LATEST UPDATES

Published at 1st of March 2022 07:31:58 PM


Chapter 467

If audio player doesn't work, press Stop then Play button again




The firewall of this computer was written by Jiang Yanhai. It can not be regarded as a firewall in the conventional sense. From the birth of the computer to the birth of the Internet, it is like an ancient spear and shield.

The fatalistic battle between hackers and security officers has begun, although many security officers are hackers behind their backs.

Because the two technologies are figured out. Jiang Yanhai's programming ability and hacker technology are not systematically learned, but directly provided by the Red Star engine, and then he learned by himself.

Instead, he did not fall into such a rigid brain. In terms of hackers, or in the field of computer software, his creativity can be described as unrestrained.

When it comes to the network, it is inseparable from the computer virus, which changed people's color from the end of the 20th century to the beginning of the 21st century.

Computer virus is the general name of a program that can quickly parasitize and reproduce through computer network, and quickly obtain certain system control through system vulnerabilities through mutation and hybridization.

Some people may not understand that this computer virus is the same as raising pigs and rice. Are you still playing with biology? In fact, there are two words "virus" in the name of computer virus. In fact, it is like a virus in the human body.

However, viruses that kill people and are difficult to kill so far have high variability, reproduction, and even cross variability with other viruses.

The same is true of computer viruses. A perfect computer virus must first have the ability of network reproduction, that is, the ability of self replication. Secondly, it is commonly known as the idea and technology of integrating artificial intelligence.

At the same time, the perfect virus must also have a distributed structure, mother child structure, that is, when the mother virus is detected, it will release more destructive or more hidden sub viruses.

In addition, a perfect virus should also have hybridization and mutation, that is, it can exchange genetic information, self mutate and replicate with viruses similar to itself. Thus, the virus program itself is more hidden and destructive.

Of course, the perfect virus does not exist in theory at present.

Then why doesn't the virus seem to be so abnormal in recent years? Or not as much as before?

In the past, companies or software such as Ruixing, Jiangmin, xiaohongumbrella, Kaspersky, Symantec and so on were used to randomly detect computers and scan tens of thousands of viruses, but they are not available now?

In fact, it mainly benefits from the rise of cloud computing and the rapid development of computer hardware. The previous computer virus is difficult to crack because its encryption program is difficult to crack. After cracking the encryption program, once the internal source code is known, it is very easy to kill this computer virus.

Because the modern computer operation speed is too fast, it won't take long for your encryption program to crack it directly, so the glorious period of computer virus seems to have passed.

And now the network is developed, and the computer system is more connected to the server. Once any virus invades, if there is a little problem, the server will find it and give an alarm quickly. There are also various protection software with real-time protection ability.

So what 360 is installed on the computer now is more like a simple version of the firewall.

Computer viruses don't seem to develop, but firewalls don't stop.

In fact, computer viruses can not be said not to develop. Trojans and computer viruses are more often targeted at enterprise users.

Of course, everything is not so absolute. For example, Jiang Yanhai's firewall is written based on the principle of computer virus and the gene map of ball python. Of course, the biological gene map can't be the same as the program.

Jiang Yanhai said that the variation law of his viral firewall is based on the variation law of the gene map of ball python.

Because the ball python has 5000 independent variants and tens of thousands of gene combinations, and the gene map of each gene combination is different.

If other people don't know the law of variation, it's difficult to crack it. From another point of view, it's not impossible to crack it forcibly. It's not impossible to calculate a supercomputer like Shenwei Taihu Lake light if you let it calculate with all its strength.

But how many kinds of creatures are there in nature? Can you calculate them one by one? Modern computing power is not so abnormal.

The reason why this firewall is a viral firewall is that it is more like a super virus, that is, it is a little large. It takes the lead in infecting all important permissions of the whole system without any mistakes.

Whenever any other virus or remote control attempts to invade it, it will immediately release two super Trojans, one is the anti tracking program, and the other is to directly eliminate the invading virus or Trojan program.

If it is found that the other party's intrusion strength is extremely strong and can not be organized, this trojan horse program will directly and violently destroy all databases of the whole computer, and instantly erase the important data area of the hard disk thousands of times.

Even if you remove the hard disk in reality, there is no way to recover the data in it.

Moreover, it has the ability of real-time alarm, and borrows the modern powerful communication network. Once such a problem occurs, it can transmit the alarm to the EW countermeasure program at any time.

This thing can be regarded as Jiang Yanhai's trouble. A strong computer firewall can also be said to be a super virus.

If it is connected to the EW countermeasure program and has the EW countermeasure program, it is invincible if it does not know how many times the calculation amount of Shenwei Taihu Lake light!

This firewall integrating attack and defense is a relatively completed program written by Jiang Yanhai, which is many times stronger than the program he just started to test.

Of course, there is another advantage. It can be saved in the EW simulation game program. In other words, Jiang Yanhai can use it at any time and can connect any electronic equipment around him to use it directly at any time.

And when you open the computer, you don't even need Jiang Yanhai to operate by himself. The direct electronic warfare auxiliary program can instantly connect and remove the firewall.

Copy all the drawings inside. As soon as I was ready to contact the professor, fan Tianlei's phone rang.

"Yes!" fan Tianlei picked up the phone and his face became serious. After listening to the content, he immediately returned a word, and then handed the mobile phone to Jiang Yanhai.

Jiang Yanhai had some doubts, but he still picked up his mobile phone.

"Comrade Xiaojiang, are you good at breaking programs, that is, in the computer field?" there was an old man's voice on the phone.

"It's true." Jiangyan Haydn thought for a while. He probably guessed something. It should be the system problem of the stealth unmanned fighter.

"You are driving your J7 and flying directly to the airport in Chengdu last time. Someone will pick you up and have an important task."

"Yes!" when Jiang Yanhai heard the task, he stopped talking nonsense and gave a crisp response.

*************

PS:... Brothers, I'm almost caught up... Ask for a monthly ticket, beg for a monthly ticket, kneel down and beg for a monthly ticket! Today 10 more ah!! Come in the afternoon! I haven't been out for a month. I code at home. For the sake of such diligence! Ask for a monthly ticket!




Please report us if you find any errors so we can fix it asap!


COMMENTS