Rebirth Online Entertainment

Chapter 62: Half-Life

Chapter 62: Half-Life

This news has just been released and immediately attracted the attention of people in the industry. 【

Love Shang Reading Network] And, soon, this news spread to all over the world.As for the major domestic portals, they finally reacted.Hastily adopted technical means to block Microsoft's e loophole.Of course, several major portal websites would not admit that Trojan horse program even if killed.

Anyway, no one has seen it, and ordinary netizens must not understand what Trojan horses are or are not.However, the major portals can deceive many netizens, but they cannot deceive the market.The stock price of Nasdaq Sina, when the market opened that day, instantly plummeted by 15, and billions of dollars were wiped out.

The most serious thing is not Sina, how to say Sina is also a victim.The source of damage to major portals such as Sina is Microsoft.Now that the cold winter of the Internet has not yet passed, Microsoft's super-large loopholes have once again exploded at this time. Investors who own Microsoft stocks have lost confidence in Microsoft and have sold their stocks for a while.If it weren't for the mysterious funds backing the market, I'm afraid Microsoft's market value would disappear within a day13.But even so, at the close of the day, Microsoft also fell by 17, which was a small warning to Microsoft.

What made Chen Jiayi dumbfounded the most was that Microsoft actually held a press conference after the incident that day.It is said that Microsoft is preparing an operating system fund in order to maintain Internet security around the world.What it says in writing is confusing, but it is actually asking computer experts all over the world to catch bugs for Microsoft.

Moreover, this press conference, as soon as Chen Jia knew about it, was held specially for him.

Microsoft wanted to send an email to Chen Jiayi, but the intrusion method used by Chen Jiayi at that time, they couldn't crack it at all. The p address corresponding to the received email was actually their headquarters.Now that Microsoft has exploded another super big bug, the loss to Microsoft's personal interests is simply incalculable.Looking at it now, the $1000 million that was given to the hacker at the beginning seems to be worth it.

However, Chen Jiayi was not interested in Microsoft's press conference.For him now, that 2000 million dollars can no longer attract him.His plan is too big, without a scale of billions or tens of billions, it will not work at all.Therefore, Chen Jiayi didn't bother to catch bugs for Microsoft.

Now Chen Jiayi appeared at the hacker alliance headquarters, explaining the specific knowledge of the firewall to the members.

"I don't know if there is anything you don't understand. If there is, you can raise it now and we will solve it together."

After getting along with the members of the alliance for a long time, Chen Jiayi probably understood the strength of the members of the alliance.These members have relatively rich means of intrusion and are relatively experienced.However, Internet intrusion technology does not only refer to intrusion, it also has an important technology, that is, protection technology.Strictly speaking, as a top hacker, his protection technology must be better than his intrusion technology, otherwise, he will not be able to protect himself, even the White House and the Pentagon have been successfully entered by you.However, when entering, you are also exposed to the eyes of others.

Obviously, the defense capabilities of the alliance members are not good enough.This is also why jk broke many meat machines of the alliance members one after another without much effort a few days ago.If the protection measures are done well, even if others can crack it, you can also know it, so you can cut off all contact with the meat machine first, so that you can live freely in the network.

The firewall is the most important means of protection.

Even the top hacker needs the protection of a firewall.The same is true for a master of technology like Chen Jiayi.

"I have a question about the filtered data item."

At this time, Xiaobai, a member of the alliance, asked Chen Jiayi a question.

"Well, tell me, everyone is here, we can discuss together."

Chen Jiayi has good skills, and he is also explaining to them as a consultant.However, Chen Jiayi is easy-going, and he is not arrogant about his talents. Even if these alliance members are not as skilled as him, Chen Jiayi still talks to them in an equal capacity.This kind of small action has enhanced the goodwill between the members of the alliance and Chen Jiayi.

"The data setting of the firewall may not be very good on my side. If the setting is too strict, some normal data will be completely isolated. If the setting is too loose, some illegal data can easily enter."

Xiaobai described the problem in detail, and hoped that Chen Jiayi could help him answer it.

Firewall technology is actually isolation technology.

This isolation is the isolation of data.For normal data, the firewall will open the door to him, and for abnormal data, the firewall will isolate him.However, as a hacker, when he wants to invade, he must disguise himself.Some seemingly normal data are actually illegal data packets.If you put him in, you will be successfully hacked by this hacker.

"As for isolation technology, this is an issue that has been discussed all over the world. However, based on the analysis of the data left before, we don't want to imitate a different way of thinking..."

After all, no matter how clever the isolation technology is, it has its shortcomings.The so-called Dao is one foot high, and the devil is one foot high.If you always focus on this isolation technology, even if you can successfully protect it now, it will still be easy to be cracked in the near future.Chen Jiayi's point of view at this time is the most advanced firewall concept in the future.

"So that's the case."

After Chen Jiayi focused on explaining this latest theory for an hour, the alliance members finally came to their senses.It turned out that most of the members only felt that although this concept seemed very novel, it was too empty to be implemented in practice.Now after hearing Chen Jiayi's explanation, they all came to understand.I also resolved one by one at this time about the content that I felt a little confused before.

"If everyone is clear, starting tomorrow, we will work together to build a firewall of our own."

To build a firewall, Chen Jiayi had two purposes.

One is to cultivate members of the alliance, and the second purpose is to really want to make a super firewall for Chinese people.

……

Tang Dynasty Network.

"Xiaoqiang, how is it? The current progress is not bad."

The 2 engine with particle system and perspective technology has been added, and the task requirements have been greatly increased.Fortunately, Tang Dynasty Network also recruited a large number of programmers during this period, so the construction period will not be delayed.

At this time, Tang Dynasty Network has already left work, but many employees are still concentrating on their work.

Chen Jiayi knew that for them, it was a kind of pride to develop a Chinese 2 online game.Before the recruitment, many employees—Mao Suizi—joined Tangchao Network in order to participate in the research and development of this product.Therefore, there are many employees who basically forget to work day and night.

In this situation, Chen Jiayi was delighted, but secretly worried.But he knows that a lot of programmers suffer from various problems because of such hard work, and their health is worse than that of otaku.

"It's all off work now, everyone should take a break. How about, let's play a game."

Chen Jiayi clapped his hands, motioning everyone to stop what they were doing.Then he asked Zhou Xiaoqiang again, and said, "What games do you usually play?"

"Half-Life."

Speaking of games, a large group of employees got excited and said in unison.



Aishang Reading Network]

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like