Chapter 13: Awesome
When Jiang Yanhai's voice fell, he instantly felt that his gaze changed, and then Jiang Yanhai found a dumbfounded change, his brain seemed to be activated, he looked at a place, and the relevant data of this thing would appear in an instant.
Gravity, atmospheric pressure, air humidity, temperature, wind speed, after looking out the window, when his eyes pass through the window glass, Jiang Yanhai can even see the temperature difference, optical deflection, the moving speed of the object, the relative velocity...... And so on, almost all the data appeared in his mind in an instant.
Jiang Yanhai immediately simulated the red flag in the distance that he wanted to shoot, and the data within his line of sight quickly began to change, air pressure, gravity, humidity, temperature, wind speed, temperature difference, wind difference, optical deflection and other data appeared instantly, not to mention, and directly gave relevant data and answers.
In other words, if Jiang Yanhai has a sniper rifle in his hand now, he can directly adjust the data of the sniper rifle in his hand, and then pull the trigger!
It's rebellious! Please allow Jiang Yanhai to explode here, really, compared to the strong metaphysical meaning in this name, the actual effect of this skill cannot be more scientific!
It's pretty much all the data, all the problems that can be solved with the data, and then you just pull the trigger.
Can this not increase the hit rate?
Although this is said to be a skill, it is more like Jiang Yanhai's own ability. After careful experimentation, Jiang Yanhai found that this skill also has a level, and at present, it is only the most basic C-level.
After this level is higher, can you still do more perverted things? For example, to make a bullet turn? Otherwise, why do you call the uncontrollable Newton's coffin board?
However, this skill has a benefit, Jiang Yanhai can be turned off at any time, and it can also be activated at any time, without any such thing as cooldown.
Not bad! Aside from that name, this skill is definitely perverted. Especially for a soldier, shooting marksmanship is the most basic.
After turning off this skill, he thought about it, anyway, it's okay now, Jiang Yanhai simply took the last hacking knowledge directly.
When Jiang Yanhai received the hacking knowledge, a huge amount of data instantly poured into his mind, the speed of this knowledge was not very fast, but it was very profound, Jiang Yanhai immediately understood this knowledge.
It took a full two hours before and after, until Jiang Yanhai felt a little dizzy, this B-level hacker knowledge was completely transmitted, and Jiang Yanhai didn't know what kind of way Jiang Yanhai passed it directly into his mind anyway, and it was very complete, not to mention, he himself understood it very deeply.
However, although this knowledge is already very complete, Jiang Yanhai feels that he still needs to practice more. For today's information age, there is no doubt about the importance of such technology.
Even for soldiers, almost all individual equipment is inseparable from the support of information technology, and in a modern war, information technology is the most important.
Although Jiang Yanhai has accepted all the knowledge, he has no idea what level of this B-level hacker knowledge is, and he needs to carefully confirm and test it.
After thinking about it for a while, Jiang Yanhai simply took out his mobile phone, and his personal belongings were also sent to this class, it is now the information age, recruits are also allowed to carry mobile phones, and smartphones can also be carried, but only the specified domestic brands can be used, followed by the occasions for the use of mobile phones, etc., there are requirements, at least in this world.
Only the rest time can be used, and now Jiang Yanhai is the time to rest.
When he found his mobile phone and opened it, a prompt automatically appeared in Jiang Yanhai's mind, "Do you want to connect the smart device?" ”
Of course, the choice is.
After choosing yes, Jiang Yanhai found that an operation panel appeared on his mobile phone, which was a bit similar to APP, but it was not the same, but after clicking on it, Jiang Yanhai took a deep breath.
As a college student living in the information age, although Jiang Yanhai did not study computers, he must know a little about computer programming, but he can't talk about being proficient.
And now, when he opened this panel, Jiang Yanhai directly understood the underlying data that appeared in it.
Not only did he understand it, but he instantly had a deep understanding of the system of this mobile phone and other issues, after seeing this, Jiang Yanhai directly operated according to what he thought in his mind without saying a word.
In fact, even if it is a domestic mobile phone, almost all the systems are Android, but Android uses an open system, so the underlying data of domestic manufacturers can also make their own customized modifications, in this way, the security of the system can still be guaranteed.
But now, in Jiang Yanhai's eyes, there are too many loopholes in these systems in front of him, and with just a few operations, Jiang Yanhai has successfully obtained the highest level of permission for the mobile phone system and entered the underlying programming mode.
In this process, Jiang Yanhai felt for the first time how perverted the computing support of electronic information warfare auxiliary programs was.
Hackers are no longer mysterious in modern times, but in fact, more than ten years ago, hackers were a very tall name, and with the development of time, it seems that many people have rarely heard the name hacker.
Even computer viruses that used to be linked to hackers at every turn, etc., seem to be fewer now, after all, there used to be so many antivirus software and the like, and now you can use a simple 360.
Could it be that the hackers are gone?
No, hackers still exist, it's just that hackers are more low-key, because in the modern information age, it will be more difficult for hackers to hide their identities like before, so they have to keep a low profile.
Secondly, the security measures of major information companies have been improved, and there is that with the rapid development of the network, cloud computing is now the biggest development that restricts hackers, and many people think that if you find the vulnerability of the system, you can invade.
Theoretically, yes, but if you want to hack a personal computer, it's fine, but if you want to hack a large database or server of a large company, even if you have vulnerabilities, you still need powerful computing support!
The more computing power you want to hack the target, the more computing power you need!
Not to mention that the other party also has the computing power support of multiple large data centers connected through the network, and it is even more difficult to invade!
That's why hackers seem to be few and far between.
But now the computing support and auxiliary programs provided by the Red Star Engine, Jiang Yanhai has not yet tested a specific value, but he instantly understands that now he can backlink to the nearest communication company base station through this mobile phone, and then reverse analyze the system vulnerabilities of the communication company's data base station through data transmission.