Lee Sedol vs AlphaGo, More People Pay Attention to Search Algorithms - Citing the Importance of Tools in "Python Stunts: Using Python to Become a Top Hacker"

Lee Sedol vs AlphaGo More people pay attention to the search algorithm

—quote The Importance of Tools from " Python Stunts: Becoming a Top Hacker with Python "

 

This article was written on March 14th , Valentine's Day. It's a gift I gave to Lee Sedol. Yesterday was my birthday. Lee Sedol used his ability to knock down AlphaGo. I won't give a detailed analysis of the first four rounds. Because this article is talking about computer languages.

After seeing the title, many people feel that the main title and the subtitle seem to have little relevance, but they are not. Let me analyze it for everyone first. The search for human-computer warfare brings more thinking to everyone about artificial intelligence. Among a lot of topics in artificial intelligence, more people pay attention to the learning ability and search ability of computers. Well, have you found the search ability? In fact, some mathematical models are simulated and implemented in programming language after theoretical scrutiny. The reason why the computer language has such a practical function is that the computer is a master of poor reading. As long as the logic is correct, it will continue to walk out the answer you want according to the settings of the program. AlphaGo is also supported by powerful computing hardware to perform some galaxy series operations to find the optimal solution. On the other hand, learning ability and learning ability are like being in a loop, doing experiments repeatedly, and patching if there is a mistake. This is an endless loop under one rule, and some of your shortcomings are improved.

So does the programming language matter? In view of the above, the programming language does not seem to have any importance, and the theory of data models and some algorithms is more important than the programming language. Yes, that's why many people want to be a hacker, but he is always not in the stream, and always uses some tools of others on the Internet to do some hacking activities, and some even buy paid versions of tools online to carry out hacking activities . Here I will first tell you about the book " Python Stunts: Using Python to Become a Top Hacker" before reading it. First of all, you must have some basic knowledge of computer systems and computer networks, and then read how computer languages ​​implement functions on some basic knowledge. These two points are to help you find the legendary bugs , because many loopholes are passed through countless times. The poor reading method, the small tools written in the computer language do countless scans to find the theory is consistent with the actual . Therefore, the language is actually only a tool to realize the theoretical model.

Going back to the situation in the book, PYTHON , the big python, can be regarded as a good tool for individual combat. First of all, in terms of syntax, its logic and writing statements are relatively short, which is very suitable for the writing of hacking tools. On the other hand, fields such as penetration testing, electronic forensics, network traffic analysis, wireless security, etc. require the support of third-party libraries. In this regard, Python 's ecology has done very well, which is much more practical than other short-lived languages. Many languages ​​with virtual machines talk about how efficient they are, but many times the library support is not enough, resulting in some languages ​​only in name. Therefore , in the fields of penetration testing, electronic forensics, network traffic analysis, wireless security, and other fields, Python can simply call library functions, or third-party library functions.

In addition, the chapters and arrangements of this book are also very reasonable. For Chinese students, a suitable and practical case is more suitable than a simple theory or COOKBOOK . Tell the reader how to implement some programs and methods to implement HACK with case analysis . For society, the HACK method revealed by this book is not too advanced, and many loopholes seem to have been closed now, so it will not increase social unrest. At the same time, the book gives readers the opportunity to exercise, cultivate hands-on Ability to lay the foundation for innovation.

Guess you like

Origin http://10.200.1.11:23101/article/api/json?id=327033328&siteId=291194637