Verse 243 - Behind closed doors
After the existence of the black cover soft copy was leaked, a crisis of confidence broke out, and the new and old generations of discipline inspection committee secretaries had to join forces to shoulder the beam, one was responsible for dealing with the pressure of officialdom, and the other was trying to decrypt and decipher the content of the soft copy.
The angry and fierce reaction of the jackals, tigers and leopards made the old-eyed old man Wang believe that the value of this soft copy was solved, and once the secret was solved, it was likely to kill a circle of people.
For the former Commission for Discipline Inspection Shuji, what can be more pleasing than catching a bunch of official apes to drink, I think at the beginning, Lao Tzu's team was just opened, and there were only a dozen people in total, seven or eight guns...... The old man excitedly wanted to sing the last piece of "Shajiabang".
After ending the call with the current Commission for Discipline Inspection, Old Man Wang put his mobile phone on the desktop in front of him and said to everyone in the conference room: "Two days, I don't care what method you use, only two days! Two days later, I, you, and the people outside will either become heroes or be penniless forever." ”
After arranging some people and some things, Old Man Wang no longer has any worries, and now he is completely unscrupulous and gives it a go, this is the feeling, and the whole person is almost about to burn.
Everyone in the room was in the same room, and it was both a challenge and an opportunity for them.
If you can successfully decipher it, you will get a lot of unimaginable benefits.
These benefits are not just visible cash rewards, but also non-substantial future benefits, which is what they want more.
For example, the attention of superiors, the personal file has been heavily recorded, and the political consciousness is strong, if there is an opportunity for promotion and salary increase in the future, I am afraid it will be easier to get it than others.
Someone muttered: "We can use the satellite dish pot in the school to try to make a few high-frequency transceiver antennas to form a closed local area network, so that we are not afraid of hacker attacks from the Internet." ”
"Then do it!"
Old man Wang didn't understand any of the technical terms, but he knew that the advice made by professionals could often solve the problem effectively.
Even if it can't be solved, it won't be worse than the current situation.
Leaders don't need to know everything, just let the people who know how to do it.
"I'll prepare now!"
The technician immediately shared his idea with his colleagues at several other universities, and it was unanimously approved.
After agreeing on the bandwidth, encryption method and communication protocol, the technical staff of each school immediately began to take action.
Although it is illegal to set up a private high-power wireless signal station, there will be someone else who will be responsible for solving these problems.
Technical staff are responsible for technical issues, and legal personnel are responsible for legal issues.
Those jackals, tigers and leopards who are dying and struggling can't completely cover the sky with one hand, and there are naturally people on Old Man Wang's side who are responsible for containing them.
The satellite pots located on the top of several teaching buildings slowly rotated, aiming in the direction of several other universities, the large cauldron was aimed at the far, the small pot was aimed at the near, and several sets of fishbone antennas were added to strengthen the ability to receive and capture signals.
Under the antenna, several sets of special signal modems are connected to send and receive wireless signals of a specific bandwidth, and the maximum distance can reach 20 kilometers, which is the effective ground wave communication distance of high-frequency short-wave electromagnetic signals.
If you want to go farther, you can only aim at the sky and use the ionosphere to refract to a farther distance, but several colleges and universities are not too far apart, and at such a close distance, too much pursuit of sending the signal to a farther place, but it is easy to form a signal blind spot nearby, similar to the darkness under the lamp, and the flat air increases the difficulty of signal reception.
The high-frequency short-wave communication technology is mature, the networking is convenient, the power consumption is small, and the cost is also low, usually used as a teaching, and it is most suitable for the formation of a temporary star-topology high-frequency short-wave communication network between several universities.
The professional teachers in the school are experts, coupled with the assistance of students, the strength of many people, the technical transformation project did not take much time, with the success of the first commissioning, the high-frequency and short-wave communication LAN was quickly established.
In order to ensure sufficient bandwidth, the high-frequency short-wave signal that occupies multiple channels will cause some interference to wireless devices such as nearby mobile phones and walkie-talkies, but the data encryption method and structure are different, even if there is interference, the impact will not be too large, and it will not be like the previous analog signal, there will be the phenomenon of serial numbers, which is also the advantage of digital communication.
Qianjiang University has the most computing resources, and it has become the core of the entire topological structure, with a large amount of data from other universities.
As universities cut off their internet connections, the hacking spree came to an abrupt end, leaving only a few malicious programs that had managed to break in, their last cries soon swept away by highly skilled programmers.
The number of offline terminals that had plummeted quickly was curtailed and slowly began to pick up, with students working to restore distributed computing endpoints and breached computers reconnecting to the distributed computing network.
The hackers' methods have not yet reached the point of destroying the hardware, so they fall down and get up again. "The number of terminals has recovered to 31,732, and it is still increasing in single digits.
The technician who was monitoring the entire distributed computing system suddenly lost his voice and exclaimed, and he retrieved the unusual terminal ID name.
Some people have a big brain, and they actually write a special APP application, and use the mobile phone as a terminal for distributed computing.
Although the computing power of the core processor of the mobile phone cannot be compared with the personal computer processor at all, it can also be gathered into a tower, and the number of accumulations will definitely not be less than the number of personal computers, and the computing power provided to the entire distributed computing system is equivalent to hundreds of more personal computers with good performance.
Completely enclosed large-scale wireless LANs gather extremely large computing resources, and the number of processors alone is no less than that of supercomputing.
Without any interruptions, the computing power is close to that of a mainframe computer, and the data processing power at full capacity is very impressive.
In two days, perhaps less than two days, the digital ciphertext on the soft copy of the black cover will be completely deciphered, and the end of the jackals, tigers and leopards will come.
-
In a 58-storey office building in the heart of the city, the spacious, bright conference rooms are almost filled with billowing smoke.
The ashtray was full of cigarette butts, some of them didn't even finish smoking, and the remaining half of them were directly pressed in, and there were a few disposable paper cups scattered nearby, which were filled with some water, which were also stuffed with cigarette butts, and the water used to extinguish the fire had already turned black.
The paint of the brand-new conference table was stained with cigarette butts, as was the carpet, and the price of the expensive table had plummeted because of these burns.
Five or six red-skinned soft Chinese were unsealed and thrown on the table for others to use.
In two hours at most, they become a member of an ashtray, a paper cup and a trash can.
There were two air filters in the corner, running weakly, and they seemed to be too thick with smoke.
The few figures in the conference room were still spitting clouds, they were standing, sitting, walking back and forth, or whispering to each other, completely unconcerned about the harm of the smoke to their bodies.
"It's broken, it's broken! The people we invited can't get in. ”
A middle-aged man in a light blue shirt and black trousers pushed the door in, but he choked on the smoke in front of him, waved his hand to disperse the smoke in front of him, and it took a while to see the situation in the conference room.
The thick smoke escaped in part and dispersed into the office area outside.
The white-collar workers who threw themselves in front of the rows of desks began to cough violently one after another like waves, and they were choked.
A pot-bellied man sitting at the top of the conference table asked in a calm tone, "What's broken, why can't you get in?"
The middle-aged man in the light blue shirt explained: "Those universities have unplugged the network cables!"
Of course, this is just an explanation, the optical fiber is not easy to pull, at most the gateway equipment is turned off and the power is off, such an operation is enough.
"It's ruthless enough, but they won't be able to crack it successfully!"
A man who had been standing by the glass curtain wall and looking out of the building suddenly turned around, seeming to be a little excited.
If several universities fail to join forces, the divided distributed computing will be greatly inefficient, at least for a short period of time, and there will be no way to parse those digital ciphertexts.
"No, it's not, they're still calculating. ”
The middle-aged man in the light blue shirt shook his head.
The pot-bellied poop man at the top of the conference table frowned and said, "What exactly is the situation, make it clear at once." ”
"According to the reports of the students who gave us the news, several universities have set up a large shortwave communication local area network, which is completely isolated from the external network, and the experts we invited have no way to invade it. ”
The middle-aged man in the light blue shirt also had a worried face, he had an advantage before, and as soon as the network was disconnected, those hackers could only stare dryly.
The man standing by the glass curtain wall asked eagerly, "Is there a way to get into their shortwave communication LAN?"
"We don't know their signal key and how it's encoded, and if we want to crack it, it will take more time, more experts. ”
The middle-aged man in the light blue shirt has consulted a professional.
I am afraid that there is no way to invade this short-wave communication LAN in a short period of time, if the other party also uses frequency hopping technology, the difficulty will increase geometrically, you must know that frequency hopping technology has involved the military field, and it is difficult to crack it in the civilian field.
"So what are we going to do? sit and wait for that old guy to crack the ciphertext, and then invite us to prison one by one?"
The pot-bellied man slapped the table hard, looking very angry.
Old man Wang likes to invite people to eat in prison, which is a special hobby, which was once known to everyone.
"But there's a way!"
The middle-aged man in the light blue shirt suddenly became slurred after saying this.
"When is it?, if you have anything to say, if you are afraid of offending people, I will help you get it!"
The pot-bellied man glared at each other.
"Someone suggested to me that I make a simple electromagnetic bomb and burn all the computers and other electronic equipment......"
The middle-aged man in the light blue shirt was a little embarrassed, but he still spoke up.
"Great, as long as it can be solved with money, it's not a problem, find someone to make this bomb and blow that old guy into the sky. ”
The person who was standing next to the glass curtain wall waved his fist excitedly, BOOM or something the most loving.
The pot-bellied man had a gloomy face, and after a burst of blue and a burst of whiteness, he shook his head.
"No way!"
Throwing a bomb at a school, even if it's just a non-lethal electromagnetic bomb, don't you think you're dying fast enough?
The school has always been one of the government's counter-scales, and it will be killed if it is touched, and there is no possibility of sparing, and the king of heaven and Lao Tzu will still be dragged to the target and shot for five minutes.
The university is a special existence, and no matter how much the outside world fights, it is difficult to burn the fire inside.
Although there are some rules that can be used to add blockage reasonably, it is only limited to blockage.
Do those guys who pinch the grid dare to go to the campus and cut the thread?
Don't dare to borrow ten dares!
I was beaten to death by the students inside, and I died in vain!
If you are not convinced, you can review the May Fourth Movement.
There is more than one guy who was caught committing a student and being caught sacrificing to the heavens in history.
-
Genius one second to remember the address of this site:. Mobile version reading URL: m.