Chapter 42 Surveying and Mapping Completed
"The motherboard is equivalent to roads, water conservancy facilities and other things, playing a connecting role, carrying hard disks, CPUs and other things. ”
"The network card is equivalent to the identity certificate of you, the owner of the manor, and the ownership certification of the manor that is recognized in the empire. ”
"All kinds of software and applications are equivalent to jobs, turning the computing power provided by CPUs into services and workers. Guards, street sweepers, entertainment workers, etc. If the software is turned on too much and the CPU can't be driven, you are short of manpower. If you don't have enough memory, you don't have enough office space, and you have to change it to a bigger one. ”
"Coupled with computer monitors, keyboards, mice and other input devices, it is a necessary prop for you, as the owner of the computer, to be able to descend into this manor world, play role-playing games, and act as the manor lord to give orders. ”
Speaking of this, the engineer paused and concluded, "With the above things, plus the operating system and various application software, a computer can already be used, you can code words on it, you can also play computer games, and you can also use a USB flash drive to load data on the computer." However, you don't have access to the internet yet, so you'll have to play single-player games on your own. ”
"If you want to go online, connect to other estates, or even connect to major websites, and use all kinds of web applications, such as playing a big online game or something, you have to add some other hardware equipment. ”
"The cat, that is, the modem, plays a translation function, can make your computer signal along the telephone line, for example, he is a knowledgeable scholar and translator, your computer generated the upload and release of the signal, equivalent to a messenger, can be the messenger carried by the message, into standard general information, so that the local dialect and the popular Mandarin can be converted into each other, everyone is easy to communicate. ”
"Routers, if you have two or more computers at home, you can use them. It's the equivalent of a fork in the road, and the house number. If an outsider visits one of your computers and wants to play videos with you, if you don't want him to mess into your parents' computer, you have to have it, and he will tell the outsider, oh, are you here to find the eldest lady, the second young master, or the young grandmother? They live in room 1, room 2 and room 3, and you can't go wrong. ”
"With all these things, in terms of hardware, you are almost ready to contact the outside world, but if you want to actually surf the Internet, you still have one last step left!"
"What step is it? Can't remember? Have you forgotten that you used to squat at home by yourself and play manor games, and now you have to go out if you want to see the outside world, right? The problem is that your door is muddy, there is not even a road, and the messenger has to help you deliver the news, express mail or whatever? So, you have to build a road, or pull a network cable. ”
"You've bought so much hardware to get ready to surf the Internet, but it's all about your family, it's all about your own computer, and the Internet outside, and this thing is also managed, and it's not free to use. ”
"You haven't even pulled a network cable, and you haven't paid the money (Internet fee) to buy the road, even if there is an eight-lane highway at the door, you will be stopped by the traffic police as soon as you get on the road, and you will be sentenced to drive without a license, and of course you can't go online. ”
"If you want to go online, you have to understand the rules, you have to pay the network fee first, you pay the operator, it is equivalent to paying the road fee, get the pass, pass through the various checkpoints, streets, and get on the highway when you go all the way unimpeded, no network fee, as soon as you go out, the guards guarding the traffic arteries will stop you, and you haven't even paid the toll and maintenance fee, so you can play at home and go by yourself! ”
"When you pay the money, the operator will assign you an IP address, plus the MAC address on your network card, etc., that is, your house number, ID card and everything are understood, and people will not find the wrong direction and find the wrong place to recognize the wrong person if they want to visit you. ”
"Okay, with such a complete set of programs in place, you can finally go online, you can enjoy network services, chat about videos, play online shopping or something, and it's logical. ”
At the same time, at this time, your network security problem is also highlighted. ”
"In order to ensure the security of your information, you must not download a few security software? In order to make full use of your computer to enrich your life, you must not download a few more application software? What music software, chat software, video software, which one would you be willing to miss?"
"So east, west, these hired employees are already stuffed with your hard drive. As for what they are, and whether they do any private work in private, you know? Do you know that it works? Can you do without them?"
"Security software is your security team, firewall is your doorman, who can enter and who can't enter, set up the firewall, and the doorman will obey orders. With these security personnel to help you take care of your home and nursing home, you don't have to worry about three or five thieves sneaking in your computer from time to time, taking a little bit of your information, stealing a little bit of your information, or something. So, sometimes, even though you look at them over and over again with a skeptical eye, you still have to use them, and who made you not have the patience to write one yourself?"
"In the past, you played a stand-alone game by yourself, hid in a small building and became a unity, and no one could do anything about you. Now that you are connected to the Internet, the computer operating system you use, the network software and materials you download, are all people you invited from outside, these professional housekeepers, free servants or something, don't look at the honest work, some of them are hidden traitors!"
"In the past, your predecessor was helpless against these things, pinching his nose and admitting it, he could only resign himself to fate, and now, since we plan to conquer this online world, of course, we can't let these companies collect your information at will and spy on your **. ”
At this point, the engineer pointed to the manor with his whip.
I saw that on the manor map, the original gray color began to appear with bright colors.
Some of the manor staff, who were constantly running step by step, also seemed to be smart, and from time to time the conversation bar lit up, and a line of text popped up from it.
Sima Mulong looked at it, but it was a woman dressed as a singer, and said in a text bubble, "The lord of the manor ordered a bunch of songs to listen to today, I have to quickly sort it out and send it to my superiors for filing, "Ferry" was played twice, and "Half a Pot of Yarn" was played once......"
Yes, this is the company to which the application software belongs, and it is collecting user habits and information, and it has been caught by the micron robot group.
It's not weird, is it a matter for Internet companies to collect user information? Even if you haven't seen it, you haven't heard of it?
Sima Mulong looked at it disapprehantly, and continued to listen to the engineer talk about the progress of the work.
I saw the engineer pointing to the parts that were slowly rendered with color, and said to Sima Mulong, "Master, please see, these colored parts are the degree of analysis of each hardware system by the micron robot group." ”
"For some simple hardware parts, we have completely analyzed them, such as network cards, such as displays, keyboards, mice, etc. The rest is mainly those important hardware parts, such as hard disks, CPUs, memory, etc., the analysis of these hardware is still in rapid progress, and I believe that it will soon be effective. ”
"The main problem now is that the structure, structure, and working principle of some hardware itself have been sampled and studied, and their structural problems no longer bother us. ”
"The main shortcoming is that the understanding of the operating system is somewhat insufficient. Through the signal feedback generated by the internal operation of the computer itself, we can only analyze what its system settings are little by little, so that the progress of the work can not keep up, because if you want to push back, the workload is too large, after all, the volume of an operating system is as large as several G, which is not easy to complete. ”
"The operating system is a big problem, it is a collection of rules in itself, involving all aspects of the operation of the computer, it is equivalent to a manor, the overall code of conduct and laws and regulations of all members, whether we want to control other computers in the future, or carry out various information collection work, can not bypass the operating system. Even, some masters who are proficient in computer technology, if they are familiar with the operating system, can even find out whether their computer is abnormal through the scrutiny and examination of the underlying operating data of the system. ”
"We want to have the most control over the computer network and hide our presence. Then, we can not only understand the rules of the operating system, but even find vulnerabilities, we must also improve on its basis, improve its utilization of computer resources, and form an automatic camouflage and hiding of the underlying data. ”
"Now, our focus is to understand the structure of the hard drive, collect a sample of it, analyze how it works, and then start directly from the hard drive, read the information from the inside, and interpret the system architecture of its operating system, which is the fastest way. ”
"For the storage principle of hard disk data, now the degree of resolution has been 90%, no, 91%, and when all the analysis is completed, we can send more micron robots to the hard disk for data reading, once the reading is completed, this first computer intrusion mapping and modeling task, it is almost completed. ”
"With just a bit of analysis of the existing computer frame model, we can develop further control software customizations. ”