My Hi-Tech Library

Chapter 42 The Need for Cooperation

Li Yi has become a boss, so he doesn't need to look for a job, he doesn't need to pay attention to high education, and he is very attractive to him by guaranteeing him a postgraduate degree, a quota for direct blogging and so on.

Got it! Don't argue, the duck by the mouth has already flown away.

Several professors looked at each other, a little gloomy.

Professor Liu Qinghong thought for a moment, then looked at Li Yi and said, "You don't need to leave school. Since you have mastered all the courses, it doesn't matter if you don't take classes, but if you fail the final exam, you don't even think about graduating."

"Thank you teacher, I promise not to disappoint you." Li Yi was overjoyed and grateful.

Professor Liu Qinghong looked at Professor Lin Guiqing and asked for Li Yi, "Lao Lin, is your subject okay?"

Professor Lin Guiqing nodded with a smile, looked at Li Yi and nodded: "No problem, you can take my class without coming, as long as you can pass the exam."

"Your learning ability is good. It was our fault that you didn't find out in advance. If there is a chance, I still hope that you can continue your studies." After a pause, Professor Lin Guiqing looked at Li Yi and said expectantly.

"Okay, I'll consider it carefully." Li Yi nodded with a smile, not saying anything.

Li Yi has no interest in continuing his studies with a mysterious library. This is a knowledge system that is different from human civilization. Studying in school is of no help in this regard.

On the contrary, Li Yi was thinking of cooperating with the school to popularize alien knowledge in the library if there is an opportunity in the future.

The alma mater is undoubtedly a good partner.

Li Yi suddenly flashed this thought in his mind.

"What kind of software are you developing, is it inconvenient for me to take a look at it?" Professor Liu Qinghong asked Li Yi suddenly. He was very curious about what kind of software his students developed and actually used it to start a company.

Li Yi nodded happily. Now that he has said everything, he has no intention of continuing to keep it a secret.

Li Yi looked at Professor Liu Qinghong and said, "Teacher, what I am going to develop is a vulnerability scanning software, and make it into a customer service terminal, which needs to be downloaded."

"Yeah! Use this computer!" Professor Liu Qinghong nodded, pointing to a computer that no one was using, and gestured.

Li Yi walked over quickly, sat in front of the computer, opened the remote desktop, connected to the company's cloud server, and downloaded the client tool of the vulnerability scanning software.

The school is a gigabit fiber, with a download speed of tens of megabits per second, and it takes a few seconds to download the vulnerability scanning client.

Then, after installing the client, Li Yi explained to Professor Liu and others, while demonstrating the specific functions of the vulnerability scanning tool: "I found this test site on the hacker forum, and now, I use this software to demonstrate automatic vulnerability mining, …”

Professor Liu Qinghong, Professor Lin Guiqing, and Professor Qian gathered around one after another and watched curiously as Li Yi demonstrated the vulnerability scanning tool.

On the LCD screen, a code waterfall soon appeared, red, green and green code data poured down, and the vulnerability scanning tool was selecting the vulnerabilities in the test site with extremely fast speed and efficiency.

In less than ten minutes, the code waterfall on the screen suddenly stopped, showing that all the data tests have been completed.

"The test is over. The target data of this test site is relatively small. A total of 57 system loopholes have been found in the software. This is the test data. Please check it." Li Yi looked at Professor Liu Qinghong and asked for instructions.

Professor Liu Qinghong nodded and previewed the detection data curiously.

The software developed by Li Yi is an automated vulnerability mining tool. This automated vulnerability scanning tool has many products of the same type on the Internet, but it is very limited.

There are various aspects of the existence of system vulnerabilities. An automated vulnerability detection tool can never cover all the problems of the entire system. Therefore, the vulnerability mining work has always been manual-based, supplemented by scanning and testing tools.

However,

After reading the report results of this vulnerability detection tool, Professor Liu Qinghong was a little stunned, and his eyes were full of incredible colors.

The 57 system vulnerabilities provided by this vulnerability scanning tool include parameter pollution, integer overflow, null byte injection, CRLF injection, permission tampering, ..., etc., which are extremely comprehensive. If not, the target data of the test site is too small. More vulnerabilities may also be detected.

Professor Liu Qinghong was amazed, and immediately took out a loophole to test and verify.

The result is very obvious. The vulnerability discovered by the vulnerability scanning tool is real. Obviously, dozens of vulnerability data should be correct.

Such a short time and such accurate mining efficiency proves that this is a very powerful and excellent software.

"The functions are very powerful. Did you develop this software independently?" Professor Liu Qinghong looked at Li Yi and asked in disbelief.

"Uh! Our company has a very strong technical team." Li Yi smiled and said euphemistically without directly speaking frankly.

Professor Liu Qinghong nodded and said affirmatively: "Awesome, you have developed a very powerful security software. If you continue to upgrade it, you will definitely be able to occupy a place in network security."

After listening to Professor Liu Qinghong, several other professors couldn't help but nodded, all agreeing with Professor Liu's judgment.

Li Yi smiled and didn't answer the question.

Li Yi is not optimistic about the network security industry. The market is only so large and does not have the potential for innovation. The development of this industry is a coincidence, it is easy to make money, and the scanning tool is just a cash machine, and there is no need to continue to upgrade.

On the contrary, the simulation system has unlimited development prospects. If it is successfully developed, it can be used for virtual experiments, and can be used to simulate the alien technology in the experimental library, realize full physical simulation, develop virtual networks, metaverse worlds, ... , etc. This project has unlimited development possibilities.

Li Yi is very sure that the simulation system is the focus of future development.

"Teacher, if there is nothing else, we will leave first!" Li Yi looked at the professors and said goodbye.

"Don't leave in a hurry, I still have something to discuss with you." Professor Lin Guiqing looked at Li Yi and suddenly held back.

"Yeah! Teacher Lin, if you have anything, just tell me." Li Yi stopped and looked at Professor Lin Guiqing and asked curiously.

"That's right, I am very optimistic about this security software developed by your company, and I happen to have a need for cooperation in this area..." Professor Lin Guiqing introduced with a smile.

Hearing this, several professors couldn't help but feel moved. They usually don't have too many network projects, and there are urgent needs in network security. It is more appropriate to provide projects for their own students.

Li Yi also understood, and quickly explained with a smile: "No problem, Mr. Lin, I will have someone talk to you and give you the best conditions. When I was in the company, I was only responsible for technology, business and other work. No interference."

"Okay, okay, this is the best way to do it. It's really not suitable for those who are involved in these doorways." Professor Lin Guiqing laughed happily and nodded with satisfaction.

Li Yi smiled and confirmed that there was nothing wrong. Then he left again and left with the counselor Zhang Jie.

Chapter 42/370
11.35%
My Hi-Tech LibraryCh.42/370 [11.35%]