The rise of great powers: starting from military industry
Chapter 372 Internet
The party group meeting lasted for two full days before it ended.
Liu Tao came to the Computer Research Institute, which is directly under the jurisdiction of Panshan Group and specializes in research in the computer field.
The Internet Research Institute is an important institute of the Computer Research Institute, which studies the Internet.
At this time, the entire headquarters has realized the local area network.
The so-called local area network is a computer communication network composed of various computers, external devices and databases connected to each other.
Each production base and each factory has a local area network, which is then connected through a data communication network to form a large-scale information processing system.
At present, this information processing system is only included in the scope of Yunnan Province. As for Guizhou Province, Guangxi Province, Sichuan and Guangdong Province, the construction has not been completed and has not been incorporated.
This can be said to be the birthplace of the Internet in the whole of China, and it is also the most cutting-edge place in the world to study the Internet.
The interior of Panshan Group is used as a research pilot for the Internet.
Later, it will extend from Panshan Group to universities, scientific research institutions and the military in the four southwestern provinces, and then radiate to universities, scientific research institutions and the military across the country.
When everything is fully prepared, it will extend to the entire society, and then China will welcome the Internet era.
This time will take at least ten years.
For the experts and scholars of the Computer Research Institute, it was like a dream.
Last year, the "Galaxy" supercomputer was successfully developed by the Computer Research Institute of the National University of Defense Technology in Changsha, which caused a huge sensation across the country because it filled the gap in domestic supercomputers and marked that China had entered the ranks of the world in developing supercomputers.
But when they came to the Panshan Computer Research Institute, a small desktop computer, a personal computer, had a computing speed of over 100 million.
This brought a huge impact to everyone.
The "Galaxy" supercomputer is very large, a cylindrical machine composed of 7 cabinets.
And the desktop computer they use for work has a pitifully small host.
Advanced computers, as well as unheard-of and unseen local area networks and the Internet, have too many surprises.
Even internal emails can be sent.
Panshan Computer Research Institute is a unit with a very high degree of confidentiality. Every expert and scholar has undergone strict political review, and almost all of them have to remain anonymous.
It is really because they have come into contact with too many secrets, which cannot be leaked, and it is also to protect them.
Liu Tao has a very high security force, and he rarely appears in public. When he does, it is in Sijiu City, which is the safest place in the world.
But not everyone can enjoy this high level of protection.
In this case, it is the best way for these experts and scholars to keep a low profile, even to hide their identities.
It is no exaggeration to say that the entire Panshan Computer Research Institute has concentrated one-third of China's computer talents.
In terms of strength, it is undoubtedly the strongest in the country, exceeding 100% of China's computer strength.
Each expert and scholar here brought at least three students.
Liu Tao came to the Internet Center this time mainly to participate in the Internet security research meeting.
Security issues can never be ignored.
Internet security must be considered and prepared in advance, rather than being caught off guard at that time.
Computers have computer security issues, and the Internet has Internet security issues.
The two are different, but closely related.
In Liu Tao's view, Internet security has three characteristics: confidentiality, integrity, and availability!
Confidentiality means that network resources can only be accessed by authorized entities.
Integrity, information is not modified during storage or transmission, the information package is complete and cannot be modified by an unauthorized second party.
Availability, including static operability and visibility of dynamic information content.
Internet security flaws mainly include operating system vulnerabilities, network protocol vulnerabilities, application system security vulnerabilities and security management vulnerabilities.
Operating system vulnerabilities are mainly reflected in the fact that the operating system is a complex software package. The biggest vulnerability of the operating system is I/O processing - I/O commands usually reside in the user memory space, and any user can change the source address or destination address of the command after the I/O operation begins.
Network protocol vulnerabilities are because the protocol uses plain text transmission. During the transmission process, attackers can intercept emails to attack, and it is also easy to attack by entering passwords or filling in personal information on the web page.
Application system security vulnerabilities are that servers and browsers are difficult to ensure security. When programming, they do not write new programs, but make appropriate modifications to the programs. In this way, the programs will inevitably have the same security vulnerabilities.
Security management vulnerabilities are the lack of network administrators, irregular information system management, failure to conduct regular security testing and inspections, lack of network security monitoring, etc., which will pose a threat to network security.
This puts forward several functions for the Internet security mechanism, namely identity recognition, access control, digital signature, audit tracking, key management and other functions!
Commonly used prevention and control technologies for Internet security include encryption technology and firewall technology!
Encryption, on the Internet, is used to prevent important information from being intercepted and stolen on the Internet. Encryption technology is the main means of achieving confidentiality. This technology can transform important information or data from an understandable plaintext into a messy, incomprehensible ciphertext form, and transmit the information on the line in ciphertext form, and restore the ciphertext to plaintext when it reaches the destination port.
Firewall technology is actually an isolation technology!
Liu Tao attaches great importance to computer security and Internet security, because these two security can be regarded as China's security!
If these two security cannot be achieved, then China is not safe.
The Internet Research Institute studies all aspects of the Internet, and security issues are naturally an important topic of the Internet Research Institute.
Although the current scientific research team is very weak, the technical talents in the entire Chinese computer field may not even be one thousandth of those in the United States. The research on the Internet is estimated to be less than one percent of that in the United States.
But as the saying goes, the early bird catches the worm, and with Liu Tao's golden finger, the development speed in this area will naturally not be slow.
However, if China wants to be a world leader in computers and the Internet, it still has a lot of work to do and needs to work hard.
This is why Liu Tao did not sell computers that were too advanced, because if his own strength was not enough, the products he sold would be quickly mastered by others, and they would quickly catch up and then quickly surpass him.
This situation is a disaster for China, a huge disaster.
Liu Tao wants to lay a good foundation for China's computers and the Internet in the next few years, so as to help China's computers and the Internet to be invincible in the future.
You'll Also Like
-
Let You Awaken Monsters, Will You Awaken the Ten Evil Spirits of Ancient Times?
Chapter 210 3 hours ago -
Pirates: Who said I am Roger?
Chapter 193 7 hours ago -
Pirates: God avoids me, but I don't, invincibility plus critical strike
Chapter 99 7 hours ago -
Genshin Impact: Kissing Tianli at the Beginning
Chapter 99 7 hours ago -
Villain: Marrying a blind fiancée, madly in love
Chapter 96 7 hours ago -
Pirates: I'm in the East Sea helping King Luffy
Chapter 113 7 hours ago -
Cute King: The Slime Who Doesn't Do His Job
Chapter 113 7 hours ago -
One Piece: The Navy Madman, Provoking the Celestial Dragons at the Beginning
Chapter 98 7 hours ago -
Awaken the 3S-level world and summon the hero King Arthur
Chapter 100 7 hours ago -
Zongman: War Crazy Starts from Curse
Chapter 159 7 hours ago