Chapter 10 Upgraded version of smart housekeeper
Even in key secondary schools, which occupy a relatively large area, these regular sports facilities still cannot meet the needs of all students. The last two classes on Thursday afternoon happened to be Xue Yunchu's physical education class, and it was usually difficult for freshmen to grab the basketball court, so there was enough space to play. Physical education class is originally a course for students to relax, in addition to meeting the standards in the examination, this course is not included in the college entrance examination project, so the physical education teacher is quite loose with them, leading them to do the necessary warm-up exercises, and ran around the playground three times, their physical education teacher Fang Ming let them play by themselves, of course, it is necessary to remind them of safety, so Fang Ming is also with them to prevent accidents, he didn't care much about playing basketball and table tennis, and focused on reminding a group of guys who play football, Because the place where they play is quite close to the place where the sports students train, especially a few shot put.
Xue Yunchu's predecessors were relatively proficient in these three types of balls, and their motor nerves were relatively developed, not to mention now. Originally, I wanted to play table tennis for safety reasons, but the people who played basketball didn't make enough teams together, and he was relatively tall, 1.77 meters, and he was still tall among the freshmen in high school, so he was pulled over. Originally, it was used to make up the numbers, but who knew that after watching him skillfully dribble and then go to the basket, I knew that he was also a frequent player.
Chen Lin, the squad leader, is also from the urban area and is still relatively proficient in basketball. He and Xue Yunchu cooperated in pairs and played a lot of wonderful goals. Others are not so good in technique and not tall enough. Although Liang Cheng, a labor commissioner, can also be called a big man, he was born in a rural area and rarely touches basketball, and what he can do is to grab rebounds and other jobs. And quite a lot of common rookie mistakes such as three-second violations, walking, etc., are just playing together, no one will take it seriously, and there is no saying that 5 fouls are out of the game.
When playing, time flies, and the time of two classes passes in the blink of an eye. Xue Yunchu remembered that today was the time to release a new version, and there were some new features added, so he decided not to come to the evening self-study.
"Chen Lin, I have something at home tonight, and I can't come to self-study at night, help me take a leave from the teacher," he said, picking up the sportswear that was put aside.
"Got it, go ahead." Chen Lin replied loudly, while putting a ball into the basket, "Okay, class is over, gather back" beckoned everyone and walked towards the center of the playground.
The number of people was reported to the physical education teacher, and then they disbanded, and the day passed without a sound.
Back at home, Xue Yunchu packed up a few things, cooked a meal, finished eating, turned on the computer, and called up the core program of the smart housekeeper, saying that it was an upgrade, but in fact, it was to unlock the lock in the core program and make it possible to remove the damage to the computer system caused by malicious programs. Since it was the first time that such technology had been used at this level of social development, he had not yet estimated the enormous impact of lifting such restrictions on today's Internet. According to his original intention, he wants to use this kind of software as his eyes and ears in this world, and when this intelligent software uncovers the last limitations, he can silently search for important information on the computer and send it to the designated place, and this simple Trojan function cannot be discovered by others, which is the most terrifying. This means that any personal computer or server connected to the Internet cannot escape its eyes. Think about it, a software that can eliminate all attacks and viruses can appear as a protector, but in fact it is the biggest mole, and how terrible it is to pay more and more attention to privacy today. In fact, many formal software now has the potential to collect customer information, represented by the well-known Microsoft backdoor case. However, if individuals are highly aware of security and have effective protective measures, these software and systems are at risk of being discovered, so that they cannot afford to bring consequences. Therefore, these easy-to-leak software will not be used in key national departments.
When I came to the last forum, I saw that my text message box was full of messages, and if it weren't for the limited protection, it would have exploded. Most of them ask about the next version upgrade, some ask for the source code, and some ask if they have other features. Xue Yunchu swept it roughly, opened a post in the old place, and posted this version. Look at the original post has been downloaded more than 100,000 times,
It's still too little, and it's less than a fraction of what the number of computers there are in this human society. He shook his head, and then noted in detail the upgrade function of the software below the post, not only the newly developed function of checking and killing viruses, but also the system functions such as organizing the disk and cleaning up junk files have been optimized, which can be solved in a very short time. It also has the ability to determine the potential hidden dangers of hardware and software. This time it was a big step forward, and it also had to do with his eagerness to promote the software. In this social situation, whoever has more information resources will invisibly occupy an innate advantage. In order to avoid arousing excessive suspicion, he has significantly postponed the release of this software.
After Xue Yunchu posted, the number of views rose rapidly, and the number of replies quickly broke through the limit, so that many people reopened the discussion post. However, what makes them slightly dissatisfied is that no matter what questions are asked on the post, this publisher X1240 never answers, let alone release the source code.
The reason why Xue Yunchu did this was naturally to avoid people finding a trace of him and checking his real IP? His computer has the final enhanced version of the intelligent software that has just been released, and in addition to all the features of the final version, he also has the ability to defend himself against the attacker and quickly track down the attacker. In the process of uploading, multiple camouflages have been carried out, such as "springboard" frequency conversion IP and other technologies currently circulating on the Internet. It also has one of the most powerful weapons, which can spontaneously generate sequence-free ultra-large data groups at any network node that can be reached, and directly annihilate all incoming and outgoing data groups at this node, which is not an exaggeration to call it a data bomb. The principle of this weapon is unknown to anyone, as it involves the use of the resonance between the underlying physical propagation medium carrier and the electromagnetic signal itself. For example, sound can travel through the air, and the waveform of the sound acts directly on the air where it travels. It is like a stone falling on a calm water surface, forming ripples that pass into the distance, and in the process, the originally calm water surface folds. The signal propagating in the network cable or optical fiber itself has a very small impact on the propagation carrier, and the software can use different combinations of signals to stimulate this effect, so that new unknown data is generated again out of nothing in the propagation process. That's one of the things that came its way.
This upgrade software has lived up to expectations and has a series of long-awaited features. Many enthusiastic netizens downloaded the trial for the first time, and they were pleasantly surprised that in addition to the different forms of housekeeper images at the beginning, after the trial, their system ran more smoothly, and they also pointed out that their hardware facilities had compatibility problems, and those life was shortened, which surprised them and was also curious about the magic of this software.
But despite this, most people are still skeptical of what he said that he can detect and kill all viruses, and a few ill-intentioned guys also posted attacks on the author's grandstanding, which naturally has been counterattacked by many netizens who have initially fallen in love with this software. However, what disappointed them is that no matter how lively the forum is, there is no response from the author to post again, and some of those who want QQ and videos are even more disappointed.
Wang Xiaoqiang is a second-year junior high school student. During the summer vacation, when he first came into contact with computers, his father pulled on the network cable at home because of his work needs and opened a Netcom account, which gave Wang Xiaoqiang an opportunity to experience a colorful online life. Although school had already started, his father was quite enlightened, and after asking him to complete his homework on time and review his homework, he was allowed to use the computer for an hour before going to bed. At the point, he didn't want to sleep and had to sleep, because it was set up to shut down at a time, and the computer given to him was only set to give him a user account with very low permissions.
Wang Xiaoqiang's father naturally won't do this, as a real estate boss over 40 years old, it is a little difficult for him to learn these things again, not to mention that he only needs to send and receive some emails, hold a few video conferences, and go to the Internet or something. These are all configured by the after-sales service provider. However, there is a very strange pattern among the computer user base, the good technology often uses the lower configuration of the computer, but the rookies in their mouth are all the top configuration. Wang Xiaoqiang's home computer is two high-end configuration brand computers, whether it is the CPU frequency, or the motherboard, memory capacity, hard disk, all of which are the highest configuration that can be seen on the market.
However, unfortunately, Wang Xiaoqiang's two computers were targeted by the scanning "little blacks" on the first day they connected to the Internet. Rookie and: "Little Black Black" is a relatively level, and quite ethical computer technology enthusiast has no computer security awareness and technology, as well as some technology, on the use of commonly used hacking tools to infringe on personal computers of the entry hackers respectively. Generally speaking, the more sophisticated hackers disdain to attack the computers of ordinary people, except for some hackers who specialize in stealing important information.
Qian Yun is a hacker who has just started, and her skills are not very good, she knows that she can't make some website servers into broilers, so she focuses on individual users with high-end configurations. Most users in China have a weak sense of computer security, often their machines are hit by countless Trojans, and they don't know that when the computer is so slow that they can feel like they want to kill it. There are also some people who are unwilling to use paid antivirus software, and the cracked version often cannot be upgraded in time, once or twice to use it, it is okay, for a long time, and it is annoying, simply ignore the intruder, as long as it does not destroy my system and hardware, you can do what you want. I don't have any important information in it anyway. And with the popularity of video chatting and the application of cameras, there have been cases of couples being blackmailed by people hundreds of miles away. Actually, it's not complicated, a couple's computer is facing the bed, and the camera is facing the head of the bed. It just so happened that a person controlled his computer with remote control software, and it happened that they did it when the computer was still on the Internet, and it happened that the ** person was excited about the idea of blackmail, so something that seemed unbelievable to them happened.
So rookie Wang Xiaoqiang fell under only a few attacks from Xiaohei Hei Qian Yun and handed over the chastity of the first use of the computer. As for Wang Xiaoqiang's father, because his computer has some important company information, the company's network security consultants have installed quite complete security protection measures in their computers. And Wang Xiaoqiang's father is too lazy to spend an extra amount of money to use the same security measures on his son's computer, not because he has a clear distinction between public and private, but because he is reluctant to pay thousands of yuan for a set of security software. In order to save face, he can configure the same high-end for his son at the same time, but he is stingy with spending money in places that others can't see, which can be described as a typical mentality of nouveau riche. If you can save it, you can save it, anyway, there is nothing important on my son's machine. Therefore, Wang Xiaoqiang was "hit" without exception.
Qian Yun looked excitedly at the results of her first attack, and she had already obtained the highest authority in the system, and she browsed the computer configuration without Wang Xiaoqiang's knowledge. It's not better than not knowing, it's more frightening. Wow, what a powerful configuration, and then look at her own assembly machine that is making a "woo" sound, mainly configuring an assembly machine with a life span of more than three years, she is getting more and more depressed. This broiler must be occupied. Thinking that she opened a back door, and then "kindly" patched Wang Xiaoqiang's system.
It took a long time to finish all this, and Qian Yun began to enjoy the results of this time. Let's take a look at what's on his hard drive.
"Good Dongdong" didn't find it.,I found a lot of naked girls with colorful pictures.,It's also hidden under the subfolder of the system folder.,There are several layers of subfolders before and after.。 She is angry, her eyes are full of gold stars, there is no need to guess, this is a rookie uncle-level guy who behaves dirty. Without thinking much about it, she knocked out an order, deleted all these things, and left a document in his original place, and typed a sentence: "Uncle pervert, I will shoot you on behalf of the people," and then, Qian Yun, who had made a bad luck, did not do anything, and directly changed Wang Xiaoqiang's account password, and also turned off the machine for him.
Wang Xiaotian, who was excitedly chatting with his classmates on QQ, suddenly found that the words "turn off" flashed on the screen, and he was stupid. When he turned on the phone again, he found that the prompt password was incorrect, and he was depressed and saw that there was still a while before the time to go to bed, and he didn't dare to ask his father directly if he didn't understand what was going on, thinking that he would ask his classmates tomorrow.