Chapter 113: A Virtual Experiment Management System

When he woke up in the morning, it was about 3 o'clock, Lin was overjoyed, because he slept early last night, so he felt that he should get up early this morning, and then he could download some things for free on the little wood worm, and later he found out that it was wrong, because there was a problem with the network, or there was a problem with the computer. Pen & Fun & Pavilion www.biquge.info basically all downloads are the size of the file is wrong, generally small, involving a lot of software. One of them may have a problem with your computer, so you have to reinstall the operating system.

At 6:57, PM2.5--17ug/m3, Lin did an experiment that he found interesting, put the D disk files of the laptop computer into an image file, nero processed it for a long time, because it is a program file, so there are a lot of them, Lin's original intention was to see how big the D disk file is, whether it can be loaded with a CD. Then he found that there are many files under the TEMP file that can be deleted, Lin calculated, there are a total of 175 files or folder contents, about 400M in size, so he stopped the operation of image making, and deleted most of the contents in TEMP.

At 8 o'clock, my mother asked Lin if it was convenient to go to Cane Wood to buy rice together, Lin asked my mother about how far it was, and my mother said that it was about near No. 8 Middle School, and I usually took the bus to go, but now it is a holiday, so the bus is not running.

At half past eight, Lin took care of his own affairs and set off with his mother to Cane Mu, and he found that his mother's sense of balance was well maintained, and he did not worry at all when the car was driving at high speed. After arriving at Shumu, Lin stopped to look at the beauty on the side of the road, and his mother walked into the market.

After 30 minutes, my mother came out with a full hand of vegetables, and the rice was not purchased, but she bought some dishes that she liked. It was because of this successful purchase that my mother was happy all morning.

Dad was also in a very good mood, he invited his mother to go to the city park to play, so Lin continued to carve his CD, and Mom and Dad went out together.

Lin had a hunch that there would be a big outbreak of computer viruses, because his computer rarely had these strange phenomena, in the past, the virus only targeted the C drive, but now the scope of the attack is already aimed at the download of the network and various partitions. Once the code of this virus has been continuously improved by the author, there is no way to protect it from the security software available on the market.

For work, the control computer of the instrument is also very likely to have problems; For scientific research, the computers that many researchers rely on for survival and development may also have problems. But this process is not too fast, because it is still a long time from the beginning of the signs to the impact on Lin's computer use, so it shows that developers are also slow to debug their own programs and code. In addition, antivirus software and other forces are still fighting against viruses.

From a Buddhist point of view, if the mind is not polluted, the virus cannot work.

From a technical point of view, some necessary backup measures can also play a protective role.

Historically, if it weren't for the software company's deliberate release of software vulnerability information, it would be impossible for hackers and viruses to completely compromise a system. The blue screen incident of winXP back then was also a proof that XP could keep running normally for a long time, and now XP is facing a difficult situation.

Then think back to the question of whether it is necessary to install anti-virus software, if you install it, you must not use a lot of software, because files with words such as key and patch are very easy to be deleted. In fact, even if it is information such as registration codes, it is very easy for software companies to block them. So, in the end, it's the software companies that are also opening up.

There is also a possibility that antivirus software is a must, because without them, the computer can only be arbitrarily arbitrarily hacked or quasi-hackers.

Thinking of the safety factor, Lin compromised himself, immediately installed one, and the computer clicked for a while, and then calmed down. At the end of the network, Lin thought of Zhizhi's face, so he asked online: "In?" Luckily she was. So Lin chatted with her. Zhizhi said that if you decide what you want to do, do it according to the pre-set plan, and don't change yourself easily. In the past, you usually made a decision, and then a lot of people followed and had a plan accordingly, but in the middle of the story, you suddenly changed again for some reason. Everyone is very supportive of you, but because you have changed too many times, you have sacrificed a lot, so everyone is not happy.

In the next few hours, Lin tried to make himself have a plan for doing things from the beginning, simple things are fine, but some important things are difficult to stay the same. For example, if he tests a sample, using the first set of parameters, the signal value is very low, if he insists on it and does not change, then the measurement may not be completed in a day, and then he has to consider increasing the intensity of the incident light to obtain a larger signal.

Testing is just a simple example that Lin wants to give, and what is more complicated is the things and problems that involve people. Sometimes it's for yourself, sometimes it's not. Suppose it's because of someone else, then the elf will ask you why you are putting on such a high posture; If it was for himself, the elf would say that he was too selfish. So, Lin did a lot of things, and the elves had to evaluate and suggest.

The elf said Lin, "Your situation is already better than many people, and everyone also has to go through such mental and physical trials, but everyone has not said it, or has not told you. To put it simply, you have a house and a bed when you're cold, your family to help you cook when you're hungry, and a job to do when you don't have money. It's also an inner practice, a lot of people are doing penance, and you're just dealing with some difficulties at the level of the mind. ”

Lin often quarrels with elves, and on the spiritual level, sometimes he really can't help it, and he would rather offend the elves than express his dissatisfaction, and in the end he is eaten by pain. Sometimes, the pain is because the elves have this power; Sometimes, the pain is because the elves have a valid point of view. In the communication between the elves in the past life, Lin was always at a disadvantage, because the wisdom of the elves was much higher than him. Occasionally, when Lin retorted, the elves also calmed down for a short time, that is, in fact, the wisdom of the elves was very high, but it was not so high that it was unbreakable. If Lin had a chance to break through, he could only continue to think and play games against the wisdom of the elves, so that he would lose again and again, but the probability of success would be higher and higher.

There are many miracles that are difficult to reproduce, but sometimes, when doing a small thing, Lin feels a thought that seems to have happened, in this case, he will pay extra attention to see how the plot this time is different from the last time, and what impact his reaction has on the ending.

As a result, every day is like a new era, and the things of the past are basically forgotten, and the things of today feel new and are actually related to the things of the past. Whenever he walks on an empty road, Lin has an ethereal feeling, in the past, he would feel that he was alone, but now, he feels that it may be better to be alone, because he can walk more chic without worry.

However, he regretted that he could not control his own destiny, and whether others were objective or non-objective to him, by the second day, everything was back to square one.

At 6 o'clock in the morning, the sun shone out the window, which was a relatively lucky start. Then, Lin's task is to constantly monitor the status of various equipment, make evaluations, and then buy some equipment and leave it for testing the next day.

One day Lin made an interesting experiment, a burning disk should have been broken, or it was defective when it was bought, and when the optical drive was read, it showed that it still had about 300M space, so Lin made a small burning document, about 300M, and then tried to let the software burn this document. It stands to reason that it can't be engraved, and it turns out to be true.

If you put the system installation disc in the optical drive is a more dangerous thing, because the current installation disk is unattended, if its default mode is to load a system, in this way, in some case your computer restarts itself, and then the result is that the original operating system is gone. Once you lose the original operating system, the loss is naturally a lot, but it is indeed much faster for the computer, so there are gains and losses. In terms of operation habits, try not to place important documents in the C disk and program disk, so as to avoid some risks.

The next task that Lin began to experiment with was how to install the operating system ...... a hard disk that seemed to have a bad area, first of all, to repair the hard disk, boot it with a disc, and then run DiskGenius to repair the boot area of the target hard disk and save the repair results. Restart the computer, select the first partition of the hard disk to install the operating system on the CD boot menu, and then complete the installation of the system smoothly, which also contains commonly used tools. Such a process is actually a small range of computer repair work. The key point is to repair the boot area, most computers do not boot smoothly not because the hard disk is broken, but because the boot area information is corrupted.

When the idea came to this, Lin had the idea of participating in a research group, but he would expect that first of all, he should have a certain idea, so he should read some references, which is the theoretical basis of all ideas. However, the boss may think that the reference information is useless and invalid, and then the boss will make some suggestions according to his own ideas, such as what level of documentation should be read, how much time should be completed to read the literature, whether it is possible to make a group presentation, and then enter the experimental stage. On the main line of thinking, it must revolve around the boss's intentions, and most of what Lin himself thought in front of him would be gone. Either the boss proposed a very high level, or the boss asked him to do the work in combination with the current projects under construction in the unit. Then he promised that there would be progress in scientific research, but he was actually doing work and scientific research according to the boss's ideas, and his own thoughts could not be retained. Or, he did it willingly, succeeded, and was rewarded, but where is his own value?

What worries Lin even more is that his own consciousness will gradually fade, and after integrating into the dominant consciousness, his role is equivalent to a small accessory, and it can also be replaced. Of course, Lin wants to be an irreplaceable person, but if he thinks and does it this way, he will face great difficulties. For example, he wanted to do a laboratory safety project, and without the approval of the leadership, many experimental designs would not have a basis for implementation. If he wants to make a low-cost system, but the leader wants a high-quality and safe system, there is no need for him to experiment with such a so-called low-cost system.

Therefore, the low-cost system envisioned by Lin has the problem of lack of basic support at the beginning of the design, that is, if his project construction is based on the material world, there must be no technological leadership, but if his technology is based on the virtual level like the articles he wrote, it has a certain degree of advancement. Because he himself is a person who is keen on simulation computing, and in the world of computing simulation, relatively speaking, technical talents still have a certain advantage, because people engaged in the technical industry are usually people who lack money financially and can only rely on simulation. Large-scale simulations were naturally impossible, so what Lin had to do was to conduct security experiments based on a relatively simple architectural model. Such as dealing with thieves, fires, floods, pests and diseases, etc. Only if he is a little ahead in thinking, or if others really think that it is an unpopular research, then he has a certain opportunity.

If he uses this kind of thinking to guide himself, Lin has a sense of autonomy, but the financial support he can get is limited, and he does not promote the construction of his team, he enjoys the benefits of the group, but does not do anything for the group, so the team leader will gradually feel that he is not important to the team, so he will give up on him as a member.

This result is not the only one, if the level of his research is indeed relatively high, although his own thinking is leading, but everyone thinks it is good, in this way, the leader will change his original thinking and support him to bring this research model into a higher level of team building. Because a team has its own requirements at the level of experimental technology, at the level of scientific research, and at the level of security. If Lin's security philosophy can be recognized, why doesn't his own team use it? Therefore, Lin's only choice is to create a security system at the virtual level in the shortest possible time, according to the main layer of his own thinking, and the technology used is now accessible and reasonable, and then publish the results, which everyone also thinks is good.

Although his system may never have been realized, from a research point of view, there is a certain realistic possibility, and he also shared his own experience. As the main body of attack and defense, he is facing a 7-storey experimental building, and the first floor of the guard should be set up to 2, one to deal with unexpected affairs, and the other to stick to the duty post; If it is more strict, there is only one person, who does not intervene in general affairs and is only responsible for security incidents.

Dangerous items, generally identified through the security inspection system, including metal objects, firearms, etc.; Dangerous drugs are identified by biological assistants, such as police dogs; The identification of the staff is through the first fingerprint recognition, as well as the weight recognition at the entrance of the laboratory, and if the identification is incorrect, you have to enter the verification room to confirm the identity. Modern transfiguration techniques are more developed, and facial feature recognition can be used. When none of these recognition technologies find errors, they can also add behavior pattern recognition confirmation. The behavior pattern recognition system is a research system of consciousness subject, which has certain limitations, but it can play an auxiliary role in recognition.

After a number of high-standard identification and authentication system personnel, they can enter the core experimental area of the system for experiments, such an area has a high-density security inspection system, and there will be full-time personnel every day to back up the data generated by the system, and clear the data that needs to be deleted.

As the laboratory data may be deleted by the administrator by mistake, or changed by hackers from the Internet, the backup data itself also needs to be checked, such as checking the MD5 value of each file, etc., and you can also check the size of the file, the date of modification, etc. If there is an error in the data verification, it is traced back to the original data of the computer controlled by the instrument, and the network security technician checks the entrants on the intranet and extranet to confirm the list of suspects. The list is submitted to the Expert Review Group for identification and confirmation of its identity and legitimacy. After the threat is confirmed, it will be submitted to the cyber police coordinator to track and deal with the corresponding IP and owner, and if it involves law and security, it will be resolved through legal channels; Where technical aspects are involved, the cyber police are to control and handle them.

As an instrument manager, the most important job is to maintain and maintain the instrument and equipment, technical training and testing services, report for repair after failure and coordinate maintenance measures. It is obliged to submit the daily test data to the background for timely backup, and the background staff will send the data according to the information of the registered testers. For dangerous samples, in addition to the tester's instructions, pre-scanning should also be carried out according to relevant literature to prevent diseases, epidemics, insects, microorganisms and other disasters from affecting the laboratory environment; For toxic and harmful items, special personnel should be set up to manage and purchase, and relatively independent feeding equipment should be used to prevent large-scale laying of pipelines.

The members of the maintenance team are mainly responsible for electrical maintenance and repair, the construction and operation of the open computer testing platform, the detection of software safety and reliability, and the installation and training of professional software.

The members of the purchasing team are mainly responsible for communicating and trading with the market, including medicines, experimental supplies, software, consumables, small equipment, office supplies, etc.;

The expert group teacher is mainly responsible for the development and application of the instrument, enjoys a fixed time guarantee, and has the right to participate in the decision-making of the instrument procurement plan;

Biological early warning barriers should be set up around the laboratory, including the invasion of insects, snakes and harmful plants, and good lighting performance should be maintained; There is a more professional police dog garrison, which is on duty in shifts on the outer ground floor and the underground floor.

At least one guard is set up on each floor, ready to respond to emergencies at any time, including the handling of fire, water police, toxic smoke, etc., as well as the guidance and persuasion of outsiders.

The instrument administrator does not contact the tester himself, maintains a high degree of objectivity, and the tester's test needs should be clearly indicated on the appointment form, and can also be fully communicated with the administrator online.

The data backed up in the background should be stored for a long time with tapes or optical discs, waiting for authorized calls and access at any time, if the file volume is too large, it can be deleted as appropriate after consulting the leader, and the general data should be retained for at least 20 years.

The main responsibility of the audit team is to monitor the prices and consumption of economic measures and to report any abnormalities directly to the Supreme Commander of the laboratory.

The cryptographer is responsible for providing the password for system opening and password management for data backup;

The cyber security officer is responsible for maintaining the network information security of the entire laboratory, making decisions in the event of a hacker attack by temporarily shutting down the network or conducting a reverse attack, as well as recovering from the damage to the system.

For the most critical computers, it is necessary to purchase enough spare accessories, such as hard disks, which have all the necessary software installed, and can be replaced with a new one immediately once the original hard disk is damaged, so that it is more advantageous to deal with virus attacks or network attacks. Common, easily damaged hardware, accessories should have about 3 spare parts. Every week or so, all spare parts should be energized to ensure their electrical stability, and they can also be kept in a energized state at ordinary times, maintaining a certain degree of dryness, and preventing rust and poor contact.

For literature resources, software resources, and drug resources, it is best to share them within the unit, and the cost and cost are shared equally.

Usually make an evacuation plan as soon as possible, conduct a drill operation at the beginning of each new student enrollment and the next semester, equip each laboratory with a fire extinguisher, and let a student with a weak education in the room try it out once in the drill about a year later, to understand the characteristics of the fire extinguisher and how to use it.

For the case of poor contact of instruments and equipment, the maintenance team should be asked to remove rust and plate silver at the contact position to enhance the electrical performance of the contact.

Instrument administrators and maintenance team members should prepare sufficient tool software and professional software in case of network failure. For controlling the computer, you should also do more cloning backups, or one-click restoration; In general, the data should not stay on the control computer for too long, but should be uploaded to the data backup server in a timely manner.

For the training of large instrument rooms, the audio and video of the teacher's lectures should be left as materials for applying for special courses and participating in professional competitions for college students in the future.

The temperature and humidity control of the large instrument room is different, the general view is that the drier the better, but the instrument I manage is in a relatively dry situation but it is easy to have problems, because basically the large electronic instrument has some motors, these motors are easy to get stuck in a dry environment, so the dry environment is good for electronic components, but for the structure of the motor, or the slit and other parts that need to be switched, it is not good if it is too dry. Therefore, the administrator should observe what kind of dryness is suitable for his instrument. In terms of temperature control, it feels like 25 degrees is fine, if the temperature is controlled too low, the power consumption is very large, and the cold air will sometimes blow directly to the sample, causing the sample to be blown away and lost, or the cold wind blows to the instrument, causing local low temperature. These all affect the effectiveness of the test.