Obviously, this group did not have as smooth a time as the previous ones, because they were just a group of ordinary people, without the support of system plug-ins like Jingtian, and had to rely on themselves for everything, so they did not succeed, and in the end several of them were killed by the opponent.
Stinger couldn't understand why Xiang Jingtian and the others were so powerful. It was clearly their first time to conduct this training, and he was just a new recruit, but he managed to beat those people so badly that they couldn't even raise their heads. Moreover, he could accurately find where people were indoors. He immediately thought that it was just a blind cat catching a dead mouse.
At this time, the second team also returned. After seeing that everyone was present, Stinger said, "Alright, at ease. Let's talk about the first team first. Although you have wiped out all the militants, your tactical movements are not perfect. You mainly rely on snipers to achieve such results. You will all strengthen your tactical movement training later. Then, let's talk about the second team. It's a mess. The coordination between your teammates is simply too poor, and the personnel arrangement is also disorganized. I won't say anything about the first time. Go practice tactical training with them later. Once you have mastered the key movements, I will teach you blasting."
In this way, the group was taken away for their respective training.
Another day passed. Everyone had formed the habit of getting up on their own at the appointed time in the morning. The instructor for today's training was Kuangfeng. This instructor was good at computer warfare and psychological warfare, which were the indispensable first parts of modern warfare. Nowadays, all warfare was electronic and information-based. If your equipment was hacked and crashed, then you would be like a deaf and blind person. Psychological warfare was even more important. For people with poor psychological endurance, you could defeat them without shooting, so psychological warfare was also one of the compulsory subjects for modern soldiers.
Seeing how active they were today, Kuangfeng said, "Well, that's good. You already have a sense of combat. Then let's start today's course. I'm going to teach you electronic intrusion, also known as hacking. I think you've all heard of it. That's right, you have to learn this course. During the course, I will conduct special training based on your individual situation. Not everyone can master this. As long as there is one of you who is proficient, it will be enough. First, let me explain to you the common knowledge of computer viruses. First of all, according to the media where the virus exists, viruses can be divided into network viruses, file viruses, and boot viruses.
There are seven types of computer viruses.
1. Boot sector computer virus. In the mid-1990s, the most popular computer virus was the boot sector virus, which was mainly spread through floppy disks in the 16-bit disk operating system (DOS) environment.
2. File-type computer viruses
File-type computer viruses, also known as parasitic viruses, usually infect executable files (EXE), but some can also infect other executable files, such as DLL, SCR, etc.
3. Complex computer viruses
Compound computer viruses have the dual characteristics of boot sector viruses and file viruses.
4. Macro Virus
Macro viruses specifically target specific application software and can infect macro instructions attached to certain application software. They can easily spread through various means such as email attachments, floppy disks, file downloads and group software such as Microsoft Word and Excel.
5. Troy/Trojan Horse
A Trojan horse or Trojan horse is a program that appears to be legitimate but actually performs malicious and illicit activities when executed.
6. Worm virus
A worm is another type of program that can replicate itself and spread through a network.
7. Other computer viruses/malicious program codes
A malicious program is a program written with attacking intent. These threats can be divided into two categories: those that require a host program and those that are independent of each other.
Finally the talk was over. Some people listened with great interest, while others were completely confused because they only knew how to play games with computers and knew nothing about hacking. Xiang Jingtian and Wang Yuan were computer majors, and Xiang Jingtian was a doctoral student in computer science. He knew a lot about these things and had hacked into other people's computers. He could also write code to create computer viruses. He even wrote his own plug-ins for playing games, but other people's reports were useless. You can imagine how advanced his skills were.
Then Kuangfeng took out his computer and asked, "Does anyone here have this basic knowledge?"
Said to Jingtian: "Report, I will."
Wang Yuan also said to Monkey: "Report, I can do it too."
Kuangfeng said, "Well, that's good. It seems that some people have some basic skills. Well, then, you guys come up and do the experiment. Use this computer to hack into the camera of another computer."
Continue read on readnovelmtl.com