Volume 2 Fighter Bureau Chapter 66, The Way of Attack and Defense
When Yu Zihan arrived at Mr. Wu's lab, the time was 1:30 p.m. Mr. Wu has not yet come, and a few graduate students are not there, because the work of being able to write code on the computer does not require everyone to be in the laboratory all the time, everyone has a computer, and everyone can chat and discuss directly online. When the code is written and run, when there is a bug and the problem cannot be found, those students come here to find Mr. Wu for guidance.
Yu Zihan didn't wait long, and Teacher Wu came over.
Mr. Wu's first sentence was: "Yu Zihan, I know that you have done game cheating, and our project is an anti-cheat project, so I believe you should get started quickly!"
After hearing this, Yu Zihan knew that Mr. Wu still had some understanding of himself, and he should have talked to Lin Yan on the phone. Yu Zihan nodded and said, "Yes, Mr. Wu, but I haven't done an anti-plug-in program, and I still have zero foundation in this regard." ”
"Language programs are all the same, Sun Tzu once said, 'Those who know each other and know themselves will not be defeated in a hundred battles, those who do not know each other will win and lose, and those who do not know each other will die in every battle.' You've done legendary cheats, so you still have a lot of say in the design of anti-cheats, and it's a third-party company that entrusts us to do anti-cheats this time, and they have cooperation with Shengda. ”
Yu Zihan nodded and listened carefully to what Teacher Wu said.
Mr. Wu opened the door and walked into the laboratory. The furnishings in the laboratory are simple, a few desks, a few computers, a water dispenser, and two large bookcases. It's said to be a laboratory, but it's actually an office.
"Yu Zihan, in C language learning, you can have an in-depth understanding, find out the principle, and draw inferences, this is what I like you very much, Lin Yan is also good, but his knowledge is relatively wide, but not as in-depth as your research.
This project may take about half a year, you can usually study what plug-ins are on the market now, try to analyze their intrusion principle, after a few days, everyone get together, I will ask you to make a report on this, you tell me everything you know, what aspects are recommended for everyone to start with, okay? In addition, you can read Ivor Horton's "Beginning C, Fifth Edition" This book is both an introductory knowledge and a good book to expand your thinking. Teacher Wu said.
The sunlight outside the window was a little dazzling, just shining directly on Mr. Wu's desk, Yu Zihan walked to the window and pulled down the curtain halfway to block the direct sunlight on the desk, and there was sunlight sprinkled indoors.
After listening to Mr. Wu's words, Yu Zihan nodded and said, "Okay, Mr. Wu, is there any book in the library? If not, I'll go to the bookstore and buy it!"
"Whether there is a library tube, I don't know, I have one here, you can take it and see it first, but you have to gnaw it thoroughly, it's not just a month or two to learn it, and you can read it for a long time in the future." Mr. Wu sat at his desk, took out "Beginning C, Fifth Edition" on the bookshelf and handed it to Yu Zihan.
Mr. Wu's exclusive desk is clean and neat, and the characters on the computer keyboard are worn out and cannot be seen clearly, obviously Mr. Wu is often here. Yu Zihan took the book and hurriedly thanked the teacher.
"The keyboard battle on the Internet, in fact, is the same as the real battlefield, you come and go are interests, no one can say that you will win or lose, but the more knowledge you know, the greater your chance of winning. Just like since ancient times, the nomads of northern China have long peeped into the wealth of the Central Plains Dynasty.
They are like viruses, like plug-ins, taking advantage of the internal instability of the Central Plains Dynasty, seeing that you have loopholes, then come in and attack, can conquer the city, and snatch food and wealth is victory; It is precisely because of their constant harassment and attacks that the continuous development and strength of the Central Plains Dynasty have created today's unification situation.
Therefore, whether it is a plug-in program or a virus, their existence is just an external factor that motivates us to grow and expand on the Internet, and we ourselves need to constantly strengthen and learn. You've done cheats, and you know that they just use some bugs to sneak attack, and now you are looking at another way to prevent cheating, which will naturally be of great use to your growth. ”
……
The meeting with Mr. Wu just now was not long, but it opened another door in Yu Zihan's heart, he seemed to have a new direction, Mr. Wu did not tell him more knowledge details of the plug-in program and the anti-plug-in program. Instead, he gave him an analogy, the plug-in is a spear, and the anti-plug-in is a shield, one attack and one defense. The battlefield of the program is one to grasp the opponent's vulnerabilities to attack, and the other to supplement and strengthen oneself to disintegrate the opponent's intentions.
Sun Tzu said in the Art of War: Those who cannot be defeated will defend it, and those who can be victorious will attack it. The rules are insufficient, but the offense is more than enough. Those who are good defenders are hidden under the nine earths, and those who are good at attacking are moving above the nine heavens, so they can protect themselves and win all.
"Offense is the best offense", but here it becomes "Offense is the best offense". Since ancient times, when fighting a war, it is necessary to first raise troops and stimulate strength, and only after being completely prepared can we launch an attack. In the same life, we must also raise troops first before we can flourish in the future. Imagine if a country, a company, or a person can't even protect themselves, then how can we talk about realizing great dreams?
As a defender, they are always thinking about how to strengthen themselves, and as an attacker, they just want to take advantage of your illness to kill you, even if it is to get some wool from you.
In the history of China, the northern nomads are the best spears, and the Central Plains are the shields, spears and shields for thousands of years, who wins and who loses, it is no longer clear today. Mr. Wu extended from "The Art of War" to cyber attack warfare, analyzed it superficially, and recommended some information to Yu Zihan, so that he could go back and study it first.
The afternoon sun was relatively warm, Yu Zihan wore a sweater and a cotton jacket, walked slowly on campus, and sweat beads were densely oozing from his back, so Yu Zihan unbuttoned the cotton jacket, faced the breeze, took a few deep breaths of cold air, and suddenly felt much more comfortable.
On the tennis court next to the playground, two young men took off their coats and brandished rackets in thin sweatshirts. On the bench not far away, two girls were sitting, their eyes staring at the two boys playing tennis, and the two looked contented, enjoying the warm sunshine and chatting happily.
In such a beautiful weather, the playground is the favorite paradise of college students, and everyone looks very happy under the caress of the warm afternoon sun. But Yu Zihan himself doesn't know how long he hasn't been to exercise on the playground, every time he walks on the avenue of the new campus in a hurry, the canteen, dormitory and classroom are almost his fixed squatting spots, this kind of life is what he likes, but it is also the culprit of depression.
Yu Zihan came to the sideline by surprise, and then began to walk along the circular red track of the playground. He took off his sweater and coat, put it on the park chair next to him, and walked for about ten minutes, with a lot of sweat oozing from his back.
The large football field in the middle of the playground is divided into two halves, and there are many students on both sides playing small football games, loud cheers and low sighs one after another. Many students ran past them quickly, and sometimes one or two students looked back at themselves, smiled, said hello, and quickly ran away.
The transition between attack and defense on the football field is always very fast, and the attacking side, after getting the football, will often pass left and right, looking for a suitable breakthrough, and sometimes in order to pull the defenders out, they will deliberately attract defenders to their own half to grab the ball, so as to facilitate the sudden straight plug and big foot pass behind them. On the defensive side, there will always be a timely mark, or block defense.
It is impossible for the defender to make a clean block no matter what, and accidents will always happen when they are caught off guard, but it can be seen that the side with a more successful defense + is often more likely to play a defensive counterattack.
Yu Zihan looked at it and thought that block defense and purposeful offense are not exactly the ways that plug-ins are used in the plug-in? Good cheats will always try to skip your detection (defense), suddenly enter your rear, and then create chaos. At this time, if you don't have a good fill in the back, then the opponent will definitely shoot successfully, in the same way, if the plug-in program skips the detection and runs in the game, there is no corresponding detection program in the game, which will naturally let the opponent succeed.
Once the defender's front interception and follow-up defense personnel lose tracking (lose the target), they are often free to walk, which is similar to the anti-plug-in program, you have been running to detect whether there is a target, but when the game is running normally, you have not sent a suspicious target, there are only a few running programs on the computer, you have detected them, and naturally the memory consumption is very low and no longer detected. At this point, the soccer ball is actually behind you (running in the game), and you don't know it, so you need to have another detection method to monitor it in the game.
For example, after the double magic plug-in is running, the double mana consumption in the game can be judged if the double attack effect can be detected, not just the presence or absence of the program running the plug-in. As long as there is a continuous sampling value in such monitoring, the game can be stopped and the user can be determined to be using the plug-in.
Yu Zihan seems to have grasped something in his heart, this kind of regional block defense is also equivalent to a means of anti-plug-in monitoring, and the real operation and effective inspection still need more data experiments to confirm.
The winter sun is amiable, warm, and comfortable, without a little bit of violence and arrogance, just like an orchid faintly wafting with an elegant floral fragrance, embracing Yu Zihan's body, soft and crispy.
Yu Zihan ran slowly, silently reciting: know each other and know oneself, one battle will not be lost, one victory and one defeat without knowing the other, and every battle will be defeated.