Battlefield Contractor

Chapter 5148: Technical bottleneck

Sergey was very fast, and soon he invaded the security equipment manufacturing company through the network. Obtained a backup system that only registered users can obtain.

Then began to crack.

Lin Rui and others are not idle either, they are mainly in charge of reconnaissance.

Near the target building, they set up three observation points respectively, and began a long surveillance through telescopes and surveillance.

Observation records are made every fifteen minutes. This can ensure that they have a more detailed understanding of the law of action of the opponent's guard.

This process is a rather boring process, long-term observation, but can not be found by the other party. The patience of the monitor is a great test.

But it is not without results, it has been monitored for two consecutive days. They felt the basic law of guard action.

And from the position where the guard appeared, a preliminary judgment was made. The so-called should be the first floor of the building, the second row of rooms on the right.

Because when changing shifts at night, only that room is shaking. So basically it is certain that that room is the guard's duty room.

And you can judge the distance of this room from the walkway by the guard's normal walking speed.

In summary, all of the above are in line, and the location of the guard duty room is basically determined.

And they also have a general understanding of the activity area of ​​each guard.

But to their surprise, Cobain and his team encountered a certain bottleneck in cracking the security system.

When the degree of cracking reached 80%, the progress stopped.

This means that the security equipment company has adopted a completely new algorithm. They need more time to process.

After learning that the progress was delayed, Lin Rui approached Cobain, "Cobain, tell me what is going on now?"

Cobain shook his head, a little helpless, "At present, all kinds of evidence show that the other party has adopted the new core algorithm.

This means that we have to perform more complex calculations, and we have more powerful computers. "

"Is there no other way to crack it?" Lin Rui frowned.

"Unless we get their core algorithm. But now it is impossible, we can only rely on brute force to crack. And if brute force is to be used, we have to have more powerful equipment. A large computer that can perform complex calculations." Cobain shakes Shook his head.

"Aren't you very good?" Kuaima couldn't help but said, "A security system will stump you?"

"Listen, I can't crack it." Cobain explained, "In fact, any security system can be cracked.

Since there were security systems and hackers in this world, cracking and anti-cracking, the war between the two sides has never stopped.

No system is foolproof, and it may be compromised by hackers.

The world's top security companies also understand this, so they will regularly upgrade their systems. Use a more complex algorithm instead.

Prevent your own system from being cracked, forcing your security system to require a more powerful advanced computer to be cracked.

Ordinary civilian computers are of course also possible, but of course it takes a very long process. A few years or even more than ten years.

In this cycle, the security system has been upgraded several times.

If in the black island before, we could use a large computer, and even I could use the computer over there to enter many universities or research institutions and use their computer resources.

But now I only have this broken computer in my hand, and I can indeed get the support of other brothers on the Internet to let them assist in the cracking.

But this is still not enough, we lack large-scale computer resources.

Even if I unite with other brothers through the Internet, let them cooperate with me fully. The resources called are still not enough. If we calculate at this speed, we will have to wait at least one month for the system to be cracked.

This is not limited by our capabilities, but by hardware conditions. You can't expect me to use a small calculator the size of a palm to calculate such a complicated program. "

Kuaima has nothing to say. Because what Cobain said is totally reasonable.

It is simply unrealistic to use a personal host to crack the most advanced security defense system.

Even if Cobain has a team that can work in a team through the Internet, the lack of computing power is always a culprit.

Jimmy thought about it, and suddenly said, "Can such a large commercial computer work?"

"Yes, but it depends on how big it is." Cobain replied.

Jimmy thought for a while, "The Cayman Islands is an offshore financial center. As far as I know, there are many large commercial computers. Because as a financial center, financial information from all over the world must be gathered here.

All kinds of information about stock futures or other securities need to be processed by large-scale commercial computers. These computers are under maintenance at night.

Because of this period, securities trading is suspended. If you can borrow one of the large commercial computers, can you greatly shorten your calculation process? "

"Exactly right, but can you get access to such a large commercial computer?" Cobain frowned.

"Perhaps there are some. In order to investigate the flow of illegal funds, we secretly obtained the use of large commercial computers from some securities companies.

Maybe you can use these permissions to call these computers for processing, but you must do it at night.

Because it will be found during the day. "Jimmy nodded.

He took his own computer, which contained accounts and passwords for remotely logging in to multiple large commercial computers.

"It's great, um, this really solves the big problem." Cobain quickly took it, and after checking it, he frowned again.

"What's the matter? Isn't it okay?" Lin Rui asked.

"These large computers are commercially available, and there are still some insufficient computing capabilities. Compared with the large computers used by some well-known universities and the military, there is still a gap." Cobain shook his head. "According to estimates, the limited hours at night are fundamental Can’t meet our needs for cracking the program.”

Sergey couldn't help but said, "So troublesome? Haven't you been able to invade the computer system of the US Pentagon since you were a child?

Why is it so hard to break a security program now, man, your hacking skills have regressed. "

"It's not that hacker technology has regressed, but hardware technology is advancing." Cobain shook his head. "The computer capabilities a dozen years ago are not at the same level as they are now.

If you don’t believe me, take a look at the computer more than ten years ago. Can you still use it now? I guarantee that you can barely run the system, even opening a web page, it will be stuck.

These commercial computers can indeed be used, but it is still not enough to complete the cracking within the specified time. "

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like