Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in hlnovel.com -> Historic -> battlefield contractors

Chapter 5151 Technical Bottleneck

Previous page        Return to Catalog        Next page

    Sergey was very fast, and soon he invaded the security equipment manufacturing company through the network.  Obtained a backup system that is only available to registered users.

    Next, we started to crack it.

    Lin Rui and others are not idle either. They are mainly responsible for reconnaissance.

    Near the target building, they established three observation points and began a long period of surveillance through telescopes and surveillance cameras.

    Observations are recorded every fifteen minutes.  This can ensure that they have a more detailed understanding of the action patterns of the other party's guards.

    This process is a rather boring process, requiring long-term observation without being discovered by the other party.  It is a great test for the monitor's patience.

    But it was not without results, after two consecutive days of monitoring.  They figured out the basic rules of guard action.

    And it can be initially judged from the position where the guard appears.  The so-called room should be on the first floor of the building, in the second row on the right.

    Because when the shift is changed at night, only that room has people moving around.  So it is basically certain that that room is the guard's duty room.

    And the distance between this room and the walkway can be judged by the guard's normal walking speed.

    In summary, all of the above are consistent, and the location of the guard duty room is basically determined.

    And they also have a general understanding of the activity areas of the guards on each floor.

    But to their surprise, Cobain and his team encountered certain bottlenecks in cracking the security system.

    When the crack level reached 80%, the progress stopped.

    This means that the security equipment company has adopted a new algorithm.  They require more time to process.

    After learning that the progress was delayed, Lin Rui found Cobain and asked, "Cobain, tell me what is going on now?"

    Cobain shook his head, a little helpless, "Currently, all evidence shows that the other party has adopted a new core algorithm.

    This means we have to perform more complex calculations, and we have more powerful computers.  "

    "Is there no other way to crack it?" Lin Rui frowned.

    "Unless we get their core algorithms. But it's impossible now. We can only rely on brute force. And if we want to brute force, we have to have more powerful equipment. Large computers that can perform complex operations." Cobain shook  shook his head.

    "Aren't you very powerful?" Kuai Ma couldn't help but said, "How can a security system stump you?"

    ¡°Listen, it¡¯s not like I can¡¯t hack it,¡± Cobain explained, ¡°actually any security system can be hacked.

    Since the emergence of security systems and hackers in this world, the war between cracking and anti-cracking has never stopped.

    No system is foolproof and may be breached by hackers.

    The world¡¯s top security companies understand this, so they regularly upgrade their systems.  Use a more complex algorithm instead.

    Prevent your own system from being cracked, forcing your security system to require a more powerful advanced computer to be cracked.

    Of course ordinary civilian computers can also be used, but of course that requires a very long process.  Several years or even ten years.

    In this cycle, the security system has been upgraded several times.

    If in the old days of Black Island, we could use large computers, I could even use the computers there to access multiple universities or research institutions and use their computer resources.

    But now I only have this broken computer. I can indeed get support from other brothers on the Internet and let them help crack it.

    But this is still not enough, we lack large computer resources.

    Even if I unite with other brothers through the Internet, let them fully cooperate with me.  The resources called are still not enough. At this rate, we will have to wait at least a month to complete the system cracking.

    This is not limited by our capabilities, but by hardware conditions.  You can't expect me to use a small calculator as big as my palm to calculate such a complicated program.  "

    Kuai Ma has nothing to say.  Because what Cobain said makes perfect sense.

    It is simply unrealistic to use a personal host to crack the most advanced security defense system.

    Even though Cobain had a team that could work as a team through the Internet, the lack of computing power was always a Achilles heel.

    Jimmy thought about it and suddenly said, "Can such a large commercial computer be used?"

      "Yes, but it depends on how big it is." Cobain replied.

    Jimmy thought for a while, "The Cayman Islands is an offshore financial center. As far as I know, there are many large commercial computers here. Because as a financial center, financial information from all over the world must be concentrated here.

    ? Various information on stock futures or other securities requires large-scale commercial computers to be processed.  These computers are under maintenance at night.

    Because during this period, securities trading is suspended.  If you could borrow one of these large commercial computers, wouldn't it be able to greatly shorten your computing process?  "

    "Exactly, but can you get access to such a large commercial computer?" Cobain frowned.

    "Perhaps there are some. In order to investigate the flow of illegal funds, we secretly obtained the use of large-scale commercial computers from some securities companies.

    ?Perhaps you can call these computers for processing through these permissions, but it must be completed at night.

    Because it will be discovered during the day.  "Jimmy nodded.

    He took his computer, which contained accounts and passwords for remote login to multiple large commercial computers.

    "Great, well, this really solves a big problem." Cobain quickly took it over, and after checking it, he frowned again.

    "What's wrong? Isn't it okay?" Lin Rui asked.

    "These large computers are commercial, and their computing power is still somewhat insufficient. Compared with the large computers used by some well-known universities and the military, there is still a gap." Cobain shook his head, "According to calculations, the limited hours at night are not enough.  It cannot meet our needs to crack the program."

    Sergey couldn't help but said, "So troublesome? Haven't you been able to hack into the computer system of the US military Pentagon since you were a child?

    Why are you having so much trouble with a security program now? Brother, your hacking skills have deteriorated.  "

    "It's not that hacking technology is regressing, but that hardware technology is improving." Cobain shook his head, "Computer capabilities a dozen years ago are not at the same level as they are now.

    If you don¡¯t believe me, look at a computer from more than ten years ago. Can you still use it now?  I guarantee that you can barely run the system, and even opening a web page will be stuck to death.

    These commercial computers can indeed be used, but it is still not enough to complete the crack within the specified time.  "

    If you like battlefield contractors, please collect them: battlefield contractors are updated the fastest.  (Remember the website address: www.hlnovel.com
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report