Time Travel: 2014
Chapter 288: Future generations plant trees for predecessors to enjoy the shade
In terms of technical handling, the stronger is not the better, the most suitable is the best.
For Lin Hui, there are technologies that are so powerful that they subvert people's current cognition or have fatal loopholes in the logical chain.
Moving hastily will only bring endless risks.
Lin Hui did not want to take some avoidable risks.
Although base station-based virus detection is not very suitable for Lin Hui.
But it wasn't a big problem. Lin Hui quickly found a patent for detecting cell phone viruses that was more suitable for him.
Let’s call this patent the SCAN mobile device virus/virus detection patent.
As its name suggests, this patent mainly implements virus/virus detection through scanning.
The principle of this patent is to use specific strings, binary strings or code strings contained in each virus/virus body to detect and scan mobile phone files.
If the detected file matches successfully, it means that the file represents or contains this type of virus/virus.
This detection technology is somewhat similar to molecular probes in biology.
But they are only slightly similar in nature.
The prerequisite for this kind of security measure to play a positive role is to have a strong virus/virus library.
According to this method, it is obvious that the more viruses in the virus library, the more viruses can be found.
It stands to reason that such technology is not clever, and even a bit dull.
Compared with some virus dynamic defense technologies or even more advanced artificial intelligence virus dynamic defense.
This kind of technology is completely inadequate.
Even if it is not compared with the advanced anti-virus technology of the next few years.
Even compared to the technologies used by some of the current mainstream Internet security companies.
Such technology cannot be called advanced.
Why do you say that?
First of all, the technology of using virus database to detect viruses is a static virus defense technology.
This is destined to be a passive technology to a certain extent.
Secondly, this technology of using virus databases to detect viruses is largely similar to an open-book examination.
Know the "content of the exam in the book" in advance before answering the questions.
If "content outside the book" appears, it will be easy to GG.
This virus detection technology is able to detect known viruses with ease.
But it is easy to get rid of unknown viruses/viruses.
In practical applications, this kind of technology is the norm.
Even in the previous life, such a technology had little use.
After all, viruses cannot always be in the virus reservoir.
Even if there are corresponding security personnel, they will always update the virus/virus types in the technical virus/virus library.
However, the update speed of viruses in the virus database is generally not as fast as the iteration speed of viruses in the external environment.
This is not because security personnel are not trying hard enough.
But because of some obvious reasons:
——It is always easier to attack than to defend.
In the past life, after the advent of this technology, the technology of using virus/virus databases for scanning often only played the role of an afterthought.
Because of this, the people who originally developed this technology did not seem to attach much importance to this technology.
All the technologies related to this previous patent are simply encapsulated except for the virus/virus library.
The rest of the technology sits on its working hard drive with little to no encryption.
This is undoubtedly cheaper for Lin Hui.
It can be said that it is basically effortless for Lin Hui to reproduce this patent.
Although this technology was useless against mobile phone viruses/viruses of the same period in its previous life.
But this does not hinder the value of this technology to forest ash.
You know, the same method is to use the mobile phone virus/virus library to open the book and answer the questions.
What gave Lin Hui the question was the 2014 Internet environment.
But what Lin Hui was referring to was the "examination data" from 21 years.
Although the 21-year-old mobile phone virus/virus library in the previous life still cannot 100% prevent the endless mobile device virus/virus that emerged during the same period.
However, the types of mobile phone viruses/viruses collected by this mobile phone virus/virus database cover almost all mobile phone viruses/viruses in the previous life before 2021 (containing specific strings, binary strings or code strings).
In this case, the mobile phone virus/virus database naturally covers all mobile phone viruses/viruses that have been released from 2014 to 2021.
In this case, new forms of mobile phone viruses/viruses will continue to emerge even in the Internet environment.
It would take some brain cells to break through Lin Hui's simple mobile phone virus/virus detection technology.
Unless there are some mobile phone viruses/viruses that have not appeared before 2021 in previous lives.
Perhaps we can break through the technology of forest ash transportation.
Putting aside artificially targeted malicious attacks, the technology that just targets mobile phone viruses that Lin Hui is trying to transport still has its uses.
As the saying goes, the ancestors planted trees, and the descendants enjoy the shade.
When it comes to Lin Hui, it's the other way around.
Later generations plant trees, and predecessors enjoy the shade.
Why do you say that?
Because of some of the achievements that people only produced in the past few years.
In this time and space, forest dust can be carried almost unscrupulously.
Although Lin Hui knew that this kind of moving behavior was somewhat inappropriate.
But as the saying goes, if you have too many lice, don’t bite them, and if you have too many debts, don’t worry.
Lin Hui is now a dead pig and is not afraid of boiling water.
As long as the corresponding technology has sufficient value, the technical logic makes sense, and there is no risk of collision with others.
Lin Hui will work hard to carry it.
Such detection technology uses mobile phone virus/virus databases to detect mobile phone viruses/viruses.
Although using this technology cannot solve all mobile security problems faced by mobile terminals once and for all.
However, Lin Hui feels that it is quite valuable to use the technology of mobile phone virus/virus databases in the past few years to detect mobile phone viruses/viruses in 2014.
Even though mobile phone viruses/viruses emerge in an endless stream, this technology will eliminate the need to worry about most possible mobile phone virus/virus threats within two years.
Of course, the mobile phone virus/virus mentioned here refers to the conventional mobile phone virus/virus.
For some mobile-side malicious attacks with special nature, this technology may also be GG.
For example, if various underlying protocols are used to carry out attacks.
This technology to block cell phone viruses is likely to be useless.
Lin Hui pointed out the time regression vulnerability in the iOS8 beta version before:
If a hacker knows the characteristics of the time regression vulnerability in advance.
So for hackers, it is completely possible to attack iOS devices connected to the public network.
By artificially sending malicious network time protocol attacks to these devices, the iOS system time is calibrated to UTC 0.
Then the attacked device will be affected by this bug and cannot use the device after restarting the device.
The attack here takes advantage of the underlying protocol-Network Time Protocol.
When an iOS device is connected to a public network, the iOS system will use the Network Time Protocol service to calibrate the time zone and time.
The protocol this process relies on is the Network Time Protocol.
You'll Also Like
-
The extraordinary life of a certain American comic
Chapter 200 22 hours ago -
American comics: Starting from a copycat arms dealer
Chapter 231 22 hours ago -
From the waste of spiritual roots to the practice of asking the devil
Chapter 380 23 hours ago -
Trickster Hunter
Chapter 363 1 days ago -
Expedition to Europe
Chapter 1080 1 days ago -
The giant corporations that started in Night City
Chapter 385 1 days ago -
Marvel's Chronicles of Multiverse Warfare
Chapter 855 1 days ago -
The apocalypse is weird: I am the number one containment object, what's wrong with being a litt
Chapter 612 1 days ago -
Time and space transaction: Exchange food for the elf princess at the beginning
Chapter 503 1 days ago -
I, the villain, trained the loser into a dark boss
Chapter 374 1 days ago