Chapter 41: Network insecurity

(ps: Thank you for the reward of the Yuan Dynasty, you are the second classmate to donate generously, thank you!In addition, take the opportunity to ask for a recommendation vote, the recommendation votes for this book, all of them are voted by Lao Zhang and I alone, otherwise it is still a tabula rasa, which one has a vote in his hand, just vote for a few, the gods are not bad for these two votes, but Lao Zhang needs it very much.) Well, no, there are 13 more recommended votes today, thank you for voting!)

The engineer pushed his glasses and said calmly, "According to the analysis of some data that has been obtained, the architecture of this running computer system is still relatively rough, and the corresponding internal rules are not rigorous. Any hardware application will generate a series of data interactions, and eventually a large number of underlying data and permission settings will be changed. I estimate that there may be as many as a thousand system vulnerabilities that may involve the transfer of the highest privilege and will be discovered in the first vulnerability analysis work after mapping and modeling!"

"Many human beings in this world can create many harmful Heike viruses by relying only on the control of some superficial system knowledge, without involving the interaction between a series of software and hardware, and we have comprehensively and systematically analyzed the comprehensive structure of this entire system, and penetrated to an unprecedented level. So this set of security rules of the computer system, for us, its degree of strict prevention is no better than a dilapidated house with ventilation on all sides. ”

"Just think about it, we have a thousand ways to conquer it. ”

"Even if we push it lightly, this house will fall!

"Because after a preliminary analysis, we found that it may be based on our own interests, almost every necessary hardware facility has a special system backdoor, and you even need to send a simple password to be unimpeded in the entire system of products. ”

"Such a system backdoor is believed to be a deep-seated secret of the relevant manufacturers, but it is inevitable that there will be ways to leak. So, the online world is not safe. ”

"So, for beings like us who are trying to control this network system, maybe the biggest headache in the future is not how to conquer this network world, because it's just too easy. What we should think about is how to protect the world, maintain the normal operation of the world, and let users use these products more confidently and boldly, instead of making them afraid and suspicious. ”

"The Internet is a big meal, and there are too many diners who want to occupy a place at the table, such as hardware manufacturers, operating system providers, major hegemon-level application software providers, network service operators, and countless hey customers, makers of various busy software, and even fishing-fish websites and viruses. They are all potential competitors to us, who want to compete with us for the interests of the online world. ”

"Even now, a certain dormant computer, my micron robot has detected some kind of suspicious signal transmission, and I have reason to suspect that some kind of virus may have changed the computer settings and secretly stolen the computing resources of that computer!"

As he spoke, the engineer was so excited that he gave an instruction casually, only to see the computer buzzing, and it started on its own without operation.

As the page lit up and the desktop appeared, the engineer pointed to the familiar network icons meaningfully, and said to Sima Mulong, "Don't look at them as service providers, or even free service providers, but in the pattern of this network world, they also belong to the category of real powerhouses, and they can share a big piece of cake." The real underdogs are the users who haven't even paid for security software. Don't look at the calm on the surface, they are accustomed to using their own computers, but the real computer computing resources, maybe they don't even occupy half of them, outside of normal services, I don't know how many people are sharing a computer with them. ”

"But sometimes ignorance is a blessing, as long as you don't have online banking, and you don't like video and audio or anything, no matter how careful you are, the Internet will not bring you much harm. I'm afraid that those who are too curious and like to try everything are really vulnerable. ”

Sima Mulong nodded sympathetically, and said, "The original owner's memory is also like this, there are too many messy things on the Internet, and they are traps every step of the way, you want to download something, I don't know what is mixed in it, it's annoying." ”

As he spoke, he suddenly smiled and said, "But, isn't that good, the world is already so chaotic, there are so many people eating this bowl of rice, what do we have if we have one more? Even in my opinion, these guys are rare and valuable resources." Think about it, how many ready-made valuable resources they have at hand, and even, they themselves are rare objects of the black pot, and when we walk the network in the future, the resources of these guys will not be used in vain. ”

Seeing that the engineer looked a little puzzled, Sima Mulong explained, "These guys are also part of the online world, their servers are much stronger than ordinary computers, and we must control such resources." ”

"When the time comes, it's going to be on their servers, it's on their dedicated lines, it's going to be on their bank accounts. Wouldn't it even be more credible and confusing to even put on the skins of these big hooligans and build another nest in their nest and open up a special section on their website? Wouldn't this be more convenient for us to expand our influence? These will be possible when we form our own organizations in the future!"

The Engineer was slightly stunned, apparently he hadn't thought of this possibility before.

This kind of intelligent life is like this, they have unique advantages in the professional field, in technology, and in terms of density, but they are not good at intrigues, ideas and ideas that are unique and so on.

However, the engineer's reaction was still very fast, as soon as Sima Mulong said it, he immediately understood, and immediately clapped his ass, "What the master said is that with the existence of this master, they are doomed to tragedy, and no one can stop us from mastering these computer systems!"

Sima Mulong waved his hand and said, "Where, these are just small tricks, I don't know if I can use them in the future, you continue to talk about the progress of surveying and mapping, what step has it reached? Have you completed the modeling?"

The engineer immediately turned back to the subject, "There has been some progress in the mapping work, some data has been collected, and analysis is underway." ”

"However, the problem now is that our data collection and analysis work has just begun, and the robot troops need to start collecting samples from the most basic physical architecture and analyzing how they operate. All of these things take a certain amount of time. ”

"After all, these computer systems, their set of operating system data, have as many as a few gigabytes, and the physical analysis of related hardware systems is even more work. After all, the current mapping time is still a little short, and the progress is not big for the time being. Although some of the relevant system vulnerabilities have been discovered, but, from the kind of master wants, the height of the god-like realm in the network world, there is still a big gap, we must wait until more data aggregation and analysis is completed, as long as we complete the system data collection work, the results will soon be available. ”

The engineer pulled up another drawing, which resembled an ancient manor structure drawing.

I only heard the engineer say, "I know that you have no interest in these tedious and boring technical details (mainly because the author does not understand this), and these backward processes that are destined to be eliminated have no need to fill your knowledge base." But to spice things up a little bit of the battle, let me give you an animated demonstration of how the network system simulates the offensive and defensive battles of the war. ”

The engineer clicked on the drawing, and a vivid, antique, and life-filled picture of the life of the ancient manor was displayed like an animation.

It's a classic picture of a Western medieval manor.

Within a manor, there are land, farmland, streets, houses, livestock, manor owners, soldiers, administrators, farmers, slaves, public facilities such as wineries, carpenters, blacksmiths, mills, etc.

A manor, surrounded by a fence, is a completely self-sufficient little world here, regardless of the ups and downs of the outside world.

The engineer explained, "A computer is like a manor, it is a self-sufficient small world, and the continuous supply of electrical energy is like a sufficient food reserve, which can maintain the normal operation of this small world, so the power supply is one of the indispensable computer hardware facilities." ”

"CPU provides computing power, in this computer manor, it is equivalent to a role of providing labor (computing power), CPU is computing power, equivalent to human resources, family (manor) population. The more you want to do and run more programs at the same time, the better the CPU you need. ”

"Hard disks are equivalent to land, housing space, warehouse space, public facilities, and so on. If you want to run the program, you first have to download the application and put them on your hard drive, which is large enough to accommodate so many materials and programs, which is equivalent to the fact that this manor can live so many people, store so many facilities and living materials. ”

"Memory is equivalent to office space, where you can put running work data, reports, etc., and all the relevant data that is working has to be played here. In a manor, it is equivalent to the manor's study, recording some important data in the manor, housekeepers, clerks or whatnot, they have to come here every day to report their work, the study is not big enough, of course it can't accommodate these people. ”