I really just want to be a scholar
Chapter 631 New task of artificial intelligence, and the reappearance of Mr. Q!
Chapter 631 New task of artificial intelligence, and the reappearance of Mr. Q!
Considering that Chen Ming and Chen Lan were both in the car, Qin Ke didn't say any more, just closed his eyes and rested in the car, thinking about how to solve the problem raised by Uncle Yang.
Suddenly, a system notification sounded in my ear:
"Ding! You have a new mission to learn God!"
"Ding dong! The task of learning the gods is updated with a special task 'It's time for artificial intelligence to show its due power'!"
"⑤[Special Task] It's time for artificial intelligence to show its due power: Your artificial intelligence level has been raised to LV3, and you already have qualified intelligence. Please assist Xia Guo to realize the security of the Lime operating system within 48 hours. Let’s make a great leap forward, and use artificial intelligence to successfully resist and repel this international cyber attack!”
"Task Reward: According to the completion of the task, the S-level evaluation rewards academic points (informatics) +1000! Special branch technology-artificial intelligence experience value +1000! An additional reward is a mysterious gift bag!"
Qin Ke was startled for a moment, then overjoyed!
After two or three years, the system finally issued a new task of "artificial intelligence"!
Sure enough, I guessed right, the system will trigger the release of such special missions only when encountering relevant special events!
As long as this special task can get an S-level evaluation, informatics can be upgraded from "professional level" to "professional level", and artificial intelligence can also be upgraded from the current LV3 to LV4!
Qin Ke cheered up. Since the system tasks have completion evaluations, they can't just be satisfied with fixing vulnerabilities and intercepting international network attacks. The goal must be to get S-level evaluations, so improve the security of the Lime operating system , and to use the power of Shimmer to repel the invading enemy has become his main consideration.
Qin Ke suppressed the excitement in his heart and silently calculated.
……
Half an hour later, the two returned to the hotel they had arranged in advance, walked into the room and closed the door.
This is a rather comfortable large suite, and it is no secret that the two of them live together, so when Chen Ming and the others arrange the room, they will always arrange the big bed room by default.
The two of them took off their coats and washed their faces before sitting together. Qin Ke was mainly recounting the news he heard from Uncle Yang, while Ning Qingyun listened intently.
Since the room was arranged by Chen Ming and the others, it had already been inspected, so there was no need to worry about bugs.
But Qin Ke lowered his voice.
After hearing that such a big event had happened, Ning Qingyun couldn't help frowning slightly.
The Lime operating system is the brainchild of her, Qin Ke, and Qin Xiaoke, and it is also the first scientific research result of her and Qin Ke's joint cooperation. Although she has not taken care of the follow-up operation and maintenance these years, she has no control over the operation of Lime. The system still has a special feeling.
Not to mention that this is very likely to affect Xia Guo's information security lifeline for the next decade or even decades.
"I see, what do I need to do?" Ning Qingyun asked with her fists clenched.
In terms of development ability and computer knowledge, Ning Qingyun is not outstanding, not even an ordinary graduate student majoring in computer science.At the beginning, she cooperated with Qin Ke to write the Lime operating system. She was mainly responsible for UI, interface and other appearance design parts and related code parts, and Qin Ke was responsible for all the core code parts of the operating system.
However, after experiencing the development work of "Qiguang EDA", Ning Qingyun has also gained a lot of experience in development, especially in advanced software algorithm methods, and is also very familiar with code development through "Lime Smart Programming". At this time, he is confident that he can still played a lot of role.
Qin Ke thought for a while and said: "I haven't got the source code of the security audit mechanism of Lime OS V3.5. for you."
"Okay, you say."
"In addition to the security mechanism and protection software, computer security also has a very important part, which is the encryption and decryption algorithm. The current mainstream encryption and decryption algorithms, whether it is AES, Twofish, 3DES, RSA or Serpent, etc., or several The composite application of multiple algorithms rarely uses more than 256-bit keys for encryption, including the special communication software for 'Mr. Allows installation on older computers, using only 1.0-bit keys."
Ning Qingyun really didn't understand these details in detail, but she also knew that the number of digits in the key is the length of the supported password. She couldn't help being surprised: "32-bit key? How about security..."
"Security is not a problem, because the core of its security mechanism is the artificial intelligence 'Xiaoqing', there is 'Xiaoqing' to conduct security audits, 32-bit keys are enough, even if the source code is leaked, it is difficult to bypass the 'Xiaoqing' Qing' directly exploits and invades the operating system."
"I see." Ning Qingyun understood.
Qin Ke continued: "Uncle Yang said that during the second development of Longteng Zaitian, he improved the security audit mechanism of the operating system. Although Uncle Yang didn't know the details, I can guess that the key algorithm should be improved and changed to the last key algorithm. The mainstream is 128-bit or even 256-bit, but in this way, the review speed of the first generation of "Xiaoqing" will not be able to keep up. They must have designed a new security review mechanism that does not require the full intervention of the first generation of "Xiaoqing". It seems to be more secure, at least the length and security of the key increase exponentially. But this will also lead to greater harm caused by source code leakage.”
In order for Ning Qingjun to understand better, Qin Ke turned on the drawing function of the notebook, and directly used the mouse to draw while explaining: "No matter how to fix the problem of the current security review mechanism, there is one thing that must be done, and it is the easiest What works is the improvement of the algorithm.”
Ning Qingyun said unexpectedly: "You want to use a new encryption algorithm with a 512-bit or even a 1024-bit key?"
Qin Ke shook his head: "The new encryption algorithm using a 512-bit or even 1024-bit key is too cost-effective, and it cannot be promoted on ordinary computers within ten years. Because the longer the key, the more difficult it is to implement, and the calculations required for encryption and decryption The more resources there are, the 128-bit key and 256-bit key are currently the best value for balancing computer performance and security.”
When Qin Ke said this, he turned his gaze to Ning Qingyun: "Jun'er, I believe you have studied the process of my proof of Riemann's conjecture to a great extent. Next, you need to use Riemann's conjecture, Mersenne prime numbers, The Fibonacci sequence is used to upgrade and improve the encryption algorithm of the Lime operating system. These three problems in number theory are all about the distribution of prime numbers. As long as a better algorithm is designed, a shorter key can be used. , achieving the same or even higher security than current 256-bit keys."
Qin Ke wrote "32 is greater than or equal to 256" with the mouse, then smiled slightly, and encouraged him: "This is your goal, time is very tight, there are only about 40 hours left, and you must write a new one within this time." Algorithms. I believe you can do it. In terms of number theory and algorithms, you are at the level of the Philippine Award!"
With the new algorithm of 32-bit key, to achieve the security effect equal to or even surpass the current mainstream algorithm of 256-bit key?
Ning Qingyun was taken aback by Qin Ke's goal, and immediately became blazing with fighting spirit.
The girl clenched her small fist, took out the pen and manuscript paper and said, "Leave it to me! The Riemann conjecture has been deciphered by you, and it's time for it to play a new role."
Qin Ke raised his hand and gave her a high-five. The two smiled tacitly and began to work together.
Qin Ke's task is heavier, and he is responsible for more parts.
The first thing he has to solve is the security of his network connection.He is now in Japan, and it is not safe to use a transnational network, and the traffic is too large and it is easy to attract attention.
However, Qin Ke has long wondered how to achieve a safe connection in case of emergencies when going abroad, especially the "twilight" has been upgraded to LV3 - the low light of LV3 has surpassed most of the artificial intelligence in the world, even if it is not as good as Google's "Alpha Dog" is definitely closer. If it can be upgraded to LV4, it will not be a problem to surpass "Alpha Dog".
Qin Ke directly sent a message and location to "Shimmer" who was far away in the Lime data center in Xiaguo via WeChat.
Two minutes later, another "twilight" in the laptop automatically opened a new command window, and prompted: "Master Qin Ke, a secure encrypted dedicated channel has been established."
This is a secure and encrypted dedicated channel established with the help of more than 1000 high-performance servers in the Lime Data Center. All instructions and messages sent by Qin Ke on his laptop will be broken into tens of thousands or even hundreds of thousands of encrypted data packets and sent back After arriving in Xiaguo, after several transfers, they were aggregated to the Lime Data Center, and Xiaoguang re-deciphered the combination with huge computing resources.
Although it will be troublesome and resource-consuming, the security level is the highest. There is no company or organization in the world today that can intercept and crack, or even notice these scattered data packets that look like useless information on the surface.
And Qin Ke can directly connect back to the Lime data center through the encrypted dedicated channel, which is equivalent to being in China, so he doesn't have to worry about the security of the transnational network.
He quickly logged into Mr. Q's dedicated encrypted mailbox, encrypted the specially written communication software and sent it to President Yan Weizhou's mailbox.
……
Yan Weizhou has been waiting in front of his mailbox after receiving Yang Chengke's instructions.
He has never heard of "Mr. Q", but he also knows that there is indeed a team of experts with only code names, never showing up, and mysterious identities. They are all weirdos with top strength in the industry.These mysterious experts never appear in news reports, and they are typical unsung heroes, but they can often be faintly seen in the country's advanced fields.
Now, the "Mr. Q" he is about to face should be such a mysterious expert.
After waiting anxiously for more than half an hour, he finally received an email from an unfamiliar address.
What a weird email address, like a string of irregular random characters, and the suffix of the email address has never been seen before.
Yang Chengke next to him came over, identified it, nodded and said, "It's Mr. Q, you can trust the software in this attachment."
The matter is of great importance. Yan Weizhou personally operated the computer, downloaded the attachment in the email, but had to enter the password to run it. It was Lao Yang who took the keyboard and entered the pre-agreed password, and soon an unknown mysterious software was automatically installed. Yes, there was no hint at all during the period, and "Xiaoqing", the core of the operating system, did not make any interception actions.
The software opens automatically, and the contact person only has a profile picture of "Q".
"Q" sent a message, followed by another lock icon software:
"Use this encryption software to encrypt and compress part of the source code of the security audit mechanism of the 3.5 Dragon Edition operating system and related technical documents and send it to me."
"There is also this anti-intrusion software, which monitors network anomalies and can prevent someone from intruding on this computer. You'd better install it on all public computers that may be intruded."
Seeing Yang Chengke next to him nodding, Yan Weizhou immediately ordered the technicians to do so.
After sending the encrypted compressed package, Mr. Q only left a sentence: "I want to read these documents first, and wait for my message."
……
After Qin Ke got the source code and technical documents, he began to concentrate all his energy on speed-reading ten lines at a glance.
With his speed-reading ability, which is the best in the world at this time, it only takes 10 minutes to read a tens of pages of advanced mathematics papers. Although the source code passed by Yan Weizhou has hundreds of thousands of lines of code, the technical documentation is also thick. It only took about three hours for Qin Ke to read all of the two thousand pages and understand them thoroughly.
As he expected, hundreds of technicians from Longteng Zaitian did make major changes to the security review mechanism of the Lime system. The key of the security encryption algorithm was increased to 256 bits, while the network data and network connection [-]. For the review of software scheduling, only the core part is reserved and handed over to "Xiaoqing", and the rest is in charge of several customized security review software with different functions.
This can indeed not only guarantee the performance of the Lime operating system, but also further improve the security. If the source code is not leaked, it is indeed a very good audit mechanism. From this perspective, Xiaguo's IT industry is not short of talents.
It’s just that this more complex and excellent audit mechanism is more dependent on the source code itself. Once a top hacker studies the source code, it is not difficult to find targeted vulnerabilities, thereby bypassing the security audit mechanism and directly invading the system. , to obtain the highest administrator authority - if it weren't for the core part and "Xiaoqing" sitting in charge, such an intrusion would be easier.
Qin Ke is not a top hacker, but his informatics level is by no means inferior to any doctoral student majoring in computer science in the world, and he is proficient in all fields.
He quickly thought of several countermeasures, and began to refine them one by one, judging the most suitable and best solution to the problem.
Time passed by, except for a hasty dinner with Ning Qingyun, singing the birthday song and sharing the cake, Qin Ke devoted almost all his energy to this response.
And Ning Qingyun was the same, immersed in writing and calculating on the table, even forgot to drink tea.
The night was getting deeper and deeper, and it was dawn the next day in a blink of an eye.
……
This night was a torment for Yan Weizhou. The technical explanation in the conference room had just ended, and security experts from all over the country stayed up all night. They were urgently discussing countermeasures, but judging by the situation, they still couldn't think of anything good. method.
This is not difficult to understand. After all, it is very difficult to understand the current security audit mechanism in one night, let alone propose a solution to the current problem.
However, the attacks and intrusions from the international network have never stopped, and they have become more and more intense, making Longteng Zaitian's security team tired of dealing with them.
If Longteng Zaitian's computer room hadn't adopted a top-notch firewall, and gathered all the manpower to monitor the connection status of the core server at any time, it would have been compromised by now.
"Mr. Q", whom Yan Weizhou placed high hopes on, had been silent all night.
At this time, the logistics staff brought a hot breakfast, allowing everyone who had been busy all night to stop and rest for a while.
"President, let's have breakfast first." The secretary personally brought the breakfast to Yan Weizhou.
Chen Jingxue's secretary Chu Shumin and Yang Chengke's secretary Lu Xinping also brought breakfast to their bosses.
But the three of them had no thoughts or appetites, and they just forced themselves to eat a little casually.
At this moment, there was a commotion in the conference room.Lao Yang, Lao Chen, and Yan Weizhou raised their heads at the same time, and the scene in front of them shocked them all.
(End of this chapter)
Considering that Chen Ming and Chen Lan were both in the car, Qin Ke didn't say any more, just closed his eyes and rested in the car, thinking about how to solve the problem raised by Uncle Yang.
Suddenly, a system notification sounded in my ear:
"Ding! You have a new mission to learn God!"
"Ding dong! The task of learning the gods is updated with a special task 'It's time for artificial intelligence to show its due power'!"
"⑤[Special Task] It's time for artificial intelligence to show its due power: Your artificial intelligence level has been raised to LV3, and you already have qualified intelligence. Please assist Xia Guo to realize the security of the Lime operating system within 48 hours. Let’s make a great leap forward, and use artificial intelligence to successfully resist and repel this international cyber attack!”
"Task Reward: According to the completion of the task, the S-level evaluation rewards academic points (informatics) +1000! Special branch technology-artificial intelligence experience value +1000! An additional reward is a mysterious gift bag!"
Qin Ke was startled for a moment, then overjoyed!
After two or three years, the system finally issued a new task of "artificial intelligence"!
Sure enough, I guessed right, the system will trigger the release of such special missions only when encountering relevant special events!
As long as this special task can get an S-level evaluation, informatics can be upgraded from "professional level" to "professional level", and artificial intelligence can also be upgraded from the current LV3 to LV4!
Qin Ke cheered up. Since the system tasks have completion evaluations, they can't just be satisfied with fixing vulnerabilities and intercepting international network attacks. The goal must be to get S-level evaluations, so improve the security of the Lime operating system , and to use the power of Shimmer to repel the invading enemy has become his main consideration.
Qin Ke suppressed the excitement in his heart and silently calculated.
……
Half an hour later, the two returned to the hotel they had arranged in advance, walked into the room and closed the door.
This is a rather comfortable large suite, and it is no secret that the two of them live together, so when Chen Ming and the others arrange the room, they will always arrange the big bed room by default.
The two of them took off their coats and washed their faces before sitting together. Qin Ke was mainly recounting the news he heard from Uncle Yang, while Ning Qingyun listened intently.
Since the room was arranged by Chen Ming and the others, it had already been inspected, so there was no need to worry about bugs.
But Qin Ke lowered his voice.
After hearing that such a big event had happened, Ning Qingyun couldn't help frowning slightly.
The Lime operating system is the brainchild of her, Qin Ke, and Qin Xiaoke, and it is also the first scientific research result of her and Qin Ke's joint cooperation. Although she has not taken care of the follow-up operation and maintenance these years, she has no control over the operation of Lime. The system still has a special feeling.
Not to mention that this is very likely to affect Xia Guo's information security lifeline for the next decade or even decades.
"I see, what do I need to do?" Ning Qingyun asked with her fists clenched.
In terms of development ability and computer knowledge, Ning Qingyun is not outstanding, not even an ordinary graduate student majoring in computer science.At the beginning, she cooperated with Qin Ke to write the Lime operating system. She was mainly responsible for UI, interface and other appearance design parts and related code parts, and Qin Ke was responsible for all the core code parts of the operating system.
However, after experiencing the development work of "Qiguang EDA", Ning Qingyun has also gained a lot of experience in development, especially in advanced software algorithm methods, and is also very familiar with code development through "Lime Smart Programming". At this time, he is confident that he can still played a lot of role.
Qin Ke thought for a while and said: "I haven't got the source code of the security audit mechanism of Lime OS V3.5. for you."
"Okay, you say."
"In addition to the security mechanism and protection software, computer security also has a very important part, which is the encryption and decryption algorithm. The current mainstream encryption and decryption algorithms, whether it is AES, Twofish, 3DES, RSA or Serpent, etc., or several The composite application of multiple algorithms rarely uses more than 256-bit keys for encryption, including the special communication software for 'Mr. Allows installation on older computers, using only 1.0-bit keys."
Ning Qingyun really didn't understand these details in detail, but she also knew that the number of digits in the key is the length of the supported password. She couldn't help being surprised: "32-bit key? How about security..."
"Security is not a problem, because the core of its security mechanism is the artificial intelligence 'Xiaoqing', there is 'Xiaoqing' to conduct security audits, 32-bit keys are enough, even if the source code is leaked, it is difficult to bypass the 'Xiaoqing' Qing' directly exploits and invades the operating system."
"I see." Ning Qingyun understood.
Qin Ke continued: "Uncle Yang said that during the second development of Longteng Zaitian, he improved the security audit mechanism of the operating system. Although Uncle Yang didn't know the details, I can guess that the key algorithm should be improved and changed to the last key algorithm. The mainstream is 128-bit or even 256-bit, but in this way, the review speed of the first generation of "Xiaoqing" will not be able to keep up. They must have designed a new security review mechanism that does not require the full intervention of the first generation of "Xiaoqing". It seems to be more secure, at least the length and security of the key increase exponentially. But this will also lead to greater harm caused by source code leakage.”
In order for Ning Qingjun to understand better, Qin Ke turned on the drawing function of the notebook, and directly used the mouse to draw while explaining: "No matter how to fix the problem of the current security review mechanism, there is one thing that must be done, and it is the easiest What works is the improvement of the algorithm.”
Ning Qingyun said unexpectedly: "You want to use a new encryption algorithm with a 512-bit or even a 1024-bit key?"
Qin Ke shook his head: "The new encryption algorithm using a 512-bit or even 1024-bit key is too cost-effective, and it cannot be promoted on ordinary computers within ten years. Because the longer the key, the more difficult it is to implement, and the calculations required for encryption and decryption The more resources there are, the 128-bit key and 256-bit key are currently the best value for balancing computer performance and security.”
When Qin Ke said this, he turned his gaze to Ning Qingyun: "Jun'er, I believe you have studied the process of my proof of Riemann's conjecture to a great extent. Next, you need to use Riemann's conjecture, Mersenne prime numbers, The Fibonacci sequence is used to upgrade and improve the encryption algorithm of the Lime operating system. These three problems in number theory are all about the distribution of prime numbers. As long as a better algorithm is designed, a shorter key can be used. , achieving the same or even higher security than current 256-bit keys."
Qin Ke wrote "32 is greater than or equal to 256" with the mouse, then smiled slightly, and encouraged him: "This is your goal, time is very tight, there are only about 40 hours left, and you must write a new one within this time." Algorithms. I believe you can do it. In terms of number theory and algorithms, you are at the level of the Philippine Award!"
With the new algorithm of 32-bit key, to achieve the security effect equal to or even surpass the current mainstream algorithm of 256-bit key?
Ning Qingyun was taken aback by Qin Ke's goal, and immediately became blazing with fighting spirit.
The girl clenched her small fist, took out the pen and manuscript paper and said, "Leave it to me! The Riemann conjecture has been deciphered by you, and it's time for it to play a new role."
Qin Ke raised his hand and gave her a high-five. The two smiled tacitly and began to work together.
Qin Ke's task is heavier, and he is responsible for more parts.
The first thing he has to solve is the security of his network connection.He is now in Japan, and it is not safe to use a transnational network, and the traffic is too large and it is easy to attract attention.
However, Qin Ke has long wondered how to achieve a safe connection in case of emergencies when going abroad, especially the "twilight" has been upgraded to LV3 - the low light of LV3 has surpassed most of the artificial intelligence in the world, even if it is not as good as Google's "Alpha Dog" is definitely closer. If it can be upgraded to LV4, it will not be a problem to surpass "Alpha Dog".
Qin Ke directly sent a message and location to "Shimmer" who was far away in the Lime data center in Xiaguo via WeChat.
Two minutes later, another "twilight" in the laptop automatically opened a new command window, and prompted: "Master Qin Ke, a secure encrypted dedicated channel has been established."
This is a secure and encrypted dedicated channel established with the help of more than 1000 high-performance servers in the Lime Data Center. All instructions and messages sent by Qin Ke on his laptop will be broken into tens of thousands or even hundreds of thousands of encrypted data packets and sent back After arriving in Xiaguo, after several transfers, they were aggregated to the Lime Data Center, and Xiaoguang re-deciphered the combination with huge computing resources.
Although it will be troublesome and resource-consuming, the security level is the highest. There is no company or organization in the world today that can intercept and crack, or even notice these scattered data packets that look like useless information on the surface.
And Qin Ke can directly connect back to the Lime data center through the encrypted dedicated channel, which is equivalent to being in China, so he doesn't have to worry about the security of the transnational network.
He quickly logged into Mr. Q's dedicated encrypted mailbox, encrypted the specially written communication software and sent it to President Yan Weizhou's mailbox.
……
Yan Weizhou has been waiting in front of his mailbox after receiving Yang Chengke's instructions.
He has never heard of "Mr. Q", but he also knows that there is indeed a team of experts with only code names, never showing up, and mysterious identities. They are all weirdos with top strength in the industry.These mysterious experts never appear in news reports, and they are typical unsung heroes, but they can often be faintly seen in the country's advanced fields.
Now, the "Mr. Q" he is about to face should be such a mysterious expert.
After waiting anxiously for more than half an hour, he finally received an email from an unfamiliar address.
What a weird email address, like a string of irregular random characters, and the suffix of the email address has never been seen before.
Yang Chengke next to him came over, identified it, nodded and said, "It's Mr. Q, you can trust the software in this attachment."
The matter is of great importance. Yan Weizhou personally operated the computer, downloaded the attachment in the email, but had to enter the password to run it. It was Lao Yang who took the keyboard and entered the pre-agreed password, and soon an unknown mysterious software was automatically installed. Yes, there was no hint at all during the period, and "Xiaoqing", the core of the operating system, did not make any interception actions.
The software opens automatically, and the contact person only has a profile picture of "Q".
"Q" sent a message, followed by another lock icon software:
"Use this encryption software to encrypt and compress part of the source code of the security audit mechanism of the 3.5 Dragon Edition operating system and related technical documents and send it to me."
"There is also this anti-intrusion software, which monitors network anomalies and can prevent someone from intruding on this computer. You'd better install it on all public computers that may be intruded."
Seeing Yang Chengke next to him nodding, Yan Weizhou immediately ordered the technicians to do so.
After sending the encrypted compressed package, Mr. Q only left a sentence: "I want to read these documents first, and wait for my message."
……
After Qin Ke got the source code and technical documents, he began to concentrate all his energy on speed-reading ten lines at a glance.
With his speed-reading ability, which is the best in the world at this time, it only takes 10 minutes to read a tens of pages of advanced mathematics papers. Although the source code passed by Yan Weizhou has hundreds of thousands of lines of code, the technical documentation is also thick. It only took about three hours for Qin Ke to read all of the two thousand pages and understand them thoroughly.
As he expected, hundreds of technicians from Longteng Zaitian did make major changes to the security review mechanism of the Lime system. The key of the security encryption algorithm was increased to 256 bits, while the network data and network connection [-]. For the review of software scheduling, only the core part is reserved and handed over to "Xiaoqing", and the rest is in charge of several customized security review software with different functions.
This can indeed not only guarantee the performance of the Lime operating system, but also further improve the security. If the source code is not leaked, it is indeed a very good audit mechanism. From this perspective, Xiaguo's IT industry is not short of talents.
It’s just that this more complex and excellent audit mechanism is more dependent on the source code itself. Once a top hacker studies the source code, it is not difficult to find targeted vulnerabilities, thereby bypassing the security audit mechanism and directly invading the system. , to obtain the highest administrator authority - if it weren't for the core part and "Xiaoqing" sitting in charge, such an intrusion would be easier.
Qin Ke is not a top hacker, but his informatics level is by no means inferior to any doctoral student majoring in computer science in the world, and he is proficient in all fields.
He quickly thought of several countermeasures, and began to refine them one by one, judging the most suitable and best solution to the problem.
Time passed by, except for a hasty dinner with Ning Qingyun, singing the birthday song and sharing the cake, Qin Ke devoted almost all his energy to this response.
And Ning Qingyun was the same, immersed in writing and calculating on the table, even forgot to drink tea.
The night was getting deeper and deeper, and it was dawn the next day in a blink of an eye.
……
This night was a torment for Yan Weizhou. The technical explanation in the conference room had just ended, and security experts from all over the country stayed up all night. They were urgently discussing countermeasures, but judging by the situation, they still couldn't think of anything good. method.
This is not difficult to understand. After all, it is very difficult to understand the current security audit mechanism in one night, let alone propose a solution to the current problem.
However, the attacks and intrusions from the international network have never stopped, and they have become more and more intense, making Longteng Zaitian's security team tired of dealing with them.
If Longteng Zaitian's computer room hadn't adopted a top-notch firewall, and gathered all the manpower to monitor the connection status of the core server at any time, it would have been compromised by now.
"Mr. Q", whom Yan Weizhou placed high hopes on, had been silent all night.
At this time, the logistics staff brought a hot breakfast, allowing everyone who had been busy all night to stop and rest for a while.
"President, let's have breakfast first." The secretary personally brought the breakfast to Yan Weizhou.
Chen Jingxue's secretary Chu Shumin and Yang Chengke's secretary Lu Xinping also brought breakfast to their bosses.
But the three of them had no thoughts or appetites, and they just forced themselves to eat a little casually.
At this moment, there was a commotion in the conference room.Lao Yang, Lao Chen, and Yan Weizhou raised their heads at the same time, and the scene in front of them shocked them all.
(End of this chapter)
You'll Also Like
-
Zongman: Travel through the Hades mythology and join the chat group
Chapter 109 12 hours ago -
Horror Game: Kidnapped the Horror Tavern Owner
Chapter 206 12 hours ago -
NBA: Legendary coach signs with league for 10 years
Chapter 194 12 hours ago -
I, the Elf Addition Master
Chapter 193 12 hours ago -
Tennis: The strongest and most supreme, loading golden entries!
Chapter 171 12 hours ago -
Yu-Gi-Oh!: From Overlord to Ruler of the Dimension
Chapter 119 12 hours ago -
After the Demon King disappeared, they regretted it
Chapter 102 12 hours ago -
With the help of the chat group, I finally became the master of the universe
Chapter 158 12 hours ago -
Global Collapse: Infinite Upgrade Shelters
Chapter 96 12 hours ago -
Food Wars: Taste Buds Reversal
Chapter 96 12 hours ago