Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume 1 Chapter 418 Undercurrent (5)

Previous page        Return to Catalog        Next page

    Chapter 418: Undercurrent (5)

    Chapter 418: Undercurrent (5)

    "Has anyone customized this supercomputer in China? Who?" Zhang Yang asked curiously. Currently, this kind of supercomputer is available in China. Zhang Yang really didn't expect Ordinary high-tech companies have no need to use supercomputers.  Computers, this kind of supercomputer are generally used for scientific research, such as medicine, military weapons, etc. In fact, IBM sells most of these supercomputers to various departments in the United States, and very few are sold to private companies.

    "Uh this, the customer asked for confidentiality." The sales manager choked immediately.

    Zhang Yang rolled his eyes and immediately replied: "If you don't tell me, I won't buy this server. At worst, I will find Dell or other companies. Their servers are also good, or I can find Apple."  Star Group is now Apple's largest shareholder, and the sales manager naturally knows this.

    Zhang Yang¡¯s words made the manager a little confused. It¡¯s not that he didn¡¯t want to say it, but that he really didn¡¯t know. He had only heard about it through gossip within the company. It seemed that a Chinese had bought such a supercomputer.  "Well, it's not that I didn't tell you, Mr. Zhang. It's that I didn't know. Because the other party did not directly customize it from a domestic branch, but customized it from a foreign company and then transported it back to China, and even the installation personnel  None of them are from the company, so we don¡¯t know about it. I only accidentally learned about it from other colleagues. Oh, by the way, it seems to be in our H city." The sales manager said quickly.

    "Are you sure?" Zhang Yang raised his eyebrows. For some reason, Zhang Yang suddenly thought of the more than thirty express deliveries Xiang Tingwei had received, as well as the huge amount of transportation.

    "OK." The sales manager gritted his teeth and typed back with certainty. Anyway, the other party couldn't investigate the specific situation, so let's just keep it in the dark. You have to know how much commission you can get for selling this order!  "Three hundred million dollars. If you can do this business, I will take it. However, the installation, transportation costs, etc., I require that the installation be completed within half a month. At the same time, you have to send technicians to design and decorate the computer room for us.  ." Zhang Yang did not continue asking and directly changed the topic.

    "Three hundred millionI need to apply with the above." The sales manager hesitated and replied.  "No problem, you go and ask now, I'll wait here for you." Zhang Yang said immediately.

    Zhang Yang took a quick look and found that this supercomputer covers an area of ??nearly 700 square meters and has a total weight of 282.3 tons.  With a weight of nearly three hundred tons, whether this office building can bear it is still a question.  After the sales manager went to consult, Zhang Yang directly turned to the power supply department of the municipal government. For some reason, the manager just said that someone in China had ordered a set of such supercomputers, and Zhang Yang thought of Xiang Tingwei.

    Although it felt a bit unbelievable, Zhang Yang decided to investigate. At least Xiang Tingwei's villa had a huge basement excavated during the renovation. This is an indisputable fact.  The amount of electricity consumed by such a huge computer will be a terrifying figure. What exactly is under Xiang Tingwei's ground will be completely clear just by checking the files of the power company.

    Zhang Yang quickly hacked into the power company's system and immediately began to search for the electricity consumption of Xiang Tingwei's community. He didn't even need to search for individual households, just search for the electricity consumption of the entire community to find out.  The electricity consumption of such a supercomputer may exceed the electricity consumption of all users in the entire community combined in one month.

    After calling up the electricity consumption of the entire block of Xiang Tingwei's community from the power company's internal system, Zhang Yang's eyes narrowed.  There are only more than 300 villas in the villa community where Xiang Tingwei is located, but the electricity consumption of these more than 300 villas has almost caught up with the electricity consumption of the entire block in another nearby block. There is no trick here unless there is something wrong.  .

    Zhang Yang didn¡¯t investigate in detail. He directly erased all traces of his intrusion and then turned to Telecom¡¯s server.  H City Telecom's system is like Zhang Yang's backyard, you can enter it however you want.  Zhang Yang thought for a while, and instead of using the broilers commonly used for infected insects, he simply put aside the infected insects and replaced them with several other groups of domestic broiler chickens.

    If you use the same group of broilers as the infected insects, although it is unlikely to cause problems, once you are used to using them, it is easy for experts to detect the problem, so as not to let the other party connect the two IDs l and gscsd. Zhang Yang must now be a good l.  As for the character, as for the ID of gscsd, let the infected bug impersonate it for the time being.

    After replacing the broiler, Zhang Yang re-entered the telecommunications server and found all the users who had installed broadband in that community. Zhang Yang found the registered name according to the house number of the house.  The registered name and the recipientThe name of the person is the same, but it is not Xiang Tingwei's name. It seems to be the name of a woman.

    It was directly connected to the 100M optical fiber. After checking this, Zhang Yang thought about it and switched to the port server of China Telecom.  Although Zhang Yang has always been in the telecommunications system, the two systems are relatively independent.  He used his own scanner to re-scan the port server and confirmed that there was no problem before Zhang Yang hacked in directly.  The port server can operate the network port of each telecommunications user according to his account.

    People who often use broadband to log in automatically will have this experience. After a long time, they will occasionally be unable to log in. That is, the account is stuck in the port server, and you need to call customer service to refresh it before you can reconnect.  This is the server that Zhang Yang hacked now. From here, Zhang Yang can check the traffic usage of Xiang Tingwei Broadband.

    If the supercomputer was really ordered from Ting Wei, there would be a big problem. Computers are not like sports cars. If you have more money, you can spend it.  But for ordinary people, there is absolutely no need for you to buy a supercomputer. Not to mention its expensive price, you may not even be able to afford the electricity bill it uses.

    Although Xiang Tingwei said that his father is an executive deputy governor, even an executive deputy governor is a huge corrupt person. How do you want to steal 400 million US dollars in funds?  According to the current exchange rate, 400 million US dollars is equivalent to 3.2 billion RMB, which is not a small number.

    The most important thing is that no matter how good a hacker is, there is no need to buy a supercomputer and use it as hacking other people's hardware, right?  This is too extravagant. Even if Zhang Yang is so rich now, he will not be so extravagant. If it were not for the infection bug, Zhang Yang would just buy some servers instead of this supercomputer.

    In the system search window, Zhang Yang entered the broadband account number of the villa where Xiang Tingwei lived. After hitting Enter, a system prompt box suddenly popped up.  "The system network is abnormal. Do you want to resend the request?" Zhang Yang subconsciously moved the mouse and clicked on it.

    The moment the mouse was placed on it, a flash of light suddenly flashed in Zhang Yang's mind, and he moved the mouse away fiercely.  Zhang Yang quickly moved to the computer screen and looked at the prompt box carefully.  No problem could be seen from this system prompt box, but this sentence reminded Zhang Yang of something.

    A thing buried deep in his memory was probably a year before Zhang Yang was reborn in his previous life. If Zhang Yang remembered correctly, he assisted Thanatos in tracking down another super hacker. That super hacker did not have a fixed ID, and the network  Hackers on the Internet call him Troy.

    Troy is a literal translation, and Troy itself means Trojan horse. Troy is not only a hacker, but also a commercial spy. He is also famous on the Interpol's wanted list.  It is said that there is nothing that he and his partners cannot steal. Of course, Zhang Yang doesn¡¯t know the truth. What impressed Zhang Yang deeply was that when thanatos took him to fish for Troy, a tracking software used by thanatos was triggered.  After that, a current dialog box will pop up.

    In six years, Thanatos taught Zhang Yang too many things, and Zhang Yang also experienced too many advanced techniques with Thanatos. Many things Zhang Yang had forgotten. If it hadn't been for the flash of inspiration in his mind just now, Zhang Yang would also have learned so much.  I won't think about it.

    coincide?  Zhang Yang's eyes narrowed quickly. Zhang Yang did not click on the dialog box, but quickly opened the analysis software and directly entered two instructions to start analyzing the underlying processes of the telecommunications port server system.  When the system processes were listed one by one on Zhang Yang's screen, Zhang Yang finally discovered the difference.

    Because when he saw this tracking software that can be called phishing software in his previous life, Zhang Yang saw how thanatos was placed. Just in case, when Zhang Yang found this process, he immediately discovered its anomaly.  A small program was embedded inside this process. Seeing this program, Zhang Yang was sure that the server had been tampered with.

    Zhang Yang felt a little chill on his back, and a cold sweat broke out out of nowhere. He who had always had the upper hand in the fight with anubis during this period seemed a little careless without realizing it. When he saw this phishing software  , the entire series of events discovered by Zhang Yang today appeared directly in his mind.

    coincide!  What a coincidence!  mlgbd, so insidious!  Zhang Yang couldn't help but uttered a curse word. If he hadn't been reborn, Zhang Yang would have been completely passive if he had clicked on the yes or no option just now.
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report