Chapter 465: High, Really High
readx;
The determined operating system is a server system, not that all systems use FreeBSD, this is not necessary, after all, everyone has their own familiar system, and forcing them to use this system is a bit more than worth the loss. Pen ~ fun ~ pavilion www.biquge.info
Everyone is good at which one to use, on their own machine, or which one to use, but the security still needs to be strengthened, don't let others hack into their own computers, as a springboard to invade the server again.
Therefore, Liu Hui is not without things to do, other people's computers using windows are mainly reinforced by him.
And the matter of installing the system was handed over to Lao Wang, Lin Hong and that Xiao Jiang, after all, among these people, only the three of them knew about this system.
Next, we will discuss the issue of internal information communication systems.
This is also one of the regulations this time.
After all, the system is up, and it still needs to communicate and exchange data, otherwise all external network services will be shut down, and only the one-way function of external access will be retained, and it will be used as a stand-alone machine, even if the technology is good, there is nothing to be done about it.
Since it is a drill, it is natural to have the appearance of a drill.
The operational data of the two sides, placed on the server, needs to be read and written by the command headquarters, and it can also be used through this system to release messages to other departments and communicate.
They will monitor the flow of data in the network through network nodes, and at the same time, they will also check whether the servers of both sides are always connected to the network, and whether they can access through the authority of the command center, and whether they can normally obtain files, write data, and so on.
If something unusual happens, they will send someone to find out, and if someone is found to have violated the rules, they will deduct the corresponding points.
This set. It's completely moved from other exercises, and it works well, anyway, that's the general principle.
Liu Hui spoke again: "Why don't you use OICQ directly?" This software is easy to use and communicates in a timely manner. What message we want to publish, just communicate with them online directly on the client. ”
What he said is right, OICQ is indeed more convenient, and it is currently the best in China in instant messaging, and it is very convenient to contact others.
However, this is, after all, a military exercise, and the direct use of such a civilian product. Violation of basic principles of confidentiality. The messages on the oicq are to be relayed through the server of the software company, that is, all the messages may be backed up by the other party. For them, this information is all transparent.
Military information is very strictly confidential, and directly exposing information under their noses is definitely a violation of the principle of confidentiality.
That's it alone. Liu Hui's plan was directly rejected.
Xiao Jiang said: "You can consider web services. We've also set up a simple BBS before, which is also very convenient for posting messages. ”
Lao Wang said: "If you set up a web service." I'm more inclined to use the ftp service. Comparatively speaking, FTP is much more secure than web services. ”
Web services, commonly known as web services, open port 80 to the outside world through one such service, others can use a browser to access directly.
This is indeed more convenient, but it has the most vulnerabilities, and many so-called hackers are actually showing off their skills by hacking into web servers.
While these techniques are likely to be very low-end, they are very straightforward because of this approach. By modifying the code of the web page, you can represent that you have conquered the site, so it is popular with many beginners.
The FTP service, on the other hand, uses the FTP protocol, a file exchange protocol that requires the use of specific FTP software to access. In addition, strict permission control can be carried out, and relatively speaking, the threshold for intrusion is a little higher than that of web service intrusion, and the security is also higher.
Lin Hong said directly: "I recommend using Bit Messenger. ”
Bit Messenger?
Many people had a huge question mark in their eyes, and only Lao Wang was thoughtful.
"It's also an instant messaging software, and it's much more secure than OICQ." Lin Hong explained.
When Liu Hui heard this, he immediately said: "Cut~~ I thought it was a good thing, it turned out to be such a software, no matter how good the security is, isn't it still the fatal wound of instant messaging software?" ”
Others have this doubt.
Lin Hong shook his head: "Bit Messenger is based on point-to-point communication, there is no centralized server, and it is almost impossible to monitor, which is very secure." ”
The core code of the software was written by him, and he knew all too well about it. Although the current development of bit messenger has been upgraded many times, the core code and principle and encryption algorithm have not changed.
"What are you kidding? How does an instant messaging app run without a central server? Besides, how can it not be monitored, there is such software and it is not messed up! Liu Hui retorted.
Lin Hong glanced at him, but didn't say anything more. He had no interest in continuing to explain to the other party.
"I've heard of this software." Lao Wang interjected at this time, "Its principle is very complicated, I have studied it before, but I don't understand it very well. However, Lin Hong should be right, this software is designed to be specially born for encryption. There are no centralized servers, the encryption features are very robust, and this software is very popular in the foreign hacker community, and even many well-known security organizations use this software for communication. ”
As soon as Captain Qian heard Lao Wang's words, he became interested in the software of the Bit Messenger.
"Comrade Lin Hong, can you briefly introduce the basic principles of this software?"
Those of you who are sitting here don't know anything about this software, and Captain Qian wants everyone to see if this software is really reliable.
So, Lin Hong directly explained with chalk on the small blackboard in front of the conference room.
The people sitting here are all technicians, and they have a certain level, some basic concepts and knowledge, so he just skipped it and only introduced the core principle of Bit Messenger.
“…… That's basically how it works. Moreover, this software is open source, if we want to use it internally, we can modify it slightly to limit the scope of the network segment, so that the data flow can only flow in the internal network, not exchanged, and can ensure maximum security. ”
After Lin Hong finished speaking, he looked back at everyone, and saw that many people were confused in their eyes, and they basically only knew a little about what he said before, and they didn't seem to understand.
It's Lao Wang, because he has studied it before, and now after Lin Hong's explanation, he suddenly has a feeling of sudden enlightenment.
"High, really high!" "The author of this software must be a master of computer science and cryptography, and it is hard to imagine that his research in this area has reached such a point so many years ago, and the integration of these two disciplines has been so scientific!" (To be continued.) If you like this work, you are welcome to come to the starting point to vote for recommendation and monthly passes, and your support is my biggest motivation. )