Chapter 13
When Jiang Yanhai's voice fell, he instantly felt that his vision changed for a while, and then Jiang Yanhai noticed the stunned change. His brain seemed to be activated. He looked at a place, and the relevant data of this thing would appear in an instant. .
Gravity, atmospheric pressure, air humidity, temperature, wind speed, after looking out the window, when the line of sight passes through the window glass, Jiang Yanhai can even see the temperature difference, optical deflection, object moving speed, relative speed...etc. Almost all the data It all appeared in his mind instantly.
Jiang Yanhai immediately simulated the distant red flag he wanted to shoot, and the data within his line of sight quickly began to change. All data such as air pressure, gravity, humidity, temperature, wind speed, temperature difference, wind difference, and optical deflection appeared instantly. Do not say, and directly give relevant data and answers.
In other words, if Jiang Yanhai has a sniper rifle in his hand now, he can directly adjust the sniper rifle data in his hand, and then pull the trigger!
This is so fucking insane! Please allow Jiang Yanhai to swear here, really, compared to the strong metaphysical meaning in this name, the actual effect of this skill is simply scientific and can no longer be scientific!
This is almost to calculate all the data, eliminate all the problems that can be solved with the data, and then you just pull the trigger.
Does this increase the hit rate?
Although this is a skill, it is more like Jiang Yanhai's own ability. After careful experimentation, Jiang Yanhai found that this skill also has levels, and currently it is only the most basic C level.
After this level is higher, can it be possible to do more perverted things? Like turning a bullet around? Otherwise, why do you call it an unstoppable Newton's coffin board?
However, this skill does have an advantage. Jiang Yanhai can be turned off or activated at any time without any cooling.
good! Aside from the name, this skill is definitely a perverted level. Especially for a soldier, shooting marksmanship is the most basic.
After turning off this skill, he thought for a while, it was fine now anyway, Jiang Yanhai simply took the last hacking knowledge directly.
When Jiang Yanhai received the knowledge of hacking, a huge amount of data flooded into his mind instantly. The speed of the influx of knowledge was not very fast, but it was very profound. Jiang Yanhai immediately understood this knowledge.
It took a full two hours before and after, until Jiang Yanhai felt a little dizzy, and this B-level hacker knowledge was completely transmitted, and Jiang Yanhai didn't know what method, but it was directly passed into his mind anyway. , and not to mention very complete, his own understanding is also very deep.
However, although this knowledge is already complete, Jiang Yanhai feels that he still needs to practice more. In today's information age, the importance of such technology is beyond doubt.
Even soldiers, almost all individual equipment is inseparable from the support of information technology, and in a modern war, information technology is even more important.
Although Jiang Yanhai has already accepted all the knowledge, he has no concept of what level of knowledge about this B-level hacker is. He needs to verify and test it carefully.
After thinking about it for a while, Jiang Yanhai simply took out his mobile phone and sent all his personal belongings to this class. Now is the information age, recruits are also allowed to carry mobile phones, and smartphones can also be carried, but they can only be used The prescribed domestic brands, followed by the occasions where the mobile phone is used, etc., all have requirements, at least in this world.
Only rest time can be used, and now Jiang Yanhai is rest time.
He took out his mobile phone and turned it on, and a prompt automatically appeared in Jiang Yanhai's mind, "Do you want to connect this smart device?"
Of course the choice is.
After choosing Yes, Jiang Yanhai found that an operation panel appeared on his mobile phone, which was similar to an APP, but not the same, but after clicking on it, Jiang Yanhai took a deep breath.
As a college student living in the information age, although Jiang Yanhai is not a computer student, he must have some understanding of computer programming, but he is not proficient.
But now, when he opened the panel, Jiang Yanhai immediately understood the underlying data that appeared in it.
Not only did he understand it, but he also had a deep understanding of the phone's system and other issues in an instant. After seeing this, Jiang Yanhai acted according to what he thought in his mind without saying a word.
In fact, even if it is a domestic mobile phone, almost all the systems are Android, but Android uses an open system, so domestic manufacturers of its underlying data can also make their own customized modifications. In this case, the system's Safety can still be guaranteed.
But now, in Jiang Yanhai's eyes, there are too many loopholes in these systems in front of him. After just a few operations, Jiang Yanhai successfully obtained the highest level of authority of the mobile phone system and entered the low-level programming mode.
During this process, Jiang Yanhai felt for the first time how abnormal the computing support of the electronic information warfare auxiliary program was.
Hackers are no longer mysterious in modern times, but in fact, more than ten years ago, hackers were a very high-level title, and with the development of time, it seems that many people have rarely heard the title of hackers.
Even the computer viruses that used to be linked to hackers, etc., seem to be rare now. After all, there were so many antivirus software in the past, but now a simple 360 is enough.
Could it be that there are no more hackers?
No, there are still hackers, but hackers are more low-key, because in the modern information age, it will be more difficult for hackers to hide their identities as before, so they have to keep a low profile.
Secondly, the security measures of major information companies have improved, and with the rapid development of the network, the current cloud computing is the biggest development that restricts hackers. Many people think that if you find a loophole in the system, you can invade .
In theory, yes, but it's fine if you want to hack into a personal computer, but if you want to hack into a large company's large database, servers, etc., even if you have vulnerabilities, you still need powerful computing support!
The more powerful the computing power of the target you want to invade, the more powerful the computing power you need!
Not to mention that the other party has the computing power of multiple large data centers connected through the network, it is even more difficult to invade!
This is why hackers seem to be rare these days.
However, Jiang Yanhai has not yet tested a specific value for the computing support and auxiliary programs provided by the Red Star Engine, but he instantly understands that now he can backlink to the nearest communication company base station through this mobile phone, and then reverse the data transmission through data transmission. To analyze the system vulnerability of the communication company's data base station.