Chapter 369: Who Moved My Computer (1/2)
The boss suggested for them to drink coffee together, the two naturally agreed quickly. They thought Ye Qing was going to show his hands but Ye Qing called Yang Lily the manager of the propaganda department and asked her to call Yun Shi to his office.
Yang Lily said: ”Yun Shi was checking the order in the underground warehouse opposite.”. So, she called her to let her come.
Ji Ke and Wu Yuexiang sat down, one took out his mobile phone to see the circle of friends, and the other tapped on his laptop.
Wu Yuexiang glanced at everything, and it seemed that he was giving the computer a mess of software upgrades that made him feel dizzy just by looking at the name.
”By the way, by the account of the manager, I saw a lot of foreign blockbusters. When the spies invaded some well-guarded companies. They just used a jammer and put it on the camera side and could make the camera picture standstill or keep Replay. In reality, does such a thing really exist? ”
Wu Yuexiang was also bored. Ji Ke inquired about what seemed to be very high-tech and said that he might not be able to see it in the future.
At present, the office is mainly located in the Blue-Sky Building. When the company moves into the Monster Industrial Building belonging to the company in the future, the security department will be responsible for the security of the entire building. For that, this task makes people full of blood when they think about it.
Wu Yuexiang naturally had to study a lot, like those electronic detection products, there were no hidden security risks in the movies.
”Fake.” Ji Ke grinned, keeping his hands away from the keyboard: ”The picture must not be moving, or the picture should be done back, and there must be a signal source that continuously inputs the video signal. The video signal is not like the old-style optical disc. If you lose data, you will be stuck. If there is no signal, the screen will be blank.”
”No matter how powerful the jammer is, it is impossible to send a wireless video signal. Let the camera without a wireless receiver receive it?”
”The interference can only interfere with the black screen, as long as there is a black or blue screen of the monitoring device, someone will be sent to check it immediately.”
”Then I can rest assured...”
”Wait...”
In the plan of playing with the computer, suddenly Ji Ke said: ”who moved my computer?”
”What secrets can you keep on your computer?” Wu Yuexiang leaned his head away.
On the computer screen, an English software with a concise screen was appearing. Wu Yuexiang, a security captain who knew some English, barely recognized a few words.
Start, hard drive, test, update...
”There is a window in the software where commands can be written, allowing users to write appropriate detection commands according to the characteristics of the hard disk.”
”Just now…”
”There is one more command in it, but I'm sure I haven't written any commands.”
”I don't think you are programming every day?” Wu Yuexiang was unclear: ”Or... you mean, your computer was hacked?”
”Not at all.” Ji Ke took a deep breath: ”It's this algorithm command, too much... It's too subtle.”
Ji Ke narrowed his eyes and moved his finger to the arrow keys to make the cursor start with the first letter and jump with his gaze line by line.
This command, as a whole, seemed obscure and difficult to understand but it could be analyzed and understood line by line and the meaning inside could be slowly understood. He found that this algorithm was like a sharp knife, in the most direct and efficient way, to combine multiple hard drives data information for calculation.
The algorithm is the core of all detection software.
This hit actually contained an item that Ji Ke had never seen before, but after careful analysis in his mind, he simply took the case for an incredible algorithm.
The more he watched, the more his eyebrows rose, and his fingers shook.
In any profession, there are some people who cannot do it themselves, but they do not hinder knowledgeable people. They can see at a glance what is extraordinary and amazing.
Ji Ke was astonished by this algorithmic command now. He felt that these things, composed entirely of alphabetic symbols, were more beautiful than fairies and he could not help himself.
It was impossible for a hacker to hack into his computer because this laptop was not connected to the Internet in most cases.