Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in hlnovel.com -> Historic -> battlefield contractors

Chapter 5152 Breaking the system

Previous page        Return to Catalog        Next page

    "If we talk about fighting, we can still help. But computers" Lin Rui looked at everyone else and could only grin.  ¡°I estimate that the most we can do is browse the web and send and receive an email.

    We really have no way to think about this.  "

    Jimmy frowned, "In other words, you can complete the crack, but the crack may take longer. What if there are other computers that can assist in the calculation?"

    "It has to be a mainframe. Personal computers like ours are totally useless." Cobain shook his head.

    "I know there is another place on this island with a large mainframe." Jimmy whispered, "Have you heard of a virtual currency mining station?

    In recent times, the value of virtual currencies has been rising.  There is a group of people on this island who are organizing and using large computers to mine virtual currencies.  These places are commonly known as virtual currency mining stations.  "

    Cobain¡¯s eyes lit up, ¡°Virtual currency mining station? I understand. They need large computers to mine virtual currency, and they need a very powerful display core, which is the computing power of GPU.

    Utilize the powerful computing capabilities of these GPU display cores to mine virtual currencies.  If we can find a similar device.

    I can call the computing power of the GPU display core of these devices to assist our cracking operations.  How come I didn't think of this?  "

    Kuai Ma stood up immediately, "Where are those virtual currency mining stations? I think we have to do some work."

    "At the seaside, because those devices generate a lot of heat during calculations and the temperature is relatively lower than the seaside, it is also convenient to set up a water cooling system." Jimmy whispered, "If you want to do it, I can take you there."

    "Stop talking nonsense and get on your way immediately." Sergey waved his hand.  "Goodbye, computer genius. I'll bring you what you want in a few hours at most. But you'd better make sure it's useful and don't let me risk it in vain."

    Jimmy turned to look at Lin Rui.  Lin Rui looked at his watch and nodded in agreement, "Be careful, our goal is equipment, I don't want any casualties."

    An hour later, Jimmy drove a truck over. Sergey, Kuai Ma and others used a crane to lift a large piece of equipment from the truck.

    "Damn this thing is really big, big and heavy. I have never stolen anything so heavy." Sergey shook his head and got out of the car.

    "Genius! Come here and see if this thing meets your requirements? There are several big houses over there full of these." Kuai Ma asked Cobain.

    Cobain checked it quickly and said, "Okay, very good job. This is a professionally customized, multi-unit display core array.

    ??This thing will definitely be so fun to play computer games with.  However, coupled with the computing power of this GPU, it is enough to assist us in completing the crack.

    I have to say you did a great job!  "

    "You don't need to say that?" Sergey looked disdainful.

    "You'd better work quickly, maybe the news will be broadcast tomorrow morning. Bandits attacked the virtual currency mining station and stole large equipment." Jimmy spread his hands.

    "What about you?" Kuai Ma turned around and asked.

    "I have to wipe your butts clean without leaving any traces that can be traced." Jimmy sighed, "This is called aftermath work, and that's what I do."

    Lin Rui nodded to him.

    Mr. K really found the right informant. Not only is he outstanding in ability, but he is also thoughtful.

    ¡°And judging from Jimmy¡¯s skills, he is likely to be more than just an informant.

    It is very likely that he also has an intelligence background.

    Lin Rui turned his head and asked the mercenaries to cooperate with Cobain to remove the equipment and help him complete the installation and connection.

    By this time, the time was approaching. At nine o'clock in the evening, there was not much time left for them.

    Then Cobain went online urgently and called on his many brothers on the Internet to work together to start the cracking process.

    With the support of large computers, the progress of cracking is hundreds or thousands of times faster than before.

    Soon they discovered that the progress bar, which had been stationary at 80%, finally began to move forward slowly.

    "It's done." Cobain, who had been staring at the computer screen, breathed a sigh of relief.  ¡°But can we complete the entire cracking process during the night?

    I can¡¯t guarantee it yet.

    ¡°All I can say is that it¡¯s promising, well done, guys.  This is true teamwork.  "

    Indeed, as Cobain said, this kind of brute force cracking requires a lot of patience.

      Even with the support of large computers and the full assistance of multiple hacker masters.

    They were also able to complete the crack within the stipulated time.

    The permission to use large-scale commercial computers is time-limited.  But they at least managed to finish before the time limit.

    Cobain no longer knows how many cups of coffee he drank, and his eyes are already red.  But he still couldn't hide his excitement.

    "The crack was successful. We broke through Bradley's most advanced security defense system overnight.

    It¡¯s a pity that this matter cannot be made public.  If it were to be made public, this would definitely be another myth in the history of hackers.  "Cobain was dancing with excitement.

    "Okay, genius. I've known for a long time that you can do it. But now you'd better come up with a way to help us in action." Lin Rui patted him.

    "No problem. Once the system is cracked successfully, I can use technology to create a virtual host.

    Then connect their security system to my virtual host.  All instructions issued by the security system will enter this virtual host for verification.

    And all the signals sent by my virtual host will be marked as legal behaviors for testing.

    In this case, the security system will not be triggered by default, and all defenses of the entire security system will be released.

    Including their AI control monitoring equipment, alarm devices, and partition defense solutions.

    Everything will fail.

    Because the remote host here will tell the system that all this is legal.

    And their security defense system will default to my virtual system, which is the main server of the security company.  "Cobain explained.

    "I'll interrupt, can you say something I can understand?" Sergey said dumbfounded.

    "Well, to put it simply. Their security defense system was controlled by me. All automatically executed security defenses were completely ineffective.

    But you still have to avoid the cameras, because those cameras are likely to be directly connected to the security office display screen.

    For example, other infrared monitoring, or camera monitoring all controlled by AI, will all fail.  It doesn't matter if you dance in front of the camera in the surveillance area.

    The system will not trigger an alarm.  But even so, you still have to be careful with the guards on duty.

    I can control the computer system, but I can't control the guards.  ¡± Cobain replied.

    If you like battlefield contractors, please collect them: battlefield contractors are updated the fastest.  (Remember the website address: www.hlnovel.com
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report