiang University, Normal University and Technology and Business University, are home to the best teachers and students majoring in computer science at the university, who have recently received a special project.
For a purely numerical file, multiple specially written mathematical models are used to calculate and analyze, such a large amount of computation should be borne by mainframes or supercomputers, but mainframe computers and supercomputers are expensive, and not every university has the financial resources or budget to purchase them, so such a large amount of computation can only be solved by another way.
When encountering difficulties that are difficult to solve, there has always been a tradition in China that everyone gathers firewood and the flame is high, or there is a lot of strength in numbers.
The same approach can be found in the field of computing.
Gathering enough computers, relying on distributed computing to gather scattered computing resources, gathering sand into towers, and gathering rivers into lakes and seas, the energy of this kind of large-scale battle should not be underestimated.
If the computer room of any college and the personal computers in the dormitory are twisted into a rope, if not compared to supercomputing, it is not much worse than the regular mainframe, let alone the collective action of several colleges.
Old man Wang, who was hung up by Li Da Devil, was sitting in the conference room of Qianjiang University at this time, and he was not only the leaders of Qianjiang University, but also several computer technicians in the conference room.
A large conference table sits in a row of monitors showing different interfaces.
The lights in the conference room suddenly dimmed, and then came back on.
"The power is out again!"
Vice President Xia of Qianjiang University blurted out.
But everyone looked calm and calm.
In just two days, power outages, which are rare on weekdays, occurred one after another in colleges and universities participating in collective distributed computing.
It didn't take long for each emergency repair to be repaired, and soon the power was cut off again.
The reasons are so strange that you can simply compile a complete set of textbooks on power outages, all kinds of unbelievable fancy power outages, such as construction digging cables, aging lines, transformer collapses, and even I don't know where a broken Jetta came out of nowhere, and I crashed into the substation in a daze...... For professionals, if they want to make problems on the line within 200 meters, they can do it for at least three days and three nights without repeating, and all of them are verified, and they can't find the slightest fault.
Nowadays, 24 hours a day, to 18 hours in a state of power outage, the complaint phone has been called countless times, and the power supply that comes and goes must be the old side, and there is no change.
Old man Wang and the school have long been accustomed to this, and they are fully prepared to deal with it.
First of all, a large battery pack and a diesel generator are used to ensure the power supply of the machine room, and even if there is a sudden power failure, it can supply spontaneous power in time.
At the same time, additional generators are used to ensure the electricity supply of student dormitories and other departments.
Although the power grid has been repeatedly blocked, fortunately, the communication department is still firmly controlled by the old man Wang, otherwise the distributed computing will be forcibly separated, and the efficiency will be greatly reduced.
A mobile phone rang suddenly in the conference room, and a school staff member picked up the phone, and after a while, he covered the microphone and reported to the leader: "Vice President Xia, the fire department has sent someone to come over to check fire safety." ”
"This is going to be a salary!"
Vice President Xia quickly figured out what he meant, I'm afraid that the drunkard didn't mean to drink, and checking fire safety was just an excuse, and the real target was those diesel generators.
Diesel is flammable and explosive, and it is really easy to use this as an excuse to pick bones in eggs and add blockage.
"Vice Principal Xia?"
School staff are still waiting for a response.
"Lao Wang, you wait here, I'll go!"
Vice President Xia said to go.
The water came to cover the earth, the soldiers came to block, the other party let the horses come, and they followed.
Old man Wang frowned, contemplating expressionlessly, and after the opponent stopped for a while, he began to relapse again, and his methods became more and more intense.
The secret inside the black soft mask is about to be revealed, and the opponent who is not willing to sit still will definitely launch the most violent counterattack.
"Here we go again! Here we go again!"
The technicians operating the computers in the conference room suddenly screamed, and then crackled and rapidly tapped on the keyboards.
The distributed computing project jointly carried out by several universities encountered not only frequent power outages, but also hackers from the outside, and most of the energy of computer science teachers and students stationed in the computer room in shifts was spent on stopping hackers.
Hackers use only a few methods: exploiting system vulnerabilities to steal or snatch permissions, organizing bots on the network to launch a data flood to try to block the data exchange between several schools, extracting data packets, analyzing them, and implanting malicious or invalid data to deliberately create chaos for distributed computing.
The computer room is the key protection target, and most of the school's computer technology defense force is concentrated here, and the personal computers of students involved in distributed computing are often the first to fall.
The operating system of personal computers and the uneven level of users are like a big colander that can be easily broken by hackers.
In order to ensure data security, the school has come up with the technology of pressing the bottom of the box, using high-level keys for multiple encryption, and also using hardware dongles, which avoids the data crisis caused by the intrusion or interception of data packets by those computers in the distributed computing network, although the distributed decryption efficiency has decreased by a few percentage points, but it can effectively ensure data security.
Some smart students simply use virtual machines to facilitate the quick recovery of compromised systems, and to attract hackers to do useless work.
"Now there are 31,582 terminals, and there are already 3,000 offline, not good, 4,000 offline, and there are masters doing things. ”
"Someone touches me, I'll put a honeypot first and see what the way is. ”
The computer technicians in the conference room also had a good grasp and immediately set out to fight back.
The cyber war without gunpowder has begun.
Professional things are left to professional people to do, Old Man Wang remained silent, and suddenly a phone call came in.
"Old Shuji, are you in trouble there?"
After the phone was connected, the voice of a middle-aged man came.
The one who called, it was the current Commission for Discipline Inspection Shu Ji, because the black cover and soft face copying are very important, and no one in charge of this case dares to trust others, and the two generations of Discipline Inspection Commission secretaries have joined forces to guard the two battlefields respectively.
Old man Wang glanced at the conference room that suddenly fell into a busy situation, and said calmly: "My situation here is very good, don't be distracted, don't make any trouble, is there a lot of pressure on you?"
The other party was silent for a while, and said, "How's the progress?"
Although the current secretary of the Commission for Discipline Inspection did not say much, the pressure he is currently facing is self-evident.
Old man Wang looked at a monitor that specially displayed information such as progress, and then said: "It's already seventy-five percent, hold on for two more days." ”
Although the percentage progress bar has just crossed 75%, hackers are menacing, and the number of terminals offline is increasing.
The number of terminals involved in distributed computing quickly fell from 30,000 to 25,000 like a waterfall, and approached 20,000 step by step, although many students are trying to restore the system and re-engage in distributed computing.
"Two days?"
The other party seemed to breathe a sigh of relief.
Old man Wang said in an affirmative tone: "Two days!"
Two days?
The busy technicians looked at each other, looking at the current situation, the computing power has plummeted, and five days may not be enough.
This is the disadvantage of distributed computing, which is not stable enough and is prone to interference.
The best way to deal with hacking is to unplug the network cables, but the vast distributed computing network formed by several universities is not something that can be broken at once.
Once disconnected, not only will the computing power fall to the bottom, but it may also undo the previous efforts.
"Okay! Just two days! Don't worry, the sky is falling, and I'm on top of it. ”
The current secretary of the Commission for Discipline Inspection gritted his teeth, and he was also willing to go out horizontally and vertically, determined to carry it to the end.
-