my tech museum

Chapter 110

Chapter 110
"You'd better explain to me Mike, why the virus program appeared here, don't forget how you promised me back then."

Washington State.

In the security building that monitors global information data, the top person in charge Kaufman mercilessly accused Mike beside him, and the two walked quickly to the information strategy room while talking.

"Don't worry Kaufman, my plan is absolutely fine."

"It's just a small mistake right now, as long as the key is disclosed, the impact will naturally disappear."

Compared with Kaufman's nervousness, Mike looked obviously much more relaxed, and he did not forget to appease the other party's emotions while responding.

Because in order to retaliate against future technology, Mike chose to use virus programs to create chaotic economic losses after many considerations. Although it was not directly aimed at future technology, at least he would be very happy to see this scene.

For this reason, he deliberately contacted Kaufman, the person in charge of the security building, and borrowed his top computer talents to help.

Based on the ransomware virus, it has been upgraded and strengthened, and then spread.

Seeing that more than 200 million terminal devices were attacked in just two days, he felt a lot more comfortable, as if the stagnation accumulated in his heart was instantly cleared.

But the good times don't last long.

Just as he was waiting to see the further expansion of the influence, he discovered that this Trojan horse program had also appeared in Liganifer Island.

And spread faster.

The number of terminal devices attacked has reached more than 80 in just half a day since it was discovered, and even some medium-sized companies engaged in Internet security have not been able to prevent it.

In this situation, there is a sense of déjà vu of injuring the enemy eight hundred and self-defeating two thousand.

When encountering such a rare event suddenly, there are naturally many people discussing it on social platforms such as Twitter, YouTube, etc. In addition to accusing the security building of insufficient supervision, they are still thinking of various ways to restore the encrypted data. Data information.

Faced with this situation, how could Kaufman have a good face, at least in his opinion, this situation is the impact of Mike's plan.

To be honest, Mike really didn't expect the virus program to appear here, after all, it wasn't in his plan.

However, he didn't take this accident seriously, because unlike the situation in Yanguo, he held the key to recover the data information, and as long as it was released to the public, it would not cause any loss.

Of course there is nothing to worry about.

that's it.

Soon when the two came to the information room, Kaufman first asked, "How is the solution? The impact of this virus program must be resolved as soon as possible."

"Report sir."

"We are currently analyzing and confirming this virus program."

"As long as it is confirmed that its identity is correct, the patch key will be updated to recover the data information of the attacked device."

As one of the subordinates immediately opened his mouth to report the situation, before Kaufman could respond, Mike next to him interrupted and shouted in confusion: "This is the virus program you upgraded, and it needs to be analyzed. Are you sure?"

"It's a normal process."

"Okay, hurry up and work, I'll wait for the result here." Kaufman didn't respond to Mike, but directly interrupted the subordinate's response.

Hearing the sound, the other party naturally didn't dare to delay, and quickly turned around to face the computer screen to continue the work just now.

As time passed and Mike got impatient with waiting, a hurried and shocked shout suddenly sounded in the information room.

"This is not the virus program we made."

Almost at the end of the sentence.

Immediately, one after another, shouts and curses continued to spread.

"Shet!"

"My data information is locked."

"Stop it quickly."

"The key doesn't work, it's too cunning."

Kaufman, who was sitting on the sofa next to him and waiting for the good news, stood up immediately after hearing these harsh voices, and asked the subordinate just now, "What happened?"

"Report sir, we have been attacked by a virus program, and the data information in most of the devices has been locked."

"It's not the virus program we made at all."

After Kaufman heard the news, his facial expression froze immediately, and he couldn't believe that it would end up like this.

The department he is in charge of is definitely the most powerful existence in terms of Internet security. In the past, they were the only ones who monitored and attacked others. When did they have the experience of being attacked by viruses.

But now because of an upgraded version of the ransomware virus, important data information is locked, which is a great shame.

Thinking about this clearly, Kaufman dared not delay, and quickly ordered: "Find a way for me to crack this virus program. All locked data must be recovered, and all conceivable methods must be used."

"Yes, sir."

As a technician in the security building, the other party is well aware of how important these data are, and if they cannot be recovered, it will cause heavy losses to the department.

So even if you know that this matter is very difficult, you must grit your teeth and do it.

It can only be said that they were a little careless this time, thinking that the virus program that appeared in Liganife was the one they made, so they didn't pay enough attention.

It never occurred to me that the kernel of the program is completely different.

And all aspects of ability are even stronger than what they made.

It is equivalent to an upgrade and enhancement on their virus program, it is very normal to accidentally get tricked.

At this time, Kaufman's face gradually became gloomy, and he turned his head to look at Mike, who was still full of surprise, and said very dissatisfied: "I think you should understand the consequences of this matter, Mike, because your plan If such a large loss is caused, the higher authorities will definitely be held accountable.”

It can be said that Kaufman is more regretful now.

If I had known that Mike's plan would bring me such a big loss, I would never have agreed to him back then, but now it's too late to say anything.

As the person in charge of business, Mike also knows how much direct economic loss will be caused if the data information of these terminal devices under attack cannot be recovered.

Originally, he wanted to use this method to retaliate against future technology, but he didn't expect his base camp to be taken away first.

It is not an exaggeration to say that it is self-inflicted.

More importantly, no matter what, he couldn't figure out where a more powerful virus program emerged from.

Facts have proved that they still underestimated the power of the new virus program. With the efforts of many top Internet technical talents, the data information in the device was still locked two hours later.

There is simply no way to crack it.

But when Mike's face became more and more ugly, Brady suddenly came in from the outside, holding a Pingguo tablet device in his hand.

He quickly walked up to and behind Mike, and quickly reported the latest external situation to him.

"Mr. Mike, according to the latest news we have received, Future Technology has launched a security protection software called Star Shield, which not only effectively prevents the attack of our virus program, but also restores all locked data information."

Star shield?

Data Recovery?

Mike, who was already in a trance, suddenly heard Brady's words, he was stunned for a moment, and then subconsciously questioned after recovering: "This is absolutely impossible, how could they recover from the secret key without the key?" Encrypted data information."

But saying so, he still took the tablet computer that Brady handed over to him, and looked at the screen.

Because what is displayed on the screen is the information about Star Shield and the excellent results it has achieved after going online, and it is impossible for Mike to disbelieve the absolute facts.

And Star Shield was like the last straw that broke the camel's back, completely breaking Mike's psychological defense.

He mumbled something repeatedly in his mouth.

"How could this be, what a future technology!"

Mainly without this Star Shield, even if a large number of their terminal devices have been attacked, at least both sides will suffer losses.

Now the other party has recovered all the encrypted data information, reducing the loss caused by the virus program to zero, which makes them seem a little stupid.

Typical stealing chickens will not lose rice.

Such a huge psychological blow is hard to bear.

While Mike was still immersed in his own world, Kaufman next to him could not help but take the computer and check the information on it.

After discovering that all the losses caused by their previous virus program had been resolved, they were even more furious. They never expected Mike's plan to be so useless.

"Mike, you'd better give me an explanation?"

"I understand Kaufman. Future Technology must have re-encrypted our virus program. They must have done it." Faced with Kaufman's doubts, a flash of light suddenly flashed in Mike's mind, and he suddenly realized I want to understand the doubts.

Since Future Technology can decipher the key to restore the locked data, it can encrypt and upgrade the virus program, and then find a way to send it to them.

Unfortunately, he ignored a problem.

This program was created by them. Now that they know that the current situation is related to future technology, nothing will happen at all. They can only smash their teeth and swallow them in their stomachs.

But Kaufman is very clear about this truth.

Dang even said helplessly: "Even if we know that it is related to future technology, so what, our top priority now is to make up for the loss as soon as possible and find a way to recover the data."

Hearing this question, Mike was speechless for a while, unable to think of a solution.

On the other hand, Brady, who was next to him, thought about it and suggested: "In the future, if the technology can decipher the key and recover the encrypted data, then we should be able to do it."

"Google has just made a major breakthrough in the field of artificial intelligence, which may be able to help decipher the key."

"That's the only way to go now." Kaufman made a decision after hearing Brady's words, without much thought.

I am planning to go to high-end technology companies such as Gugeweiruan Pingguo to help decipher the key. After all, this is the only feasible way I can think of right now.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like