Chapter 03: Pandora's Box

Dark Small Medium Large Original Scroll to Bottom

Data overflow error, data copy is at 90%. This clearly indicates insufficient space in the divination space. Although data can be compressed after copying, the space is still inadequate. It can be confirmed that the critical value of this space is limited. 90% of 2400G is 2160G. After compression, it amounts to 216M. Therefore, the size of this space is only 216M. 90% of 2400G is 2160G. After compression, it amounts to 216M. Therefore, the size of this space is only 216M

The integrated circuit board on the base is the key component, consisting of an electronic group formed by eight special boards, which connects to the power circuit of the computer's mainboard. In fact, among all the modules, this particular module is responsible for the most functions, including circuit intervention, control and monitoring of the electronic group, communication with the computer's mainboard system, and integration with system software, all of which are realized by this integrated board. However, the implementation of this module's functions is also the easiest, as there is already mature microcontroller technology available. With only slight modifications, all functionalities can be achieved, thus requiring minimal time for implementation. In fact, among all the modules, this particular module is responsible for the most functions, including circuit intervention, control and monitoring of the electronic group, communication with the computer's mainboard system, and integration with system software, all of which are realized by this integrated board. However, the implementation of this module's functions is also the easiest, as there is already mature microcontroller technology available. With only slight modifications, all functionalities can be achieved, thus requiring minimal time for implementation

At this moment, Mo Shui, holding a box containing 32 circuit boards, along with blueprints, master copies, and all related materials, arrived at the production supervisor's office. His first purpose was to request leave, as it would take some time to integrate theory and practice after receiving the circuit boards, and he also wanted to take the time to study them thoroughly. As for his second purpose, he intended to give the supervisor a heads-up, as there might be potential for "business" collaboration in the future. After all, he had invested so much in personal relationships, and he did not want to find himself in a situation where the warmth of human connection had faded.

A muffled grunt of "Hi" escaped, expressing the joy within.

As the application software automatically stops, the critical values of these two parameters are displayed on the large screen

Hehe, this kid is quite clever. I wonder how much credit there is? I need to check after work today. Song Wenfeng looked at the card in his hand and couldn't help but think. This type of card is a special prepaid card issued by the tea house, golden in color, representing the highest level, which means it has the largest face value.

Mo Shui left the factory and directly took a taxi back. In the taxi, Mo Shui made a phone call to an aluminum alloy shop where he had ordered boxes a few days earlier, asking them to have the items ready for pickup when he passed by later.

The joy of success gradually appeared on Mo Shui's face

"Well, I will remember this, thank you very much," said Mo Shui, lifting one foot to rest the box on his thigh, freeing one hand to reach into his pocket. A golden magnetic card appeared in his hand, which he casually placed on Lao Song's large desk, saying: "Lao Song, there's no need for thanks. You see, I know you appreciate good tea. This is a VIP card for Tianxia Tea House. When you have time, go take a look and buy some tea you like." "Oh no, Xiao Mo, how can I let you spend money on this?" Song Wenfeng said as he looked at the golden card and stood up. Tianxia Tea House is the best tea shop in the area, and its prices are not generally cheap. This Mo Shui really knows how to show filial piety.

The server has been started, and Mo Shui is running all the powerful firewalls currently available in the industry, as well as his most trusted yet unpublished super firewall software. This super firewall is a byproduct of researching the algorithm of "general functions in divination space." However, it is this byproduct that has allowed Mo Shui to experiment with all viruses, virus variants, as well as various spyware and Trojan software in the industry, and indeed, none have been able to breach the protection of the firewall.

"You are quite the talented individual," Song Wenfeng remarked as he picked up his teacup and took a slow sip. "Xiao Mo, rest assured, I will do my utmost to assist you with your matters. If you need anything further, just let me know. Currently, there aren't many issues at the factory, so your leave is approved. Have you written your leave request? No? Then never mind, I will help you fill one out."

Alright, go ahead, but don't work too hard; if your body wears out, nothing will be worth it

The hard disk's hard copy technology is a method developed by Mo Shui during the research and development of super compression software. It utilizes compression principles and imaging technology to create a copy of the hard disk. By scanning the tracks and sectors of the hard disk, data is directly imaged and compressed, resulting in a dataset composed solely of 0s and 1s. Subsequently, through restoration and compilation software, this dataset of 0s and 1s is restored and compiled to achieve the purpose of data retrieval

And 64 / 100 represents the overall operating speed of the control software, indeed impressive! Just think about it, what does it mean for a software's operating speed to approach the speed of light!

A message window pops up on the large screen stating "Data overflow error, data copy in progress 90%"

With a heart full of pain, I glanced at the already discarded box. Mo Shui, feeling helpless, had no choice but to reassemble another new box. It goes without saying that the original box, aside from being an empty shell, is likely completely beyond repair.

Mo Shui observed the situation and realized that the current spiral rotation would soon evolve into eight separate army groups performing their own spins. Indeed, this was the ultimate outcome Mo Shui hoped for. If the eight electronic groups could form a Bagua array, and each electronic group could spin independently while the entire Bagua array underwent a collective rotation, then the purpose of this software would be fulfilled, and the algorithm of the "general function of the hexagram space" would be considered achieved. Indeed, this was the ultimate outcome Mo Shui hoped for. If the eight electronic groups could form a Bagua array, and each electronic group could spin independently while the entire Bagua array underwent a collective rotation, then the purpose of this software would be fulfilled, and the algorithm of the "general function of the hexagram space" would be considered achieved

Well, thank you very much. I would like to invite you for tea when you have time tomorrow

Since the software design has been completed but physical validation has not yet been conducted, there are still issues with the parameter settings. Fortunately, I have several backup sets.

4.8 seconds! A safe operating time

This super firewall software is intended to be released under the identity of 0 & 1 after the success of this project, while also making some money in the process. After all, a significant amount of personal funds has been invested in the research of this project, and during this time, the profit margin for that compression software has already diminished.

All programs are ready, Mo Shui sits back down at the computer, runs the software, intervenes in the computer's power supply line through control codes, and, following the IP address of his own server, infiltrates the neighboring server

The numerical display of 010101 begins to flow downward across the entire screen, gradually taking on a spiral shape and slowly rotating.

The entire application control software has two important parameters: one is the rotational speed of the electronic group, and the other is the execution speed of the control software code. These two parameters correspond to an external frequency and a main frequency of a computer.

Thus, Mo Shui spent nearly a month leveraging his connections as a quality inspector, investing in personal relationships with everyone from the production supervisor to the workshop director and various other links in the production line. Finally, he achieved some results: after going through all the processes of plate making, sample making, molding, and testing, 32 special motherboards that met the technical specifications came off the production line. The material cost amounted to 50,000, while the cost of personal connections was 150,000. Mo Shui was aware that extending the theory he had developed could lead to a higher-level concept that was vaguely formed in his mind. He realized that to experiment with these conceptual ideas in the future, he would still need these personal connections to bring them to fruition. Therefore, he did not feel any reluctance regarding the investment in personal relationships. Of course, there are priorities in matters; one must take things step by step, especially with theoretical concepts, which cannot be rushed.

Data copying is now in progress ... As the software operates, the numbers on the monitoring screen begin to rotate rapidly again

The first phase of the entire research has been successfully completed! Mo Shui stood up, raising both hands towards the sky in a fist.

4 sets of boxes, 2 sets were scrapped. There are still 2 sets that are completely qualified, this is the final result of Mo Shui

The typical method of intrusion is through the network card port of the other party's server at www.hetushu.com, entering their system. During this process, one can fully exploit the program vulnerabilities of system software or application software, bypass various firewalls loaded by the system, thereby taking control of the system and subsequently reading data from the hard drive. Yes, this is the standard method of intrusion.

There are no limitations on the operating speed of components such as the CPU, nor on the read speeds of RAM, ROM, and hard drives, because the software operates in the "divination space," an electronic environment that exists completely independent of hardware.

In less than 3 seconds, a message prompt "Data retrieval complete" appeared on the large screen, and at that moment, the electronic flow on the 17-inch monitoring screen began to come to a halt

Do not underestimate these two values; 8 / 100 represents the critical value of the rotational speed of the electron group, while 100 represents the speed of light. Exceeding this value causes the rotational order of the electron group to begin to change, as the entire group starts to become chaotic, leading to collisions between electrons, resulting in a complete collapse of speed. Only by reaching 8 / 100 of the speed of light can the entire electron group rotate at its fastest and most stable rate

Mo Shui, upon returning home, had already prepared all the necessary components

"Old Song, I would like to request a week's leave. I wonder if you could approve it?" Mo Shui stood in front of the desk, looking at the supervisor who was reviewing reports. Mo Shui had invested considerable effort in building a rapport with this supervisor, which is why he could greet him so "affectionately" now.

Through software, via a box, to access the INTERNET and conduct intrusions on remote servers. This is the ultimate direction of Mo Shui's research

Indeed, these are the two critical values, Mo Shui glanced at the numbers, one being 8 / 100 and the other 64 / 100, nodded slightly, and murmured to himself

Dizzy, the rotation parameters have been set too high. Mo Shui glanced at the screen, which was pitch black, shook his head, and sighed to himself.

Reassemble the box and conduct the test again

The dimensions of the box are customized according to the size of the panel, specifically a cube measuring 15 centimeters, which is not large. Additionally, there is a requirement to create an octagonal inner ring inside, with a hanging point at each corner of the inner ring and a fixed point on the base to secure another integrated board. At that time, eight special panels can be hung on it. The side features three openings: one for the I/O interface for monitor output, one for connecting to the motherboard control bus, and another for connecting to the motherboard power module. At that time, eight special panels can be hung on it. The side features three openings: one for the I/O interface for monitor output, one for connecting to the motherboard control bus, and another for connecting to the motherboard power module.

In less than 5 seconds, with a soft "puff" sound, the box began to emit smoke again

Everything went smoothly, and they safely accessed the neighboring and library servers, beginning the data retrieval process. The server's intrusion alarm had been set to maximum volume by Mo Shui, yet even when Mo Shui started the hard disk cloning, the server's alarm remained inactive.

With a muffled sound of "puff", a wisp of clear smoke emerged from the gap of the box lid. This sudden occurrence jolted Mo Shui, who had entered a state of reverie, back to reality

After assembling the box, Mo Shui immediately moved a 17-inch LCD monitor from the adjacent room, connected it to the display interface of the box, and plugged the power cable of the box into the power module on the computer's motherboard. He sat down and powered on the host. After a few seconds, the LINUX system finished loading. Moving the mouse, he clicked on an icon on the desktop, and an application software began to run. This software was developed by Mo Shui over the past month, and its specific function is to control the eight circuit boards inside the box to form an electronic group in a Bagua array, using the algorithm of "general functions of hexagram space" for information writing and reading in the software.

The IT industry, like other industries, experiences both off-peak and peak seasons. The mainboard manufacturing company where Mo Shui works is an OEM-type enterprise that provides contract manufacturing services, making the characteristics of off-peak and peak seasons particularly pronounced. Clearly, the company is currently in the off-peak season, as evidenced by the two days of rest during the weekend.

Haha, as you know, these boxes have been quite a hassle for me for several days now. How can I not be anxious? I apologize for the trouble. I would like to request a week's leave to go back and thoroughly contemplate these precious items. Perhaps I may need to trouble you again at that time

However, the current intrusion techniques employed by Mo Shui are entirely different; the control code directly enters the opponent's hard drive for data retrieval through the power circuit system.

Having closed the door, without taking a moment to drink some water, I began the assembly. Eight special panels were fixed at the eight corners of the inner ring. I took out the custom-made integrated circuit board and secured it to the base of the box. Then, I properly fixed several modules for the I/O interfaces. Once all the modules were secured, I started wiring. The wires from the eight special panels converged onto the integrated circuit board on the base, connecting the display interface, the bus intervention interface, and the power interface to the computer motherboard, one by one. Finally, I secured the top cover of the box, and just like that, a box capable of changing the world was completed. Once all the modules were secured, I started wiring. The wires from the eight special panels converged onto the integrated circuit board on the base, connecting the display interface, the bus intervention interface, and the power interface to the computer motherboard, one by one. Finally, I secured the top cover of the box, and just like that, a box capable of changing the world was completed

This situation also provided Mo Shui with an opportunity. That is, he could customize the motherboards he needed on the production line of the enterprise. Of course, the cost would be significantly higher; not to mention the cost of materials, the cost of personal connections alone could be described as a mountain of burdens. Everyone knows that a production line cannot possibly produce just a few boards for you; this is a fact.

Thus, the Pandora's box has been opened. The world's fortunes will henceforth become unpredictable

Mo Shui reassembles the box, connects the wiring and ports, powers on the system, starts it, runs the control software, connects to the INTERNET, intrudes into the neighboring server, copies the hard drive, and concludes the software operation, followed by data dumping. Extracts compression software for limited capacity compilation and restoration. As the testing progresses step by step, and with Mo Shui moving between the two rooms, data comparison is conducted.

Mo Shui began to modify the runtime values of the program, as the settings for spatial capacity could not be adjusted. After all, that was an electronic cluster space, and no one could interfere with it. Thus, adjustments had to be made to the software's runtime.

The application software is running normally and a prompt input box appears. Mo Shui enters a segment of code into the prompt box, and immediately, the 17-inch LCD monitor used to monitor the box begins to respond.

The 17-inch monitor has gone black again

Hehe, Old Song, please keep it. I might trouble you again later. You see, it is still uncertain whether these precious items can complete my experiment. Perhaps I will come to you again soon. Look, you are helping me so much; I should express my gratitude. I know you are knowledgeable about tea, so, hehe, alright, I will take my leave now. You have your work to do." Mo Shui finished speaking and walked out, casually closing the office door.

Oh, Xiao Mo, why don't you set that box of treasures aside for now? There's no need to hold it so tightly. " Lao Song, also known as Song Wenfeng, teased as he watched Mo Shui so nervously clutching the box.

After the excitement subsided, Mo Shui began to calm down and reflect on the reason for the box smoking

How could I forget that there is a hard disk array worth 20 pieces there? Mo Shui looked at the box that was continuously smoking, feeling heartbroken, and patted his forehead as he spoke, but soon began to get excited.

After adjusting his state, Mo Shui quickly walked towards the next room and activated a server placed in the corner. This is an important step in the second phase of the research

The software is running perfectly fine, and on the 17-inch monitor, there is now a continuously rotating Tai Chi symbol displayed, with an electronic flow of 010101 rapidly and steadily rotating along the Tai Chi orbit.

20 hard disk arrays, just kidding, each hard disk has a capacity of 120G. My goodness, what does this mean? A total capacity of 2400G for the hard disks, and in less than 5 seconds, hmm, Mo Shui looked at the software runtime log, 4.85 seconds. Oh my, a copy time of 4.85 seconds, although the remaining capacity of the 20 hard disks is not large, it is still not that exaggerated.