Remember [69 Chinese website] in one second, wonderful and free to read without pop-ups!

When he came over, a program popped up directly on this screen. After he came over, he started to write input on this screen without any hesitation.

People in the back want to ask, but they don’t know what to ask, because at this moment, the 12 screens in front of Jiang Yanhai soon began to display different content, and these data codes are still changing, Jiang Yanhai has been very excited. state.

"Yes, yes, this virus bomb is playing tricks. See what this means. If it is obtained by other countries, this thing is hidden in the other party's scientific research network, trying to keep stealing information back?"

"But, little thing, hehe, let me see where you hide, don't you know that the entire system is infected by my virus now? Do you want to get in? Why, disguise normal system files? Sorry, back it up, It's useless."

With a "pop" hitting his carriage return, watching a progress bar on it started, he had turned his back and started operating another program.

"Small, chaotic file order? No way, you have no chance."

The speed of Jiang Yanhai's hands is simply overwhelming. I have to say that this super virus is a bit interesting. This shows that it has been released long ago, and it has multiple functions.

For example, one of the viruses tries to get into the supercomputer and hides it in its system. If there is no accident, it is definitely not a simple destruction, but an attempt to steal data.

But if you try to kill it, it will start to destroy it frantically. A typical destructive mutant virus can pretend to mutate, but now the firewall of the entire supercomputer has been replaced by Jiang Yanhai. It doesn’t want to sneak in. It's that simple.

Several other computer viruses have different functions. For example, they try to get in and rewrite the original program of the drone, that is to say, destroy the original appearance of the program, so that you can't get it at all. In addition, they try to directly overload and destroy some hardware.

It is not difficult for software to destroy the hardware. It directly destroys the BIOS, burns the user's motherboard, and catches a lot of computer virus and Trojan horses on the hard disk.

And these things are almost hidden in it, and the strength of these viruses, to be honest, is very powerful. After forcibly locking these viruses, Jiang Yanhai directly started to catch the virus, and forced it to decompile the shell to see what its inner shell program looked like.

Seeing more computer viruses is also conducive to your own technological progress!

The electronic warfare program has directly backed up all these viruses. The supercomputer is cracking them. According to the current operation speed, the electronic warfare program can be used for a little assistance. Well, it can be cracked in about two hours at most. NS.

This speed is already very fast. These viruses must come from the hands of experts. If the entire UAV system really has an autonomous combat system, then the author of this system is definitely a genius!

Or at least this team is a genius! It is not surprising that such a person makes such a virus.

For such an unmanned stealth fighter, you don't need to think about it. Lao Mei must have all kinds of protective measures.

In two hours of cracking time, these viruses are constantly being cracked, but solving the entire UAV system does not have to be so troublesome.

Although these viruses have brought some troubles, it is absolutely impossible for other people to touch the UAV system until these viruses are resolved.

And if they crack it forcefully like that, it is estimated that the files in the UAV's internal system have already been damaged by that time. It is estimated that the entire hardware has been damaged. Now the hardware inside is also a very good thing.

These hardwares don’t say anything else. Even a stealth fighter like a drone has a limited size. It can produce such an excellent computing program in such a limited volume. This in itself proves that Lao Mei is in the computer field. Really bullshit.

But any Niucha program needs Niucha's hardware to support, and the domestic hardware...Forget it, the gap in this aspect is even greater.

From materials, to production, to architecture, all aspects are lagging behind. Although Warwick is progressing, it is only a chip that Warwick is progressing.

The chip has various effects according to different uses, different architectures, and different instruction sets.

The simplified instruction set that IBM is best at, the complex instruction set that intel is good at, these different CPU architectures have their own advantages in their respective fields, and there is really a big gap in this aspect in China.

And these gaps also depend on the future, whether it can catch up in the field of quantum computers, because that thing is a new kind of computer technology, unlike the current traditional computer technology, the country has fallen behind too much and wants to catch up. It's really tough.

Moreover, the current manufacturing instructions of the chip have also fallen into a certain limit, and it is difficult for the latest lithography machine technology to break through the limit of one nanometer.

Unless the next-generation technology obtains the purple hybrid laser etching technology, there is no breakthrough in this area of ​​research abroad.

So what is the style of the hardware inside, they still don't know exactly, if the software is cracked, then the hardware can be disassembled.

Two hours passed quickly. After Jiang Yanhai completely cracked these viruses, he immediately checked them carefully. After checking, Jiang Yanhai nodded. The virus design is a bit interesting, but there is not much. Metamorphosis, to be honest, it's not as good as his anti-tracking program virus metamorphosis.

But if this virus is released to the outside world...it's not easy to say what level of estimation, it has a strong self-adapting ability, and the difference of some operating systems can no longer limit its infection.

However, it was originally a kind of double insurance when people put it here, and this virus has been cracked by him. The rest is simple.

The drone operating procedures opened the door to him!

Completely package the entire operating system~www.wuxiaspot.com~Jiang Yanhai directly started copying all the programs. At the same time, when copying, Jiang Yanhai carefully checked and made sure that any restrictions on copying were lifted before he started copying. .

The huge programs are very large. Although they are directly transmitted by optical fiber, the writing speed of the hard disk is limited, so the data copying also takes several hours.

"Finished! The main drone operating system has been copied, but your guess is correct. In this drone operating system, there is indeed a set of autonomous combat procedures based on the fighter's sensors all over the body. "Jiang Yanhai turned his head and said to all the old professors behind him.

These professors became excited in an instant, "Really? It's done?!"

"It has been completed, but I suggest that your supercomputer should not be connected to the outside world for the time being. After you figure out the entire program, I have already cracked the core part of the entire operating system, and you can view all the source codes. "

Jiang Yanhai nodded affirmatively.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like