respawn hack
Chapter 24
He is so powerful that he obviously overestimated Baili Xuanji.
Baili Xuanji, who was no longer able to react to Gu Songsheng's words, saw that Gu Songsheng stopped because he turned his head, and immediately squatted down, regardless of what Gu Songsheng said.
"Baili, hurry up... be careful..." Gu Songsheng, who was about to pull Baili Xuanji up, saw the time after he opened his mouth, and knew that squatting down so suddenly after a lot of exercise would be bad for his health. The person walking behind Baili Xuanji.
This sentence also became the last sentence Baili Xuanji heard in front of Gu Songsheng.When Baili Xuanji heard Gu Songsheng's words and hadn't come at all, he suddenly smelled a pungent smell, and a handkerchief appeared in front of him, and he didn't know anything after that.
Why is his luck always so bad recently?This was the first sentence that Baili Xuanji thought of after she became conscious.
Other hackers have come to an era when network technology has just begun to improve, shouldn't they rely on their own network technology to dominate the Internet world?Why came to him, not only did not dare to run around, but also was constantly attacked?Obviously many times he endured it and didn't want to cause trouble for himself, but why are there always people being aggressive?
Open your eyes and look at the fairly clean roof.Probably because she had been more comatose during this period of time. When she woke up this time, Baili Xuanji felt that her recovery ability had become much stronger.Not only did he open his eyes effortlessly, but even his strength recovered quite quickly.
After staying quietly for a while, the surroundings seemed very quiet, Baili Xuanji sat up with support, and rubbed her temples with her hands.Sure enough, his brain would protest if he inhaled too many unqualified drugs.
The inside of the room is also very tidy.Blocked windows, dark heavy curtains, white walls, floral bed sheets and quilt covers, wooden tables and chairs, and a monitor that looks rather bulky and a blade processor... Wait, it's a blade processor?
Baili Xuanji, who was still very calm at first, realized when the server was placed at that place, quickly jumped out of bed, ran to squat down in front of the blade server, and carefully looked at this magical thing.
A blade processor, as the name suggests, refers to a server unit that can be plugged with multiple card types in a rack-mounted chassis of a standard height.It is a low-cost server platform that implements HAHD (High AvaiMabiMityHighDensity, High Availability and High Density), and is specially designed for special application industries and high-density computing environments.
In fact, the official name of the blade processor should be bladeserver, which is translated as "blade processor" because its server is like a "blade".Each "blade" is actually a system motherboard.They can boot their own operating system from the "onboard" hard drive.Therefore, each "blade" is an independent server. In this mode, each "blade" runs its own system and serves different designated user groups. The centralized management of the blade server can simplify the management of the server. work and reduce maintenance costs.In this mode, each "blade" runs its own system, serving different designated user groups, and is not related to each other.
The use of blade servers to construct server clusters is easy to maintain and manage, and is the most suitable for constructing clusters. It can be said that it fundamentally overcomes the shortcomings of chip server clusters and is called the terminator of clusters.
The classification of blade servers is also very standardized.According to the server functions that need to be undertaken, blade servers are divided into server blades, network blades, storage blades, management blades, Fiber Channel SAN blades, and extended I/O blades. Various blades undertake different functions in the system.Therefore, the blade service area is mainly used in four aspects of telecommunications, government, education and finance.In China, blade servers are rare treasures.
The blade server in the room now has a preliminary judgment by Baili Xuanji. It has at least several partitions: server blades, network blades, storage blades, and expansion I/O blades. That is to say, even in the most widely used blade servers In the United States, this kind of blade server can be regarded as top-notch.
Really want to move this blade server back.Baili Xuanji, who can't wait to kiss this blade server, knows that this blade processor is quite simple for him, but he has made up his mind to use computers of this era as much as possible to solve all problems. Baili Xuanji couldn't resist the temptation of this look.
In the 23rd century, blade servers have largely been eliminated, and more advanced servers are the most precise items managed by artificial intelligence.However, it has to be said that at the beginning, those more advanced servers relied on the configuration of blade servers to complete.
The author has something to say: I feel like there is a lot of information~~ In fact, starting from the last chapter, the protagonist’s career is about to start, so there will be more and more relevant information, which just makes up for the previous bullshit. I can’t get into the flaws of the hacker’s topic~~
However, because there is a lot of information, the update of Yaoshou may be affected, because Yaoshou uses a network card at school, and the speed is slow to death, so the update of Yaoshou from Tuesday to Friday is a bit uncertain , Anyway, when the chapter is finished, I will post it~~ Dear friends, please forgive me~~
27. The legendary kidnapping...
Legend has it that the blade server has a place that cannot be copied by the server that was manufactured later, and it is that unique place that created the legendary name of the blade server.It's a pity, because the blade server is gradually withdrawing from the stage of history, so this is the first time Baili Xuanji has seen it in kind.
After carefully looking at every place on the blade processor with his eyes, Baili Xuanji pressed the start button, then sat down on the chair reluctantly, and turned on the computer monitor that he was not used to seeing.
After turning it on, Baili Xuanji's first feeling was that the speed was very good, at least it was the fastest one he had seen, except for the cradle.It really deserves to be a computer with a blade processor.The system is Linux, and this is the first time Baili Xuanji has seen this familiar Linux system after her rebirth.
Linux is a free and open source computer operating system and the most famous example of free software and open source development.It generally has these main parts: Linux core, some GNU libraries and tools, command line shell, X window system with graphical interface and corresponding desktop environment, and contains thousands of tools ranging from office packages, compilers, text editors to App software for scientific tools.
Linux can be installed on a wide variety of computer hardware devices, from mobile phones, tablets, routers and video game consoles, to desktop computers, mainframes and supercomputers.The 10 fastest supercomputers in the world run the Linux operating system.
And, most importantly, Linux is also the only one that allows users to freely use all the underlying source code of Linux or freely modify and redistribute the source code of the Linux system under the GNU General Public License.
Even the source code of the cradle system, traced to the top, is also transformed from the source code of this Linux system.
It seems that luck is not so bad!Feeling lucky in her heart, Baili Xuanji kept moving her hands, and switched the page to run. On the black background, lines of white C++ language bloomed like fireworks.At least, now he can use the most effective method without disturbing the people behind the scenes to investigate his current situation.
The first is to build a 32824-DEC-LAN bridge, this is very simple, a common Sniffer can handle it.
As a control software console, a set of software used to control network hardware, a network control card that supports Ethernet packets, and a transmission device used to make packets flow from here to there, sniffer is to use the computer's network interface to intercept the destination A tool for sending datagrams to other computers.Or in other words, a sniffer is a software that can set the state of the local nc to a (promiscuous) state. When the nc is in this "promiscuous" mode, the nc has a "broadcast address", and it has a "broadcast address" for all encountered Each frame generates a hardware interrupt to alert the operating system to process each packet passing through the physical medium. (Most ncs have the ability to be set in promiscuous mode)
Hardware type, done.Agreement Type: Done.Protocol address length: Done.Hardware address length: get it done.Opcode: Done.Sender hardware address: Done.Sending machine IP address: Done.Receiver hardware address: Done.Receiver IP address: Done.
send out.
After a few seconds, the 32824-DEC-LAN bridge sent back a series of C++ language.Baili Xuanji glanced roughly at what was sent back, and let out a long breath of relief.It seems that these people who kidnapped him haven't had time to use the Internet to monitor
Baili Xuanji, who was no longer able to react to Gu Songsheng's words, saw that Gu Songsheng stopped because he turned his head, and immediately squatted down, regardless of what Gu Songsheng said.
"Baili, hurry up... be careful..." Gu Songsheng, who was about to pull Baili Xuanji up, saw the time after he opened his mouth, and knew that squatting down so suddenly after a lot of exercise would be bad for his health. The person walking behind Baili Xuanji.
This sentence also became the last sentence Baili Xuanji heard in front of Gu Songsheng.When Baili Xuanji heard Gu Songsheng's words and hadn't come at all, he suddenly smelled a pungent smell, and a handkerchief appeared in front of him, and he didn't know anything after that.
Why is his luck always so bad recently?This was the first sentence that Baili Xuanji thought of after she became conscious.
Other hackers have come to an era when network technology has just begun to improve, shouldn't they rely on their own network technology to dominate the Internet world?Why came to him, not only did not dare to run around, but also was constantly attacked?Obviously many times he endured it and didn't want to cause trouble for himself, but why are there always people being aggressive?
Open your eyes and look at the fairly clean roof.Probably because she had been more comatose during this period of time. When she woke up this time, Baili Xuanji felt that her recovery ability had become much stronger.Not only did he open his eyes effortlessly, but even his strength recovered quite quickly.
After staying quietly for a while, the surroundings seemed very quiet, Baili Xuanji sat up with support, and rubbed her temples with her hands.Sure enough, his brain would protest if he inhaled too many unqualified drugs.
The inside of the room is also very tidy.Blocked windows, dark heavy curtains, white walls, floral bed sheets and quilt covers, wooden tables and chairs, and a monitor that looks rather bulky and a blade processor... Wait, it's a blade processor?
Baili Xuanji, who was still very calm at first, realized when the server was placed at that place, quickly jumped out of bed, ran to squat down in front of the blade server, and carefully looked at this magical thing.
A blade processor, as the name suggests, refers to a server unit that can be plugged with multiple card types in a rack-mounted chassis of a standard height.It is a low-cost server platform that implements HAHD (High AvaiMabiMityHighDensity, High Availability and High Density), and is specially designed for special application industries and high-density computing environments.
In fact, the official name of the blade processor should be bladeserver, which is translated as "blade processor" because its server is like a "blade".Each "blade" is actually a system motherboard.They can boot their own operating system from the "onboard" hard drive.Therefore, each "blade" is an independent server. In this mode, each "blade" runs its own system and serves different designated user groups. The centralized management of the blade server can simplify the management of the server. work and reduce maintenance costs.In this mode, each "blade" runs its own system, serving different designated user groups, and is not related to each other.
The use of blade servers to construct server clusters is easy to maintain and manage, and is the most suitable for constructing clusters. It can be said that it fundamentally overcomes the shortcomings of chip server clusters and is called the terminator of clusters.
The classification of blade servers is also very standardized.According to the server functions that need to be undertaken, blade servers are divided into server blades, network blades, storage blades, management blades, Fiber Channel SAN blades, and extended I/O blades. Various blades undertake different functions in the system.Therefore, the blade service area is mainly used in four aspects of telecommunications, government, education and finance.In China, blade servers are rare treasures.
The blade server in the room now has a preliminary judgment by Baili Xuanji. It has at least several partitions: server blades, network blades, storage blades, and expansion I/O blades. That is to say, even in the most widely used blade servers In the United States, this kind of blade server can be regarded as top-notch.
Really want to move this blade server back.Baili Xuanji, who can't wait to kiss this blade server, knows that this blade processor is quite simple for him, but he has made up his mind to use computers of this era as much as possible to solve all problems. Baili Xuanji couldn't resist the temptation of this look.
In the 23rd century, blade servers have largely been eliminated, and more advanced servers are the most precise items managed by artificial intelligence.However, it has to be said that at the beginning, those more advanced servers relied on the configuration of blade servers to complete.
The author has something to say: I feel like there is a lot of information~~ In fact, starting from the last chapter, the protagonist’s career is about to start, so there will be more and more relevant information, which just makes up for the previous bullshit. I can’t get into the flaws of the hacker’s topic~~
However, because there is a lot of information, the update of Yaoshou may be affected, because Yaoshou uses a network card at school, and the speed is slow to death, so the update of Yaoshou from Tuesday to Friday is a bit uncertain , Anyway, when the chapter is finished, I will post it~~ Dear friends, please forgive me~~
27. The legendary kidnapping...
Legend has it that the blade server has a place that cannot be copied by the server that was manufactured later, and it is that unique place that created the legendary name of the blade server.It's a pity, because the blade server is gradually withdrawing from the stage of history, so this is the first time Baili Xuanji has seen it in kind.
After carefully looking at every place on the blade processor with his eyes, Baili Xuanji pressed the start button, then sat down on the chair reluctantly, and turned on the computer monitor that he was not used to seeing.
After turning it on, Baili Xuanji's first feeling was that the speed was very good, at least it was the fastest one he had seen, except for the cradle.It really deserves to be a computer with a blade processor.The system is Linux, and this is the first time Baili Xuanji has seen this familiar Linux system after her rebirth.
Linux is a free and open source computer operating system and the most famous example of free software and open source development.It generally has these main parts: Linux core, some GNU libraries and tools, command line shell, X window system with graphical interface and corresponding desktop environment, and contains thousands of tools ranging from office packages, compilers, text editors to App software for scientific tools.
Linux can be installed on a wide variety of computer hardware devices, from mobile phones, tablets, routers and video game consoles, to desktop computers, mainframes and supercomputers.The 10 fastest supercomputers in the world run the Linux operating system.
And, most importantly, Linux is also the only one that allows users to freely use all the underlying source code of Linux or freely modify and redistribute the source code of the Linux system under the GNU General Public License.
Even the source code of the cradle system, traced to the top, is also transformed from the source code of this Linux system.
It seems that luck is not so bad!Feeling lucky in her heart, Baili Xuanji kept moving her hands, and switched the page to run. On the black background, lines of white C++ language bloomed like fireworks.At least, now he can use the most effective method without disturbing the people behind the scenes to investigate his current situation.
The first is to build a 32824-DEC-LAN bridge, this is very simple, a common Sniffer can handle it.
As a control software console, a set of software used to control network hardware, a network control card that supports Ethernet packets, and a transmission device used to make packets flow from here to there, sniffer is to use the computer's network interface to intercept the destination A tool for sending datagrams to other computers.Or in other words, a sniffer is a software that can set the state of the local nc to a (promiscuous) state. When the nc is in this "promiscuous" mode, the nc has a "broadcast address", and it has a "broadcast address" for all encountered Each frame generates a hardware interrupt to alert the operating system to process each packet passing through the physical medium. (Most ncs have the ability to be set in promiscuous mode)
Hardware type, done.Agreement Type: Done.Protocol address length: Done.Hardware address length: get it done.Opcode: Done.Sender hardware address: Done.Sending machine IP address: Done.Receiver hardware address: Done.Receiver IP address: Done.
send out.
After a few seconds, the 32824-DEC-LAN bridge sent back a series of C++ language.Baili Xuanji glanced roughly at what was sent back, and let out a long breath of relief.It seems that these people who kidnapped him haven't had time to use the Internet to monitor
You'll Also Like
-
Simulating The Cultivation Of Immortals, I Reached The Nascent Soul Stage In Ten Days!
Chapter 255 11 hours ago -
In Konoha, I collected corpses on the battlefield for ten years
Chapter 349 12 hours ago -
I picked up skill fragments in the demon world
Chapter 596 16 hours ago -
Yu-Gi-Oh!: Start with Ultraman Tiga! ?
Chapter 165 16 hours ago -
Top female anchor daily life
Chapter 152 16 hours ago -
Genshin Impact: Use various skills to create a romantic encounter
Chapter 204 16 hours ago -
Ultra: I got the Light of Galaxy Victory
Chapter 238 16 hours ago -
Help! I just woke up and was stabbed by a big kid
Chapter 510 16 hours ago -
Dragon Ball: I have the wrong system and I have entered the wrong world
Chapter 500 16 hours ago -
Siheyuan: Seventeen-year-old He Yuzhu
Chapter 318 16 hours ago