Chapter 335:-for-tat
readx;
Bi Sheng listened to Su Lun's explanation, nodded, and accepted it, because in a virtual space, hackers can't find a way out anyway, and hackers will choose to give up, because hackers won't delay too long in one thing, and delaying too long means being exposed. Pen, fun, pavilion www. biquge。 info800
"And what about tel backdoors and service backdoors? How to deal with the source code developed by Su Gong, because this is very important. The hacker will also be able to access the host through the password of the shell of a TCP port of a certain TCP port of the network service backdoor, enter ifconfig in the CD of the host for pre-attack detection, once the test is successful, the ping command will perform the ping of the relevant network command, the ping command will diagnose the TCP/IP network, and send an ICP packet carrying its own infection virus to the target host, and the target host will send it back after receiving it, if the returned packet is consistent with the sent packet, It shows that the network service is connected by the backdoor, then the trial is successful, and the hacker can proceed to the next step, and silently. Bi Sheng said rigorously.
Su Lun and Liu Qing listened to Bi Sheng's words, in the constant temperature conference room, cold sweat oozed unconsciously, and every sentence Bi Sheng said was aimed at the source code that Su Lun said.
Su Lun has been in the industry for so long, and he has never met a network master like Bi Sheng, which makes Su Lun a little powerless.
Liu Qing looked at his supervisor a little embarrassed, he really underestimated the son of this boss, but he didn't expect that not all the rich second generation are losers, what does this rich second generation have to do with his family background?
"The newly developed mosaic source code can seal the tel backdoor, so that the hacker falls into the deadlock of the virtual tel backdoor, unable to extricate himself, when the company's employees are working normally, tel to the Pangu 7 operating system, hackers can not correctly identify TCP/IP, can not realize the ID service data round trip of the listening port, and will not accept the connection to the subsequent handover of in.teld. The original running login was cleared, and the hacker could not know whether the login was the correct path, so he began to modify the in.teld to find a way out, and during this period, the analysis team of the internal information supervisory department of in.teld analyzed and identified the information, such as what kind of scanner and terminal the hacker used, and the source code will help the analysis team to effectively identify. The analysis group uses the identified data packets to report to the capture group, and the capture group uses the roundabout command in the source code to inform the tracking group to intercept, and the typical terminal setting of the general hacker is xter or t100, and the hacker intrusion is surrounded by the source code Wei Wei rescued Zhao's order, and is besieged by the capture group and the tracking group. Liu Qing explained not to be outdone, and at this time, Liu Qing was already in a cold sweat after he finished speaking.
A network master like Bi Sheng is indeed a powerful opponent, and Bi Sheng is not a hacker, otherwise he would have suffered the guilt of these senior software engineers.
Bi Sheng listened to Liu Qing's explanation, and he already knew it in his heart, Bi Sheng smiled and looked at Liu Qing and Su Lun and said: "I don't know Su Gong and Liu Gong, what is the name of your source code, will it be attacked, and some hackers will also attack the source code." ”
Hearing Bi Sheng ask this, Liu Qing, who eased up a little, calmed down, and seemed to have a more difficult conversation with Bi Sheng than writing ten codes by himself.
"Pangu7's operating system is compiled using 16 binaries,16 binaries are constantly superimposed,The new source code is called the bottom of the kettle draw code,The same is the use of 16 binaries that match the operating system,And I also compiled the automatic arrangement of commands in the source code,5 minutes will be rearranged,After rearrangement, it will not affect the source code,It will not affect the language formed with the operating system,Even if it is powerful, it will not easily try to attack the bottom of the kettle. Because this is undoubtedly a self-defeating choice. Saying this, Liu Qing was a little proud.
Because of the development of science and technology, although the computer has advanced by leaps and bounds in hardware and software, it is still based on the binary system discovered by Leibniz, and Liu Qing can superimpose 16 binaries in a computer operating system, which is undoubtedly a breakthrough.
Generally speaking,Pangu7Operating SystemThe general hacker will not choose to attack,Because it hurts and laborious,It is likely to fall short,The choice outweighs the loss,The Pangu7Operating System used on the market is very stable,Even the government departments of the Qin State are also using the Pangu7Operating System,The premise is genuine。
Listening to Liu Qing's words, Bi Sheng's face was full of admiration, these are what Bi Sheng wants, because these are all flaws for the offense.
Hackers and blue customers are both attacking the network system, Bi Sheng knows the truth of this, even if he operates it himself, he will do it in accordance with these basic principles, and a certain master is rearranged on the basis of these principles, but everything is inseparable from it, and he can't escape this circle.
Liu Qing's answer made Bi Sheng very happy, because the basic backdoor was almost perfectly avoided by Liu Qing, and at the same time, virtual confusion was added on the original basis, which is not something that ordinary people can think of, on the one hand, it is preventing the attack, on the other hand, it is also carrying out defensive counterattacks at the same time, not giving the invading hackers a chance to breathe, and instantly Bi Sheng feels that Liu Qing has the potential to become a red guest.
"Liu Gong is really a master, I admire it, such a difficult source code can be thought of, it seems that I am still slightly inferior! Some of the questions just now are more acute, I hope you don't mind, I can't help but run into an opponent, and I ask Liu Gong to forgive me for getting an axe. Bi Sheng said very humbly, showing plenty of awe.
When other people heard Bi Sheng say this, they were all shocked, especially Liu Qing, Liu Qing looked at Bi Sheng a little sluggishly, but he didn't expect Bi Sheng to say this, Liu Qing thought that Bi Sheng would ask any high-end questions to make himself nervous? I didn't expect Bi Sheng to be so sure of his source code.
Liu Qing looked at Bi Sheng intricately and said: "Thank you for the compliment, I just did my duty, after all, the Pangu 7 operating system also has a part of my work, and the impeccable upgrade of Pangu 7 is also an affirmation of the value of my work." I want to thank you here too. Those questions of yours made me a little confused, and I almost thought that there was something wrong with my source code. ”
Liu Qing also said sincerely, Su Lun saw this, and said: "Sheng Shao has already expressed his opinion on our source code mosaic circumvention method, I don't know if Mr. Li has any questions?" ”
After Su Lun finished speaking, Bi Hongzhan and Tang Fu, as well as Hao Bin, were all looking at Li Yun.
At this time, Li Yun was thinking about the conversation between Bi Sheng and Liu Qing, and after the two of them made a move, they avoided the problem of the backdoor and completed the preliminary plan for the update and upgrade of the Pangu 7 operating system.
Li Yun looked at the people in the conference room, and then said lightly: "With Bi Sheng's control of the operating system, I don't have any constructive questions, but there is one thing I want to explain, after all, the operating system is compatible with the computer hardware, in addition to the strengthening and upgrading of the operating system, the hardware of the computer must also be upgraded synchronously, including the network port used by Pangu, because a powerful hacker can use any available resources to invade, we must do everything in detail, and no possibility can be exposed. In addition, after the operating system is completed, it is necessary to conduct a simulation test as soon as possible. ”
Provide full-text online reading, faster update and better article quality, if you think the network is good, share this site more! Thank you readers for your support!
The latest chapter of the high-speed debut martial arts master in the city, this chapter is the address if you think this chapter is not bad, please don't forget to recommend it to your friends in the QQ group and Weibo!