Chapter One Hundred and Nine
Since the procedure has already been prepared, the preparation is relatively sufficient, so the whole transformation process does not take much time.
Back in the dormitory, several of my roommates were still asleep and didn't notice my presence at all.
However, I saw that it was almost time for breakfast, so I put the finished accessories in my cupboard, locked them, and walked out of the dormitory.
After enjoying a different breakfast in the nearby 17th cafeteria, I guess my roommates have gone to different classes.
I walked back to my dorm.
Sure enough, the door to the dormitory was locked, and there was no smell of anyone inside.
I opened the door and took out the computer accessories locked in the cabinet and went straight to the computer.
After reinstalling the hardware part, I pressed the boot button of the Ziyun computer.
As soon as the screen flashed, a dragon appeared and disappeared, and then it entered the desktop of the 'Chinese Dragon' fourth-generation system, and the speed was as fast as if it was playing fast action.
"I didn't expect the efficiency of the Chinese character computer to be so high, and the compatibility is excellent!" Although I had known about this for a long time, I was still surprised by the actual performance.
The functions of the 'China Dragon' operating system were tested one by one, and there was no delay in speed at all, and there were no compatibility problems.
I became more confident in my work.
Exiting the 'Chinese Dragon' operating system, I restarted the machine.
This time I was prepared, and pressed the button in time to enter the boot setting screen to adjust and optimize.
Then I took out the laser installation disk of the operating system that I had made in the lab.
Because I wrote this operating system based on Chinese characters, I named it "Qianghan".
After putting the "Qianghan" installation disk into the computer's original drive, I started the machine again.
Although the installation capacity of the "Strong Man" system is as large as 2G, the process of installing it is extremely fast.
I set the 'Strong Man' system installation disk to automatically format the hard disk (adjustable) and delete the operating system (not adjustable), because after using this system, there is no need for other systems to exist!
Since the 'Chinese Dragon' adopted the image of the dragon as its own symbol, I gave the iconic beast of the Qianghan system to the equally famous auspicious beast in ancient China, the Fire Qilin.
And on the screen, the fire unicorn just ran from left to right, and cutely sprayed fire on the way, and the whole process of formatting the hard drive and installing the system was over.
From this, it can be seen that the running speed of Ziyun computer has improved rapidly after transformation.
After that, I started writing and debugging the "strong man" firewall.
With the experience of writing a "strong man" operating system, it is much easier to write firewalls, and there is no problem with debugging.
At this point, my idea of Ziyun Computer is just to put it on the Internet and test it in substance.
I chose the Qinglong server group of 'Longteng' as the testing ground, because I know that the official and non-governmental hacker masters of various countries have invariably taken the conquest of the 'Longteng' system as their own goal.
And whoever can break the 'Dragon Teng' system will definitely immediately become famous in the world, and the fruits of fame and fortune will be in hand."
Therefore, the phenomenon of attacking the Longteng server cluster will never be less, and the attack methods are definitely advanced, even advanced.
As China is the base camp of Longteng, the Qinglong server cluster is the first to bear the brunt, and the attacks are astronomical every hour of the day.
But because of that, it's the perfect place for me to experiment.
I first used the addressing function in the 'Strong Man' firewall to find the real addresses of the 10 sub-servers of the Longteng Qinglong cluster, which alone is not comparable to those so-called famous firewalls. (Many companies have integrated covert and defensive counterattack programs into firewall products, so it is difficult to search for real addresses, and SkyEye has done a better job in this regard.)
Then set your Ziyun computer to the open type, and fill in these 10 addresses into the protection address of the firewall, and press the protection button.
In this way, my old computer became the first firewall to protect these 10 sub-servers.
In an instant, countless attack data began to hit the firewall.
At that moment, the "strong man" firewall also began the mission I gave it.
As I watched the firewall work, I made new adjustments to it and added features inspired by the constant flashes of inspiration in my head.
In the midst of attacks from all sides, Ziyun Computer still maintained a strong operating speed despite the high-speed operation of the firewall and the almost full capacity of the CPU.
It has not been severely affected and exhibits delays.
This makes me very satisfied and proud of the stability of the firewall.
Open the attacker's address bar built into the firewall, and in just one hour, more than 750,000 addresses were collected, all of which were real network addresses of hackers from all over the world.
Under the powerful effect of the "strong man" firewall, no matter how many "meat machines" they use and how many deception methods they use, they cannot escape the network golden eye function of the firewall.
These hackers have nothing to hide.
Looking at the address bar, which is still growing, I can't help but secretly admire the network protection technology of Phantom World.
They have to face such a large attack group all the time, and it is impossible to effectively defend against it without extremely sophisticated firewall technology.
Moreover, the Phantom World Company has maintained the Longteng server clusters in various countries without being breached for many years, which has to be admired.
At this time, Zeng Qianrong, a senior engineer on duty in the technical department of Phantom World Company, suddenly found that the number of attacks counted on the Tianyan server was rapidly decreasing, until in the end, there was no statistical record of attacks, and it has been maintained.
After a complex system check, she began to report the situation after confirming that there were no abnormalities in the Sky Eye system.
......
I didn't plan to experiment for too long.
With such a large amount of attack traffic, a few hours of testing is enough.
But since I had to go to the library in the evening, I decided to let the firewall run until I got back from work.
I spent the whole morning in the process of testing and debugging.
By the time the afternoon class arrived, the "Qianghan" firewall had been basically debugged.
And I, who had nothing to do, also broke through the wasteland in the afternoon to take the first lesson since entering the school, but I didn't see Yan Ziqing, Liu Shishi, Tie Zhongtang and others, and even Fang Qixue was nowhere to be seen.
After class, after having dinner with Luo Wancheng in the West District 10,000 people canteen, I went straight to the library.
Since the separation of Qingqing Internet Cafe, I have not seen Yan Ziqing again, nor have I contacted Liu Shishi again.
According to Luo Wancheng at dinner, they waited for a while at the Qingqing Internet café that day, and the manager surnamed Zhang came, and he was taken aback when he saw Tie Zhongtang, but he quickly recovered, and he talked and laughed with Tie Zhongtang, which was obviously very familiar.
During the conversation, Manager Zhang also knew about my existence, and he was particularly interested in me and asked me a lot of things.
However, I didn't know Tie Zhongtang very well with them, and they knew very little about me, so of course Luo Wancheng pretended not to know, so Manager Zhang couldn't get much information about me.
It's just that before leaving, Manager Zhang sent a VIP card and asked Luo Wancheng to transfer one to me, saying that he would go to him to play in the future, and it would be half price.
But the strange thing is, why would he be so enthusiastic about us?
I couldn't figure it out.
At 19:00, I took over at the library on time and started my first day of part-time work.
The job of an associate is actually quite easy.
In today's highly developed intelligent technology, the management of the library, as a concentration of knowledge, has been at the forefront of the application of science and technology, and the management has basically been automated.
My job is basically to put the books back on the shelves that have been scattered in a mess.
And it's more about packing up books for tomorrow's opening after closing.
Therefore, the time after work and before the closure of the museum is very free.
As long as you don't leave the reading room management desk.
So, during this time, I chose to read books, and I read everything.
Of course, when I come across my own bioscience and technology books, I still read them more seriously.
The library closes at 9:30 a.m.
I quickly packed up my books and returned to my dorm at 9:50 a.m.
Liang and Li Guangguo were not in the dormitory, only Yang Wenfeng was sitting in front of the computer wearing a helmet, obviously playing a game.
As for what kind of game it is, I don't want to know, so I go straight to my own position.
Opening the locked computer and display, I first look at the firewall records.
I'm quite happy with the results.
There are nearly 10-digit attack addresses, 14-digit hacker attack records, 19-digit virus attack records, nine-digit attack methods, and countless dangerous data intercepted, but the system invasion record is 0.
In other words, my firewall system has not been breached.
I know that my "strong man" firewall has fully met my needs.
So, I opened the counterattack function bar, entered the number of a small program I had programmed in advance in the send data field, and then pressed the counterattack button.
Then the protection function of the Longteng Qinglong server cluster was disconnected.
I know that it won't be long before a fire-breathing unicorn will appear on the monitors of the operators of the network addresses I've recorded.
It will run around the screen, and everywhere it passes, it will turn into a black screen.
When the entire screen is completely black, a line of Chinese characters appears: XXXXXXXXXXXX (network address) Operator: Your network IP address has been recorded, please stop your attack immediately!
Then the system will return to normal, and the applet will be automatically cleared, leaving no trace.
Other than that, there will be no changes or effects on their own systems.
In other words, that code is just a warning code.
............
In the technical department of the Phantom World Company, Lin Yunong, who was on duty in the duty room, suddenly found that the number that was already 0 in the attack record column suddenly began to beat.
All kinds of attacks on the Qinglong server cluster revisited the security protection gate of the Tianyan system after the 'strong man' firewall closed the protection function and was withdrawn from the front line of protection.
It didn't take long for the attacks to fall back on.
What they don't know is that the reason for the decrease in attacks this time is that the warning program I issued is working.
Because those hackers who have invaded the computers of hackers in various countries, the text displayed on their screens is their real network address.
Although these people shuddered at the Chinese characters in front of them, they didn't dare not immediately stop the attack in their hands and avoid the limelight for a while.
It's just that this account is credited to the head of the Phantom World Company again.
............
After turning off the firewall, I made one final tweak, and then shut it down to my satisfaction - reboot to get it to full functionality.
After returning to the 'Strong Man' operating system, I was relieved to connect to the Dragon World.
Without the help of a holographic helmet, I wouldn't have that three-dimensional reality.
It felt a little weird.
On the screen, I stand alone in a shallow hole, in front of me a small glowing orb with four glowing balls, which feels strange and familiar to me.
I took a few steps with the mouse, and although it wasn't as agile and realistic as a helmet, it was also very fast, without any dragging or delay.
However, my mental power is completely useless, and there is no reaction between my true power and mixed energy.
Now, it's all up to me!
Fortunately, the cloudy and sunny round and waning moon array I set up still exists. And it looks like it's working pretty well.
Although I can't see the sights in the helmet on my screen, I can still move freely in the formation without any inconvenience.
In order to adapt to the new environment and operation methods as quickly as possible, I did not go out immediately, but used the mouse to manipulate my avatar on the screen and do all kinds of actions that I could think of.
When I was able to use the mouse to the point where I could make my arm as I wished, I decided to go into battle.
Although the 'Sweep the World' stunt is completely useless now, my purpose in the battle is not to kill monsters.
I plan to take a turn around the Huaguo Mountain first, observe the terrain carefully, and collect some herbs for medicinal practice by the way.
It's a real failure, I've been in Huaguo Mountain for many days, but I'm either tired of running or busy arranging the formation.
I don't really know anything about Huaguo Mountain, let alone wander around Huaguo Mountain, looking for opportunities to do tasks.
And now, although my attack power is not good, my defense power is supported by various pieces of superb equipment, and I still retain some strength.
I believe that as long as I am careful, I can definitely gallop safely in Huaguo Mountain.
Therefore, I did not hesitate to drill out of the waning moon formation from the northwest corner, and the monkey monsters all over the mountain suddenly surrounded me.
Without waiting for them to close in, I picked up the level 115 Water Dragon King Staff in my hand and smashed the head of a mountain monkey general who was blocking in front of me, and strode towards the periphery.
Now I'm not the pitiful person I was a few days ago, not to mention the best equipment full of brilliance, and my own strength has also made a qualitative leap.
But to be on the safe side, I took a step-by-step circular motion to look inward.
It was very amusing to be running round by circle, and the monkeys chasing after me were also running around in circles.
As time passed, the outline of Huaguo Mountain began to become clear in my mind.
Huaguo Mountain is not too big, and the whole terrain is a bit like a big peach gnawed by a caterpillar.
Its outer part of the terrain is first higher and then lower, and after a distance towards the center, it begins to rise again, and there is a tendency to rise gradually.
With this feeling in mind, I continued to go deeper into the center.
Since the monkeys here have all run behind me, I will be informed all the way.
At this point, I finally confirmed that I was now climbing a mountain.
Because from the screen, a tall mountain appeared in front of me.
"It's like I've seen a mountain, and it seems that it should be the real Huaguo Mountain!" I am overjoyed, which means that I have found the true hinterland of Huaguo Mountain.
Generally speaking, the final boss of the hidden mission is mostly hiding somewhere in these hinterlands, waiting for the arrival of the brave.
I excitedly quickened my pace, pushing the monkey monster farther behind me, and I was soon at the foot of the mountain.
However, when I came to the foot of Huaguo Mountain, I looked at Huaguo Mountain and was shocked.