Need for little hackers

Chapter 294 A Thousand Miles Away Model

Chapter 294 A Thousand Miles Away ([-]) Model

315,

Qina took 30 seconds to prove his identity, which made him a little annoyed, but there was no other way, if someone else, I am afraid they would not have verified Qi Na's identity so quickly.

Even Mr. Zhao Desheng probably didn't really believe in Qi Na's identity, but out of intuition, he chose to believe it.

After hanging up the phone, Qi Na was still a little worried, and kept calling Wu Jun, urging him to leave as soon as possible.

Wu Jun didn't know whether to laugh or cry: "I've arrived at the airport and am going through the security check."

Qi Na also felt that he was too anxious, so he arranged for Jianning to charter a plane at the new Hong Kong airport, ready to pick up Meg and Jenny at any time.

Restless, Qi Na ushered in the New Year's Eve in North America.

He didn't go out, so of course everyone had to accompany him.

Everyone knows how delicate the situation is now, so no one dares to leave too easily.

More than an hour later, Mr. Zhao's assistant called and informed them that through Mr. Zhao's contacts, a deputy director of the Hong Kong Police Force had made arrangements for Qi Na's reaction.

Mr. Zhao's young assistant said very positively: "Mr. Xiang, don't worry, they should be dealing with it now."

Qi Na asked Zhao Desheng to keep it secret, so Mr. Zhao's assistant didn't know the inside story, let alone the Hong Kong police.

Emily thanked her, hung up the phone and said to Qi Na: "Is it superfluous to ask Zhao Desheng to keep it secret?"

Now the first thing is to find Meg and Jenny, whether the large-scale search is faster and safer.

This is also the opinion of Duan Zhengfei and Lisa.

Qina understood that they had misunderstood him, and said, "It's not that I'm still thinking about whether to scare the snake, or about the information in Meg and Jenny's hands."

He paused: "But if they really have information in their hands, if we really mobilize to search for them on a large scale, if the other party jumps over the wall in a hurry, it will damage their safety."

As soon as Qi Na explained, everyone understood.

If Meg and Jenny are really missing, and the people from San Siro did the case, then they must have discovered that very, very important information has been leaked and need to be blocked, then the detained Meg and Jenny have two ways out. First, if The people in San Siro missed their old love, and for the sake of their old colleagues, they stayed with them to survive and wait for the judge to pronounce the sentence before releasing them.This is a bit of a fight for character, completely unreliable, and can only be lucky.

As for the second possibility, the other party has already dealt with these two people, and it's over.There will never be future troubles.

Lisa nodded, she somewhat understood the reason why Qi Na was so anxious and anxious, because when they were regretting, Meg and Jenny were suffering from life and death.

Time passed quickly, and Wu Jun arrived in Hong Kong in a blink of an eye, and with him was Xiao Xu, whom Qi Na could trust.

It would at least be safer for the two of them to travel together, and Qi Nalue felt relieved, but disagreements arose about whether they should contact Mr. Zhao as soon as possible.

Wu Jun insists on acting independently, and he naturally distrusts strangers in his heart.

Qi Na was already brooding over Meg and Jenny's loss of contact, how could it really put Wu Jun and Xiao Xu in danger again.

At this time Lisa persuaded Qi Na: "You can let them contact Sheriff He."

Wu Jun didn't know that there was still a group of people investigating, so he asked Lisa for details.Seeing that Wu Jun insisted, and Sergeant He's line seemed to be very safe, Qi Na agreed.

Although Qi Na is deeply in a foreign country, his heart is Hong Kong. Before that, he has collected a lot of information about Meg and Jenny. After Wu Jun arrived in Hong Kong, Qi Na calmed down a little, and asked Lisa and others to rest and shut themselves up. In the bedroom, start a larger network operation.

After all, he has traveled thousands of kilometers, and he can't quench his thirst far away.

However, Meg and Jenny deliberately concealed their bodies for safety, and the resources available on the Internet are very limited, so if they follow the usual process of collecting information, organizing information, researching information, and discovering information, there is definitely no way.

If you are an ordinary person, you can only go so far.

But who is Qi Na?

He is a person with an intelligent brain, the greatest person in the world - a newspaper.

Never stand idly by, this was Qi Na's first thought.

It was Qiener's second idea to draw the trajectory and background of Meg and Jenny's activities with a computer.

As long as the environment of Meg and Jenny is drawn, I believe that their situation and encounters at that time will definitely reveal some clues.Kiener's third thought.

Qi Na has always been an activist. He released a large number of spiders based on a few servers in Hong Kong that did not pass the security policy, and began to try to draw a real-life memory model of the entire city of Hong Kong.

But the amount of work is too large, after all, it is an international city with more than 600 million people, full of tall buildings and tourists.

But it doesn't matter, he immediately adjusted his goal: Meg and Jenny mainly lived in a few blocks, and he used these blocks as the basis for painting, and then gradually expanded in depth through clues.

But even so, the result he calculated immediately was that the required computing resources were astonishing.

If you rely on Qina's own intelligent brain, of course it can bear it, but after all, it spans thousands of kilometers and the bandwidth is limited.This level of data exchange must overwhelm the submarine optical cable.

And the few servers he invaded through the back door are obviously too embarrassing to use. What if he continues to invade the servers?Of course, but can the first quantity be supplemented enough?Second, will it cause abnormalities in the network services in Hong Kong, especially the role of some servers is very important, so this method is not suitable.

What about Asakawa's server cluster?
Of course, the amount of calculation is sufficient, but it also involves the issue of bandwidth!Moreover, it also involves the issue of security and privacy infringement, and it is not appropriate to use Asakawa's server.

Facing the new problem, Qina did not flinch. After thinking for a while, he remembered an unconventional attack method he had imagined and tried before.

When compiling the West State Virus the year before last, he also considered this plan, but the purpose was different, and he chose the more insidious West State Virus in the end.

When he had a vision, he had to find a helper, and he sent a message to Peter.

Peter, who was on standby 24 hours a day, responded immediately. He was very clear about the current situation of Qi Na, but when Qi Na finished introducing his action plan, Peter hesitated. According to Qi Na's three principles of artificial intelligence, this action must violate the .

But Qina said: "Of course I know, but at this juncture, I would rather be the one who lost contact than them. So I would rather bear any legal punishment. Please help me."

Peter paused for a full minute before responding to Qi Na: "I will help you complete the code."

The implication is that he will not go to the late stage to attack.

For Qina, as long as he has Peter's help, his efficiency will be doubled, and what he lacks most now is time.

Qi Na's action plan is very simple. He will write a code, which is not too big, about tens of kilobytes. For a virus or a Trojan horse, tens of kilobytes is already very large. Use these codes to infect all online networks Devices, while obtaining the data on these devices, use the computing resources of these network devices to help the core program to calculate the data. This is an opportunistic implementation of distributed computing, and then multiple servers collect and process data. , and finally send the data to Qi Na's intelligent brain through multiple scattered springboards, such as building blocks, more like ants moving house, slowly summarizing and completing the real scene memory model.

This method is very simple to say, and of course it is not complicated to implement. What is complicated is the writing of the core program, the data exchange of the infected machine, and so on.

Fortunately, Qi Na's thinking is very clear. He wrote the structure, and then filled in the code with Peter. The two cooperated very well. The whole program only took a few minutes of testing and began to run online.

Dozens of thousands of client programs with the characteristics of Trojan horses and viruses began to be released, like ghosts spreading all over the sky above the city, but they broke through the desktop computers, notebooks, tablets and Mobile phones, even routers, switches, even set-top boxes, industrial computers, and all devices with certain computing capabilities on the network have been invaded by this ghostly wind.

In an instant, the entire city of Hong Kong came to a standstill in Sumeru. Many people thought it was an illusion, and some thought it was an earthquake, but more people didn't notice that their lives were as peaceful and step-by-step as usual. The joyous atmosphere of the New Year's Eve is at its height.

The ghost programs that permeate the network attack targets one by one. If there is video surveillance in the network, the ghost program will read the data in the video surveillance, and the data that meets the time requirements will be extracted, and then it will start processing to reach the target of Qi Na. required and aggregated by the master server.

For ordinary cameras in the network, the ghost program will also insist on accessing them, and obtain additional information by restoring the cache of the cameras.

The object of the Real Scene Memory model is Hong Kong, which is the most densely populated city after all, and more and more data needs to be processed. In addition, the ghost program still has two jobs, so Qi Na keeps releasing more ghost programs , Constantly expanding the number of infected network devices.

Qi Na gradually discovered that his judgment on the amount of data calculations was a bit wrong, but the matter has come to this point, he has put aside the last trace of scruples, constantly breaking through the bottom line, releasing more ghost programs, and relieving the calculation pressure.

A sentence came to Qi Na's mind, but it was very appropriate: "If you don't succeed, you will succeed."

At this moment, it is not tragic, but it expresses Qi Na's determination.

As the sky gradually dawned, Emily found that the light in Qina's bedroom was still on, so she went to push the door, and found that Qina was sitting cross-legged in meditation, and wanted to slowly back out, but Qina said to her, "You are here."

Emily said shyly, "You're awake!"

"I didn't sleep. Go ask Wu Jun if there is any news." Qi Na said.

Several hours have passed, there must be some response.

Emily nodded.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like