In this way, Lin Jianye still used email and similar methods to transmit information.
Xing Baohua felt that she was quite tragic.
He went through all the trouble of setting up the wireless network, intending to make it easier for everyone to use it, but who knew these experts would use it against him.
Once the data packet is transmitted, Xing Baohua has no way to intercept it. Within the system, only the trace of the sending address will be left. The location of the receiving point depends on the other party's mobile device, which is either a laptop or a tablet.
The mobile devices Xing Baohua distributed to his employees were all Dami brand. Wasn't that shooting himself in the foot?
The only way is to capture Sun Jianye, obtain his mobile device, and then crack it. This will take several more days.
"Boss, should we check the node that uploaded the data packet?" another trainee said.
"Go ahead and investigate! Use your brains to think about how to investigate," Xing Baohua replied.
Xing Baohua also wanted to work on checking nodes, but this technology was indeed outside his field; it was a different project called data engineering.
It was a very complex project. Electronic information at that time was very simple and did not have many complex structures.
However, as the number of servers, hard drives, and data increases, this technology is simply replicated.
Xing Baohua never handled the hardware for the ports himself; it was all outsourced, involving technologies from Ericsson, Alcatel, and IBM.
Xing Baohua is not good at this.
Moreover, there is a very critical technology involved that is prohibited: the interception of data packets.
This is the work of the relevant departments. Xing Baohua is just an operator. Would he dare to install that equipment?
Furthermore, this equipment must operate at extremely high speed and with advanced technology. The massive amounts of data not only consume a lot of CPU resources, but memory is also crucial.
Especially the network controller ports, which are routed out and stored in the buffer. Unencrypted data packets are fine; they go directly to the analyzer for analysis and then to the logic layer for processing.
Moreover, the cache, analyzer, executor, and optimizer involved here are not software, but hardware.
Each individual device requires a separate chip to perform its task.
Therefore, all of this is beyond Xing Baohua's capabilities, requiring him to enter another field. Perhaps he'll work with big data and similar things when technology advances, but for now, that's a long way off.
As for the trainees, they should know about data packet nodes and have probably come into contact with them before, but currently, no device has the capability to analyze nodes.
If this kid can extract the node and crack the data packet, then such a talent should be worshipped as a god.
Continue read on readnovelmtl.com