Chapter 464: Choosing a System
readx;
Captain Qian led Lin Hong and Ouyang Chuchu to the computer room of the Red Army base. Pen? Interesting? Pavilion wWw. biquge。 info
Because Lin Peng was not a drill personnel, he had already returned to the tank company to continue to do the final closing work, summed up all the problems encountered before, and after Lin Hong's exercise was over, they would leave for the company.
The machine room of the Red Army is actually not as magnificent as Lin Hong imagined, on the contrary, it can only be described as ordinary.
The area is about 100 square meters, and all the machines are in the same big house, against the wall. The PCs above are not the latest and greatest configurations, on the contrary, they are a bit old, and most of the PCs are Lenovo.
There are two servers, but they are relatively new, it looks like they have just been bought, Lin Hong looked at it, and knew that one was SunUltraii of Sun, and the other was IBM's, as for what model, I didn't see it for the time being.
Later, Lin Hong learned that these two servers were specially commissioned by the Red Army to be imported by companies in Zhongguancun for this exercise.
The commanders of both sides did not know exactly what equipment they wanted, after all, it was the first time they had conducted such an exercise. These things are all up to the civilian staff.
Lin Hong and Ouyang Chuchu followed behind Captain Qian, walked through the main room, and came to a conference room. There are already quite a few people in there.
When Lin Hong came in, Lin Hong felt very keenly that most of the eyes of most of the people inside were focused on the notebook in his hand, and even the big beauties around him did not have this charm at all.
From this point alone, we know that most of the people sitting here are tech nerds. The appeal of notebooks is obviously greater than that of beautiful women.
The people in the room are clearly divided into two parts.
Some of them are civilian soldiers in military uniforms, all of whom are under Captain Qian, basically lieutenants or second lieutenants, and there are four of them. It seems that they are members of the information confrontation brigade in the Red Army.
Another part. It was a civilian "master" invited by the Red Army.
Captain Qian was not very familiar with these people, so he simply asked everyone to stand up and speak one by one, and briefly introduce their names and areas of expertise.
The first to stand up was a young man who looked to be about twenty-three or four years old. He was tall and thin, I don't know if the fire in his body was too vigorous, and his face was full of red and white pimples, as pitted as the surface of the moon.
The young man's name is Liu Hui, although he is young, he is already well-known in the industry, and he is currently working as a technical engineer in the first Internet café in North J. It is said to be a core member of a hacker group. The project he is good at is network infiltration, according to his own words, these well-known websites in China have basically been taken down by him for background management permissions.
He spoke very openly, without stage fright at all, and had the style of a general.
It's just that it's a bit unknown whether everyone believes his words or not.
The second to speak. His name is Wang Dongmin, a middle-aged man in his forties, and his body is also very thin. It was as if a gust of wind could knock him down. According to his own introduction, what he is good at is anti-virus, so everyone can call him Lao Wang directly.
He didn't talk much, he was very low-key, and he didn't say that he had any brilliant achievements. However, since he was able to be invited here, he must have a few brushes.
In the end, it was Lin Hong's turn to introduce, and he just briefly said his name and what he was good at, and it was very simple, just saying that he had a wide range of knowledge. I understand a little bit.
As for Ouyang Chuchu, this time he came over to observe and did not participate in it. She specializes in the design and research of combat equipment, and does not have a deep understanding of computers.
I have to say that most of the people sitting here are young people. Except for Wang Dongmin, who is a little older, the others are all in their twenties.
This is also the characteristic of the computer field, due to the emerging industry terminology of this industry, the development of this area in China is very late, and the older people are basically not very willing to learn a completely new discipline again.
After everyone finished the introduction, Captain Qian began to introduce the situation of the exercise.
"This information confrontation exercise is a new exercise set up by the military region, and we have no experience in this area, and we basically cross the river by feeling the stones, so we must learn a lot from you in many aspects, and I hope that you will not hesitate to give us advice."
After a few polite words, Captain Qian continued: "This exercise is mainly divided into three parts, namely password cracking, network infiltration, and network infiltration defense.
Our servers are connected to the Blues' servers, and both servers have important confidential files on them, and our main goal is to seize the files on the Blues servers through technical means, which is not enough, the files are encrypted and we need to crack them to see the contents......
On the other hand, we also need to defend ourselves against attacks and infiltration by the Blues to prevent them from seizing our documents.
Note that this is a technical process, not that the server must be online at all times......"
When Captain Qian said this, he saw Liu Hui raise his hand high at this time.
"Comrade Liu Hui, what do you have to say? Please speak. ”
Liu Hui asked, "Captain, I want to ask, can we bring down their server?" ”
Captain Qian nodded: "Of course you can." ”
Liu Hui thought for a while, and then continued to ask: "Suppose...... Let me give you an analogy...... Suppose the opponent is superior and successfully breaks through our defenses, and we have a way to paralyze their system, can we just do that? As a result, everyone can't access their respective servers, do we win, or do we draw? ”
"If it's their network down, of course we win." Captain Qian had obviously considered this situation for a long time.
If you think about it, it's actually easy to understand. After all, the importance of the network is self-evident, and if the network is paralyzed, other affairs will definitely be greatly affected.
Liu Hui sat down with great satisfaction.
Lin Hong glanced at him and shook his head slightly.
Lin Hong knew that Liu Hui actually understood this question, and the purpose of his question was not to dispel confusion, but purely to attract everyone's attention and show a familiar face, that's all.
Next. Captain Qian began to discuss what system we used as the operating system for the server.
He gave three alternative systems, namely the Windows series, the Linux series, and the Unix series.
In other words, you can only choose between these three systems. Other systems, temporarily excluded. At the same time, it is also stipulated in this exercise.
These three systems, in fact, are also the most used systems on domestic servers, which are also in line with national conditions.
Although there were other strange systems, the final decision was to limit the type of system in order to allow the exercise to proceed smoothly. After all. If they casually build a very niche system, and as a result, the other party has never heard of it, let alone invaded, it will be completely invincible, and it will also lose the meaning of the exercise.
"I recommend using Windows!" Liu Hui was the first to speak, explaining, "Windows is undoubtedly the most popular system right now. The interface of this system is very friendly, and there are the most software tools in it, and we usually write a lot of software for this platform. The loopholes inside are also basically plugged ......"
He talked about the advantages of the Windows system, but in fact, in the eyes of others, this is precisely the weakness of the Windows system.
If it's too generic, it's familiar to everyone, and the more opportunities you have to find vulnerabilities.
Liu Hui said for a long time, in fact, the main reason why he suggested choosing this system was not said, that is, he was most familiar with this system, and if he chose other systems, he was not good at it at all. There are fewer opportunities to help.
Among the officers, there are also those who agree with Liu Hui's suggestion, and the reason is the same as Liu Hui, after all, it is of course best to use the system that he is familiar with, if he doesn't even know the basic operation, what kind of invasion and defense are he talking about?
Of course. There are also military officers who suggest the use of Linux, arguing that only this one is the least of the three systems. This is true for them, and it must be true for each other. The more niche the system, the more secure it is.
In addition, there was a second lieutenant officer surnamed Jiang, who suggested using the Unix series of systems, on the grounds that both Windows and Linux were not very mature and had too many vulnerabilities.
Captain Qian listened for a long time, and saw that Lin Hong and Lao Wang had not yet spoken, so he asked, "Comrade Lin Hong, Lao Wang, what is your opinion?" ”
He valued the views of these two more than others.
Lao Wang said: "I agree with this ......"
He looked at the officer surnamed Chiang.
Captain Qian said: "You can call him Xiao Jiang." ”
"Well, agree with Xiao Jiang's proposal. It's better to use the UNIX system, but other systems are still a bit immature and have too many vulnerabilities. ”
"Comrade Lin Hong?" Captain Qian looked at Lin Hong.
"Let's use FreeBSD." Lin Hong finally said.
There are many branches of the Unix family of systems, and strictly speaking, Linux and Minix are also members of the Unix-like system. In addition, there are systems such as FreeBSD, OpenBSE, and Sun's Solaris.
The FreeBSD system was developed in 1993 based on the 386BSD core, and was completely rewritten from the 2.0-release released in January 1995 to the University of California, Berkeley's 4.4BSD-liteRelease.
Although it has been developed for a shorter time than Linux, because it is based on the source code of Unix, this system is currently much more powerful than Linux in terms of functionality and security.
In fact, for Lin Hong, it doesn't matter which system it is, he is familiar with it. But what he wants most is his own Linx system, which is limited to rules and cannot be used, and even if there are no such restrictions, they may not agree.
In this way, the final system was determined, and the server used the FreeBSD operating system. (To be continued.)