Super-brain hacker

Chapter 465 High, really high

The operating system determined is a server system. It does not mean that all systems use FREEBSD. This is not necessary. After all, everyone has their own familiar systems. It is not worth the loss to force them to use this system.

Which one you are good at, on your own machine, or on your own machine, but the security still needs to be strengthened. Don't let others invade your computer, and then use it as a springboard to invade the server.

Therefore, Liu Hui has nothing to do. Other people use WINDOWS computers, which are mainly reinforced by him.

The installation of the system was handed over to Lao Wang, Lin Hong and Xiao Jiang. After all, only three of them know about the system.

Next, we will discuss the internal information communication system.

This is also one of the regulations this time.

After all, when the system is up, it still needs to communicate and exchange data. Otherwise, all external network services will be turned off, only the one-way function of external access will be retained, and it will be used as a stand-alone machine. Even if the best technology is, there is nothing we to do about it.

Since it is an exercise, it is natural to have the appearance of an exercise.

The combat data of both sides, placed on the server, needs to be read and written by the headquarters, and can also be used through this system to release messages to other departments for communication.

In this exercise, there is also a director's department. These people also asked professionals to monitor the full name. They will monitor the data flow in the network through the network node. At the same time, they will also check whether the servers of both sides have been connected to the network at any time, access them through the permissions of the headquarters, and whether they can Pieces, write data, etc.

If an abnormal situation occurs, they will send someone to understand it. Once they find that someone has violated the regulations, the corresponding score will be deducted.

This set. It was completely moved from other exercises, and it is also very useful. Anyway, the general principle is like this.

Liu Hui said again: "Why don't you use OICQ directly? This software is easy to use and communicates in a timely manner. What news do we want to post? Just communicate with them online directly on the client.

He is right. OICQ is indeed more convenient, and it is currently the best in instant messaging in China. It is very convenient to contact others.

However, after all, this is a military exercise, directly using such a civilian product. It violates the basic principle of confidentiality. The messages on OICQ are relayed through the software company's server, that is to say, the other party may leave a backup of all messages. For them, this information is transparent.

And military information is very strictly confidential, and it must be against the principle of confidentiality to expose the information directly to their eyes.

Only on this point. Liu Hui's plan was directly rejected.

Xiao Jiang said, "You can consider WEB services. We have also set up a simple BBS before to publish information, which is also very convenient.

Lao Wang said, "If you set up a WEB service. I prefer to use FTP services. Relatively speaking, FTP is much safer than WEB services.

WEB service, commonly known as website service, through such a service, opens 80 ports to the outside world, and others can use the browser for direct access.

This is indeed more convenient, but it has the most vulnerabilities. Many so-called hackers actually show off their technology by invading the WEB server.

Although these technologies are likely to be very low-end, they are very direct because of this method. Modifying the web page code can represent that you have occupied the website, so it is popular with many beginners.

To set up an FTP service, the FTP protocol is used, a file exchange protocol that requires the use of specific FTP software to access. And strict permission control can be carried out. Relatively speaking, the threshold of intrusion is higher than that of WEB service intrusion, and the security is also higher.

Lin Hong said directly, "I suggest using a bit messenger."

Bite messenger?

Many people directly showed a huge question mark in their eyes, and only Lao Wang thought about it.

"This is also an instant messaging software, which is much more secure than OICQ." Lin Hong explained.

As soon as Liu Hui heard this, he immediately said, "Cut~~ I thought it was a good thing. It turned out to be such a software. No matter how good the security is, isn't it still fatally injured by instant messaging software?"

Other people also have this doubt.

Lin Hong shook his head: "The bit messenger is based on point-to-point communication. There is no centralized server, and it is almost impossible to monitor it. It is very safe."

The core code of this software is written by himself, and he is naturally very clear about it. Although the bit messenger has been upgraded many times, the core code, principles and encryption algorithms have not changed.

"Are you kidding me? How does the instant messaging software run without a central server? Besides, how can it not be monitored? If there is such software, it won't be messy!" Liu Hui retorted.

Lin Hong glanced at him, but said nothing more. He has no interest in continuing to explain to the other party.

"I've heard of this software." Lao Wang interrupted at this time, "Its principle is very complicated. I have studied it before and I don't quite understand it. However, Lin Hong should be right. The design of this software was specially designed for encryption. There is no centralized server, and the encryption features are also very strong. In the foreign hacker world, this software is very popular, and even many famous security organizations use this software for communication.

As soon as Captain Qian heard Lao Wang's words, he became interested in the software of Bittel messenger.

"Comrade Lin Hong, can you briefly introduce the basic principles of this software?"

I don't know anything about this software. Captain Qian wants everyone to see if this software is really reliable.

So, Lin Hong explained directly with chalk on the small blackboard in front of the conference room.

The people sitting are all technicians, and they have a certain level. He also skipped some basic concepts and knowledge directly, and only introduced the core principle of the bit messenger.

"...The principle is basically like this. Moreover, this software is open source. If we want to use it internally, we can modify it slightly to limit the range of the network segment, so that the data flow can only flow on the internal network without external exchange, which can ensure maximum security.

After Lin Hong finished speaking, he looked back at everyone and saw that many people were confused in their eyes. For what he said before, it was basically only a little understanding, and it seemed that he didn't understand.

It's Lao Wang, because he has studied it before, and now after Lin Hong's explanation, he suddenly has a feeling of enlightenment.

"High, really high!" Lao Wang praised, "The author of this software must be a master of computer science and cryptography. It is hard to imagine that his research in this area so many years ago has reached such a scientific integration of these two disciplines!" ( To be continued. If you like this work, you are welcome to the starting point () to vote for recommendations and monthly tickets. Your support is my greatest motivation.)