HK027 Be prepared(2/2)
After connecting to the two servers through the router, Shi Lei started to invade the other server from the graphics workstation.
The ordinary server was named No. 1 by Shi Lei. It would be Shi Lei's springboard for connecting and controlling other servers.
Server No. 1 is running the Panshi firewall that Shi Lei has written in the past few days.
Panshi Firewall is a firewall conceived by Shi Lei in his previous life. It uses some of Shi Lei's unique insights to provide a very targeted defense against hacker attacks.
The Panshi firewall is fully opened to protect the unattended No. 1 server.
Shi Lei concentrated on invading from the graphics workstation to the No. 1 server.
Although the performance of Server No. 1 is not even one thousandth of that of Shuangqing University's server, it has initially resisted Shi Lei's attack at this moment.
"The power of the rock is quite powerful!"
Shi Lei was typing on the keyboard, and combined with the poor performance of Server 1, he began to execute a malicious memory overflow attack.
The Panshi firewall constantly blocked Shi Lei's attacks, and the information that overflowed the memory was directly repaired by the Panshi.
"Not bad!"
"It's just that Brother Shitou can't beat me!"
Shi Lei used another method, disrupting the function of the firewall and confronting the firewall head-on.
Not long after, server number one was breached by Shi Lei.
Although the Panshi Firewall was powerful, the performance of the server itself was a bit too poor, which caused the firewall to collapse and was taken over by Shi Lei.
"What a tragedy!"
"When I get rich, I must buy a supercomputer and use it as a server!"
The strength of the server's defense capabilities, in addition to the server system, server security policy, and server firewall, is also related to the performance of the server hardware.
If there is a problem in any aspect, the server may be hacked!
Although the hardware performance of Server No. 1 is not very good, Shi Lei is very satisfied with the defensive capabilities of Panshi Firewall.
After all, not everyone is the world’s top hacker!
The world's top hackers would not be stupid enough to hack a workstation-level server and use it as a chicken.
After the preliminary test of server No. 1, Shi Lei opened the scanning tool and scanned the server system thoroughly again.
He himself wrote a security authentication program on the graphics workstation to protect the No. 1 server.
Server No. 1 will be used to steal supercomputers.
Once successful, Server No. 1 will control the ninth-ranked supercomputer in the world.
Its importance is self-evident!
Shi Lei needs to use special security measures to ensure the safety of Server No. 1.
Ordinary password protection, this is the most basic!
Shi Lei initially planned to write an image processing program to cooperate with the use of cameras to perform facial feature authentication.
However, the facial feature authentication program is a huge project. Even if Shi Lei had completed it in his previous life, it would take a long time to rewrite it.
Unable to use facial feature authentication immediately, Shi Lei had another idea.
Behavior dynamic capture program!
Using the behavioral dynamic capture program with the camera, Shi Lei can pre-set a behavioral dynamic image password.
Then use the camera to capture specific action combinations.
If you want to unlock the behavioral dynamic capture program, you must face the camera and perform a preset combination of unlocking actions.
If the preset action combination is not correctly made to unlock the behavioral dynamic program, server No. 1 will only run the ordinary Windows.Server.2003 standard version virtual system.
If the camera captures the action of forcibly shutting down or unplugging the power supply, it will control the hard drive and brake to perform a low-level format!
Protect No. 1 without weapons to the maximum extent!
It took Shi Lei nearly ten hours to write a preliminary version of the behavioral dynamic capture program.
For the safety of Server No. 1, Shi Lei was fully prepared!
————————————————————————————————————————————
PS: There are 3151 recommendation votes. Mission goal: 3400 recommendation votes before 20:06 pm.
Reward: One more chapter added at 20:06!
Asking for recommendation votes, asking for member clicks, asking for favorites, asking for tips, evaluations, comments, etc.~~~~
——
[Thank you for tipping] Ke Xiaowu, tip 200
.
.
.
;
Chapter completed!