Feather Emperor
Chapter 286 Operating Systems
Chapter 286 Operating Systems
After chatting with colleagues in the office for a while, it can be seen that they all really like this refined-looking little girl with a faint mysterious aura.At work, I explained to Bing Yan very carefully, such as procedures, business and so on.
Leng Bingyan is also smart enough to understand everything, and he has mastered the essentials of the work in just a short time.
When it's time to go to work, Bingyan sits back to her own small site, on which the logo "R&D1-3-7" has been pasted with blue plastic tape, which I think means to represent a group of three teams. The last seven is the team number.
Turn it on, wait for a while, the buzzing sound of starting up...
It has to be said that the computer configured by the company for this office is currently the most advanced, almost reaching the level of luxury. After a while, the computer was turned on.
Looking at the very familiar Windows 7 operating system on the screen, Leng Bingyan wrinkled her lovely nose. Although Windows 7 is much more advanced than Windows XP and Windows Vista, based on the premise that the Windows system itself has huge loopholes, Leng Bingyan Bingyan has always been dismissive of windows.
But one thing has to be admitted, Microsoft's giant status is hard to be shaken, with the transcendent achievements of the Windows series global market share of more than 90.00%, it is destined to be the biggest threat to other operating systems.
Relatively speaking, Leng Bingyan looks at linux with admiration. In fact, linux only refers to the kernel. Linux is open source, so many companies develop based on its kernel.The more famous ones are Red Hat Linux (red_hat_linux), ubuntu_linux, and the best one in China is Zhongke Hongqi Linux.The authentic linux distributions are more famous redhat, suse, debain and so on.
It is precisely because the linux source code is visible that computer enthusiasts all over the world supplement it.It also makes linux a relatively perfect operating system with almost no loopholes.
The Linux system is designed for a multi-user environment, so a clear distinction is made between system files and user files, and each file has different user attributes.As an ordinary user, you can usually only read and write your own files, but you can only read and not modify general system files. Even reading of some sensitive system files is prohibited.
This design fundamentally guarantees the security of the system, even if a user file has a problem, it will not affect the entire system.In contrast to the windows system, in the era before win2000, there was no such difference between users. Almost all system users have administrator privileges and can modify system files arbitrarily.
Even though Microsoft later realized this problem and distinguished between administrators and ordinary users in the subsequent system, he still did not solve this problem well in terms of permissions. What administrators can do, ordinary users still Basically everything can be done, such as installing software, modifying system settings, and deleting user files.
This also explains why once an ordinary user of Windows is infected with a virus or a Trojan horse, it usually endangers the security of the entire system, and there is almost no reason why such a situation has never occurred in the Linux world.
Of course, Windows 7 has been greatly improved since then. The user group policy installed by default in Windows 7 does not log in as an administrator account, thus avoiding some problems.
It can be said that the architecture of an operating system has predetermined its security.In fact, the fundamental reason why Linux has relatively few security vulnerabilities is that it is open source and modifiable. After so many years, the vulnerabilities have been studied almost. Linux also has shortcomings. Its hardware compatibility with audio and video has not been very good, but it is still quite powerful in data processing and programming calculations.
But even so, Leng Bingyan still did not choose to switch from Windows to Linux, because she has a more secure and reliable system!
He secretly took out a data cable, plugged one end into the computer, and the other end extended to the necklace around his neck.
The Pillow Demon has become her special "mount". Whenever she needs to use the computer, she will turn the Pillow Demon into a notebook.The Pillow Demon itself is a high-tech product. Although the internal massive database is huge and contains countless information, Leng Bingyan did not directly call his favorite operating system from it.Instead, I used the knowledge I had mastered to independently write one.
Of course, the self-compiled system cannot be as perfect as the system in the database, but at any rate, Leng Bingyan also has the reputation of "Purple", and I believe that the system is beyond ordinary technology, at least a little more advanced than windows and linux.
Now that system is already lying in the belly of the Pillow Demon, Leng Bingyan is going to name it "Purple_lightning1.0", which means the primary version of Purple Lightning.
With the power of Pillow Demon, the small system installation can be completed directly.
restart……
The debugging progress bar went up, and finally it was completed with a sound of "beep!".
The system on the screen is still in the form of windows, but it is obviously different from the windows system. The layout and principle are completely different. It is absolutely impossible for humans to complete it, but Leng Bingyan managed to do it...
When Long Xian'er saw this system, her eyes lit up, as if she saw another way to get rich.Leng Bingyan has reasons to believe that Xian'er has put her mind on this system.
Out of the designer's self-confidence, Leng Bingyan firmly believes that the performance of his own system is more than one step higher than that of Microsoft's, and it has a more special feature - full Chinese language compilation!If it is really put on the market, it will surely grab a lot of shares.
Click on the webpage, and Leng Bingyan directly enters the URL of the "Crazy Day" forum. This is a forum for computer technology enthusiasts, and it is also where the ID "Frozen Tears" made its fortune.
I remember that the deputy administrator of this website, Mizuki, is also Bingyan's apprentice, and once set her as an honorary moderator!
Judging from the fact that Mizutsutsuki belongs to the government department, Leng Bingyan guessed that the controller behind this website is very likely to be the government!Because the government needs talents like hackers, it is very possible to dominate a website to attract those masters.
Leng Bingyan couldn't control that much, and directly hung up the principle and core of the Chinese language in the form of a super-large attachment. Of course, she registered a new account, after all, the identity of the ID "Frozen Tears" has been exposed .
What should I name it?After thinking about it again and again, I came up with a Chinese name "Zi Mou".Haha, anyway, it is about the Chinese language, and no one will believe that I am not Chinese. Since this is the case, it is better to announce it openly.
Leng Bingyan did this in the hope that the Chinese language of computers would be as popular as possible. It would be even better if the government led behind the scenes of Crazy Day, and it would directly reach the height of the national level, quack...
Believe in such a feat, the country will not cherish itself.The military needs such talents... Information warfare, if there is no unique system of its own, is very likely to be defeated before the war begins.
After finishing all this, Leng Bingyan retreated, and at this moment, he found that there was something wrong next to him. On the other side of the partition, Hu Yan'er was looking towards him through the transparent material with a look of surprise on his face.
"Bingyan, what system are you using? Why haven't I seen it before?" Hu Yan'er opened her mouth and asked, obviously she just noticed Bingyan just now, she didn't see what Bingyan did before, she just thought There was something new about that system.
"Uh, this is the latest operating system developed by our Fenglan, or... a trial version!" Leng Bingyan had an idea, and said casually.I thought to myself: Actually, I didn’t talk nonsense. This system has indeed been copied for Xianer. It is not a big problem to say that it is a trial version that Fenglan will produce soon.
"What? We Fenglan is going to launch an operating system?" Hu Yan'er looked surprised, and hurriedly ran around to Bingyan, carefully sizing up the system... She had never heard such news!
top secret!This is definitely an absolute secret in business!How did Bingyan know, and she is already using this trial version.Suddenly Hu Yan'er became curious about Leng Bingyan's identity. She...could not be the eldest lady who came down from the air, right?
"I... am actually a test user in the company, trying out this system internally." Seeing more and more people gathered, Leng Bingyan said hastily.
Apparently, for no better reason, everyone believed it.
So the focus shifted to the system. Several people tried it out, and were immediately amazed by it, and the prospects suddenly became brighter.
"This system is really great!" Yang Mo praised without hesitation.
"Bingyan, make a copy for us..." They looked at her expectantly as they said that, technicians are like this, seeing high-tech things is like seeing a baby.
But these Leng Bingyan can't decide, this set of "Purple_lightning1.0" is already the top secret of Fenglan Technology, and it must not be leaked out.
Thinking about it, she picked up her mobile phone and dialed Long Xian'er. The tragedy was that something like this happened inadvertently, and the mess had to be handed over to Xian'er to clean up.
Ten minutes later, Long Xian'er came to the office, holding a stack of documents in her hand.
"Do you want to use this system in advance?" Long Xian'er asked, seeing everyone nodded like chickens pecking at rice, pointed to the things in their hands and said: "Here are several agreements, you can install and use it after signing it .”
That agreement was originally signed for those real internal testers, but with the current situation, it is obvious that the number of internal testers will be expanded.
Fortunately, these people are trustworthy, their family affairs are clean, and they cannot be spies sent by others, and Long Xian'er doesn't have too many worries.
After a few swipes, everyone signed, happily took the small USB flash drive in Xianer's hand, and cared for it like a child...
Long Xian'er looked helplessly at Bing Yan who had caused trouble, and after seeing Bing Yan felt embarrassed for a while, she left with a smile...
(End of this chapter)
After chatting with colleagues in the office for a while, it can be seen that they all really like this refined-looking little girl with a faint mysterious aura.At work, I explained to Bing Yan very carefully, such as procedures, business and so on.
Leng Bingyan is also smart enough to understand everything, and he has mastered the essentials of the work in just a short time.
When it's time to go to work, Bingyan sits back to her own small site, on which the logo "R&D1-3-7" has been pasted with blue plastic tape, which I think means to represent a group of three teams. The last seven is the team number.
Turn it on, wait for a while, the buzzing sound of starting up...
It has to be said that the computer configured by the company for this office is currently the most advanced, almost reaching the level of luxury. After a while, the computer was turned on.
Looking at the very familiar Windows 7 operating system on the screen, Leng Bingyan wrinkled her lovely nose. Although Windows 7 is much more advanced than Windows XP and Windows Vista, based on the premise that the Windows system itself has huge loopholes, Leng Bingyan Bingyan has always been dismissive of windows.
But one thing has to be admitted, Microsoft's giant status is hard to be shaken, with the transcendent achievements of the Windows series global market share of more than 90.00%, it is destined to be the biggest threat to other operating systems.
Relatively speaking, Leng Bingyan looks at linux with admiration. In fact, linux only refers to the kernel. Linux is open source, so many companies develop based on its kernel.The more famous ones are Red Hat Linux (red_hat_linux), ubuntu_linux, and the best one in China is Zhongke Hongqi Linux.The authentic linux distributions are more famous redhat, suse, debain and so on.
It is precisely because the linux source code is visible that computer enthusiasts all over the world supplement it.It also makes linux a relatively perfect operating system with almost no loopholes.
The Linux system is designed for a multi-user environment, so a clear distinction is made between system files and user files, and each file has different user attributes.As an ordinary user, you can usually only read and write your own files, but you can only read and not modify general system files. Even reading of some sensitive system files is prohibited.
This design fundamentally guarantees the security of the system, even if a user file has a problem, it will not affect the entire system.In contrast to the windows system, in the era before win2000, there was no such difference between users. Almost all system users have administrator privileges and can modify system files arbitrarily.
Even though Microsoft later realized this problem and distinguished between administrators and ordinary users in the subsequent system, he still did not solve this problem well in terms of permissions. What administrators can do, ordinary users still Basically everything can be done, such as installing software, modifying system settings, and deleting user files.
This also explains why once an ordinary user of Windows is infected with a virus or a Trojan horse, it usually endangers the security of the entire system, and there is almost no reason why such a situation has never occurred in the Linux world.
Of course, Windows 7 has been greatly improved since then. The user group policy installed by default in Windows 7 does not log in as an administrator account, thus avoiding some problems.
It can be said that the architecture of an operating system has predetermined its security.In fact, the fundamental reason why Linux has relatively few security vulnerabilities is that it is open source and modifiable. After so many years, the vulnerabilities have been studied almost. Linux also has shortcomings. Its hardware compatibility with audio and video has not been very good, but it is still quite powerful in data processing and programming calculations.
But even so, Leng Bingyan still did not choose to switch from Windows to Linux, because she has a more secure and reliable system!
He secretly took out a data cable, plugged one end into the computer, and the other end extended to the necklace around his neck.
The Pillow Demon has become her special "mount". Whenever she needs to use the computer, she will turn the Pillow Demon into a notebook.The Pillow Demon itself is a high-tech product. Although the internal massive database is huge and contains countless information, Leng Bingyan did not directly call his favorite operating system from it.Instead, I used the knowledge I had mastered to independently write one.
Of course, the self-compiled system cannot be as perfect as the system in the database, but at any rate, Leng Bingyan also has the reputation of "Purple", and I believe that the system is beyond ordinary technology, at least a little more advanced than windows and linux.
Now that system is already lying in the belly of the Pillow Demon, Leng Bingyan is going to name it "Purple_lightning1.0", which means the primary version of Purple Lightning.
With the power of Pillow Demon, the small system installation can be completed directly.
restart……
The debugging progress bar went up, and finally it was completed with a sound of "beep!".
The system on the screen is still in the form of windows, but it is obviously different from the windows system. The layout and principle are completely different. It is absolutely impossible for humans to complete it, but Leng Bingyan managed to do it...
When Long Xian'er saw this system, her eyes lit up, as if she saw another way to get rich.Leng Bingyan has reasons to believe that Xian'er has put her mind on this system.
Out of the designer's self-confidence, Leng Bingyan firmly believes that the performance of his own system is more than one step higher than that of Microsoft's, and it has a more special feature - full Chinese language compilation!If it is really put on the market, it will surely grab a lot of shares.
Click on the webpage, and Leng Bingyan directly enters the URL of the "Crazy Day" forum. This is a forum for computer technology enthusiasts, and it is also where the ID "Frozen Tears" made its fortune.
I remember that the deputy administrator of this website, Mizuki, is also Bingyan's apprentice, and once set her as an honorary moderator!
Judging from the fact that Mizutsutsuki belongs to the government department, Leng Bingyan guessed that the controller behind this website is very likely to be the government!Because the government needs talents like hackers, it is very possible to dominate a website to attract those masters.
Leng Bingyan couldn't control that much, and directly hung up the principle and core of the Chinese language in the form of a super-large attachment. Of course, she registered a new account, after all, the identity of the ID "Frozen Tears" has been exposed .
What should I name it?After thinking about it again and again, I came up with a Chinese name "Zi Mou".Haha, anyway, it is about the Chinese language, and no one will believe that I am not Chinese. Since this is the case, it is better to announce it openly.
Leng Bingyan did this in the hope that the Chinese language of computers would be as popular as possible. It would be even better if the government led behind the scenes of Crazy Day, and it would directly reach the height of the national level, quack...
Believe in such a feat, the country will not cherish itself.The military needs such talents... Information warfare, if there is no unique system of its own, is very likely to be defeated before the war begins.
After finishing all this, Leng Bingyan retreated, and at this moment, he found that there was something wrong next to him. On the other side of the partition, Hu Yan'er was looking towards him through the transparent material with a look of surprise on his face.
"Bingyan, what system are you using? Why haven't I seen it before?" Hu Yan'er opened her mouth and asked, obviously she just noticed Bingyan just now, she didn't see what Bingyan did before, she just thought There was something new about that system.
"Uh, this is the latest operating system developed by our Fenglan, or... a trial version!" Leng Bingyan had an idea, and said casually.I thought to myself: Actually, I didn’t talk nonsense. This system has indeed been copied for Xianer. It is not a big problem to say that it is a trial version that Fenglan will produce soon.
"What? We Fenglan is going to launch an operating system?" Hu Yan'er looked surprised, and hurriedly ran around to Bingyan, carefully sizing up the system... She had never heard such news!
top secret!This is definitely an absolute secret in business!How did Bingyan know, and she is already using this trial version.Suddenly Hu Yan'er became curious about Leng Bingyan's identity. She...could not be the eldest lady who came down from the air, right?
"I... am actually a test user in the company, trying out this system internally." Seeing more and more people gathered, Leng Bingyan said hastily.
Apparently, for no better reason, everyone believed it.
So the focus shifted to the system. Several people tried it out, and were immediately amazed by it, and the prospects suddenly became brighter.
"This system is really great!" Yang Mo praised without hesitation.
"Bingyan, make a copy for us..." They looked at her expectantly as they said that, technicians are like this, seeing high-tech things is like seeing a baby.
But these Leng Bingyan can't decide, this set of "Purple_lightning1.0" is already the top secret of Fenglan Technology, and it must not be leaked out.
Thinking about it, she picked up her mobile phone and dialed Long Xian'er. The tragedy was that something like this happened inadvertently, and the mess had to be handed over to Xian'er to clean up.
Ten minutes later, Long Xian'er came to the office, holding a stack of documents in her hand.
"Do you want to use this system in advance?" Long Xian'er asked, seeing everyone nodded like chickens pecking at rice, pointed to the things in their hands and said: "Here are several agreements, you can install and use it after signing it .”
That agreement was originally signed for those real internal testers, but with the current situation, it is obvious that the number of internal testers will be expanded.
Fortunately, these people are trustworthy, their family affairs are clean, and they cannot be spies sent by others, and Long Xian'er doesn't have too many worries.
After a few swipes, everyone signed, happily took the small USB flash drive in Xianer's hand, and cared for it like a child...
Long Xian'er looked helplessly at Bing Yan who had caused trouble, and after seeing Bing Yan felt embarrassed for a while, she left with a smile...
(End of this chapter)
You'll Also Like
-
One Piece meme: Starting with eight extraordinary skills
Chapter 333 1 days ago -
Pokémon: I picked up a reborn Eevee at the start of the game.
Chapter 515 1 days ago -
Type-Moon: My Destiny Guide
Chapter 376 1 days ago -
Divine Seal: From a Heavy Sword to Slicing Through the Holy Demon Continent
Chapter 247 1 days ago -
Douluo Continent: Starting with Transforming Xiao Wu into the Zerg Queen
Chapter 127 1 days ago -
Nobody told me this wasn't a game.
Chapter 347 1 days ago -
Savior of the everyday world of crossover anime
Chapter 86 2 days ago -
I unleashed a Hundred Demons Parade in the Ninja World
Chapter 1251 2 days ago -
Thank you for the invitation. He's in heaven now, he's become God.
Chapter 583 2 days ago -
I don't want to be an elf!
Chapter 318 2 days ago