Quartus II 18.0 installation tutorial (very detailed) from scratch to mastery, just read this article (installation package attached)

software download

Software: Quartus II Version: 18.0
Language: English
Size: 2.62G
Installation environment: Win11/Win10/Win8/Win7
Hardware requirements: [email protected] Memory@4G (or higher)
Download channel①Baidu network disk丨64-bit download link:

https://pan.baidu.com/s/1fiTFBMA149iBoEURslVoKQ

Extraction code: 5678

Software introduction

Quartus II is a comprehensive PLD/FPGA development software that supports multiple design input forms such as schematics, VHDL, VerilogHDL, and AHDL (Altera Hardware Description Language). It embeds its own synthesizer and simulator to complete the design process. Complete PLD design flow input into hardware configuration.

installation steps

1. Right-click the [Quartus II 18.0 (64bit)] compressed package (win11 and above systems need to click "Show more options" first) and select [Extract to Quartus II 18.0 (64bit)].

2. Open the decompressed folder, right-click [QuartusSetup-18.0] and select [Run as administrator].

3. Click [Next].

4. Select [I accept the agreement] and click [Next>].

5. Modify the first character C in the path address to change the installation location of the software (for example, change C to D to install on the D drive), click [Next>].

6. Click [Next>].

7. Click [Next>].

8.Software installation in progress...

9. Uncheck [Launch USB Blaster…] and click [Finish].

10. Select [If you have a...] and click [OK] (do not close the interface that pops up afterwards).

11. Open the [license] folder in the [Quartus II 18.0 (64bit)] folder after decompressing the installation package.

12. ❶ Right-click [license.dat] ❷ Select [Open with] ❸ Select [Notepad] ❹ Click [OK].

13. Replace all [XXXXXXXXXXX] in the opened document with [the characters after (nic) ID] (as shown in the interface that pops up after step 11), and save after replacement.

14. Copy the saved document to the root directory of the software installation location (set in step 6, here it is: D:\intelFPGA\18.0).

15.❶Click […]❷Select [license], ❸Click [Open].

16. Click [OK].

17. Click the [X] in the upper right corner of the software to exit the software first.

18. Open the [Quartus II 18.0 (64bit)] after decompressing the installation package, right-click [Crack] and select [Copy].

19. Right-click the desktop [Quartus (Quartus Prime 18.0) Standard Edition] and select [Open file location].

20. Right-click the mouse in the blank space and select [Paste].

21. Right-click the pasted [Crack] and select [Run as administrator].

Kind tips

① Before running [Crack]: first turn off "all anti-virus software (the "McAfee" that comes with some computers must also be turned off), firewall, and Windows Defender", otherwise it may be accidentally killed by the anti-virus software and unable to run. If the file no longer exists, you need to re-decompress the installation package.

②▷Guess you want to ask: Why does anti-virus software falsely report viruses?

22. Click [OK].

23. Click [OK].

24. Click [No].

25. Double-click the desktop [Quartus II 18.0 (64bit) (64-Bit)] icon to start the software.

26. Installation successful.

digression

Many people who are new to the computer industry or graduates of computer-related majors from universities encounter difficulties in finding employment due to lack of practical experience. Let's look at two sets of data:

  • The number of college graduates nationwide in 2023 is expected to reach 11.58 million, and the employment situation is grim;

  • Data released during the National Cyber ​​Security Awareness Week show that by 2027, the shortage of cyber security personnel in our country will reach 3.27 million.

On the one hand, the employment situation for fresh graduates is grim every year, and on the other hand, there is a shortage of one million cybersecurity talents.

On June 9, Max Research’s 2023 Employment Blue Book (including the “2023 China Undergraduate Employment Report” and “2023 China Higher Vocational Students Employment Report”) was officially released.

The top 10 majors with the highest monthly income for college graduates in 2022

Undergraduate computer majors and higher vocational automation majors have higher monthly incomes. The monthly incomes of the 2022 undergraduate computer majors and higher vocational automation majors are 6,863 yuan and 5,339 yuan respectively. Among them, the starting salary of undergraduate computer majors is basically the same as that of the 2021 class, and the monthly income of higher vocational automation majors has increased significantly. The 2022 class overtook the railway transportation major (5,295 yuan) to rank first.

Looking at the major specifically, the major with the highest monthly income for the 2022 undergraduate class is information security (7,579 yuan). Compared with the class of 2018, undergraduate majors related to artificial intelligence such as electronic science and technology and automation performed well, with starting salaries increasing by 19% compared with five years ago. Although data science and big data technology are new majors in recent years, they have performed well and have ranked among the top three majors with the highest monthly income for 2022 undergraduate graduates six months after graduation. French, the only humanities and social sciences major that entered the top 10 highest-paying undergraduates five years ago, has dropped out of the top 10.

“There is no national security without cybersecurity.” At present, network security has been elevated to the level of national strategy and has become one of the most important factors affecting national security and social stability.

Characteristics of the network security industry

1. The employment salary is very high, and the salary increases quickly. In 2021, Liepin.com announced that the employment salary in the network security industry is the highest per capita in the industry, 337,700!

2. There is a large talent gap and many employment opportunities

On September 18, 2019, the official website of the "Central People's Government of the People's Republic of China" published: my country's demand for cyberspace security talents is 1.4 million, but major schools across the country train less than 1.5 million people every year. Liepin.com’s “Cybersecurity Report for the First Half of 2021” predicts that the demand for network security talents in 2027 will be 3 million. Currently, there are only 100,000 employees engaged in the network security industry.

The industry has huge room for development and there are many jobs

Since the establishment of the network security industry, dozens of new network security industry positions have been added: network security experts, network security analysts, security consultants, network security engineers, security architects, security operation and maintenance engineers, penetration engineers, information security management Officer, data security engineer, network security operations engineer, network security emergency response engineer, data appraiser, network security product manager, network security service engineer, network security trainer, network security auditor, threat intelligence analysis engineer, disaster recovery professional , Practical attack and defense professionals...

Great career value-added potential

The network security major has strong technical characteristics, especially mastering the core network architecture and security technologies at work, which has an irreplaceable competitive advantage in career development.

As personal abilities continue to improve, the professional value of the work they do will also increase with the enrichment of their experience and the maturity of project operations, and the room for appreciation will continue to increase. This is the main reason why it is popular with everyone.

To a certain extent, in the field of network security, just like the medical profession, the older you get, the more popular you become. Because the technology becomes more mature, your work will naturally be taken seriously, and promotion and salary increases will come naturally.

How to learn hacking & network security

As long as you like my article today, my private network security learning materials will be shared with you for free. Come and see what is available.

1. Learning roadmap

There are a lot of things to learn about attack and defense. I have written down the specific things you need to learn in the road map above. If you can complete them, you will have no problem getting a job or taking on a private job.

2. Video tutorial

Although there are many learning resources on the Internet, they are basically incomplete. This is an Internet security video tutorial I recorded myself. I have accompanying video explanations for every knowledge point in the roadmap above.

The content covers the study of network security laws, network security operations and other security assessments, penetration testing basics, detailed explanations of vulnerabilities, basic computer knowledge, etc. They are all must-know learning contents for getting started with network security.

(They are all packaged into one piece and cannot be expanded one by one. There are more than 300 episodes in total)

Due to limited space, only part of the information is displayed. You need to click on the link below to obtain it.

CSDN gift package: "Hacker & Network Security Introduction & Advanced Learning Resource Package" free sharing

3. Technical documents and e-books

I also compiled the technical documents myself, including my experience and technical points in participating in large-scale network security operations, CTF, and digging SRC vulnerabilities. There are more than 200 e-books. Due to the sensitivity of the content, I will not display them one by one.

Due to limited space, only part of the information is displayed. You need to click on the link below to obtain it.

CSDN gift package: "Hacker & Network Security Introduction & Advanced Learning Resource Package" free sharing

4. Toolkit, interview questions and source code

"If you want to do your job well, you must first sharpen your tools." I have summarized dozens of the most popular hacking tools for everyone. The scope of coverage mainly focuses on information collection, Android hacking tools, automation tools, phishing, etc. Interested students should not miss it.

There is also the case source code and corresponding toolkit mentioned in my video, which you can take away if needed.

Due to limited space, only part of the information is displayed. You need to click on the link below to obtain it.

CSDN gift package: "Hacker & Network Security Introduction & Advanced Learning Resource Package" free sharing

Finally, here are the interview questions about network security that I have compiled over the past few years. If you are looking for a job in network security, they will definitely help you a lot.

These questions are often encountered when interviewing Sangfor, Qi Anxin, Tencent or other major companies. If you have good questions or good insights, please share them.

Reference analysis: Sangfor official website, Qi’anxin official website, Freebuf, csdn, etc.

Content features: Clear organization and graphical representation to make it easier to understand.

Summary of content: Including intranet, operating system, protocol, penetration testing, security service, vulnerability, injection, XSS, CSRF, SSRF, file upload, file download, file inclusion, XXE, logical vulnerability, tools, SQLmap, NMAP, BP, MSF…

Due to limited space, only part of the information is displayed. You need to click on the link below to obtain it.

CSDN gift package: "Hacker & Network Security Introduction & Advanced Learning Resource Package" free sharing

Guess you like

Origin blog.csdn.net/Javachichi/article/details/132986748