Current location - Music Encyclopedia - NetEase Cloud Music - Nintendo's source code leaked, revealing the past life of Super Mario.
Nintendo's source code leaked, revealing the past life of Super Mario.

Nintendo was attacked by the biggest hacker in history, and the complete source code, design and information of many works of "Pockmarked Dream" of Wii were leaked, and the subsequent impact of this leakage seems to have erupted. Early prototype videos of Mario Kart and Super Mario World 2 (Yaoxi Island), as well as early artistic designs of Super Mario World and other games were exposed on the Internet, revealing that the prototype, appearance and behavior of the game are completely different from the final product. The history of this source code leak can be traced back to the Super NES period. The leaked code is so large that it is described as "Gigaleak".

Yoshi's Island has different interfaces, music and mini-games, while Super Mario Kart does not drift. Even the once abandoned Star Fox 2 (eventually released with SNES Classic Edition) will have a human pilot at one stage.

Other tidbits include Super Mario World (Bowser's legs may be visible) and alternative artworks of Zelda 3, an early engine test of Mario Kart 64, and the source code of Star Fox 2.

not sure who got the information or how. Don't be surprised if Nintendo quickly deletes any original content. Because although it is more than ten years ago, it is still internal material. In essence, this is a large-scale data leakage event full of threats. These just let us see that the game will change greatly in the development process, and a good game will change for several generations, which will cost a lot of people's efforts. Nintendo, which has been gradually impressed by users as a "data sieve", is worth looking forward to how to reverse its image and save its poor network security image. It also makes us realize the importance of data security, especially for developers. What are the advantages of such a lively artificial intelligence technology in this respect?

artificial intelligence technology is a very good tool to ensure the security of sensitive information. Because it can quickly process data and predict and analyze, artificial intelligence is widely used in automation systems and information protection. In fact, ensuring data security is also the practical application of artificial intelligence technology at present, and there are also hackers who use artificial intelligence technology to carry out attacks. The more artificial intelligence technology is used for protection, the more likely it is to deal with hackers who use advanced technology. The following are several ways in which artificial intelligence is applied to data security protection.

Many hackers will use some passive methods in their attacks, that is, they will not affect the operation when they steal information from the intrusion system. With AI, enterprises can detect cyber attacks in advance, and even hackers will be found when they enter the system. The volume of network attacks is very large, especially many hackers can automate some work. But these attacks are similar to humans and difficult to deal with. For multitasking, AI is the best solution at present, which can detect malicious threats in time and alert users or lock attackers. By predicting threats, the system can create specific protection before attacks occur. With predictive technology, the system can run more efficiently without sacrificing safety.

multi-factor authentication changes the way code works. Users are required to enter different passwords in different locations. With the detection system of artificial intelligence, the characters may change. Multi-factor authentication can not only add a layer of security, but also be more intelligent on who can access the system. The system will learn the characteristics of users who can enter the network, and then cross-contrast behaviors and related characteristic patterns with malicious content to determine access rights.

Applying artificial intelligence technology to password protection and authentication can make passwords more secure. Before, the password was a word or phrase. Now enterprises begin to use actions, patterns, biological data, etc. to unlock information.

data security

artificial intelligence technology can identify patterns, find bugs, and even execute plans to fix vulnerabilities. With artificial intelligence, the whole network security will change and develop at a faster pace. More progress in technology will change more fields.

keywords artificial intelligence data security Nintendo video game information security Super Mario

Welcome to pay attention to Q&A (WeChat WeChat official account has the same name) to push fresh technology, directly connect interesting technologies, show creative ideas and present rare views.