Chapter 109 (I)
Since the procedure has already been prepared, the preparation is relatively sufficient, so the whole transformation process does not take much time.
Back in the dormitory, several of my roommates were still asleep and didn't notice my presence at all.
However, I saw that it was almost time for breakfast, so I put the finished accessories in my cupboard, locked them, and walked out of the dormitory.
After enjoying a different breakfast in the nearby 17th cafeteria, I guessed that my roommates had already gone to different classes, and then I walked back to my dormitory.
Sure enough, the door to the dormitory was locked, and there was no smell of anyone inside.
I opened the door and took out the computer accessories locked in the cabinet and went straight to the computer desk.
After reinstalling the hardware part, I pressed the boot button of the Ziyun computer.
As soon as the screen flashed, a dragon appeared and disappeared, and then it entered the desktop of the 'Chinese Dragon' fourth-generation system, and the speed was as fast as if it was playing fast action.
"I didn't expect the efficiency of the Chinese character computer to be so high, and the compatibility is excellent!" Although I had known about this for a long time, I was still surprised by the actual performance.
The functions of the 'China Dragon' operating system were tested one by one, and there was no delay in speed at all, and there were no compatibility problems.
I became more confident in my work.
Exiting the 'Chinese Dragon' operating system, I restarted the machine.
This time I was prepared, and pressed the button in time to enter the boot setting screen to adjust and optimize.
Then I took out the laser installation disk of the operating system that I had made in the lab.
Because I wrote this operating system based on Chinese characters, I named it "Qianghan".
After putting the "Qianghan" installation disk into the computer's original drive, I started the machine again.
Although the installation capacity of the "Strong Man" system is as large as 2G, the process of installing it is extremely fast.
I set the 'Strong Man' system installation disk to automatically format the hard disk (adjustable) and delete the operating system (not adjustable), because after using this system, there is no need for other systems to exist!
Since the 'Chinese Dragon' adopted the image of the dragon as its own symbol, I gave the iconic beast of the Qianghan system to the equally famous auspicious beast in ancient China, the Fire Qilin.
And on the screen, the fire unicorn just ran from left to right, and cutely sprayed fire on the way, and the whole process of formatting the hard drive and installing the system was over.
From this, it can be seen that the running speed of Ziyun computer has improved rapidly after transformation.
After that, I started writing and debugging the "strong man" firewall.
With the experience of writing a "strong man" operating system, it is much easier to write firewalls, and there is no problem with debugging.
At this point, my idea of Ziyun Computer is just to put it on the Internet and test it in substance.
I chose the Qinglong server group of 'Longteng' as the testing ground, because I know that the official and non-governmental hacker masters of various countries have invariably taken the conquest of the 'Longteng' system as their own goal.
And whoever can break the 'Dragon Teng' system will definitely immediately become famous in the world, and the fruits of fame and fortune will be in hand."
Therefore, the phenomenon of attacking the Longteng server cluster will never be less, and the attack methods are definitely advanced, even advanced.
As China is the base camp of Longteng, the Qinglong server cluster is the first to bear the brunt, and the number of attacks per hour every day is astronomical.
But because of that, it's the perfect place for me to experiment.
I first used the addressing function in the 'Strong Man' firewall to find the real addresses of the 10 sub-servers of the Longteng Qinglong cluster, which alone is not comparable to those so-called famous firewalls. (Many companies have integrated covert and defensive counterattack programs into firewall products, so it is difficult to search for real addresses, and SkyEye has done a better job in this regard.)
Then set your Ziyun computer to the open type, and fill in these 10 addresses into the protection address of the firewall, and press the protection button.
In this way, my old computer became the first firewall to protect these 10 sub-servers.
In an instant, countless attack data began to hit the firewall.
At that moment, the "strong man" firewall also began the mission I gave it.
As I watched the firewall work, I made new adjustments to it and added features inspired by the constant flashes of inspiration in my head.
In the midst of attacks from all sides, Ziyun Computer still maintained a strong operating speed despite the high-speed operation of the firewall and the almost full capacity of the CPU.
It has not been severely affected and exhibits delays.
This makes me very satisfied and proud of the stability of the firewall.
Open the attacker's address bar built into the firewall, and in just one hour, more than 750,000 addresses were collected, all of which were real network addresses from hackers from all over the world.
Under the powerful effect of the "strong man" firewall, no matter how many "meat machines" they use and how many deceptive methods they use, they will not be able to escape the "golden eye" function of the firewall.
These hackers have nothing to hide.
Looking at the IP addresses that are still increasing, I can't help but secretly admire the network protection technology of Phantom World.
They have to face such a huge attack group all the time, and it is impossible to effectively defend against them without extremely sophisticated firewall technology.
Moreover, Phantom World has maintained a record of unbroken Longteng server clusters in various countries for many years, which has to be admired.
At this time, Zeng Qianrong, a senior engineer on duty in the technical department of Phantom World, suddenly found that the number of attacks on the 'Sky Eye' server was rapidly decreasing, until in the end, there was no statistical record of attacks, and it has been maintained.
After a complex system check, she began to report the situation after confirming that there were no abnormalities in the Sky Eye system.
......
I didn't plan to experiment for too long.
With such a large amount of attack traffic, a few hours of testing is enough.
But since I had to go to the library in the evening, I decided to let the firewall run until I got back from work.
I spent the whole morning in the process of testing and debugging.
By the time the afternoon class arrived, the "Qianghan" firewall had been basically debugged.
And I, who had nothing to do, also broke through the wasteland in the afternoon to take the first lesson since entering the school, but I didn't see Yan Ziqing, Liu Shishi, Tie Zhongtang and others, and even Fang Qixue was nowhere to be seen.
After class, after having dinner with Luo Wancheng in the West District 10,000 people canteen, I went straight to the library.
Since the separation of Qingqing Internet Cafe, I have not seen Yan Ziqing again, nor have I contacted Liu Shishi again.
According to Luo Wancheng at dinner, they waited for a while at the Qingqing Internet café that day, and the manager surnamed Zhang came, and he was taken aback when he saw Tie Zhongtang, but he quickly recovered, and he talked and laughed with Tie Zhongtang, which was obviously very familiar.