When Jiang Yanhai's voice fell, he instantly felt that his sight changed. Then Jiang Yanhai found the stunned change. His brain seemed to be activated. When he looked at a place, the relevant data of this thing would appear in an instant.
Gravity, atmospheric pressure, air humidity, temperature, wind speed, after looking out of the window and looking through the window glass, Jiang Yanhai can even see the temperature difference, optical deflection, moving speed and relative speed of objects... Almost all the data appear in his mind instantly.
Jiang Yanhai immediately simulated the red flag in the distance he wanted to shoot. The data within his line of sight began to change rapidly. All the data such as air pressure, gravity, humidity, temperature, wind speed, temperature difference, wind difference, optical deflection and so on appeared instantaneously, and directly gave the relevant data and answers.
In other words, if Jiang Yanhai has a sniper rifle in his hand, he can directly adjust the sniper rifle data in his hand, and then pull the trigger!
This is fucking against the sky! Please allow Jiang Yanhai to swear here. Really, compared with the strong metaphysical meaning in the name, the actual effect of this skill is simply scientific and can't be more scientific!
This is to calculate almost all the data, eliminate all the problems that can be solved with data, and then you just pull the trigger.
Can this not increase the hit rate?
Although this is a skill, it is more like Jiang Yanhai's own ability. After careful experiment, Jiang Yanhai found that this skill also has a level. At present, it is only the most basic level C.
After this level is higher, can we do more abnormal things? Like turning a bullet? Otherwise, why do you call an unstoppable Newton coffin.
However, this skill has one advantage. Jiang Yanhai can be turned off or activated at any time without any cooling.
not bad Aside from that name, this skill is definitely abnormal. Especially for a soldier, shooting is the most basic.
After closing this skill, I thought about it. Anyway, it's all right now. Jiang Yanhai simply received the last hacker knowledge directly.
When Jiang Yanhai received hacker knowledge, a huge stream of data immediately poured into his mind. The influx of knowledge was not very fast, but it was very profound. Jiang Yanhai immediately understood this knowledge.
For two hours, until Jiang Yanhai felt a little dizzy, the B-level hacker knowledge was completely transmitted. Jiang Yanhai didn't know how to transfer this knowledge. Anyway, it was directly introduced into his mind, and it was very complete. He understood it very deeply.
However, although these knowledge are complete, Jiang Yanhai thinks he should practice more. For the current information age, there is no doubt about the importance of such technology.
Even for soldiers, almost all individual equipment is inseparable from the support of information technology, and information technology is the top priority in a modern war.
Although Jiang Yanhai has accepted all the knowledge, he doesn't have a concept of what level the B-level hacker knowledge is. He needs to confirm and test it carefully.
After thinking about it, Jiang Yanhai simply took out his mobile phone and sent all his personal belongings to this class. Now it is the information age. Recruits are also allowed to carry mobile phones, and smart phones can also be carried, but only the specified domestic brands can be used. Secondly, the occasions for using mobile phones are all required, At least in this world.
Only the rest time can be used, and now Jiang Yanhai is the rest time.
Touch out his mobile phone and open it. Jiang Yanhai's mind automatically appears a prompt, "do you want to connect the smart device?"
Of course, the choice is.
After choosing yes, Jiang Yanhai found an operation panel on his mobile phone, which is a bit similar to app, but not the same. However, after clicking on it, Jiang Yanhai took a deep breath.
As a college student living in the information age, although Jiang Yanhai doesn't study computer, he must know much about computer programming, but he can't be proficient.
Now, when he opens this panel, Jiang Yanhai can directly understand the underlying data emerging from it.
Not only did he understand it, but he immediately had a deep understanding of the mobile phone system and other problems. After seeing these, Jiang Yanhai directly operated according to what he thought in his mind without saying a word.
In fact, even for domestic mobile phones, almost all systems are Android, but Android adopts an open system, so the domestic manufacturers of its underlying data can also make their own customized modifications. In this way, the security of the system can be guaranteed.
But now, in Jiang Yanhai's eyes, there are too many loopholes in these systems in front of him. After only a few operations, Jiang Yanhai successfully obtained the highest authority of the mobile phone system and entered the underlying programming mode.
In this process, Jiang Yanhai felt for the first time how abnormal the operation support of electronic information warfare auxiliary program is.
Hackers are no longer mysterious in modern times, but in fact, more than a decade ago, hackers were a very tall name. With the development of time, it seems that many people have rarely heard of hackers.
Even computer viruses that used to be linked to hackers seem to be less now. After all, there were so many anti-virus software in the past, but now it's just a simple 360.
Is there no hacker?
No, there are still hackers, but hackers are more low-key, because in the modern information age, it will be more difficult for hackers to hide their identity as before, so they have to be low-key.
Secondly, the security means of major information companies have been improved. In addition, with the rapid development of the network, cloud computing is the biggest development limiting hackers. Many people believe that if you find the loopholes in the system, you can invade.
Theoretically, yes, but it's ok if you want to invade a personal computer, but if you want to invade the large databases and servers of a large company, even if you have vulnerabilities, you still need strong computing support!
The more powerful the computing power of the target you want to invade, the more powerful the computing power you need!
Not to mention that the other party also has the computing support of multiple large data centers connected through the network. It's even more difficult to invade!
This is why there seem to be few hackers now.
However, Jiang Yanhai has not tested a specific value for the calculation support and auxiliary programs provided by the Red Star engine, but he suddenly understands that now he can reverse link to the nearest communication company's base station through this mobile phone, and then analyze the system vulnerabilities of the communication company's data base station through data transmission.