Chapter 28

"I don't care if ctOS has cancer or something?" Charlotte didn't want to hear these nonsense at all, she just cared, "It doesn't matter if it's AIDS, can you get rid of this virus!"

"It has already covered the entire system! Do you understand?" The man in the suit also understood Charlotte's heart very well. It is impossible for the president of an Internet company to understand the Internet. She just couldn't believe it subconsciously, "This virus program uses It is far beyond the level of this world, it cannot be the creation of an ordinary civilian hacker, make a decision, they are almost successful in invading."

"Hmm... ahhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhssesses!" Knowing that shirking responsibility and covering the lid will not help, Charlotte can only issue a destruction order, "execute order zero, destroy all data!"

All the people in the hall immediately started to prepare to operate, but they stopped soon because their computers were completely stuck in a black screen, with only a big ellipsis.

Then everyone looked at the ellipsis for a long time, and suddenly, the ellipsis turned into a progress bar with a sentence written on it:

"Copying... 0%"

"Execute the power-off procedure! Immediately execute the power-off procedure!" Charlotte was completely panicked. She leaned on the rostrum and issued an order hysterically, "Hurry up and notify the security department, notify the police, notify the Southern Company, and protect the ctOS of the three nodes." The center is safe, search for all suspicious persons!"

"You!" She pointed to everyone in the security hall, and made an ultimatum with her deadly eyes, "Hurry up and find a way to deal with this... virus, otherwise all of us will have no way out."

Immediately, the hall, which was originally quiet enough to hear a drop of a needle, immediately became noisy like a vegetable market. People desperately tried to make the computer respond with all actions: constantly tapping the keyboard to open the source code page, restarting the computer, or even directly disconnecting the computer. Electricity.

Let’s not talk about whether it’s useful or not. Charlotte, who has just left the security hall and is about to be questioned by shareholders and dignitaries in the meeting room, received a worse news:

"What! One of the nodes has been reset!"

Shocking news, absolutely shocking news.Charlotte, who was in an urgent mood, was about to faint from heartache when she received the news.

But she exerted her will, slowed down, and gave the messenger the loudest roar in her life: "Protect the remaining two nodes immediately, and tell everyone, we will die if we don't!
We only have 15 minutes. "

She glanced at the life countdown in the hall:
Copying...6%
……

At the same time, in an ordinary private house in the southern district, processors filled the entire room, and a middle-aged man wearing a blue-gray denim vest, long hair and beard, and a metal ring on his chin was concentrating on He tapped the keyboard in front of the screen, analyzing the unknown virus he just intercepted.

At the same time when the virus started to scan the entire system of ctOS, T-bone, one of the founders of the entire system, also received the information that the system was invaded at the first time.

T-bone, who has long since drawn a line with Bloom, will not be in danger of life because the system is completely invaded... Well, there is a little bit, but the impact is not big, he has long been a "living dead" up.

But because of the system he built himself, he also put in hard work and emotion. He regards the system as his heir. At the same time, out of the curiosity of a senior hacker, he also invested in the operation of anti-virus programs.

For this reason, he also called one of the other founders, Tobias, but Tobias himself was getting older, and at the same time he was persecuted by Bloom to the point of mental trauma, and his hacking methods were not as good as before. But he has a wealth of knowledge and can sometimes give some unexpected answers.

Computer viruses have the characteristics of reproduction, destructiveness, infectivity, latentness, and triggerability, but the essence is a set of instruction sets or program codes compiled by using the inherent vulnerabilities of computer software and hardware, which are artificially written. .

As long as it is a creation made by humans, it will definitely have weaknesses. Even if there is no solution to contain it in a short time, after brainstorming and continuous trials, there is no virus that can never be prevented.

But when he analyzed the collected viruses, after repeated firewall tests, he found to his horror that no matter what kind of detailed and complicated firewall algorithm or anti-virus software, he had no ability to resist this unknown computer virus. .

"It's like water or air, no, even water and air have impenetrable surfaces." T-bone talked to himself about his discovery in disbelief.

"But this virus program can be integrated with the anti-virus program in a very short time, making it impossible to be recognized or targeted. By the time he wants to do anything, he has been completely invaded by the virus."

"How can it adapt to any anti-virus software? Does this program have intelligence?"

"Then he might not be a virus designed by humans." A voice suddenly sounded beside him.

It was Tobias who had been watching for a long time. Tobias was a bald old man in pajamas. Under normal circumstances, his eyes were flustered and dodged.

But at this moment, his eyes are like sharp eagles.

"Oops," T-bone rolled the office chair in a panic and almost fell backwards, and it took a while to turn back.

"You almost scared me to death!" T-bone glared at Tobias angrily, but Tobias did not respond to T-bone's complaints, but concentrated on watching this amoeba-like constantly changing its own code. virus.

After a while, he finally realized, and asked T-bone seriously: "Do you know when this program was uploaded?"

"I don't know, I only know that this thing easily broke through the ctOS's strict firewall, and has not been discovered until it was discovered by the backdoor detection program I installed when it was about to scan the entire system."

T-bone described the whole process of encountering the virus, and at the same time narrated his own failure in frustration: "I immediately notified the Network Security Hall after receiving the warning, but it was too late, the virus has completely scanned the entire system, and The entire system is copied and transmitted."

"Where is the end point of its transmission?" Tobias asked immediately.

"You should ask, where is it?" T-bone turned the virus research monitor in front of Tobias, and switched the screen.

Then Tobias saw a very beautiful scene, a fish-like creature was swimming in an ocean composed of tens of thousands of network data lines.

But the careful Tobias understood the meaning of T-bone, and the constantly swimming fish creatures are actually huge data streams stolen by viruses.

But this fish is constantly swimming in the data ocean composed of various regions of ctOS, constantly absorbing every small node-the data in everyone's mobile phone, and then "excreting" it into the mobile phone, completing the exchange of a large amount of data .

"Cunning virus." Tobias shook his head. He knew that it would be impossible to find the final flow of data in a short time.

T-bone held up his phone and showed it to Tobias: "My phone is getting slightly hot." He turned back to the memory display page, showing 45%, "Now even my phone is constantly uploading and downloading data , let alone ordinary people."

"Have you thought of any solution?" Tobias asked his old friend. He knew that although T-bone didn't like Bloom, he would definitely not give up ctOS.

"Now I have only two ways to locate the virus publisher," T-bone announced his battle plan to his old friend, "First, I have been looking at the surveillance video around the ctOS tower for the past hour, this is a slow effort, But you can definitely find someone.

The second is to stare at the three major nodes, which are the life insurance of Bloom's idiot maintenance department. If there is a problem there, if you find the person who destroyed the node, you will basically find the relevant person. "

Regarding these two plans, T-bone seemed full of confidence, but Tobias said to him: "Then you can look for it quickly. Just now your computer showed that the first node has been reset."

"what!"

……

At this time, Xie Yuan, wearing a built-in body armor, quietly sprang out from the second node—ctOS center.

Standing in the distance, looking at the security forces and police cars that immediately surrounded the entire ctOS center, I thought:
"The third node is estimated to be a fierce battle."

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like