Chapter 399 Qinglong System
After the introduction, Cai Hua went to the computer to do his own research. Chen Qian took Lin Dong to visit the laboratory here.
The most eye-catching thing in the laboratory are two oval white equipment like huge egg shells. Lin Dong guessed that this should be a simulation training cabin.
Chen Qian seemed to know Lin Dong’s thoughts and directly brought him to this "eggshell" and introduced: "This is the simulation training cabin developed by the Air Force Equipment Department. Currently, because the software and hardware are not closely matched, they are sent to us for software adjustments and modifications. Later, you brought your flying wolf helmets and prepared to combine them into a more complete and more realistic trainer."
Lin Dong nodded, but his eyes did not fall directly on the "big dome", but on the computer operated by the technicians.
All computers have no host, only one monitor. Lin Dong was surprised to find that these "computers" were just monitors, keyboards, and mouse connected to a black box the size of a palm. There was a network cable connected to the ground cable trough on the black box, and then I didn't know where to go.
"This is..." Lin Dong pointed to the black box and asked in surprise: "Is this kind of computer? In the cloud?"
Chen Qian said proudly: "Yes, this is our computer!"
Lin Dong was a little surprised. He had never seen such a computer.
But think about it, this is a research institute and a military confidentiality unit. Some strange things should not be anything, right?
Lin Dong was a little curious and found an empty seat to sit down. He could see that there was a button on the black box that should be the power supply, so he pressed it.
"This is based on domestic hardware, the military Qinglong operating system. It does not require a host, but it is directly operated in the cloud, so it looks different from ordinary computers." Chen Qian explained: "Because Microsoft's plague system has too many backdoors and loopholes, it is easy to be attacked. Although we have taken many security measures before, in the end, we still think that we have a safe operating system, so the Qinglong operating system has been established."
"Don't you have your own internal network?" Lin Dong was a little surprised. He knew that the army had its own internal network. Generally, there would be no problem of losing secrets on the Internet as large as possible.
"It's not that simple!" Chen Qian sighed: "I thought it was like this before. At least the military network would be safer, but in fact it is not like this."
Chen Qian told Lin Dong this thing.
A few years ago, the experimental computer room of a relatively famous military academy in China had both computers connected to the military network and computers connected to the Internet. Although it was in the same computer room, it belonged to different areas.
Once, a researcher worked overtime and drove a computer entering the Junnet. Because he had to check information from the Internet, he was lazy to connect the computer connected to the Internet to the Junnet. The two network cables were interchanged.
This researcher was originally recruited into a military academy. Although he received short-term military training, he was a rookie in terms of confidentiality concepts. Although the unit often learned confidentiality knowledge, he did not listen to it - he felt that those were too far away from him.
However, he never expected that his computer had been targeted by someone. A spy from a certain country found his computer through keyword searches, and then implanted a ferry Trojan. During his dual network conversion, thousands of files were stolen from more than 40 computers on the entire LAN - many of which were secret-level or above!
Although the researcher was dealt with afterwards, the loss could not be recovered!
There are many such lessons within the army. Grassroots officers and soldiers in the army often receive confidentiality education, so the concept of confidentiality is relatively strong, but the concept of confidentiality in some research institutions and institutions may not be strong.
Chen Qian said: "So, based on this situation, the Qinglong operating system has been developed internally. There is no host or hard disk, and everything is stored in the cloud. Even if you want to copy things away, it is not easy, so it is much safer now."
Lin Dong thought more: "I'm afraid it's not just that! With this operating system, at least it won't be controlled by others in the future!"
Chen Qian nodded and gave a thumbs up. It was obvious that Lin Dong had guessed the core thing.
Self-reliance has always been the dream way for national development.
You should know that although the things you buy may perform better and have stronger effects, they will inevitably be subject to others. To put it the simplest, the neighbor in southwestern China, with a population almost as large as China, the equipment used by the state army was almost "made by all nations", just like when China was liberated decades ago. Such a country is too easily controlled by others when fighting wars - not to mention big guys like aircraft, cannons, missiles, even small things like artillery shells, rockets, etc., your own country cannot build - at least you don't have that production line, and you can't use the things you make?
That's why a second-hand aircraft carrier was bought with hundreds of millions of dollars, but again and again, pigeons were put on, and finally paid 2.3 billion US dollars, which was more expensive than a new one!
There are also examples in China. In the 1990s, when Baodao attempted independence, China was practicing at sea, but they didn't know where the missiles that flew out - the missiles were used with GPS systems, and that thing was made by the old United States. As long as they adjust the parameters, all your missiles will be out of reach.
What’s even more disgusting is that if it weren’t for the South China Sea collision incident on April 1 more than ten years ago, our American reconnaissance plane was “dissected”, the Chinese military wouldn’t know at all. The Americans already knew the password of the enemy-me-identifier on our plane—that is, if we really fight with the Americans, they only need to change the identifier. At that time, the plane is in a state of out-of-visual range, and you think they are friendly aircraft—but they know you are enemy aircraft—how can you fight this battle?
Not to mention the Dayun incident, the J-8 reform incident, and the J-10 engine incident...
It is precisely because of these things that are subject to humans that the later Beidou navigation system, the current new enemy-friendly identification system, our Y20, and our Taihang engine - although it is not perfect, at least it has it, and it is not our own?
Just like the current Qinglong system, it is our own. We don’t have to be controlled by others, and we don’t have to worry about others being “bottled” at critical moments. When we really want to fight, we will lose a lot of concerns!
Lin Dong sighed secretly, we all know the appearance. It turns out that it is not just netizens who are anxious, but these national defense technicians are even more anxious.
Although some things are updated independently through imitation and copying, no matter how they are imitated for the sake of the country's interests, it is not an exaggeration.
This reminded Lin Dong of a sentence: "I feel relieved to know that our country is so hooligan!"
PS: Thank you for the monthly ticket support of Zhuzi 007, and thank you for the 12-year-old book friend for the reward of 588 coins! Thank you for your subscription and recommendation ticket support!
Chapter completed!