Chapter 487 - Firewall (28000 Monthly Pass Plus Update)
The firewall of this computer was written by Jiang Yanhai, it cannot be regarded as a firewall in the conventional sense, from the birth of the computer to the birth of the Internet and then to the present, it is like an ancient spear and shield.
The fateful battle between hackers and security officers can be regarded as beginning, although many security officers are hackers behind their backs.
Because the technology of these two is figured out, Jiang Yanhai's programming ability and hacking technology are not systematically learned, but directly provided by the Red Star Engine, and then he learns by himself.
This has prevented him from falling into such a rigid and rigid brain, and it is not an exaggeration to say that his creativity is wild when it comes to hacking, or in the field of computer software.
When it comes to the Internet, it is inseparable from computer viruses, which once made people smell and change color in the late 20th and early 21st centuries.
Computer virus is a general term for a program that can quickly parasitize and multiply through computer networks, and quickly pass through system vulnerabilities through mutation and hybridization to gain a certain degree of system control.
Some people may not understand, why is this computer virus the same as raising pigs and rice, and you are still playing with biology? In fact, there are two words in the name of a computer virus, but to put it bluntly, it is like a virus in the human body.
However, all viruses that have killed people and have been difficult to kill so far have high variability, reproduction, and even the possibility of interbreeding with other viruses.
The same is true for computer viruses, perfect computer viruses must first have the ability to reproduce on the network, that is, the ability to replicate themselves, and secondly, the ideas and technologies commonly known as the integration of artificial intelligence.
At the same time, a perfect virus must also have a distributed structure, a mother-child structure, that is, when the parent virus is detected, it will release a more destructive or more insidious daughter virus.
In addition, a perfect virus must also have hybridization and mutation, that is, it can exchange genetic information, mutate and replicate with viruses that are almost the same as themselves. This makes the virus program itself more insidious and more destructive.
Of course, the perfect virus theoretically does not exist at the moment.
So why doesn't the virus seem to be as perverted as it used to be in recent years? Or is it not as much as it used to be?
In the past, what companies or software such as Ruixing, Jiangmin, Little Red Umbrella, Kaspersky, Symantec, etc., were used to detect computers casually, and tens of thousands of viruses were scanned, but now there are none?
In fact, it is mainly due to the rise of cloud computing and the rapid development of computer hardware. In the past, computer viruses were difficult to crack because its encryption program was difficult to crack, and after cracking the encryption program, once the internal source code was known, it was very simple to kill this computer virus.
Because modern computers are so fast that it doesn't take long for your encryption program to be cracked by force, the glory days of computer viruses seem to have passed.
And now the network is developed, the computer system is more connected to the server, once any virus intrusion, a little problem, the server will find, and quickly alarm, there are various protection software with real-time protection capabilities.
So what 360 or something is installed on today's computers is more like a rudimentary version of a firewall.
Computer viruses don't seem to be developing, but firewalls aren't stagnant.
In fact, it cannot be said that computer viruses are not developing, and Trojans and computer viruses are often more targeted at enterprise users.
Of course, everything is not so absolute, for example, Jiang Yanhai's firewall is based on the principle of computer viruses and the genetic map of the ball python. Of course, the genetic map of an organism cannot be the same as the program.
What Jiang Yanhai said was that the mutation law of his viral firewall was based on the mutation law of the ball python's genetic map.
Because the ball python has 5,000 independent variants and tens of thousands of gene combinations, and the genetic profile of each gene combination is different.
If other people don't know the law of mutation, then if you want to crack it, it is difficult to climb to the sky, from another point of view, it is not impossible to forcibly crack it, such as a supercomputer like Shenwei Taihu Light, if you let it calculate it with all its might, it is not impossible to calculate.
But how many species of creatures are there in nature, can you count them one by one? Modern computing power is not so perverted.
The reason why this firewall is a viral firewall is because it is more like a super virus itself, but it is a little bit large, and it is the first to infect all the important permissions of the entire system, without any mistakes.
Whenever there is any other virus or remote control trying to invade it, it will immediately release two super Trojans, one is an anti-tracer, and the other is to directly destroy the intruding virus or Trojan horse.
If it is found that the other party's intrusion is extremely strong and cannot be organized, this Trojan program will directly and violently destroy all the databases of the entire computer, and repeatedly erase the important data area of the hard disk tens of thousands of times in an instant.
Even if you remove the hard drive in reality, there is no way to recover the data inside.
Moreover, it has the ability to give real-time alarms, borrowing from modern powerful communication networks, once such a problem occurs, it can transmit the alarm to the electronic warfare countermeasure program at any time.
This thing can be regarded as a powerful computer firewall that Jiang Yanhai has nothing to do, and it can also be said to be a super virus.
If it is connected to the electronic warfare countermeasure program, if it has an electronic warfare countermeasure program, I don't know how many times the amount of calculations of the light of Shenwei Taihu Lake, it is invincible!
This firewall that integrates attack and defense can be regarded as a relatively complete program written by Jiang Yanhai, which is many times stronger than the program he just started experimenting.
Of course, there is another advantage, it can be saved in the electronic warfare simulation battle program, that is, Jiang Yanhai can use it at any time, and he can connect any electronic device around him at any time to use it directly.
Moreover, when he turned on the computer, he didn't even need Jiang Yanhai to operate it himself, just directly connected to the electronic warfare auxiliary program and lifted the firewall instantly.
Copy the drawings and everything inside, and just as I was about to contact Professor Xiang, Fan Tianlei's phone rang next to me.
"Yes!" Fan Tianlei picked up the phone, his face became serious, and after listening to the contents, he immediately replied with a word, and then handed the phone to Jiang Yanhai.
Jiang Yanhai was a little puzzled, but still took the phone.
"Comrade Xiao Jiang, are you good at breaking programs, that is, in the computer field?" Inside the phone was an old man's voice.
"Sort of." Jiang Yanhai paused, he probably guessed something, it should be the system problem of the stealth unmanned fighter.
"You're driving your J7 right now, flying directly to the airport you were at last time in Rongcheng. Someone to pick you up, important tasks. ”
"Yes!" Jiang Yanhai didn't talk nonsense when he heard the task, and responded sharply.
*************
ps:…… Brothers, I'm about to catch up...... Ask for a monthly pass, ask for a monthly pass, kneel and beg for a monthly pass! Today's 10 more!! Come in the afternoon! I haven't been out for a month, and I'm just coding words at home. For the sake of such diligence! Ask for a monthly pass!