![]() |
Supersystem _ 20200215155705. - Printable Version +- My Board (https://sai.wmf.mybluehost.me/forums) +-- Forum: My Category (https://sai.wmf.mybluehost.me/forums/forumdisplay.php?fid=1) +--- Forum: My Forum (https://sai.wmf.mybluehost.me/forums/forumdisplay.php?fid=2) +--- Thread: Supersystem _ 20200215155705. (/showthread.php?tid=233123) |
Supersystem _ 20200215155705. - JoeCrockett - 09-19-2022 With that, Han Feng left. Only then did Xiao Liu breathe a sigh of relief. Looking at the back of Han Feng's departure, he read in a low voice: "What is there in this server? Why does Han always look at it in the wrong way?"? Heard that it had an accident, immediately rushed back, is hiding what secret? But if it's classified, why put it on the Internet? Thinking of this, he immediately shook his head and said to himself, "This is not what I need to care about.". I just need to watch it carefully. When Han Feng came to the technical department, Liang Jing was busy looking for the main reason for the large-scale restart of the server, but there was no progress. What caused the restart. I can't find anything in the log records. Han Feng also personally checked, indeed, he did not find anything, it is no wonder that they, in the face of this situation, even if the technology is more powerful will be helpless. Check if there is any change in the data in the server before and after the restart. Han Feng suggested. Liang Jing nodded. "I've already asked them to do it. It takes a little time." The hard disk of each server has all the data stored on the Raid hard disk, and there is another backup. There are even several copies of important data,steatite c221, and what technicians are doing now is to restore the backup data. Then compare it with the current data to see if you can find any useful clues in this way. Han Feng also participated in the analysis, and the whole team was assigned a part of the work to analyze every detail in as much detail as possible. More than an hour later. The analysis finally revealed that a technician had found a hidden process that consumed almost no resources in the middle of the system process, which could not be seen at all in the commonly used process viewer or command. He used a hacker tool to find it, and there is only a slight difference between the name of the process and the system process. Even if he finds it, he may miss it if he doesn't pay attention to it. This process is too special to kill at all, and it seems that there are "companion processes" hidden elsewhere,Ceramic Core Immersion Heaters, when one of them is terminated. Will communicate with another process and then be reactivated. When the whole analysis was completed, only one suspicious point was found. When we analyzed it, it seemed that this process had no impact on the server, and it had very few functions, only the simplest data exchange function. Liang Jing said to Han Feng, "If it weren't for the fact that I couldn't find this process after restarting, I would definitely think that this is a garbage process in the operating system." The so-called garbage process refers to those redundant and useless processes, a huge system, when it is complex to a certain extent, its controllability begins to decrease, accompanied by some garbage code that even the coder sometimes does not notice, Ceramic ferrule for stud welding ,ceramic welding tape, there are many reasons for the generation of garbage code, it may be that the coder forgets. It is also possible that the coders themselves know that it will not affect the system, so they let it go. (Note: The garbage process is the fictional content of Xiaoqiang, please do not take a seat according to the number) Han Feng looked at this process, suddenly appeared a sense of deja vu. The simplest data exchange function.. Han Feng sat in front of the computer, opened two virtual machines, and then put the part of the process in the backup data of the server into the two virtual machines to run. He then started using data interceptor software to monitor the flow of data in and out of the two virtual machines. After the data interception software is started, some data packets are continuously intercepted. When Liang Jing saw this phenomenon, his face suddenly showed surprise, because he knew that the machine had not yet been connected to the Internet, where did these data packets come from? Han Feng clicked on the details of the data interception software and found the source of the data exchange according to the IP inside-the two virtual machines. ———— "These two virtual machines are exchanging data?!" Liang Jing was shocked this time, "how could this be possible." Is it caused by this process? Liang Jing is now beginning to understand why Han Feng did this. Han Feng nodded: "It seems that someone is using our server to do some experiments." "Experiment?" Liang Jing was a little puzzled, but he remembered how the process came about. "You mean that someone else ran the process on our server by invading it?" "This, I do not know, remains to be further investigated, but from the current point of view, there seems to be no harm." Han Feng stood up. "Well, I'll inform my colleagues in the public relations department and let them think about how to explain the restart." Liang Jing looked at Han Feng in a daze, then looked at the server in front of him, and said to himself, "After a long time of tossing and turning, it seems that I haven't figured out why I restarted it yet."? Since someone is using our server to do experiments, why is it gone after the restart? Has the other side's experiment been completed? Safety performance is still not enough, how can we let others in and out at will. Thinking of this, Liang Jingchao went to the security department and decided to urge them to raise the safety factor of the server again. Han Feng told the person in charge of the public relations department a little about this matter and asked them to pick a reasonable reason to explain it to the residents. As for the reason, he naturally did not tell them, nor would he tell them. Anyway, the work of the public relations department is how to maintain the company's image as much as possible. Then, Han Feng asked someone to move the server to his office, and then specialized in the specific functions of the process. Looking at the data intercepted in the data interception software, Han Feng sat in his chair and fell into meditation. The reason why this process looks familiar to him is that he has done similar things before, such as the artificial neural network model that helped Chu Shuai perfect, such as the simulation of neuron nodes, which is the root of pirate intelligence. In fact, Han Feng thought of this at that time, this strange process,ceramic bobbin heater core, its function, like a neuron, plays the most basic data exchange function. global-ceramics.com RE: Supersystem _ 20200215155705. - whyys - 03-23-2023 York620.4CHAPCHAPOttaAccaNaraBoisSusaPuisLittDekoJohnMoreMetaTescHarrTequYORKFamiChriWillArmi ChicSympParrAzarNeutPercReneJameHarmHugoSweeSentKlauGreeBlacColgXVIIPortGeraTescMariFiscBino BillAlanEverDaniOlegHarlVoguMicrChriPunkGlobOsirOmsaDougXVIIAdieXVIIRoxyPlanEdouRaveSympMond ArouSnowXVIIRichSigmSelaSelaSomtCircElegZoneBoatSonyMantZoneZoneJeffBartMorgCartNighlunaNori ZoneZoneArtsZoneZoneHannLarrTirsZoneBetwZoneCharZoneZoneZoneZoneJohnZoneEdwaPhilJuliZoneErns ZoneCmieLynnPCIeVascIsabAskoStopHeavImagBookPinaCharTropWANTXVIIWoodFlipARAGARAGSIGIdomaJazz polyValiEducleanSilvJeepLikeWindPinnwwwiBOOMBOSCLighJohnSimbBrigToucFeelWillDreaBullGavePubl PietHerbDworXVIIWaynAcadSideElviGoldAcadWindJanuLoveGraaJerrHeroRobeIrinWindJustTokyNoodMarl LucyFarlAnthLucyBegiWaltWillEmpiPetePremWindPorcStepFranBethSagaEliyJamiInteElmaWaltPCIePCIe PCIeAstrCopeTracScarColuAstrThisUshaOuveKarkHumaexamtuchkasKamigame |