Lin Zai knew that in his previous life, a top hacker had created a similar system. Although this system was not perfect, it was already considered a modern system at that time. It even broke through the firewall of the Western Ministry of Defense.
Lin Zai thought for a while and decided to create such a system. However, it was relatively more complete than the system that appeared in his previous life.
This kind of big project was undoubtedly very difficult. Ever since the emergence of online information, countless scientists had devoted their lives to this, but they had not achieved much.
Moreover, this kind of project usually required a computer with extremely high configuration. Otherwise, ordinary computers would not be able to cope with the stuttering and large amount of data storage.
First, Lin Zai uninstalled all the firewall in the system. Then, after the network was cut off, he reprogrammed all the unnecessary software. This was to maximize the amount of memory that could be used. After all, this computer was too old.
Lin Zai, on the other hand, did not rest for even a moment. He completed the entire system in one go.
Unknowingly, half an hour had passed, and the system that Lin Zai had designed was gradually appearing on the table.
The computer desktop was replaced by darkness, and in the center of the screen was a constantly rotating three-dimensional image. It looked like a medieval lighthouse.
This was the appearance of the system that Lin Zai had designed. From the screen, it was impossible to tell that the system had the ability to break through 90% of the firewall except in areas without network access. It could be said that the defense system that any big company was proud of was trash in front of it.
Moreover, the defense of this system was comparable to an iron wall. Even a team of a hundred people might not necessarily be able to break through the flood attack with big data. Instead, their core computers might be hacked in reverse.
Even Lin Zai himself was a little entranced by the scene in front of him. If a network engineering expert were to see this, they would definitely go crazy with shock.
"Ding! Congratulations to the host for deducing the first derivative technology. This technology is of the network engineering type. Please name it yourself…"
Suddenly, the system notification sounded in Lin Zai's mind. Hearing this notification, Lin Zai suddenly felt enlightened. No wonder there was a column for derivative technology in the character template. So that was what it meant.
In other words, every time he implanted a portion of black technology data in the future, he would be able to derive a corresponding derivative technology.
Thinking of this, Lin Zai looked at the image on the table again. The image looked like a medieval lighthouse that was constantly rotating. A name appeared in the mind.
"Babel, this technology is called Babel Hacking System!”
As Lin Zai spoke excitedly, the character template in his consciousness immediately changed.
[Host: Lin Zai]
[Fame: 5]
The First Black Technology: Anti-Destructive Weapons
[Derivative Technology: Babel Hacking System]
After figuring out what derivative technology was, Lin Zai turned around and started compressing the Babel system in his computer. However, just as he was about to save it into the USB drive, he stopped.
To be honest, after Lin was reborn, he knew that the background of this world had completely changed. Even if such a monstrous hacker system appeared, no one would come to check the water meter.
This was the result of his research and could only belong to him alone. Even if they wanted to give it away in the future, they could only give it the right to use it. However, if he only used some encryption methods, he could not guarantee that the system would not be copied.
To be honest, such a system was equivalent to money and beauty to those researchers who specialized in this field. No one could resist such a great temptation.
However, even if it was an encrypted password, no matter how many layers it was, there would still be a time when it would be cracked. Moreover, if it was a multi-character encryption, the highest number of digits that the computer could carry was a 128-bit encryption password.
If the research team used a flood attack, the 128-digit password could be cracked. In that case, what encryption method should be used to ensure that the system would never be copied?
"I got it!"
Right at this moment, Lin Zai stared at the Babel system in front of him and suddenly revealed an evil smile. Since it was going to be encrypted, it had to be set to an encryption method that no one would think of.
After another ten minutes, Lin Zai finally completed the encryption. Staring at the compressed package on the table, he could almost see the frantic expressions of the experts.
In order to do the encryption, Lin Zai did not use the usual digital password. Instead, he split the Babel Tower and compressed it. The common explanation was that Babel was the password itself.
This book comes from:m.funovel.com。