Chapter 490: Lifted (The Alliance Leader's Rampaging Old Monster Plus 3)

Remember [69 Chinese Network] in one second, wonderful free reading without pop-ups!

When he came, a program had popped up directly on the screen, and after he came, he continued to write input on the screen without any hesitation.

The people in the back wanted to ask, but they didn't know what to ask, because at this moment, the 12 screens in front of Jiang Yanhai soon began to display different content, and these data codes were still changing, and Jiang Yanhai's whole person had fallen into a very excited state.

"Yes, yes, this virus bomb is slipping, look at what it means, if other countries get it, this thing is hidden in the other party's scientific research network, trying to keep stealing information back?"

"But, little thing, hehe, hey I see where you're hiding, don't you know that the whole system is infected by my virus now? Do you still want to get into it? What are you doing to disguise normal system files? Sorry, it's backing up, it's useless. ”

With a "snap", he tapped his return and watched a progress bar on it start to proceed, and he had already reflexively started to operate another program.

"Little, messing up the order of the files? No, you don't have a chance. ”

Jiang Yanhai's speed of his hands is simply bursting, I have to say that this super virus is a bit interesting, which shows that it has already been released, and it has multiple functions.

For example, one of the viruses tries to burrow into the supercomputer and then hides in its system, and its function, if nothing else, is definitely not a simple destruction, but an attempt to steal data.

But if you try to kill it, it will start to destroy like crazy, a typical destructive mutant virus, which can disguise itself and mutate, but now the entire supercomputer firewall has been replaced by Jiang Yanhai's, and it is not so simple for it to sneak in.

And several other computer viruses have different effects, such as trying to go in and rewrite the original program of the drone, that is, destroying the original face of the program, so that you have no success at all, and trying to directly overload and destroy some hardware.

It is not difficult for software to destroy hardware, directly destroy the BIOS, burn the user's motherboard, and catch a lot of computer viruses and Trojans on the hard disk.

And almost all of these things are hidden in this, and the strength of these viruses, to be honest, is very strong. forcibly locked these viruses, and then Jiang Yanhai directly began to catch the virus, forcibly decompile it into the shell, and see what its inner shell program looks like.

Taking a look at some computer viruses is also good for your own technological progress!

The electronic warfare program has directly backed up all these viruses, and it is the supercomputer that cracks them, according to the current computing speed, and then let the electronic warfare program assist a little, well, at most, it can be cracked in about two hours.

This speed is already very fast, these viruses must be from the hands of masters, if the entire UAV system really has an autonomous combat system, then it is definitely a genius to write this system!

Or at least the team is a genius! It's not surprising that such a person makes such a virus.

For such an unmanned stealth fighter, you don't have to think about it, you know, the United States must have all kinds of protective measures.

Two hours of cracking time, these viruses are constantly being cracked, but it doesn't have to be so troublesome to solve the entire UAV system.

Although these viruses have caused some trouble, it is absolutely impossible for others to touch this drone system until they have solved these viruses.

And if they forcibly crack it like that, it is estimated that the files of the drone's internal system will have already been damaged, and it is estimated that the entire hardware has been damaged, and now the hardware inside is also a very good thing.

Not to mention anything else, even if it is a stealth fighter of a drone, its volume is limited, and it can make such an excellent algorithm program in such a limited volume, which itself proves that Lao Mei is really good in the field of computers.

However, any program of the bull fork needs the hardware of the cow fork to support, and the domestic hardware is ...... Forget it, the gap is even bigger in this area.

From materials, to production, to architecture in all aspects, Huawei is lagging behind, although Huawei is improving, but Huawei is only a chip.

And the chip thing, according to different uses, different architectures, different instruction sets have a variety of different effects.

IBM's best reduced instruction set, intel's good at complex instruction set, these different CPU architectures have their own advantages in their respective fields, and there is really a big gap in this area in China.

And these gaps are to see if the future can catch up in the field of quantum computers, because that thing is a new kind of computer technology, unlike the current traditional computer technology, China has fallen too far behind, and it is really difficult to catch up.

Moreover, the current manufacturing instructions of chips have also fallen into a certain limit, and it is difficult for the latest lithography machine technology to break through the limit of one nanometer.

The next generation of technology is not until the violet hybrid laser etching technology is obtained, but there is no breakthrough in this research abroad.

So what kind of hardware is in this, they don't know very well, if the software is cracked, then the hardware can be disassembled.

Two hours passed quickly, when Jiang Yanhai completely cracked these viruses, he immediately checked them carefully, after checking them, Jiang Yanhai nodded, the design of the virus is a bit interesting, but it is not too perverted, to be honest, it is not as perverted as his anti-tracking program virus.

But what if this virus is released to the outside world...... It's hard to say what level of estimation, it has a strong adaptive ability, and the difference in some operating systems can't limit its infection.

However, it was originally a kind of double insurance that people put here, and this virus has been cracked by him. Then the rest is simple.

The drone operating program opened the door to him!

After the entire operating system was completely packaged, Jiang Yanhai directly began to copy all the programs, and at the same time, when copying, Jiang Yanhai carefully checked it and made sure that any restrictions on copying and other aspects were lifted before he began to copy.

The huge programs are large, and although they are direct fiber optic transmissions, the hard disk has a limited write speed, so the data can be replicated for several hours.

"That's it! The main drone operating system has been copied all, but your guess is correct, in this drone operating system, there is indeed a set of autonomous combat programs, which are based on the fighters' sensors throughout the body. Jiang Yanhai turned around and said to all the old professors behind him.

The professors instantly became excited, "Really? It's already done?! ”

"It's done, but I suggest that your supercomputer don't connect to the outside world for the time being, and when you figure out the whole program, I have cracked the core part of the entire operating system, and you can view all the source code."

Jiang Yanhai nodded affirmatively.