Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 13

When Jiang Yanhai's voice fell, he felt his gaze change suddenly, and then Jiang Yanhai discovered a stunned change. His brain seemed to be activated. When he looked at a place, relevant data about this thing would appear instantly.

Gravity, atmospheric pressure, air humidity, temperature, wind speed, after looking out the window, when your eyes pass through the window glass, Jiang Yanhai can even see the temperature difference, optical deflection, the movement speed of the object, relative speed, etc., almost all the data appear in his mind instantly.

Jiang Yanhai immediately simulated the red flag in the distance who wanted to shoot. The data within his line of sight quickly began to change. All data such as air pressure, gravity, humidity, temperature, wind speed, temperature difference, wind difference, optical deflection, etc. appeared instantly, and directly gave relevant data and answers.

In other words, if Jiang Yanhai has a sniper rifle in his hand now, he can directly adjust the data of the sniper rifle in his hand and then pull the trigger!

This is so fucking amazing! Please allow Jiang Yanhai to swear here. Really, compared to the strong metaphysical meaning in this name, the actual effect of this skill is simply so scientific that it cannot be more scientific!

This is almost all the data, eliminate all the problems that can be solved with data, and then you just pull the trigger.

Can this not increase the hit rate?

Although this is a skill, it is more like Jiang Yanhai's own ability. After careful experimentation, Jiang Yanhai found that this skill also has levels, and it is currently only the most basic level C.

After this level is higher, can we do something more abnormal? For example, let the bullet turn? Otherwise, why do you call the Newton coffin board that can't be suppressed?

However, this skill has one advantage. Jiang Yanhai can be turned off at any time or activated at any time, without any cooldown or other statements.

Not bad! Apart from that name, this skill is definitely at the pervert level. Especially for a soldier, shooting and shooting skills are the most basic.

After turning off this skill, I thought about it and it was fine now. Jiang Yanhai simply received the last hacking knowledge directly.

When Jiang Yanhai obtained the hacker knowledge, a huge stream of data instantly poured into his mind. The speed of this knowledge was not very fast, but it was very profound. Jiang Yanhai immediately understood this knowledge.

It took two hours in total, and it was not until Jiang Yanhai felt a little dizzy that the knowledge of B-level hacking was completely transmitted. Jiang Yanhai didn't know what method to do, but it was directly passed into his mind anyway, and it was very complete. He understood it very deeply.

However, although this knowledge is already very complete, Jiang Yanhai feels that he should practice it more. In the current information age, there is no doubt about the importance of such technology.

Even for soldiers, almost all individual equipment cannot be separated from the support of information technology, and in a modern war, information technology is the top priority.

Although Jiang Yanhai has accepted all the knowledge, he has no concept of what level of B-level hacking knowledge is, and he needs to carefully verify and test it.

After thinking about it, Jiang Yanhai simply took out his mobile phone and sent his personal belongings to this class. Now it is the information age. New recruits are also allowed to carry mobile phones, and smartphones can also be carried, but they can only use the specified domestic brands. Secondly, the occasions for mobile phone use, etc., all have requirements, at least in this world.

Only rest time can be used, and now Jiang Yanhai is rest time.

After taking out his phone and opening it, a prompt automatically appeared in Jiang Yanhai's mind, "Is it connected to this smart device?"

Of course the choice is yes.

After choosing Yes, Jiang Yanhai found an operation panel appeared on his phone, which was a bit similar to the app, but it was different. However, after clicking on it, Jiang Yanhai took a deep breath.

As a college student living in the information age, although Jiang Yanhai did not study computers, he must have a little understanding of computer programming, but if he is proficient, he can't talk about it.

Now, when he opened this panel, Jiang Yanhai could directly understand the underlying data that appeared inside.

Not only did he understand, but he also instantly had a deep understanding of the system and other problems of the mobile phone. After seeing these, Jiang Yanhai directly operated according to what he thought in his mind without saying a word.

In fact, even for domestic mobile phones, almost all systems are Android, but Android uses an open system, so domestic manufacturers can make their own customized modifications to their underlying data. In this way, the security of the system can still be guaranteed.

But now, in Jiang Yanhai's eyes, there are too many loopholes in these systems in front of him. After just a few operations, Jiang Yanhai successfully obtained the highest authority of the mobile phone system and entered the underlying programming mode.

During this process, Jiang Yanhai felt for the first time how abnormal the computing support of electronic information war auxiliary programs is.

Hackers are no longer mysterious in modern times, but in fact, more than ten years ago, hackers were a very noble title. With the development of time, it seems that many people rarely hear the title of hackers.

Even computer viruses that used to be linked to hackers often seem to be less now. After all, there were so many antivirus software and the like before, but now I just need a simple 360.

Is it because the hacker is gone?

Not that there are still hackers, but hackers are more low-key, because in the modern information age, it will be more difficult for hackers to hide their identities as before, so they have to keep a low profile.

Secondly, the security measures of major information companies have been improved. In addition, with the rapid development of the network, cloud computing is the biggest development that restricts hackers. Many people believe that if you find vulnerabilities in the system, you can invade.

In theory, it is true, but it is okay if you want to hack into a large database or server of a large company, even if you have loopholes, you still need powerful computing support!

The stronger the computing power of the target you want to invade, the stronger the computing power you need!

Not to mention that the other party has the computing power support of multiple large data centers connected through the network, it is even more difficult to invade!

This is also why there seems to be fewer hackers nowadays.
Chapter completed!
Prev Index    Favorite Next