Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume 1 Chapter 181 Shock (2)

Previous page        Return to Catalog        Next page

    Chapter 181 Shock (2)

    This function can be said to be quite powerful. The reason why Zhang Yang developed this function is that in order to save resources in special effects production, in some specific scenes, he can directly replace it and then supplement the pixels.

    However, even this single function has its biggest drawback!  As you can see from the introduction, these functions require huge amounts of computing data!  It's okay if you analyze a picture alone. An ordinary home computer can barely do the calculation, but it still takes more than ten minutes!

    If it is video replacement, then I'm sorry, it requires resources that even ordinary servers cannot provide!  If a video is converted into a picture according to the number of frames, then the computer resources it needs to process the picture will be absolutely astronomical. I am afraid it must be a supercomputer, and a supercomputer equipped with specialized image processing components will be able to do the job.  This works.

    In the logical judgment of infected bugs, Zhang Yang thought of the function of this software, seamless replacement!  It seems quite simple to say, but there are essential differences between the two. First of all, the pictures are dead and can be analyzed and decompiled by your software at will.

    But anti-virus software does not. If your virus wants to modify the anti-virus software, it will be very difficult. After all, no matter which anti-virus software, the first and most important thing is to protect itself.

    However, Zhang Yang already has an idea. First of all, the concealment and infection capabilities of the infected bugs are quite powerful, and they can make a fuss about this. At least the current anti-virus software cannot identify the infected bugs, let alone anti-virus. Before they are infected,  Before the law of mutation of worms, the only anti-virus software that could kill infected worms was the mother nest written by Zhang Yang himself!

    Zhang Yang is currently writing mainly for Brood. When he first wrote Brood, Zhang Yang wanted to be able to kill all viruses. But now that he is writing infection bugs, Zhang Yang also wants to be able to kill all anti-virus software, the strongest spear.  It feels really strange to hold both the shield and the shield in his hand.

    But it has to be said that it is precisely because of this that Zhang Yang¡¯s technical strength in these two fields is increasing at a terrifying speed.  Brood Antivirus is not about analyzing the ability of viruses. After pondering for a long time, Zhang Yang began to rewrite what he had written before. Previously, Zhang Yang made an active decomposition of the virus by infecting bugs, and then recorded the anti-virus software's anti-virus methods, thus  Send back antivirus signatures from antivirus software.

    "But Zhang Yang doesn't want to do this anymore. In this way, the infected bugs can actively mutate and achieve the ability to evade anti-virus software. This is not impossible, but it is absolutely impossible to do now.  It is necessary to actively mutate to avoid detection by anti-virus software. The logical judgment involved is too complicated.

    Zhang Yang decided to use another ability, that is, mixed mutation and gene exchange. In the past, the gene exchange function of infected insects, that is, the mutation function, came into contact with similar viruses, and then it occurred. For example, the last time Zhang Yang released the chase  The virus that kills the assassin virus has mutated with the infecting bug, and the two sides have cross-exchanged.

    Now what Zhang Yang has to do is to strengthen this ability again, but also rewrite the function of the anti-virus software that he wrote before, that is, the active analysis.  After the infected bug detects the anti-virus software, it will immediately copy the same virus. When the virus is cleaned out by the anti-virus software, it will mutate according to its own mutation rules.

    Next, Zhang Yang also changed the infecting worm into a sub-virus. Inside the infecting worm will contain a sub-virus with powerful destructive capabilities. The main purpose of this sub-virus is to destroy the source code and database files of the target software, and at the same time also  Code that breaks the target can be analyzed and captured for secondary mutation.

    In this way, after the infected bug that has been killed once by the anti-virus software mutates once, the source code will be different.  After it destroys the anti-virus software, after secondary mutation, the source code will be completely different from before.  Then it will return, mutate, and genetically swap with the original parent virus from which it splintered.

    After writing all these functions, Zhang Yang discovered another problem, that is, the infection bugs have become larger!  There is no way, so many functions are combined together. Although it seems to be a virus in nature, its size is already 1.2m!

    Computer viruses are not that big at all, they are usually tens of kb or hundreds of kb!  However, Zhang Yang did not delete it. Instead, he quickly copied the virus into his computer, then established a simulation system, and then placed his own firewall in it. Zhang Yang wanted to try out the new infected virus.  How about it!

    After copying the two to the simulation system, Zhang Yang directly activated them.??'s infected bugs, and then pay close attention to the changes of the infected bugs. Zhang Yang naturally has ways to control the viruses he writes himself. The author of each virus will reserve deletion control means in the core code of the virus.

    Because Zhangyang¡¯s firewall also has anti-virus functions, it can be regarded as a combination of anti-virus software and firewall!  After Zhang Yang activated the virus, Zhang Yang immediately activated the infection bug.  At the moment of activation, Zhang Yang immediately discovered that the CPU usage of the entire computer was rising at a terrifying speed.

    "Fuck!" Zhang Yang was stunned for a moment, and then he couldn't help shouting. He suddenly remembered a key issue. When he was writing the infection bug, the infection bug copied a virus when it detected the anti-virus software.  When he went out to test the anti-virus software, Zhang Yang forgot a key issue!

    That¡¯s the problem with the number of replicating viruses!  I'm dizzy!  Zhang Yang was a little dizzy, and he immediately started to operate in a hurry, but soon Zhang Yang discovered that he was in a tragedy, because in the short period of time when Zhang Yang reacted, the infected bug copied an unknown number of viruses and went out to detect the firewall, and the firewall  It kept alarming and anti-virus, and the CPU usage immediately reached 100%.

    The reaction speed of the computer has almost become slower than a snail, and Zhang Yang cannot react at all when operating the computer!  "I'm going to go." Zhang Yang yelled depressedly. Now Zhang Yang couldn't do anything. He could only wait for the computer system to crash before he dealt with it.  The entire computer screen has been completely frozen, and all Zhang Yang can hear is the "buzzing" sound left by the high-speed operation of the server's hard drive.

    There was no movement on the screen for a long time. Zhang Yang wondered whether to turn off the computer. Anyway, it was already frozen. But if the system was not damaged, the same thing would happen even if it was turned on. Although it was said to be a virus running in a simulated system,  The simulation system also occupies server resources, which is a truth.

    Viruses are not human beings. Until Zhang Yang has no control over them, they will not be able to tell whether it is their owner¡¯s computer or someone else¡¯s computer. As long as it is a computer, it will be infected. The problem now is that even if it is turned on  , as long as the computer is restarted, I am afraid that as long as the system is not damaged, the problem just now will occur immediately.

    day!  Zhang Yang couldn't help but curse. One carelessness could lead to this result. Maybe, Zhang Yang would have to redo the system. The problem is that there are a lot of written software stored in this computer. If he redo the system,  I'm afraid these things are over!

    More importantly, Zhang Yang is also worried about another problem, that is, it seems that the infection bug is also a hard disk-resident virus, unless Zhang Yang deeply formats the hard disk.

    After struggling for more than ten minutes, Zhang Yang couldn't make up his mind. The main reason was that the server used a hard disk array, and the hard disks were all managed centrally. Zhang Yang had no way to distinguish which data was on which hard disk. If deep formatting was performed, what would happen?  If the hard drive storing the disordered array is formatted, then Zhang Yang will be in trouble.

    Just when Zhang Yang was struggling, the computer screen suddenly changed. Zhang Yang was stunned for a moment, and then immediately discovered that the CPU usage displayed in the CPU detection window he opened before was rapidly declining, and soon dropped to normal.  situation.

    What's going on?  After a pause, Zhang Yang quickly started to check the infected virus. In just twenty minutes, Zhang Yang didn't know how many files the infected virus had copied, and he didn't know why it stopped, but the entire server resources were probably destroyed.  Used by infecting insects.

    After finding the infection bug information he had written, Zhang Yang quickly entered his control program. After successfully deactivating the infection bug, Zhang Yang began to check its status. This check was not important, and Zhang Yang almost fell off his chair.  !  The entire infected insect has completely changed!

    Its source code has almost nothing that Zhang Yang is familiar with. As for how it mutated, Zhang Yang is not sure. Moreover, its size has changed. Originally it was about 1.2m in size, but now, it has become  It was about 3m in size, and not only that, the simulation system that Zhang Yang used to test the infected bug and his firewall were completely killed by the infected bug!

    First, he checked the firewall used for testing. After the test, Zhang Yang was speechless for a while. The entire firewall has now become a sieve, full of holes. More than 90% of the functions cannot be used due to the lack of key files. The entire firewall  The software cannot run completely.

    Needless to say, these holes must have been ¡°gnawed¡± by infected insects.  Not only was there a problem with the firewall, but the entire simulation system and environment used for testing were penetrated by infection worms!  It even affected Zhang Yang's real system. As for why the replication speed of the infected bugs slowed down, Zhang Yang would only know it after testing.
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report