Chapter 464 Firewall (28000 Monthly Ticket Plus More)
The firewall of this computer was written by Jiang Yanhai. It cannot be regarded as a firewall in the conventional sense. From the birth of the computer to the birth of the Internet and then to the present, it is like an ancient spear and shield.
The fateful battle between hackers and security officers has also begun, although it is said that many security officers are hackers behind their backs.
Because these two technologies are figured out, Jiang Yanhai's programming ability, hacking technology, these are not systematically learned, but directly provided by the Red Star Engine, and then he learned it by self-integration.
On the contrary, he did not fall into such a rigid and rigid brain. In terms of hacking, or in the field of computer software, his creativity can be said to be wild and unrestrained.
When it comes to the network, it is inseparable from the computer virus, which once made people's emotions change from the late 20th century to the early 21st century.
A computer virus is a general term for a program that can quickly parasitize and multiply through a computer network, and quickly pass through system loopholes through mutation and hybridization to gain a certain degree of system control.
Some people may not understand, this computer virus is the same as raising pigs and rice. Are you still playing with biology? In fact, there is the word virus in the name of computer virus. In fact, to put it plainly, it is like a virus in the human body.
Any virus that kills people and has been difficult to kill so far has high variability, reproduction, and may even hybridize with other viruses.
The same is true for computer viruses. A perfect computer virus must first have the ability to reproduce on the network, that is, the ability to self-replicate, and secondly, it is commonly known as the idea and technology of integrating artificial intelligence.
At the same time, a perfect virus must also have a distributed structure, a parent-child structure, that is to say, when the parent virus is detected, it will release a more destructive or more concealed child virus.
In addition, a perfect virus must also have hybridization and mutation, which means that it can exchange genetic information, self-mutate, and replicate with viruses that are almost the same as themselves. This makes the virus program itself more hidden and more destructive.
Of course, a perfect virus does not exist in theory at present.
So why does it seem that the virus is not as perverted as it used to be in recent years? Or is it not as much as it used to be?
What kind of companies or software did you use in the past, such as Rising, Jiangmin, Little Red Umbrella, Kaspersky, Symantec, etc., to randomly detect the computer and scan tens of thousands of viruses, but now there are none?
In fact, it is mainly due to the rise of cloud computing and the rapid development of computer hardware. The previous computer virus was difficult to crack because its encryption program was difficult to crack. After cracking the encryption program, once the internal source code is known, it is very simple to kill this computer virus.
Because the computing speed of modern computers is too fast, it will not take long for your encryption program to force you to crack it, so the glory period of computer viruses seems to have passed.
Moreover, with the development of the network now, the computer system is mostly connected to the server. Once any virus invades and there is a slight problem, the server will find it and quickly alarm it, as well as various protection software with real-time protection capabilities.
So what 360 and the like installed on the current computer is more like a simple version of the firewall.
Computer viruses don't seem to be developing, but firewalls are not stagnant.
In fact, computer viruses can't be said not to develop. Trojan horses and computer viruses are often more aimed at enterprise-level users.
Of course, everything is not so absolute. For example, Jiang Yanhai's firewall is based on the principles of computer viruses and the genetic map of the ball python. Of course, the genetic map of an organism cannot be the same as a program.
What Jiang Yanhai said was that the variation rule of his viral firewall was based on the variation rule of the gene map of the ball python.
Because the ball python has 5,000 independent variants, tens of thousands of gene combinations, and the gene map of each gene combination is different.
If other people do not know the law of mutation, then it is difficult to crack it. From another point of view, it is not impossible to forcibly crack it. For a supercomputer like Sunway TaihuLight, you let it calculate with all its strength. If so, it is not impossible to calculate.
But how many kinds of creatures there are in nature, can you count them all? Modern computing power is not so perverted yet.
The reason why this firewall is a virus firewall is that it is more like a super virus, but it is a little larger in size. It first infected all the important permissions of the entire system without any mistakes.
Whenever any other virus or remote control tries to invade it, it will immediately release two super Trojans, one is an anti-tracking program, and the other is to directly eliminate the invading virus or Trojan program.
If it is found that the intrusion of the other party is extremely powerful and cannot be organized, this Trojan program will directly violently destroy all the databases of the entire computer, and repeatedly erase and write the important data areas of the hard disk thousands of times in an instant.
Even if you remove the hard drive in reality, there is no way to recover the data inside.
Moreover, it has real-time alarm capability, borrowing modern powerful communication network, once such a problem occurs, it can transmit the alarm to the electronic warfare countermeasure program at any time.
This thing can be regarded as a powerful computer firewall that Jiang Yanhai has nothing to fiddle with. It can also be said to be a super virus.
If it is connected to the electronic warfare countermeasure program, if it has an electronic warfare countermeasure program, it does not know how many times the calculation amount of the Sunway Taihu Light, it is invincible!
This integrated attack and defense firewall is a relatively complete program written by Jiang Yanhai, many times stronger than the program he just started experimenting with.
Of course, there is another advantage. It can be saved in the electronic warfare simulation battle program. That is to say, Jiang Yanhai can use it at any time, and can connect any electronic device around him to use it directly.
And when you turn on the computer, you don't even need Jiang Yanhai to operate it himself, just connect the electronic warfare auxiliary program to remove the firewall instantly.
Copying all the blueprints inside, and just about to contact Professor Xiang, Fan Tianlei's phone rang.
"Yes!" Fan Tianlei picked up the phone and his face became serious. After listening to the content, he answered a word neatly, and then handed the phone to Jiang Yanhai.
Jiang Yanhai was a little puzzled, but took the phone over.
"Comrade Xiao Jiang, are you good at breaking programs, in the computer field?" There was an old man's voice on the phone.
"Forget it." Jiang Yanhai paused for a while, he probably guessed something, it should be the system problem of the stealth unmanned fighter.
"You are now driving your J7 and flying directly to the airport where you were in Rongcheng last time. Someone will pick you up and you have an important task."
"Yes!" Jiang Yanhai stopped talking nonsense when he heard the task, and responded quickly.
*************
PS:...Brothers, I'm about to be caught up...I ask for a monthly pass, ask for a monthly pass, and ask for a monthly pass! 10 more today! ! Come in the afternoon! I haven't been out for a month, so I'm coding at home. For such hard work! Ask for a monthly ticket!