home

search

Chapter 48: The Ultimate Hacker Plan!

  Chapter 48: The Ultimate Hacker Plan!

  "Thanks to book friend 'Tian Di Shen Gong' for the second reward support! Bowing! Today is Labour Day, wishing everyone a happy holiday and taking the opportunity to ask for recommendation votes. Everyone use your votes to crush me!"

  At this moment, Feng Xiang Tian was staring blankly at the computer, although he had been kicked out of the local area network again, but he was not discouraged. At this moment, he was thinking about how to deal with that supercomputer.

  Just as Feng Xiatian was deep in thought, the lights inside the house suddenly flickered. This was caused by a fluctuation in voltage. Feng Xiatian was worried that the computer would be damaged due to unstable voltage, so he immediately looked down at the case. Fortunately, the voltage fluctuation was still within the range that the computer could withstand, and no malfunction occurred.

  Wait! Voltage... computer... voltage... computer...

  Feng Xiao Tian suddenly thought of something, and he stared intently at the computer case, his mind racing with thoughts. A moment later, he jumped up from his chair, exclaiming: "I've got it! I've figured out a way!"

  What method did Feng Xiaotian think of? The answer is simple, that is, by controlling the power supply of this supercomputer, causing voltage fluctuations, and thus affecting the processing speed of the computer itself. As long as the computer's processing speed becomes slow, he can achieve his goal.

  Talking about this, it's necessary to mention the working principle of computers. As we all know, a computer is constructed by both hardware and software, with an inseparable relationship between them. The software is responsible for processing information, but in order for the software to process information, it needs support from the hardware.

  The performance of a computer depends to a large extent on the configuration of its hardware, and using different processors or motherboards will affect the performance of the computer. Among them, one point is most critical, that is, the CPU of the computer, also known as the "processor".

  The processor belongs to computer hardware, but its connection with computer software is very close. Computers are all binary (there are other bases, but these bases will also be converted into binary in the data processing of computers). Any information is obtained by superimposing and calculating the two digits "0" and "1". It can be said that all accessories of a computer, including software, are built on this basis. Software wants to complete information processing through "0" and "1", it must go through the processor.

  On the processor, there are many tiny transistors densely packed. After receiving messages from software, the processor controls these transistors to turn on or off continuously, allowing current to flow through different channels within the processor. Finally, the software determines the result based on the channel through which the current flows, achieving computer information processing. The path of current flow is actually a logical operation process, with each channel representing a different result. Software obtains the final calculation results based on these results.

  Feng Xiaotian's plan was based on this principle, as long as the processor's voltage is unstable, the processor itself will be disordered. If the software's calculation instruction is 1+1=, the processor may give any wrong number, and then the computer's operating system will also have problems. At that time, Feng Xiaotian can take advantage of the situation.

  Who would have thought of this method? Hackers are all masters in programming, but who would conduct such in-depth research on hardware? Only Feng Xiaotian would think of this. Since he got this computer, he has been studying it from various aspects. In order to connect the computer to a wireless network, he even went to the library for in-depth study. So it's not surprising that he thought of this point.

  Of course, there are also realistic reasons for this. If it weren't for the unstable voltage causing the light bulb to flicker, he would have thought of this point with great difficulty. In short, this brilliant idea had already formed in Feng Xiaotian's mind. What he needed to do next was to implement this plan, which was also Feng Xiaotian's last resort. If this plan didn't work out, he was ready to give up, because he couldn't think of a better way anymore.

  Feng Xiaotian first used the IP of NORAD as a node to search for adjacent networks, what he was doing was trying to find the power plant that provided electricity to NORAD. Feng Xiaotian knew that the United States was a very modernized country and had achieved computer-integrated management in many fields, so the power plant should have used computers, which would enable more intelligent control of electricity and achieve energy-saving purposes.

  A few minutes later, Feng Xiang Tian found this power plant, but what shocked him was that it turned out to be a nuclear power station!

  It has to be said that the North American Aerospace Defense Command, as a unit holding the secrets of US nuclear missiles, is indeed powerful in its own configuration, and even uses nuclear power plants.

  Feng Xiao Tian paused for a moment, then made up his mind: things have come to this point, giving up would be a pity. I'm just controlling the voltage of the hacking competition organizer, it has no effect on the nuclear power plant, so... let's continue!

  The nuclear power plant's network was not connected to the outside world, but Feng Xiaotian still managed to infiltrate it because they had phones after all. As long as there was a channel for transmitting network information, Feng Xiaotian could complete the intrusion. He had already tested this on the North American Aerospace Defense Command, and the method was the same. Without much effort, Feng Xiaotian sneaked into the nuclear power plant's central control system, then observed the execution program in the system for a moment before withdrawing.

  Feng Xiao Tian wrote a program on his computer based on the information he observed, and this program had only one purpose: to crazily change the voltage of the power usage unit.

  The program was simple, just a very small instruction program, Feng Xiaotian only spent three minutes to complete it, and then he once again sneaked into the central control system of the nuclear power plant, putting the program in a very hidden place. What he had to do next was to get the opportunity to dialogue with the "Fortress" computer, which required him to invade the opponent's network again.

  James had ordered all physical cables to be severed, thinking that would completely isolate Feng Xiaotian's invasion, but was it really so?

  The answer given by Feng Xiaotian is affirmative! At present, there is only one invasion path left, that is, the wireless signal transmitted through satellite completes the invasion!

  This can also explain why Feng Xiang Tian didn't feel depressed when he was finally kicked out of the LAN, because he still knew about this last route, his own computer was connected to the internet through a wireless signal, and at that time, in order to achieve this, he had spent countless effort, which left a deep impression on him, how could he forget?

  The people at NORAD had no idea that a massive invasion storm was about to hit, the biggest threat this institution has ever faced since its inception!

Recommended Popular Novels