hk258 Seize Zombie ,flave !

In 2006, Xia Nation had a total of two times network War for Wo Sang Nation, and Wo Sang Nation retaliated once, but the tiger’s tail rushed back.

This is because NS did not know, ns intervened, their official Security SpeCIA list Little Group, tracking Sakura Group’s member, let Wo Sang Nation Hacker lose the leader, so Wo Sang Nation’s Hacker’s short attack retreats .

Pink Sakura was the one who made the offensive too sharp and pointed to the social issue of Xia Nation, which made Xia Nation’s leadership very unhappy.

Fortunately, Pink Sakura ran fast, and ns only dispatched a formal Little Group to pursue. If Pink Sakura is still in the network of Xia Nation, the 12 Specialist group of ns is not guaranteed, and the team will be besieged Pink Sakura.

That Pink Sakura is absolutely essential! [

Wo Sang Nation’s net world, Raphael provoked Shi Lei’s Sockpuppet Mr. M. Shi Lei succeeded in getting the Antivirus FIRE wall to do the defense. After having the premise of protecting himself, he was also a bit eager to move.

The first two times Xia Nation war against Wo Sang Nation, Shi Lei although participated. But he is not in the wave, it is accurately as stated in the back, there is no positive battle!

This time Moon Virus raged in Wo Sang Nation, and Raphael provocative, let Shi Lei decide, ready to bully Raphael!

To bully people, you must first be well prepared, such as catching Zombie.

There are only two fixed bots in Shi Lei’s hands. The first one is the Core Zombie Supercomputer Swallow. Yan is the absolute trump card in Shi Lei’s hands. With Supercomputer Swallow in hand, and with defense, Shi Lei is not afraid of anyone!

Of course, not afraid of anyone, does not mean that you can provoke anyone. For example, Xia Nation’s ns, Wo Sang Nation’s Foreign Ministry International Intelligence Agency, Li Jian Nation’s and fb, and so on.

Supercomputer Swallow works with defenses to really resist them, but it is suspected to expose Supercomputer Swallow.

If you lose Supercomputer Swallow, Shi Lei’s strength in the Internet is at least half!

Shi Lei’s Another Zombie, precisely as stated Shuangqing University’s public server, this Zombie is very weak, can only be said to be Shi Lei’s small toy, the Implement Daily Task can use it. There is no possibility of borrowing Shuangqing University Public Server at a critical moment.

Second time Xia Nation and Wo Sang Nation network War, Shi Lei abandoned the Access Company’s First Grade Zombie and abandoned the Boulder FIRE wall just to protect the Supercomputer Swallow. That lesson also made Shi Lei remember deeply.

So before bullying Raphael, Shi Lei is ready to grab a few more Zombies and be ready.

Using Supercomputer Swallow, in the Internet World scan of Wo Sang Nation, Shi Lei also uses Wo Sang Nation’s Search Engine to check out some of the High-tech Enterprise’s OffiCIA l Website for a chance.

On the Search Engine, I looked for it, but I didn’t find the right object. Shi Lei touched his stomach, took an all night, and after sleeping for a day, he was indeed hungry now.

Taking a look at the scanning progress of Supercomputer Swallow, Shi Lei stood up and found some food in the refrigerator, which is the thing like bread and milk.

I used a microwave to heat up the bread and milk. Although it was not delicious, Shi Lei’s own cooking was even worse. He missed Ouyang Xiang’s cooking skills!

After barely eating the bread and milk, Shi Lei washed his hands and sat back in front of the Number One Server.

Supercomputer Swallow’s scan has been feedback back to good news. Supercomputer is rented out, and some companies that need Supercomputer have purchased Supercomputer Swallow computing services.

These companies that need Supercomputers are mostly High-tech companies, and their own servers are quite powerful. With Leicomputer Swallow, Shi Lei has the authority to connect to those High-tech Enterprise Servers, and reverses from Supercomputer Swallow to several High-tech companies.

In these High-tech companies, Shi Lei screened two companies with superior server performance and lower server usage. [

The two companies, like the original Access, rented Supercomputer Swallow just for the purpose of promoting corporate awareness, rather than actually using Supercomputer Swallow.

Shi Lei first attacked a company called Le Yu Company through the authority of Supercomputer Swallow. This company, mainly for other companies, provides computer service support.

Their Server uses the Cluster mode. The so-called Cluster mode is precisely as stated Clustered Server. Simply describe the Clustered Server, which is precisely as stated to enable multiple servers to work like a single server.

For example, Le Yu Company’s Clustered Server has a total of eight servers, which improve stability and computing power through the Cluster System.

There are many advantages to using Clustered Server. For example, Server Upgrade, the old server can’t just drop it, and also consider the service’s persistent issue. If you use the Clustered Server method, you can directly connect the new server. Composed of Clustered Server, directly promoted performance.

Another advantage of Clustered Server is that if there is an issue in the Cluster Server, the other server can take the fault-tolerant Task, isolate the faulty server from the Cluster System through the dedicated software, and the remaining Servers pass. The load transfer mechanism between servers reimplements the load balance. At the same time, give Safety On-duty Personnel, indicating the existence of the faulty server.

Le Yu Company’s Cluster System uses the unxSystem, which can accommodate up to eight ** servers, and they are also equipped with eight ** servers, reaching the limit.

Shi Lei knows another Cluster System that can support 96** Server, which is the openvms of Compaq Company!

However, as early as in 2002, the Compaq Company had been acquired by Hewlett-Packard, which caused Hewlett-Packard’s Server to become more and more powerful.

The unxCluster System used by Le Yu Company is equipped with eight **Servers with an operating speed of 02tflops. The integrated Clustered Server has even more powerful 60 than the Access Company’s Server group.

With the help of Supercomputer Swallow, Shi Lei successfully entered the Le Yu Company’s Clustered Server and began to implement his own intrusion plan.

The advantages of Clustered Server are obvious, but they also have disadvantages.

Because there is a fault-tolerant Task between the Clustered Servers, when a **Server, the running application fails, or a **Server fails, the other Server will open the application again because of the fault-tolerant Task, taking over the shared disk. The data area on the cabinet, which in turn causes the failed application to re-run.

This mechanism is very good and one of the advantages of Clustered Server, but it is also one of the disadvantages of Clustered Server.

The process of taking over takes roughly three steps.

The First step is the detection of the fault-tolerant Task and determines if the fault really exists. The Second step is a server in the Clustered Server that restarts the application that is in error. The final step is to take over the data area of ​​the shared disk cabinet.

If the application of a certain **Server is wrong, it takes a certain amount of time for other Servers in the Cluster to take over the application. At this time, depending on the size of the application of the issue, the larger the application, the more time it takes!

In response to this mechanism, which is both an advantage and a disadvantage, Shi Lei found a currently running Large-scale application in Le Yu Company’s Clustered Server.

After forcibly aborting this Large-scale application and isolating the Unix server, Le Yu Company’s Clustered Server is started by another **Server under the management of the fault-tolerant Task mechanism, and then the load transfer mechanism starts to adjust the rest. Load balance of seven servers.

When the load balance is deployed, the Cluster System has the highest system resources and the System Defensive Power is the weakest. With this moment, coupled with the power of Supercomputer Swallow, Shi Lei invaded the Core of the Cluster System and captured the Super Authority!

I got the Super Authority of the Cluster System, and I also mastered the Le Yu Company’s Clustered Server in other words, making him a Zombie!

Shi Lei hēi hēi laughed and named the new Le Yu Company Zombie, numbered No. 2 Server, for his own memory. [

With Le Yu Company, Shi Lei did not stop and continued to move toward Second target.

The Second target, called Universal Air Technologies, is a research-based company, and their Server is actually a Clustered Server.

However, Universal Air Technologies’ Clustered Server is different from Le Yu Company. The Le Yu Company’s Clustered Server is composed of eight ** servers under the unxCluster System. The Universal Air Technologies’ Clustered Server is composed of two simple servers, one Main Server and one standby server.

This structure is another form of Clustered Server. The Main Server assumes all services. Only when the Main Server fails, the standby server takes over all the Tasks of the Main Server.

Shi Lei looked at the performance of the Main Server to 1tflops, the standby server, and 05tflops. Adding two Servers is also more powerful than the Access Company’s Core Server group!

For this kind of Clustered Server, Shi Lei is handy!

Shi Lei hacked into the periphery of the Main Server and wrote a message that simulates the Main Server’s issue and passed it to the standby server. The standby server immediately takes over the Task of the Main Server, and the two servers activate the priority decision of the Cluster System due to the moment of takeover.

The Main Server is not faulty and needs to implement all the applications; the standby server, because it receives the fault of the Main Server, needs to take over all the Tasks.

When there is a conflict between the Main Server and the standby server, the Cluster System activates the priority Grade determine program to verify that the Main Server is normal.

This conflict time and verification time is short, but it is enough for Shi Lei of World Summit Grade Hacker to break into the Universal Air Company’s Cluster System.

After successfully entering System, Shi Lei tried to get Super Authority, he actually found a classic flaw!

The Universal Air Company’s Cluster System is also unxSystem, and Shi Lei only analyzed for a moment and laughed.

“It’s really Idiot! Actually made such a big mistake!”

(To be continued. Please search [], novel is better to update faster!)