Since I Was a Special Soldier
Chapter 485: Firewall
The firewall of this computer was written by Jiang Yanhai. It cannot be regarded as a firewall in the conventional sense. From the birth of the computer to the birth of the Internet and then to the present, it is like an ancient spear and a shield.
The fateful battle between hackers and security officers can be regarded as the beginning, although it is said that many security officers are behind hackers.
Because the two technologies are just figured out, Jiang Yanhai's programming ability and hacking skills are not learned systematically, but directly provided by the Red Star Engine, and then he learns it thoroughly.
Instead, he didn't fall into such a rigid brain. In the field of hackers, or in the field of computer software, his creativity can be described as wild and unreliable.
When it comes to the Internet, it is inseparable from computer viruses, something that once made people hear about it from the end of the 20th century to the beginning of the 21st century.
Computer virus is a general term for a program that can rapidly parasitize and multiply through computer networks, and quickly pass through system loopholes through mutation and hybridization, and obtain certain system control rights.
Some people may not understand that this computer virus is the same as raising pigs and rice. Are you still playing with biology? In fact, there are two words in the name of a computer virus. In fact, to put it bluntly, it is like a virus in the human body.
Any virus that has put people to death and is difficult to kill so far has high variability, reproductiveness, and may even hybridize and mutate with other viruses.
The same is true for computer viruses. A perfect computer virus must first have the ability to reproduce on the Internet, that is, the ability to replicate itself, and secondly, it is commonly known as the idea and technology of integrating artificial intelligence.
At the same time, a perfect virus must also have a distributed structure, a mother-child structure, that is to say, when the mother virus is detected, it will release a more destructive or more concealed daughter virus.
In addition, a perfect virus must also have hybridization and mutation, which means that it can exchange genetic information with viruses that are similar to itself, mutate itself, and replicate. This makes the virus program itself more concealed and more destructive.
Of course, a perfect virus does not exist in theory at present.
Then why doesn't it seem that the virus hasn't been as perverted as it used to be in recent years? Or is it not as much as before?
In the past, what companies like Rising, Jiangmin, Xiaohong Umbrella, Kaspersky, Symantec, etc. or software were used to detect computers randomly and scanned for tens of thousands of viruses, but now there are none?
In fact, it is mainly due to the rise of cloud computing and the rapid development of computer hardware. The previous computer virus is difficult to crack because its encryption program is difficult to crack. After the encryption program is cracked, once the internal source code is known, it is very simple to kill this computer virus.
Because the computing speed of modern computers is too fast, it won't take long for your encryption program to directly crack it for you, so the glorious period of computer viruses seems to have passed.
Moreover, the current network is developed, and the computer systems are more connected to the server. Once any virus invades, the server will find a little problem, and promptly report to the police. There are also various protection software with real-time protection capabilities.
Therefore, what 360 or the like installed on the current computer is more like a crude version of the firewall.
Computer viruses don't seem to develop anymore, but the firewall hasn't stagnated.
In fact, computer viruses can't be said to be undeveloped. Trojan horses and computer viruses are more often targeted at enterprise users.
Of course, everything is not so absolute. For example, Jiang Yanhai’s firewall is based on the principles of computer viruses and the genetic map of the ball python. Of course, the genetic map of organisms cannot be the same as the program.
What Jiang Yanhai said is that the mutation rule of his viral firewall is based on the mutation rule of the ball python's genetic map.
Because the ball python has 5,000 independent mutations and tens of thousands of gene combinations, and the genetic map of each gene combination is different.
If other people don’t know the law of mutation, it’s difficult to crack it. From another point of view, it’s not impossible to crack it by force. For supercomputers like Shenwei Taihu Light, you let it calculate with all its strength. If it is, it is not impossible to calculate it.
But how many kinds of creatures are there in nature, can you count them one by one? Modern computing power is not that abnormal.
The reason why this firewall is a viral firewall is that it is more like a super virus, but it is slightly larger in size. It is the first to infect all the important permissions of the entire system without any errors or omissions.
Whenever there is any other virus or remote control trying to invade it, it will immediately release two super Trojan horses, one is an anti-tracking program, and the other is to directly eliminate the invading virus or Trojan horse program.
If it is found that the other party’s intrusion is extremely powerful and cannot be organized, this Trojan horse program will directly and violently destroy all databases of the entire computer, instantly repeatedly erasing and writing important data areas of the hard disk thousands of times.
Even if you remove the hard drive in reality, there is no way to recover the data inside.
Moreover, it has the capability of real-time alarm, borrowing the modern powerful communication network, once such a problem occurs, it can transmit the alarm to the electronic warfare countermeasure program at any time.
This thing can be regarded as Jiang Yanhai has nothing to do with it. A powerful computer firewall can also be said to be a super virus.
If it is connected to an electronic warfare countermeasure program, if it has an electronic warfare countermeasure program that does not know how many times the amount of calculations than the light of Shenwei Taihu Lake, it is invincible!
This offensive and defensive firewall is a relatively complete program written by Jiang Yanhai, which is many times stronger than the one he just started experimenting with.
Of course, there is another advantage. It can be stored in the electronic warfare simulation battle program. That is to say, Jiang Yanhai can use it at any time, and he can connect to any electronic equipment around him and use it directly.
And Jiang Yanhai doesn't even need to operate the computer when turning on the computer, just connect directly to the electronic warfare auxiliary program and remove the firewall in an instant.
Copy all the drawings inside, and just about to contact Professor Xiang, the phone next to Fan Tianlei rang.
"Yes!" Fan Tianlei answered the phone ~www.wuxiaspot.com~ and his face became serious. After listening to the content, he immediately responded with a simple word, and then handed the phone to Jiang Yanhai.
Jiang Yanhai was a little puzzled, but still took the phone.
"Comrade Xiaojiang, are you better at breaking programs, in the computer field?" There was an old man's voice on the phone.
"Forget it." Jiang Yanhai paused, he probably guessed something, it should be the system problem of the stealth unmanned fighter jet.
"You are now driving your J7 and fly directly to the airport where you were in Chengdu last time. Someone will pick you up and have an important task."
"Yes!" Jiang Yanhai stopped talking nonsense when he heard the mission, and responded neatly.
*************
ps:...brothers, I am about to be caught up...please ask for a monthly pass, ask for a monthly pass, ask for a monthly pass! 10 more today! ! Come in the afternoon! I haven't been out for a month, just code words at home. For the sake of such hard work! Ask for a monthly pass!
You'll Also Like
-
The commander-in-chief is handsome and charming
Chapter 409 7 hours ago -
Elf: I became the king, the system is online
Chapter 162 7 hours ago -
One Piece: The Straw Hat Pirates' Max-Level Swordsman
Chapter 462 7 hours ago -
Pokémon: Thunder Shatters the Darkness
Chapter 445 7 hours ago -
Crazy Xiuxian, boundless magic power
Chapter 304 7 hours ago -
Cultivation begins in the world of Pokémon
Chapter 294 7 hours ago -
Transformed into a vicious concubine? Being led by the eldest sister is annoying
Chapter 496 7 hours ago -
Non-mainstream Conan viewing style
Chapter 467 7 hours ago -
Pokémon: I have a Pokémon too!
Chapter 463 7 hours ago -
The physical skill becomes a god, and the fist gives the ninja world a middle part
Chapter 182 7 hours ago