These hidden programs will be activated
(Rebirth) Mu Huanhuan took out the weapon on his body and put it aside, and looked at Wang Molun with a sip of water unhurriedly: "Hello Professor Wang, I am Mu Huanhuan, all the agents of China-country-country-country-security, I will definitely guarantee your safety, now...... You tell me where the things are, and I'll take you to the Prime Minister. ”
Professor Wang Molun hesitated for a moment, looked up at Mu Huanhuan, and said firmly: "Not yet, I must leave Denmark safely after meeting the prime minister to tell you." ”
Mu Huanhuan frowned: "Professor Wang, you also know that that thing is very important, I'm just afraid that someone else will find it later." ”
"No, it won't." Wang Molun said solemnly, "Absolutely not, no one can get anything like that except me." ”
Mu Huanhuan chuckled and lowered his eyes: "I'm a little curious, since Professor Wang has obtained the system and network equipment developed by Professor Gu Peng, and you are also experts in networking, why can't you develop a set of exactly the same?" But we have to go to great lengths to find that set? ”
"I can't do it, because I'm not Gu Peng." Wang Molun's deep eyes looked at Mu Huanhuan, "I can't copy a set of exactly the same thing." ”
"So...... Research a set of your own things, more powerful than Professor Gu Peng's set? Mu Huanhuan looked at Wang Molun.
"I still can't do it." Wang Molun chuckled a little dejectedly and sat on the sofa, "When I first got this set, I also wanted to try to copy it, or ...... At least there was a loophole for me to break, but the result disappointed me, I spent nearly half a year without even breaking into the system, I first looked for the reason from the system, and then found out that the network equipment was too powerful...... That is why the President of the United States ordered to get this set of things at all costs. ”
"Today's wars are no longer just human wars, cyberspace is becoming more and more important, and the United States and Israel have used computer worms to cripple Iran's nuclear facilities – why is the virus so powerful?" Wang Molun said a little excited, "It's because almost every computer in Iran has Microsoft's indos system installed." In addition to the traditional four war spaces, more and more countries are turning their attention to cyberspace. Network equipment is a necessary weapon for cyber warfare! Gu Peng's system and network equipment...... It can be called perfectly impeccable, and the United States has always regarded China as a security threat...... In other respects, China is already very powerful, but in the area of cyber alone, it is like a newborn baby who is defenseless and unable to fight back, but if China has this system, it will really become a threat to the United States. ”
"Gu Peng started to work on this set of things in 1997, and I was there at that time." Wang Molun gritted his teeth and looked a little far-reaching, "The reason is because George of the United States once said in "Introduction to Information Warfare" that because of the absolute superiority of the United States in software, the US government can decide that all software will be banned from being exported if there is no Trojan horse program. When a file with the words "war with the United States" appears on the computer or is triggered by other external triggers, these hidden programs are activated, which can result in formatting the computer's hard drive or sending files from the user's computer to the CIA. "Rebirth