Chapter 191: You Will Have No Strength to Fight Back!

One of the most powerful programmers can write hundreds of lines of effective code a day, and thousands of lines are bragging, after all, there is no complex logic in the code, you can type it however you want, and in the end you still have to delete it.

An operating system has tens of millions of lines of code, Android has hundreds of millions of lines of code, and many Linux versions range from more than 10 million to tens of millions of lines.

Microsoft's Windows XP has 40 million lines of code, and Windows 7 has 50 million lines of code.

It's not that a system is powerful if there is more code, but how big is the difference between the engineering quantity of the system and the effective code that a programmer types in a day.

It takes hundreds of years for a person to use the English programming language to knock out an operating system.

In the video, the number of lines of code converted by Chinese programming far exceeds that of English, and almost all of them become valid code after compilation.

This terrifying efficiency impressed all the technicians present.

Compared with English programming, it saves at least ten or even dozens of times the time!

......

"Fast input, high efficiency, stronger logic, the written program is more perfect, incomparably suitable for machine computing, this is Chinese programming!" Zhong Zixing gave a detailed introduction to the audience about the set of programming languages that he had tormented for many years to sort out.

The person who stood up because of the excitement adjusted his emotions and sat down again.

"Mr. Zhong, does this mean that from now on, there will be no need to learn English programming in China?" The reporter finally started asking questions.

"Yes, with more efficient Chinese programming, English programming languages can only be studied as a hobby."

"What else? Is there anything else people have to use in Chinese programming? ”

"Huh?" Zhong Zixing glanced over there, and silently praised him in his heart, this is definitely not a trust invited by Neutron Star Technology.

"This reporter from Science and Technology Daily asked me what I was going to say next......

As long as the Internet practitioners have almost all had the experience of malicious attacks on websites, it can be said that writing, maintenance, and security are the only way for every programmer.

"When I release Chinese programming, I don't force anyone to use this programming method, of course, I don't believe you can resist the temptation of high efficiency."

"The sole purpose of releasing Chinese programming is to improve the level of software in China...... As for whether you use it or not, it's up to you! ”

"Smack", Zhong Zixing habitually snapped his fingers.

Andromeda immediately analyzes the meaning and completes the video change on the screen.

The screen was split into two parts, one with about seven or eight people, the other with dozens of people, each facing a high-performance computer, fingers tapping on the keyboard.

"It's ...... Hacker battles? ”

The people in the audience reacted instantly, and all the technicians had their eyes shining and watching with relish.

Hackers are not a derogatory term in the industry, but a group of computer experts or programmers who are enthusiastic about computer technology and have a high level.

It's just that there are many illegal people who do some illegal things in the name of hackers, which is slowly misunderstood by outsiders as a group of people who wander in the gray area.

In fact, these two terms originally referred to people with a high level of understanding in computer science, programming, and design.

More than half of the thousands of people invited to the audience were technicians, and all were hackers.

The hacker battle is a thrilling showdown.

"Eight people against dozens of people, if there is not much difference in technology, then how can a few people have a chance of winning? If the technology is too different, then this video doesn't make sense. "Rebus, who was born as a programmer, is naturally also a hacker, and has even participated in many hacker wars.

At this time, he stared intently at the screen, doing a series of analyses.

There are many ways to attack hacking.

The simplest and easiest way for ordinary people to fall for is URL spoofing, and the websites visited have been modified by hackers, such as some XX online, XXXX online XX, and so on.

There is also a series of listening programs, placed in the opponent's computer, stealing passwords, or directly cracking by violent means, or placing a Trojan horse, allowing the Trojan to invade the opponent's computer and destroy it.

The above are the most common means.

In addition, there are email attacks, attacks on system vulnerabilities, account attacks, stealing administrator identities, and so on.

If you're all about sabotage, the easiest way to do that is to hedge your data streams.

With the help of server technology, multiple computers are united as an attack platform to launch a DDOS attack on one or more targets, thereby multiplying the power of a denial-of-service attack.

Now these two parties are using this kind of violent means to overwhelm each other's servers with massive amounts of data.

In the video, a small group of eight hackers used a unique anti-attack algorithm to write several defense programs in a short period of time in the form of Chinese programming, forming an unbreakable defense system.

Like a rock that does not move in a storm, no matter how the data flow hits, it stands proudly.

Soon, the eight people who had prepared their defenses began to counterattack......

The audience in the audience was all drawn by this big battle, and their eyes were glued to it, although they already had an opinion in their hearts, they still couldn't believe it.

Soon, the winner was decided.

Not to their surprise, the eight-man team emerged victorious.

Seeing that they were speechless, Zhong Zixing smiled: "Showing you this video is not to show off how good Chinese programming is, but to tell you clearly ......"

"After a Chinese word is compiled, it can form a series of code, and this action efficiency will be more obvious in critical moments."

"What I mean is that once some illegal people start to use Chinese programming, and you are still programming in English, and you are attacked and have no power to fight back, don't blame me Neutron Star Technology Group for releasing Chinese programming!"

"That's the end of this press conference!" He made a gesture and walked off the stage.

"Mr. Zhong, please wait a minute!" Someone in the audience immediately shouted.

"What's wrong?" Zhong Zixing asked knowingly.

"You said so much, but it tells us where to learn this programming method of Neutron Star Technology? Do we have to figure it out for ourselves? ”

"yes!"

"Don't sell it!"

In front of and behind the scenes, all the technicians in front of the live broadcast platform are a little anxious.

"All the logical rules related to Chinese programming have been published in the journal "Truth" of the unknown exploration of neutron stars, if you want to know, you can subscribe by yourself."

This is the end of the press conference, but the storm caused by Chinese programming is far from subsided.

In the background, Li Ying of the Ministry of Commerce brought news:

"Mr. Zhong, General Zhou, who came to the group last time to discuss cooperation, asked you to meet!"

()