Volume 2: Urban Legend Chapter 156: Bridge System (3rd Update)
Zhao Feng took out two mobile phones, one is the original copycat machine, the other is a well-known domestic top 5G mobile phone, the latter is a special machine bought to test the limit of algorithm compression technology, because it is not good to directly change the computer in the management room into a bridge system, so after completing the preliminary framework of the system, it was transferred to the mobile phone for follow-up improvement, and experienced three performance tests.
The other copycat machine is used for anti-theft code testing, and it has been replaced with a bridge system.
"The system dominates, starts. ”
With Zhao Feng's order, the screen of the new mobile phone was automatically unlocked, and a black and white pattern similar to a compass appeared on the screen, and the pattern was divided into three layers from the inside out: the core layer, the middle layer, and the outer layer.
The core layer is a mechanical face, which represents the root of the system, that is, the highest authority of the system.
In the highest authority of the bridge system, there is only one system master, and countless other system cores, and the 5G mobile phone in Zhao Feng's hand lives the only system master of the entire bridge system, no matter how many people use the bridge system in the future, its highest authority is only the core of the system, and the system master holds the ultimate dominance of the main system.
The middle layer is the framework of the entire system, all of which are the products of the algorithm compression technology of the mysterious country, including the initial UI, algorithm base, hardware association optimization, and emergency self-destruct code.
The so-called emergency self-destruct code, not that it will self-destruct after starting, this string of codes is directly connected with the outer layer of anti-theft code, once the anti-theft code is broken, it will directly trigger emergency self-destruct, delete the bridge system of the current mobile phone, and leave no traces, which is the last anti-theft measure.
While the emergency self-destruct code is perfect, it can't be relied on as a theft prevention alone, in which case the bridge system will never be put on the market, after all, who wants to use a system that can self-destruct at any time?
The last outer layer is the key to the key, the ontology of the anti-theft code, which is also the next item that Zhao Feng will test.
"The system master has been started, the operation authority has been confirmed, please enter the operation command. The mechanical face of the core layer opened its mouth to speak, and the mobile phone synthesized electronically.
"Connect to the network. ”
This is the first time that Zhao Feng has connected the bridge system to the network, and before that, he has not had much confidence in the anti-theft code written by the divine consciousness, for fear that there will be some uncontrollable accidents once connected to the network.
"Connected to the network, the current signal is good, the data transmission speed is 980Mbps, and the actual transmission speed is 1172Gbps after algorithm compression technology, does it enable traffic stealth?"
Traffic stealth is also a function based on algorithm compression technology, and its specific implementation ideas can be exemplified by the copycat machine on the table and the brand machine in the hand.
When the copycat machine turns on the data traffic, the brand machine simultaneously opens the traffic, and turns on the traffic stealth, then the latter is forced to divert a very small amount of traffic from its traffic without the authorization of the copycat machine, but because of the effect of algorithm compression technology, this very little traffic can be used for huge data docking, and these data will not show that it is received by the copycat, let alone show the traces of the brand machine access to the network, at most, when the copycat machine is carefully checked, it is found that the copycat machine has a very small amount of abnormal transmission data.
And because the data "disappears" before it enters the copycat, so, if it is really calculated, it is the communication provider who has to compensate the copycat for the amount of missing data.
In this way, you can run wild in the online world without being noticed at all, so it is called traffic stealth!
Of course, once the function of traffic stealth is used on a large scale, there may be network security risks, so Zhao Feng only retains this function in the system master.
"Initiate stealth and start a large-scale firewall breach within the network, dividing the data according to the difficulty of cracking. ”
"Executing Instruction ......"
The network knows no borders, and all the devices connected to the network around the world are attacked by the system master at almost the same time, and because of the effect of traffic stealth, the firewalls of these devices are not even aware of their own incursions.
In fact, the system master did not substantially break the defense line of these firewalls, but analyzed their components one by one, synchronously formed the same firewall on Zhao Feng's mobile phone, and then cracked it on the mobile phone.
Within 10 seconds from the start of the task, all the firewalls in the network are almost synchronously replicated and cracked in the mobile phone, which means that among these firewalls, the strongest defense can only last for 10 seconds!
"The execution of the order has been completed. The system juggernaut then pops up a window that ranks all the firewalls in order of difficulty to breach, from highest to lowest, and the first one is Norton Firewall with a score of 997.
"Add the anti-theft code of the bridge system to the ranking, update the ranking. ”
A second later, the ranking is updated, and the first place: bridge system, score 110749.
Zhao Feng couldn't laugh at this result, obviously, his previous idea was indeed ridiculously wrong, just in terms of this ranking, it is almost impossible to break through the anti-theft code of the bridge system in the world!
At the same time as getting this result, Zhao Feng made a decision: to initially put the free version of the bridge system into the network!
If the complete bridge system is a mobile phone system that automatically obtains the highest authority by the user, then the free version retains the basic operation authority, hides the core of the system, and only provides the middle-level functions to the user, but only the UI, algorithm base and emergency self-destruct code will take effect for free in the middle-level functions, and the hardware association optimization will directly cause the user's mobile phone performance to be greatly improved, and this paid function can give the registered user the experience permission for the first seven days.
Zhao Feng didn't plan to make money with the bridge system so quickly, this time the investment was more like a market research, according to the number of downloads and installations, the number of registered users and the total number of payments for follow-up policy formulation, so, the standard of payment is not high, initially set at ten yuan per month.
As for the webpage of the bridge system, although Zhao Feng can't get it, he can hand it over to the system master to get it, but it really can't be done, and he can also let the divine consciousness of the creation system master take action.
On this night, the official website of the bridge appeared on the Internet, and Zhao Feng asked the system to monitor the dynamics of the official website at all times, and carried out publicity 24 hours a day in the major forums on the Internet......
......
At 6:50 the next morning, Zhao Feng took Zhao Xue to school, looking at the various luxury cars lined up at the door, most of the people who sent their children to school were women, and the mothers wore gold and silver, chatting with each other about which bag they had recently spent for tens of thousands of dollars, and which international skin care brand had come up with a new product.
The scene was more like Mrs. Kuo's morning tea party than sending her children to school.
"Brother!"
Just when Zhao Feng's brothers and sisters came to the gate of the school, they heard a call from a distance, and they looked at it, it was Zhao Yuanyuan, Zhao Zilong, and Zhao Feng's adoptive mother Zhang Lilin......