Chapter 164(1/2)
162. One punch can prevent a hundred punches from coming
"Do you have a way to do anti-plug-up procedures?" Cao Yang asked.
"emmm..." Liu Guangran frowned, "The best way is to add more judgments on the server. Synchronous running data will definitely eliminate plug-ins. If you do anti-plug-ins, you can only do it on the client."
The server-side synchronous running is definitely the most accurate, and League of Legends uses this set.
Because there is no plug-in on the server.
The server is in the company and in the server's computer room. It may cause problems unless someone can come in to physically load it, or an executive who is in charge of the server accidentally receives the Trojan horse and then inserts the Trojan horse onto the server.
Otherwise the server will be safe.
Since the server is safe and clean, when the server runs all logical operations, the result will definitely be the most accurate.
What the client says can only be used as a reference. If the data performance of the client and the server is consistent, it means that there is no problem with the client.
If the calculation results of the client and the server are quite different, it means that the client is likely to have plug-ins.
However, in terms of the current network situation, it is definitely unrealistic to put data on the server to run synchronously.
You should know that the main selling point of Three Kingdoms Online is [National War]. The national war has very high requirements for the number of people online, and at the same time, it also requires very high requirements for the smoothness of network interaction.
Therefore, it is impossible to place it on the server for judgment, otherwise network delay alone will be fatal.
If the anti-plug-in program is done on the client, it cannot guarantee that it will be safe.
This kind of anti-plug-up program is equivalent to [anti-virus software], which will judge some commonly used interfaces and memory in games. If a program tries to connect to the interface or modify local memory without authorization, the anti-plug-up program will start an alarm and check and kill the program.
The common method of Steam and Orange platforms is to use this anti-plug-up method.
This is actually impossible, because most games on the Steam and Orange platforms are stand-alone games, and stand-alone games are not mentioned by the server. All data and operations are placed on the client and run locally by the player.
Therefore, it is inevitable to generate plug-ins, and even players can handle everything with just one UE modifier.
The anti-plug-up program of the client can only provide a certain degree of protection and detection, and there is no possibility of completely eliminating it.
"Yes, just do it." Cao Yang had no better solution. Since the server synchronous data running cannot work, the client's anti-plug-in program is the only way.
"Yes, OK." Liu Guangran nodded.
Sometimes he thinks that Cao Yang is not as strong as a boss. When you talk about the terms and designs in the program, you may have only said one noun, and Boss Cao already knows it, and he knows more than you.
Liu Guangran himself was also very surprised.
However, after checking, he found that the boss actually graduated from the computer science department of Qinghai University. He can be said to be an alumnus and his junior brother, so it is not surprising that he understands programs.
Of course, Liu Guangran dared not call him junior brother.
What is strange is that Cao Yang not only understands procedures, but also has high attainments in art. According to the words of the company's owner Mei Ma Hao, Cao Yang's painting skills and painting style are at least 20 years ahead of this era.
I can only say that this world is unfair.
Some people not only have the ability, money, and have the best wife like Miss Mining, but God also gave him a beautiful face.
Cao Yang is the kind of man who can make money even if he doesn't work.
Liu Guangran really couldn't envy him.
"By the way, boss," Liu Guangran remembered something and continued, "In addition, I can add a precision strike function, manually load the plug-in list, so that the anti-plug-in program can check and kill these plug-in-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one plug-in-one
"Well, this is great." Cao Yang nodded.
but……
After Liu Guangran's reminder, Cao Yang suddenly thought of something.
"Hey, Guangran, do you think there is a way to get the address of the plug-in seller?" Cao Yang said, "so that we can come to catch people directly."
this……
Liu Guangran covered his face in pain.
"Boss, you're completely making things difficult for me."
The collapse of adults is often just a moment.
Liu Guangran felt extremely tired.
"I can't climb over the network cable, right? And... there is no network cable to climb here?"
Liu Guangran explained, "Since there is no way to trace the source of plug-ins, after the plug-ins are sold, they can only become an independent existence on the client side, and we have no way to track them down through plug-ins."
"Of course I know this..."
Cao Yang frowned.
"Wait, there is a way that might work."
"Hmm?" Liu Guangran raised his head.
His eyes revealed horror.
Liu Guangran no longer dares to chat with Boss Cao. Every time he chats with the boss, there will be a lot of inexplicable new needs.
What's even more terrifying is that these needs are more strange than the other, and they are things that ordinary people dare not think of.
When Liu Guangran returned to school to communicate last time, he found that in the software field, he was already much ahead of his former tutor and classmates in the same grade.
When someone asks, Guangran, how did you make such rapid progress?
Liu Guangran often has joy and pain on his face, saying that this is all tempered!
The so-called practice brings true knowledge, and this principle is really correct.
But if this continues, Liu Guangran feels that he will collapse one day.
It's so scary. When you encounter a boss who keeps using your needs to urge you, it's hard not to make progress.
Moreover, we must not only make progress, but also make progress significantly, which is much more than the players of the same level.
Seeing the horror in Liu Guangran's eyes, Cao Yang laughed silently.
"Boss, don't do this. If you smile like this, I feel scared in my heart." Liu Guangran said weakly.
"It's okay, this requirement should be very simple." Cao Yang said.
Liu Guangran shook his head.
I don't believe it.
But he still asked, "So what exactly is it?"
Cao Yang smiled sly, "Do you know how to enforce the law?"
"ha?!"
Liu Guangran felt that he had heard a terrible word, and for some reason, he felt a little scared in his heart.
"My idea is this. Is there any way to send Trojans to plug-in sellers and position them to plug-in manufacturers?" Cao Yang said, "You should know better about network security than me. Using Trojans should be feasible, right?"
“Um…”
Liu Guangran clenched his hand into a fist and put it beside his mouth and thought carefully.
There are several ways to invade someone else's computer—
The first is to bypass the security system through network attacks. This requires you to know the other party’s IP address or the network used by the company.
Another way is to use various means, beauty tricks, to query the other party’s account and password, and enter directly remotely through the account password.
This method is used more frequently in foreign spy war movies.
Corresponding to the second type, there is another way, which is to crack the password. Cracking the password is to invade the account by consuming a large number of passwords in a short period of time.
It is easier to steal bank card passwords, because bank card is a 6-digit password, and there are only 100,000 types of arrangements and combinations in total.
However, it is a bit troublesome to crack the computer password, and it is not impossible. The premise is the same as the first one, and you must know the other party’s IP in advance.
In fact, if you can really obtain the other party's IP, as long as the other party has not disguised your IP address, you can directly find the physical address through the IP and ask the police to come to arrest people.
Therefore, the best way is the third way, that is, by sending a Trojan to the other party and opening a backdoor in the other party’s computer background, then you can invade the other party’s computer through this backdoor, query the other party’s IP, and then go directly to catch people.
A Trojan virus refers to a piece of malicious code with special functions hidden in a normal program. It is a backdoor program that has special functions such as destroying and deleting files, sending passwords, recording keyboards and attacking Dos.
Trojan virus is actually a program used by computer hackers to remotely control computers. It parasitizes the control program in the controlled computer system, and cooperates with the inside and outside to operate the computer infected with Trojan virus.
General Trojan virus programs mainly focus on finding computer backdoors and waiting for an opportunity to steal passwords and important files from the accused computer. They can perform illegal operations such as monitoring and modifying data on the accused computer.
Trojan viruses are highly concealed and can launch sudden attacks based on hacker intentions.
What Cao Yang said is the third way.
But the only problem with this method is that-
"How can I build a Trojan on the other party's computer? The key is that if you send a Trojan, others may not necessarily accept it." Liu Guangran was very confused.
You can't wear a night clothes and plug a USB drive with a Trojan horse into someone else's computer like the ones performed in the spy war movie?
You all know where the other party’s computer is, why do you still need to build a Trojan?
This is obviously contradictory.
"You... you are still our chief technical officer, the director of the program department, and the first problem solver, can't you think about it?" Cao Yang looked at him with some amusement, "Think about it, how did the word Trojan come from?"
To be continued...