Chapter One Hundred and Eight
Li Xinpeng clenched his fist tightly and swung it forward, eagerly looking forward to the arrival of the game approval letter soon.
"The system has been updated。。。。。。 The information on the screen flashed, and then a golden dragon soared into the sky, flew into the clouds and disappeared.
The 4th generation operating system of 'China Dragon' is finally running on my computer.
Since the system is new, there are many ways to make some simple adjustments to increase the speed of operation.
I didn't have time to think about it, according to the memory in my mind, I modified the default settings of the system to my own set plan according to the map, and then opened the official homepage of Longteng.
I found the download link of the client, and with a click of the mouse, the download progress bar began to move.
In fact, most of the data operation of the Dragon game is integrated in the server, and the client program downloaded by the players is essentially just a login program.
So, it didn't take long for me to download the program.
The installation process is very simple, just follow the prompts that appear during the program's operation.
The only thing to mention is that among the options before proceeding with the installation, I chose the 2D planar login.
The reason is simple, because I don't have that kind of advanced holographic virtual induction headset.
With my current financial situation, I am not able to enjoy this kind of ultra-high-speed sensing technology equipment for the time being.
But I don't care, I'm sure my manual movements alone won't be any slower than wearing a helmet.
The program was small, so it was installed quickly, but I didn't immediately connect to the game.
My computer is just a simple host and monitor, without any external devices, fingerprint and iris checks cannot be used, so I can only use the original password to log in.
In this way, it is important to ensure the security of your own host and prevent outsiders from intrusion.
Nowadays, many purchases can be made through the Internet, and the widespread use of BOC cards has forced me to make my own machine more secure.
And I'm no longer the novice I used to be when I didn't know anything about computers, and I know how important this is.
Through the filling and absorption of knowledge in the library some time ago, my computer knowledge is unprecedentedly rich.
I followed my mental memories and searched the Internet.
There are quite a few firewall programs found, and I also got the URLs of the companies that produce these firewalls according to the introduction on the Internet.
I downloaded some commonly used hacking programs from the Internet and probed the web servers of these companies in turn.
I think that as long as I can't hack into any company's servers through my methods, its products are worthy of my trust and worth buying.
But I was unusually disappointed with the test results throughout the afternoon.
Seventeen well-known firewall companies' web servers were all breached by me in just one afternoon.
I didn't do anything to sabotage, but my frustration with them had risen to the extreme.
Exiting the last compromised server, I wiped out all traces left on the web.
I was lost in thought.
I'm not going to use these seventeen firewalls.
Since I can easily break them now, it means that the flaws in these products are still very prominent, and sooner or later they will be discovered and exploited.
And the firewalls used by these companies should be the most advanced and secure products they have developed, and they should be more secure than the ones they sell.
But with the usual hacking program I was using, they still couldn't keep me out, and they didn't even notice my intrusion in the first place.
Although I used a little mental power to make a few tricks in the process of probing, I still can't trust them anymore.
Standing up, I walked to the window.
Looking at the figures on the lawn in the distance, my brain was racing and I was thinking about a solution.
After a long time, my mind gradually settled.
Since I couldn't trust someone else's product, I decided to write my own security program.
In my mind, the 0 and 1 in the data are actually not substantially different from the yin and yang that I am most familiar with.
Yin and Yang are the final decomposition states of all things, and they are the origin of all things.
In other words, the different combinations of yin and yang create the different shapes and characteristics of all things.
In the data world of the computer, the data flow composed of 0 and 1 constitutes the grass, trees and even all things in the illusory world, and vividly expresses the characteristics of yin and yang to create all things.
Therefore, I plan to develop a computer program with a completely new concept based on the theory of yin and yang that I have learned.
There are countless runes that can only exert their power by combining the two energies of yin and yang in my memory, and their essence is that they can evolve different effects through the combination of yin and yang of different intensities and different degrees.
However, the combination of yin and yang in the talisman is not simply composed of yin energy and yang energy slowly arranged little by little, but in the form of a symbol.
In fact, these symbols are also the first generation of yin and yang energy in the initial formation process of the universe and slowly arranged in different forms over a long period of time.
But once they are arranged and formed, they always exist in the universe as a fixed formation.
It is precisely the constant change and combination between them that constitute the world of flowers and flowers in the universe.
It can be said that they are the basis of the composition of all things in the universe.
My idea is to make a simple and effective network firewall with complete defense capability based on these symbols that have been mastered by my master and learned by me.
It's not that complicated.
For example, Chinese characters on the Internet are made up of small dots arranged in a certain form. If the dots are compared to 1 and the distance between dots is compared to 0, then the kanji is composed of an infinite number of 1s and 0s.
If the system needs to call this Chinese character, it is undoubtedly much faster to take out the already formed Chinese character directly than to slowly combine it from 1 and 0.
Moreover, the dots on the network are actually arranged by countless 1s and 0s, and this loop is almost infinite.
This places an extremely heavy burden on the operation of the system, resulting in a significant reduction in the speed of operation.
More importantly, once a symbol or Chinese character is formed, it can be decomposed into a data stream, or synthesized by a data stream, very quickly.
As long as the interface is done well enough, it can also speed up this combination and disassembly.
In fact, this theory has been put forward in China in the 21st century, but for unknown reasons, it has never succeeded.
I am working on a new firewall program today to apply this theory of being both someone else and myself.
Originally, I was going to write it using symbols, which are the basis of symbols, but on second thought, the program I wrote in this way was too advanced for the world, and it was impossible to support it with the necessary hardware at all.
In this way, what is written is completely wasteful.
It is better to redesign it based on the Chinese characters in the human world instead of the symbols that are almost the origin of the universe, and it will completely achieve my purpose.
And maybe it will be of some benefit to the country.
Once I had made up my mind, I started to use my brain.
In fact, my brain is an incomparable computer, and I don't think there's anything else in the universe that can compare to it.
So, I use it as a platform for writing new programs.
Slowly climbing into my bed, I slowly closed my eyes to prevent the light in my eyes from disturbing others by revealing it while thinking.
Thoughts are flying, more than 85,000 ancient Chinese characters are flying in the mind, 3,500 commonly used Chinese characters are also shining in it, the decomposition and combination of words and words have never stopped, and the two-dimensional graphics of Chinese characters are also flowing rapidly in the heart like flowing water. The 16 basic elements, such as the right hook, also flashed in the brain one by one with the analysis of each Chinese character, and they were constantly combined and enlarged.
Little by little, the rules of the two-dimensional shape of the strokes that make up Chinese characters were discovered and extracted by my super brain, until the complete rules were formed in my mind.
I knew that the first step in programming had been successfully taken.
I finally understand why the people who came up with the computer theory of Chinese characters didn't succeed in the end.
Although they saw that Chinese characters as two-dimensional figures have much larger structural information than one-dimensional English, which is composed of linearly arranged letters, they also knew that Chinese characters convey a much faster amount of information and a larger capacity than English.
However, they could not find the law of the order in which the strokes formed the Chinese characters, so that they could not realize the dream of a Chinese character computer without advanced theories.
These patterns are so hard to find that I used my own super brain to analyze them, and it took me a whole night to achieve my goal.
In the early morning of summer, the sun has not yet risen, and the stars have not completely dispersed.
I took a gentle breath in the cool, fresh air, enjoying the joy and comfort of success.
At this moment, an idea popped into my head.
I have already mastered the rules of the composition of Chinese characters, so why don't I make up my own operating system?
In that case, because the underlying software is completely different, it is simply impossible for someone to break into my computer.
Unless he has mastered the mysteries of Chinese character strokes as much as I do.
And it also requires superb hacking skills to break through the protection of the firewall.
But in any case, if I can really do this, the security of the computer system is undoubtedly a qualitative leap.
I lay on the bed and my mind began to stir.
The writing of the operating system is exceptionally difficult.
Although I have memorized countless computer knowledge in my head, after all, they all exist in the form of theories.
For me, who lacked practical experience, it was really difficult.
Although I would like to decipher the source code of the fourth-generation operating system of the 'China Dragon' as a reference, it is obviously impossible to achieve it under the current circumstances, so I can only find another way.
"Since 1 and 0 have similar properties to yin and yang, can you draw inspiration from the principles of the Tao in my knowledge?"
As this thought lingered in my head, my mind raced again.
Yin and Yang, Bagua, Yili, Refutation, Evolution of Life, Life and Death。。。。。。 The principles of the universe and the renewal of Vientiane flashed in my mind, and my own operating system finally took shape in my thinking.
I got excited.
With a working idea, it is like steelmaking has a billet, and then you can get twice the result with half the effort.
The basic elements of the sixteen Chinese characters seemed to come alive in my mind, and they began to combine themselves around what I wanted to achieve.
They fly, intersect, weave different program nodes, and then connect and communicate with each other to become a complete whole.
A brand new operating system was initially completed in my high-speed brain.
It's not so much an operating system, but it's actually more like a new type of Taoist symbol, an operator based on Chinese characters.
Since Chinese characters can hold more information than English, and the expressions are also direct, simple, clear, and beautiful, they are inherently rich in various advantages.
Coupled with my optimization and the discovery of the rules of word formation, Chinese characters have reached unprecedented superiority in terms of the amount of information and expression.
Why?
To put it simply, punctuation aside, English is made up of 26 * 2 = 52 basic letters, and Chinese characters can express far more words than English with only 16 basic strokes.
This alone, and in the same case, a computer based on Chinese characters is more than three times more efficient than an English-language computer.
Not to mention the meaning expressed by the phrases that are spoiled by Chinese characters.
What's more, after I introduced the concept of a universal symbol into the symbolic method, countless complex operations were replaced by small symbols composed of Chinese character strokes, which incredibly simplified the process and made the results faster.
In this case, there are even more functions that can be achieved.
I made a rough estimate that my operating system should be at least fifty times more efficient than the fourth-generation 'Chinese Dragon' operating system based on the still English-based 'China Dragon' on the same computer.
This can completely compensate for the delay in network reception and transmission caused by the lack of sensor helmets.
Although there is no way to continue my strong advantage in mental power, it is enough to support me in the dragon during the days when I didn't save enough money to buy a helmet.
And if necessary, I can also go to an Internet café to use my mental power to deal with strong enemies.
I can't imagine what amazing results this kind of operating system will achieve when it is paired with a helmet that can transmit my mental power.
Now it's just a matter of how to get the operating system out of my head and into my old computer.
The original instruction set and BISO in the CPU are no longer applicable and must be re-entered.
Operating systems are also not programmable on existing computers.
These tasks can only be achieved with special equipment.
Fortunately, the school has invested a lot in this area, and the laboratory has countless high-tech equipment, which can fully enable me to achieve the desired purpose.
Taking advantage of the fact that people were asleep in the early morning, I got out of bed lightly, dismantled the Ziyun computer into eight pieces, and then humanized the void and appeared in the Tongfang computer lab at a speed that was difficult for people to discern with the naked eye.
First, use the device to wash off the built-in instruction set of the CPU that I removed from the Ziyun computer, and input the new Chinese character method instruction set that I had already programmed.
Then burn the stroke symbol program into the BIOS on the motherboard.
Seeing that there was still room in BISO, I simply wrote a small defensive formation program into it.
In addition to protecting the program in the BIOS, this applet can also find out the source of the intrusive program through a small Chinese character method in the program, and track it secretly.
In this way, the security system at the lowest level of the computer is also greatly improved.
After doing these two jobs, I started writing the Chinese character computer operating system that I had already designed on the supercomputer.
The work was done quickly, because the content of the program was already engraved in my head, and here I just wrote it into machine language.
Coupled with the fact that I was being able to manipulate the input faster and faster, it didn't take long for all the work to be done.
After carefully removing all traces I had left behind in the lab, I quietly retreated.