Chapter 634 Mount Everest 1.0 System



"Oh, oh, we happen to work together. Wait a moment, I'll give him the phone."

What the hell are we doing working together? Are we studying the script or acting?

A moment later, Gong Huang greeted Xing Baohua on the phone before revealing the purpose of his call.

The purpose was to have Gong Li give Jin Li a heads-up. Gong Li's company, Columbia Entertainment in Hong Kong, is optimistic about Jin Li and has already sent people to make contact. To avoid any misunderstandings, Gong Li was asked to give Jin Li a heads-up in advance and also to persuade her to come to Hong Kong for better opportunities.

To be honest, Gong Li is a little envious of her junior sister, who has a bright future ahead of her.

What they didn't know was Xing Baohua's ulterior motives. Is it easy to be a boss these days? You even have to worry about your employees' marriages. He claims to be facilitating blind dates, but in reality, it's a bit like pimping.

Xiao Tian is right, that's exactly what he meant. What if the woman doesn't like Zhang Dongshuo?

Why did Xing Baohua go to such great lengths and expend so many resources to sign people to Hong Kong and support them?

So, this time they have to succeed, even if it doesn't work out. Even if it doesn't, Xing Baohua doesn't have a good solution and can only keep them on the payroll. But after all, they graduated from a prestigious central government-affiliated university, so signing them wouldn't be a loss. If they become famous, it would also benefit the company.

Xing Baohua and Xiao Tian were working on the system. These days, systems are very small and come with templates that you just need to fit into. Their workload seemed huge, but actually, if you write it according to your own ideas, it's not that difficult. The difficulty is just that it takes a lot of time.

Early computers had little to no defense, and even with the addition of firewalls, they were no longer considered a line of defense by hackers. Therefore, third-party software was needed to achieve protection.

The modified system is no longer the same as a regular DOS system. Even the executable files and programs are no longer in EXE format, but in JAP format.

The two are not interchangeable, just like computer programs cannot be used on mobile phones. If you want to use them, you must open a virtual machine and use them within the virtual machine.

Xing Baohua named this system Mount Everest 1.0.

When Xing Baohua and Xiao Tianna finished compiling the software, they said they wanted to have a celebration.

Of course, it hasn't been run in code yet. But this is already a first step for a domestically developed system.

It seemed like a joyful moment, but Xing Baohua knew in his heart that this system was garbage. Anyone could break it, after all, it was developed on an open-source system.

Moreover, this system continues to follow the open-source model, allowing anyone to add to, delete from, or modify it to create higher versions.

Once you learn Java programming, it's even easier to crack than MS-DOS.

To enhance protection, the only option is to rely on third-party software to prevent system intrusions.

To put it bluntly, it's useless. It can't prevent hackers from using their methods to break into the system. Even if you patch the system, they still have many ways to exploit vulnerabilities.

Therefore, strengthening protection is difficult in the early stages unless the storage hardware has a very large capacity, various defenses are added to the system, and even third-party software installation is blocked. A blacklist or whitelist program is used to constantly monitor the file operation status within the system.

Continue read on readnovelmtl.com


Recommendation



Comments

Please login to comment

Support Us

Donate to disable ads.

Buy Me a Coffee at ko-fi.com
Chapter List