Super-brain hacker

Chapter 466 Famous Master

For technicians, the easiest and fastest way to win their respect is to conquer them with technology and let them know that your technology is better and more powerful than them.

Although many people don't understand the underlying principle of technology mentioned by Lin Hong, they know that it's just that their level is not enough. There is a saying that "although it is unclear, it feels fierce" is exactly what they think at this moment.

That Liu Hui was happy with Lin Hong at the beginning, but now he found that the other party was not speechless by himself, but disdained to argue with him at all, because his grade was too low. This made him feel a little feverish and felt that his previous behavior was quite childish. He smiled at Lin Hong with a smile.

Although Liu Hui is a little rough and likes to show the limelight, he is still quite convinced of the really powerful people and has to be convinced.

With Lao Wang's admiration and Liu Hui's comparison, Lin Hong immediately established the image of a technical master among the crowd.

According to Lin Hong's description, Bit messenger is an artifact. With this thing, you don't even need to open external services. You can directly specify the port, and the other party has no way to invade.

That is to say, those two servers are not useful at all. What information does the headquarters want to send? Lin Hong can write a small tool later and send it directly. It can not only spread information, but also spread files and file sharing. Don't be too convenient.

Captain Qian thought for a moment and hesitated, "This thing is good, but in this way, won't we be invincible?"

Lin Hong nodded: "In a sense, you can think so."

"This...isn't it good?" Captain Qian was a little uncertain. He always felt a little cheating. "According to the regulations, our battle plan should be placed on the server, and we should be able to be accessed by the headquarters."

The person who specified this regulation did not expect that there would be the possibility of an anti-sky software such as bit messenger. It is just inertial thinking that other companies must be connected to a central node if they want to obtain files from the headquarters, or use WEB services or FTP services. But I never thought that it could be transmitted directly point-to-point.

Lin Hong was a little helpless: "This thing is public. You can't use it just because it can't be used, right? Besides, they can use it if they want to. If you use this, then fight for other technologies!"

In fact, Lin Hong really wants to say that this is an exercise, not a performance. What's the point of always acting according to the script of the director's department?

If the other party is really good at it, it is not impossible to get the file.

In the end, Captain Qian was persuaded by Lin Hong.

Of course, the server still needs to be set up, and the real files are also put in it, but the service will be opened as few as possible. Open a port that no one else has ever seen, so that they will have a headache.

The modification of the bit messenger naturally fell on Lin Hong. Here, only he knows this, and even Lao Wang can't stand it.

After setting the tone, everyone began to be busy.

Install the system, patch the patch and modify the software.

Ouyang Chuchu watched Lin Hong very skillfully open the compiler in his laptop, and then began to make targeted modifications to the source code of the special messenger.

She saw that Lin Hong's system seemed to be more advanced than others.

"Lin Hong, what system is in your computer?" Ouyang Chuchu asked curiously.

"LINX." Lin Hong skillfully tapped the code and said, "Cisely speaking, it's an upgraded version of LINX."

"LINX? Can LINX still be used on notebooks? Ouyang Chuchu was very surprised when he heard this.

She had seen the LINX in the tank fire control system before, and marveled that it was easier to operate and powerful than the original fire control system, but she did not expect that the LINX could be installed on a notebook, which was no different from the general system.

"Of course. INX is both a real-time operating system and an embedded system. Theoretically, as long as it conforms to a certain structure, it can be installed, but it needs targeted improvements and drivers. Lin Hong patiently explained, "The system I use has undergone my major modifications and added a lot of functions that LINX did not originally have, so I called it an upgraded version of INX."

Lin Hong's explanation is very simple. After all, Ouyang Chuchu is not a professional. If she talks about some content such as "task scheduling" and "memory management", she must not understand.

Ouyang Chuchu looked around for a while and saw that Lin Hong was like flying, skillfully entering the code. Basically, there were few mistakes, and the whole process was flowing, as if he was making a work of art.

She has never seen anyone write code to this extent. In their research institute, there are also some computer engineers who often write industrial control systems and so on, but when they write code, they are always intermittent. Sometimes they check information, sometimes debug to find bugs, and they are very busy.

How can it be like Lin Hong here now? It seems that all the code has been remembered in his own mind. Just type it again and again.

Lin Hong directly modified the bit messenger after three or five dictions.

Although he has not contributed code to the Bit messenger project for a long time, he has been using it and has added a lot of functions on the original basis. Of course, he did not make these functions public, but chose to use them himself.

He has been able to make a lot of contributions to the open source society of the original bit messenger. Now the code maintenance work of the bit messenger community is also going smoothly. He no longer has Yiwu and there is no need to continue to contribute code.

After Lin Hong fixed a few bugs, he directly ran the bit messenger.

Its appearance looks similar to the current OICQ. In fact, this interface has been available for bit messenger for a long time. It is estimated that ICQ has referred to the interface design of bit messenger before.

After testing for a while, Lin Hong suddenly remembered a problem. This client is now for domestic users. Many people may not understand English. Now it has an English interface, and it has to be re-Chineseized.

After thinking about it, Lin Hong directly separated the phrases and descriptions involved in it, and used the search and replacement function to do it in a short time. Then he directly told Captain Qian and found a second lieutenant to help translate it into Chinese, which directly corresponded to these phrases.

Among them, the most heavy work is to write instruction manuals. After all, this thing should be used by other people. Many of these people are not technicians. The way of thinking is completely different from that of technicians. If you don't write it clearly, you can't imagine how they will understand the software.

When Lin Hong was idle, Ouyang Chuchu seized the opportunity to ask the doubts in his mind.

"Lin Hong, is the software you mentioned really so powerful? Why can't it be intercepted? Absolutely safe?"

"Absolute safety is naturally not enough, but the price paid to intercept is too much, much higher than what he gets, and it also depends on luck. The gains outweigh the losses, so basically, few people will do it."

Ouyang Chuchu continued to ask, "Why do you seem to know everything? How do you know this knowledge? I don't think you even know Lao Wang.

"I stayed abroad to study for a few years,..." At this point, Lin Hong suddenly shut up. He turned his head and looked at Ouyang Chuchu. Seeing that her eyes were a little shining, it seemed that her heart was shining, and he suddenly said secretly, "Well... do you have nothing to do?"

Seeing him like this, Ouyang Chuchu's face turned slightly red. He quickly adjusted his mood, sorted out his expression, and said, "Yes, why not? I'm here to investigate and learn the information confrontation level of the Red Army... Although you have this bit messenger, I remind you not to be careless. Among the people invited by the Blue Army, there are teachers and talented students from the School of Computer Science of Shuimu University, all of whom have long been famous and are very powerful!"

"Oh?" Seeing that she was also a little interested when she talked about the Blue Army, Lin Hong couldn't help asking, "What kind of masters are there?" Let's talk about it"

"There is no comment!"

Blue Army Base.

The Blue Army's computer room is obviously much more magnificent than that of the Red Army. With the factory-style structure, the machines are all visited in the middle, and it looks much more high-end than the Red Army's.

On the side of the computer room, the Blue Army Information Confrontation Brigade is also discussing issues similar to that of the Red Army.

The meeting was presided over by a man in his thirties, dressed in Zhongshan, with three or seven-cent hair and a pair of thick glasses.

He is Professor Li Yushan, the teacher of the Network Center of the School of Computer Science of Shuimu University mentioned by Ouyang Lanlan.

Professor Li Yushan is the head of the network center. He has a lot of research on network security and is quite famous in the field of domestic network security. Ordinary people may not be him when they hear his name, but he must be like his network ID "Deep Mountain Red Leaves".

Deep Mountain Red Leaf is best known for patching the system and launching a virus killing program. You can often see people discussing his tools in domestic security professional forums.

Sitting on his left hand side was his proud disciple Ding Huáhui.

Similarly, for technical experts, their names are not famous, but their network IDs are famous

ACE is Ding Huáhui's network ID. His ID can be said to be even more famous than the ID of Shenshan Hongye, because he is the founder of Shuimu BBS. Basically, people who pick up BBS have heard of his name.

Both of them have been famous on the Internet for a long time, and their technology is also quite powerful, especially in the deep mountains and red leaves. They have been immersed in network security and disease research for a long time. Lao Wang's wild road is too far from him.

In addition to them, Lan Jun also invited several famous masters in society.

It can be seen that Lan Jun's confrontation with information security this time is bound to win.