Chapter 108 (I)

Li Xinpeng clenched his fist tightly and swung it forward, eagerly looking forward to the arrival of the game approval letter soon.

。。。。。。

"The system has been updated。。。。。。 The information on the screen flashed, and then a golden dragon soared into the sky, flew into the clouds and disappeared.

The 4th generation operating system of 'China Dragon' is finally running on my computer.

Since the system is new, there are many ways to make some simple adjustments to increase the speed of operation.

I didn't have time to think about it, according to the memory in my mind, I modified the default settings of the system to my own set plan according to the map, and then opened the official homepage of Longteng.

I found the download link of the client, and with a click of the mouse, the download progress bar began to move.

In fact, most of the data of the Dragon game is integrated into the server, and the client program that players want to download is essentially just a login program.

So, it didn't take long for me to download the program.

The installation process is very simple, just follow the prompts that appear during the program's operation.

The only thing to mention is that among the options before proceeding with the installation, I chose the 2D planar login.

The reason is simple, because I don't have that kind of advanced holographic virtual induction headset.

With my current financial situation, I am not able to enjoy this kind of ultra-high-speed sensing technology equipment for the time being.

But I don't care, I'm sure my manual movements alone won't be any slower than wearing a helmet.

The program was small, so it was installed quickly, but I didn't immediately connect to the game.

My computer is just a simple host and monitor, without any external devices, fingerprint and iris checks cannot be used, so I can only use the original password to log in.

In this way, it is important to ensure the security of your own host and prevent outsiders from intrusion.

Nowadays, many purchases can be made through the Internet, and the widespread use of BOC cards has forced me to make my own machine more secure.

And I'm no longer the novice I used to be when I didn't know anything about computers, and I know how important this is.

Through the filling and absorption of knowledge in the library some time ago, my computer knowledge is unprecedentedly rich.

I followed my mental memories and searched the Internet.

There are quite a few firewall programs found, and I also got the URLs of the companies that produce these firewalls according to the introduction on the Internet.

I downloaded some commonly used hacking programs from the Internet and probed the web servers of these companies in turn.

I think that as long as I can't hack into any company's servers through my methods, its products are worthy of my trust and worth buying.

But I was unusually disappointed with the test results throughout the afternoon.

Seventeen well-known firewall companies' web servers were all breached by me in just one afternoon.

I didn't do anything to sabotage, but my frustration with them had risen to the extreme.

Exiting the last compromised server, I wiped out all traces left on the web.

I was lost in thought.

I'm not going to use these seventeen firewalls.

Since I can easily break them now, it means that the flaws in these products are still very prominent, and sooner or later they will be discovered and exploited.

And the firewalls used by these companies should be the most advanced and secure products they have developed, and they should be more secure than the ones they sell.

But with the usual hacking program I was using, they still couldn't keep me out, and they didn't even notice my intrusion in the first place.

Although I used a little mental power to make a few tricks in the process of probing, I still can't trust them anymore.

Standing up, I walked to the window.

Looking at the figures on the lawn in the distance, my brain was racing and I was thinking about a solution.

After a long time, my mind gradually settled.

Since I couldn't trust someone else's product, I decided to write my own security program.

In my mind, the 0 and 1 in the data are actually not substantially different from the yin and yang that I am most familiar with.

Yin and Yang are the final decomposition states of all things, and they are the origin of all things.

In other words, the different combinations of yin and yang create the different shapes and characteristics of all things.

In the data world of the computer, the data flow composed of 0 and 1 constitutes the grass, trees and even all things in the illusory world, and vividly expresses the characteristics of yin and yang to create all things.

Therefore, I plan to develop a computer program with a completely new concept based on the theory of yin and yang that I have learned.

There are countless runes that can only exert their power by combining the two energies of yin and yang in my memory, and their essence is that they can evolve different effects through the combination of yin and yang of different intensities and different degrees.

However, the combination of yin and yang in the talisman is not simply composed of yin energy and yang energy slowly arranged little by little, but in the form of a symbol.

In fact, these symbols are also the first generation of yin and yang energy in the initial formation process of the universe and slowly arranged in different forms over a long period of time.

But once they are arranged and formed, they always exist in the universe as a fixed formation.

It is precisely the constant change and combination between them that constitute the world of flowers and flowers in the universe.

It can be said that they are the basis of the composition of all things in the universe.

My idea is to make a simple and effective network firewall with complete defense capability based on these symbols that have been mastered by my master and learned by me.

It's not that complicated.

For example, Chinese characters on the Internet are made up of small dots arranged in a certain form. If the dots are compared to 1 and the distance between dots is compared to 0, then the kanji is composed of an infinite number of 1s and 0s.

If the system needs to call this Chinese character, it is undoubtedly much faster to take out the already formed Chinese character directly than to slowly combine it from 1 and 0.

Moreover, the dots on the network are actually arranged by countless 1s and 0s, and this loop is almost infinite.

This places an extremely heavy burden on the operation of the system, resulting in a significant reduction in the speed of operation.

More importantly, once a symbol or Chinese character is formed, it can be decomposed into a data stream, or synthesized by a data stream, very quickly.

As long as the interface is done well enough, it can also speed up this combination and disassembly.

In fact, this theory has been put forward in China in the 21st century, but for unknown reasons, it has never succeeded.

I am working on a new firewall program today to apply this theory of being both someone else and myself.

Originally, I was going to write it using symbols, which are the basis of symbols, but on second thought, the program I wrote in this way was too advanced for the world, and it was impossible to support it in relation to the hardware.