Since I Was a Special Soldier

Chapter 13: Really awesome

When Jiang Yanhai's voice fell, he felt his eyesight change for a while, and then Jiang Yanhai noticed the stunned change. His brain seemed to be activated by someone. When he looked at a place, the relevant data of this thing would appear in an instant. .

Gravity, atmospheric pressure, air humidity, temperature, wind speed, after looking out the window, when the line of sight passes through the window glass, Jiang Yanhai can even see the temperature difference, optical deflection, moving speed of the object, relative speed... etc. Almost all the data are all It suddenly appeared in his mind.

Jiang Yanhai immediately simulated the red flag that he wanted to shoot. The data within his line of sight quickly began to change. All the data such as air pressure, gravity, humidity, temperature, wind speed, temperature difference, wind difference, optical deflection, etc. appeared instantly. Not to mention, and directly gave the relevant data and answers.

  In other words, if Jiang Yanhai has a sniper rifle in his hand, he can directly adjust the data of the sniper rifle in his hand, and then pull the trigger!

   This is too **** good! Please allow Jiang Yanhai to explode here, really, compared to the strong metaphysical meaning in the name, the actual effect of this skill is simply scientific and can't be more scientific!

   This is almost calculating all the data, eliminating all the problems that can be solved with the data, and then you just pull the trigger directly.

   Can this not increase the hit rate?

   Although this is a skill, it is more like Jiang Yanhai's own ability. After careful experimentation, Jiang Yanhai discovered that this skill also has levels, and currently it is only the most basic C level.

   After this level is higher, can it be possible to do more perverted things? For example, let the bullet turn? Otherwise, why do you call an unquenchable Newton coffin board?

   But this skill does have an advantage, Jiang Yanhai can be turned off at any time, and can also be activated at any time, there is no such thing as cooling.

good! Aside from that name, this skill is definitely a metamorphosis level. Especially for a soldier, shooting marks are the most basic.

   After turning off this skill, I thought about it, anyway, it’s okay now, Jiang Yanhai simply took the last hacker knowledge directly.

   After Jiang Yanhai received his hacker knowledge, a huge amount of data poured into his mind instantly. The speed of this knowledge is not fast, but it is very deep. Jiang Yanhai immediately understood this knowledge.

Two full hours before and after, until Jiang Yanhai felt a little dizzy, the B-level hacker knowledge was completely transmitted, and Jiang Yanhai didn’t know how to use it, anyway, it was directly passed into his mind. , And not to mention that it is very complete, but his own understanding is also very deep.

   Although this knowledge is very complete, Jiang Yanhai feels that he still needs to practice more. For the current information age, the importance of such technology is beyond doubt.

   Even if it is a soldier, almost all the individual equipment is inseparable from the support of information technology, and in a modern war, information technology is the most important thing.

   Although Jiang Yanhai has accepted all the knowledge, he does not have a concept about what level of B-level hacking knowledge is. He needs to verify and test carefully.

After thinking for a while, Jiang Yanhai took out his mobile phone and sent all his personal belongings to this class. Now it is the information age. Recruits are also allowed to carry mobile phones. Smart phones can also be carried, but they can only be used. There are requirements for domestic brands, followed by mobile phone use occasions, etc., at least in this world.

   Only the rest time can be used, and now Jiang Yanhai is the rest time.

   took out his mobile phone and turned it on, and Jiang Yanhai's mind automatically showed a prompt, "Are you connected to this smart device?"

   Of course I chose yes.

   After choosing Yes, Jiang Yanhai found that an operation panel appeared on his mobile phone, which was a bit similar to APP, but not the same, but after clicking it, Jiang Yanhai took a deep breath.

  As a college student living in the information age, although Jiang Yanhai is not a computer student, he must have some understanding of computer programming, but he is not proficient.

   And now, when he opened this panel, Jiang Yanhai could directly understand the underlying data that emerged from it.

   Not only did he understand, but he also understood the phone’s system and other issues in an instant. After seeing these, Jiang Yanhai directly operated according to what he thought of in his mind without saying a word.

In fact, even if it is a domestic mobile phone, almost all the systems are Android, but Android uses an open system, so domestic manufacturers of its underlying data can also make their own customized modifications. In this case, the system's Safety can still be guaranteed.

   But now, in Jiang Yanhai's eyes, there are too many vulnerabilities in these systems in front of him. After just a few operations, Jiang Yanhai successfully obtained the highest level of authority for the mobile phone system and entered the low-level programming mode.

   During this process, Jiang Yanhai felt for the first time how abnormal the computing support of the electronic information warfare auxiliary program was. UU Reading www.uukanshu.com

   Hackers are no longer mysterious in modern times, but in fact, more than ten years ago, hackers were a very high term. With the development of time, it seems that many people have rarely heard the term hacker.

   Even the computer viruses that used to be linked to hackers at all times, etc., seem to be less now. After all, there were so many anti-virus software before, but now it’s just a simple 360.

   Is there no more hackers?

   No, hackers still exist, but hackers are more low-key, because in the modern information age, it is more difficult for hackers to hide their identity as before, so they have to keep a low profile.

Secondly, the security measures of major information companies have improved. Also, with the rapid development of the Internet, cloud computing is now the biggest limit for hackers. Many people think that if you find the loopholes in the system, you can invade. NS.

   In theory, yes, but you want to invade a personal computer, but if you want to invade a large company's large database, server, etc., even if you have loopholes, you still need powerful computing support!

   The more powerful the computing power of the target you want to invade, the more powerful the computing power you need!

   Not to mention that the other party still has the computing power of multiple large data centers connected through the network, it is even more difficult to invade!

   This is also the reason why there seem to be few hackers now.

However, Jiang Yanhai has not tested a specific value for the calculation support and auxiliary programs provided by the Red Star engine, but he instantly understood that he can now use this mobile phone to reverse link to the nearest communication company base station, and then reverse it through data transmission. To analyze the vulnerabilities of the data base station of the communications company.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like