The interrogation questions needed to be handled by professionals, and Xing Baohua wasn't sure if his own guards could get any information out of them.
If he couldn't get any information out of him, Xing Baohua decided to bring the person back to China. The person couldn't die immediately; he needed professional medical treatment and a professional interrogation.
The most important thing now is to verify the authenticity of the data.
The large space created by the hard drive enclosure allows for the freeing up of 20GB of files. Furthermore, copying can be performed within a single drive, and so on.
The only problem is that the serial port speed of this era is a bit frustrating. A 20GB file is quite large, and it takes 6-7 hours to transfer it to the hard drive enclosure.
Xing Baohua wouldn't wait. During the transmission, Xing Baohua and other staff members manually operated the system to identify one or two viruses for analysis.
Since the security software issued a warning, it means there is similar virus core information in its database. After analyzing the virus pattern, it begins to separate the infected files. At this point, a small operational error could delete the infected file.
Manually extracting files is time-consuming, and with many files, it requires teamwork. However, there is another method: dedicated removal mode.
Viruses come in different types. To specifically target one or two types of viruses, you need to develop antivirus software that can both kill the virus and protect the original files, and reduce a lot of manual time through scanning.
This operation places very high demands on the machine's performance.
A regular computer's CPU can't handle it; not only is the frequency low, but the power consumption is also low. The only way to operate it is to utilize the overclocking capabilities of a server. If one server isn't enough, use two; if two aren't enough, use four.
If performance is insufficient, quantity will compensate.
Of course, it can't be done haphazardly; it requires targeted processing, bridging hardware, and dedicated core software for frequency control to achieve the desired tuning effect.
A regular computer has only one motherboard and one CPU, but servers can often have more than two.
The most common type is the dual-socket CPU. These CPUs are different from the usual ones because they come with overclocking capabilities from the factory.
Overclocking is like an engine. A regular engine has limited power, while an overclocked engine is like one that comes with built-in boost, allowing it to operate at overload.
Overclocking reduces the lifespan of the chip. Continuing to overclock will cause the chip temperature to rise sharply, and if the cooling system cannot lower the temperature, it will burn out the device.
Often, after large servers are upgraded, the retired CPUs are tested for performance and then enter the second-hand market.
By modifying the motherboards and using these retired CPUs, these machines can be sold as high-performance machines at a very low price. This is very attractive to budget-conscious consumers—cheap, good performance, what more could you ask for!
This is essentially the same as buying a used taxi – it's converted from a commercial to a non-commercial vehicle. It's usable and can run, but you never know when it might break down.
Therefore, if you use a server chip like a home computer, you might be lucky and it could last for seven or eight years or even more. If you're unlucky, it might only last a few weeks. It mainly depends on what you're running, how much you overclock, and the temperature.
Xing Baohua is currently using the overclocking capabilities of the server CPU to improve computing power, and once it's enabled, he'll also need to figure out how to improve the cooling system.
The hardware team has a plan in place, including what to use for cooling, like water!
It wasn't a water-cooling system like those in later generations, but rather an aluminum radiator with an insulated and waterproof device and a drain pipe.
Ice cubes are placed inside the recesses of the insulating and waterproof device to cool the radiator, achieving a conductive cooling method. As the ice melts, the water is drained out through the drain pipe.
If there's not enough ice, add more ice.
This method is used in laboratories. Some laboratories use coolant to test the limits of chip overclocking performance, while others use liquid helium for cooling.
Of course, these are all extreme operations. With current chip technology, Xing Baohua feels that even using coolant would be a waste.
Because the computational load cannot reach extremely high temperatures.
Xie Yingying looked at Xing Baohua, who was busy in front of the computer, and then looked down at the line of text that appeared on his pager: "Are you short-handed? Do you need any support?"
It was just one line of text, without a signature.
Xie Yingying was unsure whether to interrupt Xing Baohua to let him know, but she knew that Xing Baohua handing over all the communication equipment to her meant that the boss didn't want anyone to interrupt his work.
But after a short while, a dozen or so lines of gibberish appeared on the pager. This time, I really couldn't understand it. If it were Morse code or something, I could at least understand a little bit.
Seeing that Xing Baohua was busy, they could only save this information and wait until he was done.
By noon, Xing Baohua had finally finished processing a set of viruses; all three major categories of viruses were on this hard drive.
The security management software records worm viruses most frequently. Xing Baohua estimated that the alerts were also for worm viruses, so when creating the dedicated removal tool, he first focused on worm viruses.
Worms are prone to mutation, and often even specialized removal tools may not detect them. However, these should only be dealt with as a last resort.
Xing Baohua yawned as he walked out, intending to get something to eat.
He called Xie Yingying and headed towards the restaurant. It was then that the secretary told Xing Baohua two important pieces of information.
Xing Baohua looked at the pager and typed in two words: No need.
Stop when you see the garbled text; you still have to wait to eat.
Xing Baohua, who had returned, randomly picked a computer, opened a text file, typed in the garbled characters, then wrote a string of numbers and letters, saved it, and exited.
Next, rename the file extension of the text. After doing all this, type a few letters in the computer's command prompt; this is the name of the programming software.
My dear reader, there's more to this chapter! Please click the next page to continue reading—even more exciting content awaits!
Continue read on readnovelmtl.com