When Fang Yuan returned home with Xinxin, Father Fang and Mother Fang hadn't left yet, but Father Lan and Mother Lan were gone.
When the little guy saw his grandparents, he first ran over and hugged Mother Fang's legs and asked her if she could sign up for a dance class, but she couldn't understand her words. Mother Fang was confused when she heard it, and Fang Yuan finally explained it to her.
Although Mother Fang was a little surprised, why did she come to ask her about this?But he nodded and agreed.
The little guy cheered when he heard the words, ran to Fang Yuan, and strongly urged to go back and sign up now. Finally, after Fang Yuan repeatedly explained, he reluctantly agreed to wait for Ai Cai to return to their home in the afternoon.
Father Fang and Mother Fang were planning to go to the property. Fangyuan asked them to bring the little guy with him. Naturally, the little guy didn't want to stay at home, so he happily went out with them.
When they left, Fang Yuan went back to the study and turned on the computer. He wanted to find out who the next door was from the Internet.
With the development of science and technology, as long as people living in this world, they will leave more or less traces of their own. In addition to government files, there are surveillance cameras everywhere. There will always be Take it and leave your shadow.
But because this data is too large, and there is no good identification software, it is completely recognized by human eyes, so few people find someone through such a stupid method, unless there is a major criminal case and the police have no clues. It is possible to organize a lot of manpower to analyze the videos one by one.
But Fangyuan doesn't need it, because the sweeping robot he wrote has a complete recognition system, and because of this function, it can quickly recognize garbage.
Therefore, Fangyuan first uploaded the previously co-photographed photos on the beach to the computer, and then imported the appearance and body shape data of their family of five into the recognition system.
The rest is to access the police database. Of course, this does not refer to the domestic police station, but the Japanese police station, because the family is not from Japan?Besides, Toshio Utsumi had been a policeman, so the Japanese police must have his files inside.
Of course, if you want to access the database of the Japanese police station, it is certainly not a conventional method. Moreover, the private network used by the police is generally not connected to the civilian network, but there are exceptions to everything. There are so many police officers in Japan that no one will not access the outside world. Net?Only one is enough.
It can be said that any programmer has a hacker dream, and even many people become programmers because they worship hackers.
Fangyuan is no exception. After they learned the DH language, he used it to practice and wrote many gadgets. These things are actually no different from some hacker intrusion tools circulating on the Internet, but because of the different algorithms, their functions have become More powerful and more concealed.
Therefore, Fangyuan must first scan the entire Japanese network, especially the official websites of the police stations. This is the fastest way to find loopholes.
But no matter how powerful Fangyuan’s software is, the amount of data is still huge. No matter how high the utilization rate of his broken computer is, it is not enough. So he first scanned the domestic network and grabbed a few broilers, then used it as a springboard to control it. Several computers in Japan eventually invaded the Japanese Gyoukou computer.
The computer is owned by Japan's Marine Earth Science and Technology Agency. It is the successor to the EarthSimulator supercomputer and was ranked 69th in the top 500 supercomputers in June 2017.
Based on 1250 Intel Xeon 16-core processors and InfinibandEDR interconnection, most of the power consumption of this supercomputing comes from the 19.84 million cores in the Pezy-SC2 accelerator.In terms of speed, 14,130 trillion times per second can be calculated.
As such a powerful supercomputer, its defense system is naturally very powerful, but to the other side, it is like a piece of paper, which can be broken in one poke.
No matter how powerful the defense system is, it is also based on the existing computer technology, but it is naturally impossible to defend against a brand-new technology like Fangyuan.
Therefore, Fangyuan quickly controlled a small part of the computing memory, and used Gyoukou supercomputer to sniff the Japanese network. The speed was not too fast. He quickly scanned out the loopholes in the Japanese police station and the IP of the external network link. Through these vulnerabilities and IP, the internal database was accessed.
Fangyuan first searched for the name Toshio Uchikai, and found that there were thousands of people in Japan, so he added professional qualifications, and the scope was reduced to dozens. Fangyuan quickly found the information he wanted.
Unexpectedly, Toshio Utsumi looks silly, but his resume is very awesome. Not only is he proficient in Muay Thai, boxing, karate and taekwondo, but the police school scores are almost perfect. He is a new star in the police world, but there is no record of his marriage in the file. , And did not record the reason for his resignation, which surprised Fang Yuan.
So Fang Yuan retrieved the names of Xiaolei, Xiaotong and Xiaoai again, but there was no record of them.
At this time, Fangyuan’s recognition software is ready to use. Face recognition and comparison of this database. Even if Gyoukou calculates fast, the comparison will take a while. Fangyuan got up and ran a cup of tea for himself and found that there was no comparison yet. Finished, so I flipped through Gyoukou Supercomputer at will, and unexpectedly discovered that he was not the first to come. Before him, someone had already visited this computer and left two back doors.
Fang Yuan did not clear these two back doors, but attached a hidden tracker to them. As long as they visit again, the tracker will record their real address.
But these two backdoors also gave Fangyuan an inspiration. He carefully carved out a place from the computer and built an independent enclosed space, which he called the "empty house", completely belonging to his empty house.
After this was done, Fangyuan found that the recognition program had been completed, but even scanned hundreds of pieces of data, which made Fangyuan feel very strange. You must know that his program recognition rate is very accurate. This should not happen. .
But when I opened it, I found that there was really nothing wrong. There were dozens of identity materials for the three of Xiaolei. Although the names are different, the ages are different, and the looks on the photos are slightly different, they are in the recognition software. With fault tolerance, they have nothing to hide.
What's left is not the identity material, but some photos and videos taken in the theft. The appearance has also changed a little, but it is still recognized.
"Caught you?" Fang Yuan smiled triumphantly.
He looked through these files and videos one by one and found that these three women turned out to be very skilled snitches, no wonder they were so rich.
I also found their real names living in Japan. It turns out that they also opened a coffee shop in Japan, and their behavior is unexpectedly good. Welfare homes, orphanages, pet rescue centers, etc., not only have a large amount of materials donated by them, but also Also often participate in social welfare activities.
And what they stole originally belonged to a German painter and collector named Michael Heinz, which is interesting.
Just as Fangyuan was clearing the traces of the visit and was about to quit the supercomputing, a piece of data suddenly appeared out of thin air in the "empty house" he had just done. Someone was visiting supercomputing just like him...