Blooming America

Chapter 275: CIA firewall

Chapter 275 A's Firewall

Catherine certainly believes that it is for the benefit of the United States.

The Internet is now popular in universities. After the east-west lines are connected, the connection from New York to California will become unimpeded. From Changchun Fujimen University to the University of California, they will all be closely integrated.

For college students, this is a place to disseminate ideas—according to the company's survey, more than 90 college students are interested in the Internet. And think this thing will change their lives.

Hoover is the vanguard of the anti-communist party. What he wants to do is naturally to suppress the spread of ** thoughts among college students in the United States. But he didn't know that his actions were completely counterproductive. Not only that, but A's normal work was also affected.

Relatively speaking, A's environment is more relaxed. As an organization that can burn money to the bottom of their hands, A is more financially rich than that, and they even have many non-white employees. For example, the famous spy Jin Wu Xiao, he has even become the top of A-but in the end because of the betrayal of the traitor, he caught it and was put in jail, and because of the attitude of a certain Luàn state, he finally had to be elected. "suicide". But whether it is suicide or suicide... Who knows, this thing is very common in the United States anyway.

"Um... OK, that's it."

Catherine hung up the phone, and then let out a long sigh of relief. When the final work of the magazine is completed tomorrow, Catherine will invite a professional manager to take care of the business here. As for Catherine, she is going to lead a team. Go develop a firewall for A.

"Sister Edson, this is the strategy for "Emma Cube" I wrote." At this time, "Rebecca" walked in.

"okay."

Catherine asked the other party to write this document. Being able to play "Emma Cube" to that extent, Catherine herself couldn't imagine.

Then the other party left, and Catherine continued to work.

"Rewall...?"

As soon as he left the office, "Rebecca" murmured, then immediately returned to normal and left.

And Catherine had no idea what happened, she was in a good mood now. Because A has sent someone to contact her, they seem to really need a firewall.

The firewall has a very good protective effect. The intruder must first traverse the security line of the firewall before reaching the target computer. But this can't completely prevent others from intruding.

Since A has extra money, Catherine is even going to recommend a professional team of computer engineers to them to deal with them.

But Catherine somewhat doubted whether A would really hire her own people. For them, this didn't seem to be a wise move. If so, how about helping A train a group of employees? Catherine is not sure if this should be the case. The key lies in A’s attitude. If they really hire their own people, it would be even better. Is this something more wonderful?

"Um... what kind of firewall should they need?"

The firewall needs to prevent some unpredictable people from querying the IP. This is the simplest thing. And another thing is to prevent hackers... although there is no such thing as a hacker.

Catherine took the paper and drew on the notebook, but "Rebecca" over there took a long time off, and then left the company...

"Rewall?"

"Rebecca" passed his message to Mourningbel.

And the other party is also suspicious.

…What is this?

Firewalls have always existed, but few people associate this thing with the Internet. But according to "Rebecca" intelligence, this thing seems to be related to the Internet. The other party did say so on the phone. If Mourningbel's guess is correct, this thing should be a piece of software.

These are not the key, the key lies in the news that Mourning Bell got from the other side-A was raided.

Mourningbel still feels very bāng for the United States to have conflicts on its own. But then he learned that this matter seemed to be related to the Internet. However, the KGB has not yet obtained more specific information.

These two things were connected together, Mourningbill seemed to understand something, but could not grasp anything.

However, he still gave this information and his own speculation to āo to his superiors, and he himself continued to investigate...

On the other hand, Catherine also returned to Noah's headquarters the next day, and then began to set up a working group dedicated to researching firewalls.

What Catherine is considering for A is not a software firewall, but a hardware firewall.

Embed the software firewall in the hardware, and then embed the x system and the software system of your own firewall, and then between the two parties.

Hardware firewalls are superior to software firewalls in many respects, and modern computers are not updated very quickly. It is completely feasible to develop hardware firewalls.

And with A to bear the research and development expenses, Catherine is also happy to continue to develop a new product for herself.

"Sister Edson, the east-west network will be connected soon, and we will have a huge network at that time. At this time, the number of people we have to face is ten times as large as now. This is a very research problem. We. I don’t want anyone to spoil us."

In the meeting room, Baduwa said to Catherine like this.

"There is no problem at all, we still have two months to go."

The project is expected to be faster than expected. If it goes well, the east-west fiber optic cable network can be completed as soon as the end of January. At that time, the New York network and the California network can be completely connected.

The time of invasion caused A to beat the gods. There are more people on the Internet, and if one of them suddenly becomes interested, then A may be bad. After all, what their "temporary workers" do is to pull hatred.

"How exactly should the firewall be arranged?"

Snake asked, who was following Badu.

"We will first develop a simple software version for emergency use, and then we will develop a complete hardware version."

"please continue."

"However, no matter how comprehensive and rigorous the installed hardware firewall is, once the hardware firewall is put into the actual use environment, the situation will change at any time. The rules of the hardware firewall will always change and adjust, and the configuration parameters will also change. It will change from time to time."

"...Why did it change?" Sneek seemed puzzled.

"It's the enemy." Catherine stretched out a finger-what she thought of at the moment-and continued: "If the enemy finds that their attack becomes ineffective, they will not continue to take this naive behavior. The other side’s engineer will definitely find a way to circumvent our firewall."

Both Baduwa and Sneek nodded.

“As a network security manager, it’s best to write a set of security policies that modify firewall configurations and rules, and implement them strictly. The hardware firewall configuration involved should be detailed as to which traffic is allowed and which services require proxy Such details..."

Catherine told them so, but the two seemed a little embarrassed.

"...We A don't have professional network talents yet..."

Catherine was taken aback.

"why?"

"Because our funding has just been cut... so many of our original plans have decided to postpone the implementation. But in terms of the current form, we have decided to establish our own network management personnel."

A is not enough funds? Are you kidding me? You didn’t take this seriously, right?

Catherine believed that this must be the case.

"This... Sister Edson, can you explain to us the specific details that the network firewall should pay attention to?"

Catherine nodded, and then continued: "In the security policy, it is necessary to specify the steps to modify the hardware firewall configuration, such as which authorizations need to be modified, who can make such modifications, when can the modifications be made, how to record these modifications, etc. Security. The policy should also specify the division of responsibilities. For example, if one person makes specific changes, another person is responsible for recording, and a third person will check and test whether the modified settings are correct. A detailed security policy should ensure that the modification of the hardware firewall configuration is programmatic. And can try to avoid errors and safety leaks caused by modifying the configuration."

Speaking of this, she paused: "Of course, with a firewall, it does not mean that we can rest assured. The enemy's technology is also improving, so we need better and more complete network methods. We are the most Fortunately, there is a programmer who specializes in mén's quick response. When the enemy invades, UU reading www.uukanshu.com and they can immediately dispatch... and even invade the other party's computer."

"It's a pity that we don't have such talents in A..." Baduwa shook his head.

"Maybe we can help you?" Catherine laughed suddenly, "We have a lot of technicians in our telecommunications company."

"It sounds really good, but we are going to set up a mén response department here. We may need some confidential talents..." Snake said euphemistically.

"Oh?"

Catherine did not expect that A would suddenly increase the importance of the Internet to such a strong level.

…Are they trying to get revenge?

It seems very possible.

Although Catherine’s financial path was cut off, fortunately, Catherine had a solution long ago: “It’s okay, if your personnel and technology are not enough, our telecommunications company can also provide you with first-class services. We can help you train absolutely Talents…"

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like