Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume 1 Chapter 275 Mutated Infectious Insects (2)

Previous page        Return to Catalog        Next page

    Chapter 275: Mutated Infectious Insects (2)

    Zhang Yang himself didn't even know what kind of state the infected bugs were in. After several mutations, the infected bugs already had preliminary logical analysis capabilities. Later, Zhang Yang added this to the infected bug system based on the simulation function of the brood.  The simulation function, this function and the initial logical analysis ability of the infected bug once almost caused Zhang Yang's server to crash. After that, the infected bug adjusted itself to prevent the server system from completely collapsing.

    Looking at the record log inside the infected bug, Zhang Yang¡¯s expression was quite strange. Should I say that I am lucky, or should I say that anubis is unlucky?  The so-called Adam is a semi-finished product, all its subsystems have been completed, and when anubis designed Adam, it was built based on the neuron distribution structure of humans and animals.

    The entire system is divided into many subsystems. At the end of the subsystem, it is equivalent to the neurons of the animal or human nervous system. These subsystems can be basicly analyzed and then integrated together, just like the brain governs the neurons. The entire system  The utilization rate and response speed are surprisingly high.

    But this brain is not so easy to program. Even if anubis has gathered so many experts, it is impossible to program this brain in a short time. After that, mak's laptop was brought to this secret research base. When it was connected to the base  After entering the internal network, the infection bug immediately infected the entire network.

    However, although the entire system has not been completely completed, this system with preliminary logical analysis is still different from a normal operating system, and then the simulation function of infected bugs plays a huge role.  Then there is the mutation of the infected bugs. The specific mutation cannot be seen from the logs.

    The only thing that can be seen is that this mutation process has gone through at least tens of thousands of mutations. At the end of the log, Zhang Yang almost laughed out loud. When the infected bug transferred data because it was connected to the external network, the entire anubis cost ten  All the programs of the Adam system that had been written over several years were completely transferred by the infected bugs. All the computers in the entire secret research institute completely crashed and went on strike due to the system transfer.

    Such a large data transfer would be a problem if anubis couldn't detect it. The reason why anubis broke out in the United States is because Zhang Yang's most peripheral broiler IP is in the United States. When the infected bug transfers data, it is from the American IP.  transferred, so Anubis went crazy looking for this data throughout the United States, but the people at Anubis did not expect that Zhang Yang would move so quickly and directly cut off the connection in the middle, causing them to lose the data.  connect.

    After more than ten years of research, countless manpower and material resources were spent, and finally they made a wedding dress for Zhang Yang. No wonder Thanatos went crazy. Zhang Yang would probably not be able to calm down, and it was even more serious than Thanatos and Anubis going crazy.  You must know that the entire system has been compiled for more than ten years, and the infection bug was so ruthless when transferring data, including the underlying data. In addition to the system structure information, other information in that research institute  Everything has been cleaned. In other words, there is nothing in anubis now. Even if you rewrite an Adam, there is probably no way to do it.

    "Haha! mlgbd, this is called evil being punished, haha!" After Zhang Yang figured out the whole process, he couldn't help but laughed wildly in the dormitory. This is a typical self-inflicted crime. Anubis is famous all over the world.  He stole research data from other companies, and in the end, something he had been researching for more than ten years was stolen by an infected bug just by accident.

    Zhang Yang didn¡¯t know how the anubis organizational manager was feeling at the moment. If it was Zhang Yang, he would probably cry to death.  But now Zhang Yang is probably even more confused about what the infected bug has mutated into.  "Infection bug, are you an operating system or a virus now?"

    "The database is insufficient to answer the question. Are online searches allowed?" The voice of the infected machine sounded again. Zhang Yang shrugged. It seemed that he thought too well. He really thought that the infected machine had become a super computer. In fact, to put it bluntly  It's not much different from before, except that a voice command function has been added.

    "What is the content of the data in the database? It is displayed on the screen." Zhang Yang asked tentatively again.

    This time, the infected bug quickly listed the data and displayed it directly on the computer screen.  ¡°First, the structure of the infected insect system constitutes a database.

    Second, sound collection and distribution, conversion database.

    Third, the subsystem fuzzy judgment analysis retrieves the database.

    Fourth, hardware matching, retrieval, and database calling.

    Fifth, analysis operation formulas, data simulation formulas, data analysis formula framework, no content.

    Sixth, chat room summary?Component and chat history backup.  "

    These are six major items. Under the six major items, there are densely packed small options. After reading it for a while, Zhang Yang understood that except for the sixth item, the others were all the core structural data of the entire system. Instead,  In other words, the size of the entire system is almost more than one hundred grams.

    As for the sixth item, Zhang Yang is a little curious. It is probably the chat history of anubis, a secret research room.  "Read the sixth item." Zhang Yang tried to say.

    "The review is completed." As the infection finished, a text document immediately appeared on Zhang Yang's screen.  Zhang Yang immediately came over curiously to check.

    At the top are some useless chats and some discussions about artificial intelligence programming. Zhang Yang is not interested in these. What he wants to know now is where the organization anubis is, and what kind of organization anubis is.  I don¡¯t know if there are any relevant records in this chat room.

    After flipping through a few pages, Zhang Yang didn't find what he needed. The beep of the bug-infected machine suddenly rang: "Would you like to record user habits and generate a relevant matching database?"

    After being stunned for a moment, Zhang Yang immediately understood what this meant. In fact, it is like a personalized theme for your personal computer. Everyone has their own usage habits, and this database should record user habits.  Anubis is really crazy. It even took these details into consideration. No wonder the entire system has not been completed for more than ten years.

    "Yes! Can you also change the voice? Is there a more humane one?" Zhang Yang is not anxious to look at this data. Now it is best to find out what the infected bug can do after it has completely mutated into a system.  important.

    "The data has been created, and the authority is the first core sequence. The sequence is generated. Please create a unique control authority password. It is detected that there is an existing core password. Do you want to change it?"

    "Don't change it." The core control password of the infected bug is a 32-digit password. If it gets longer, Zhang Yang may not remember it. More importantly, such a password alone cannot guarantee absolute security. However, Zhang Yang has no good solution for the time being.  We can only leave it like this for now.

    "Generation completed, would you like to perform the first self-test?" Then another prompt sounded, and Zhang Yang immediately understood that he should have triggered a set system startup process. Only by completely completing such settings,  I am afraid that the functions of the entire system can be fully utilized.

    "Yes." Zhang Yang nodded with curiosity on his face. Anubis was pretty good at it. Although Zhang Yang's infective insect mutated into what it is today and contributed a lot to it, it cannot be denied that without the half-finished Adam of Anubis, it wouldn't be possible.  It was only Zhang Yang who programmed Infection into what it is now, and I'm afraid it won't work for decades.

    There was no beep this time, but the sky-blue screen began to refresh data.  The result of the self-test was unexpectedly fast. It took less than a minute for the self-test to be completed. When the self-test was completed, the entire computer screen immediately turned bright red and the prompts were too full to fit on the screen.

    Looking at the scary drop-down menu next to it, Zhang Yang¡¯s head was full of black lines. He might not be able to finish it next year. Anubis is a group of perverts. You just write the system. Why do you make it so perfect?

    "The system security status is 0%. It is recommended that, first, increase the system hardware. The hardware required to fully utilize the system performance is roughly as follows: CPU" The mechanical prompt sounded immediately, and Zhang Yang's head was spinning.  Zhang Yang spoke quickly: "Skip all the prompts and list the highest level ones on the screen according to the alert level."

    There was a clear "ding" sound, the mechanical prompts suddenly stopped, and then several red warnings marked with nine stars appeared on the computer screen.  Zhang Yang looked at the top entry and found that the first sequence of passwords was too simple.  There are hundreds of small lists below the second article. In short, Zhang Yang's server is too rubbish and cannot fully utilize the system's functions. The following hardware needs to be added to fully utilize the system's functions.

    ??????? And it was very humane to even calculate the amount of money needed. Just looking at the 11-digit number, and the unit was still $ (US dollars), Zhang Yang rolled his eyes and simply chose to ignore it.  With a hardware investment of over 10 billion, I will sell Zhang Yang to see if it is enough.

    Time passed very quickly, and it was not until early in the morning that Zhang Yang¡¯s stomach began to growl, and he suddenly realized that he didn¡¯t seem to have eaten yet.  The ability of the infected bugs has been almost tested. In just one night, Zhang Yang was completely contaminated by the infected bugs. Oh, no, I can't say contaminated, I can only say that he was attracted by the infected bugs.

    Convenient, so damn convenient!  With such a system, all we can say is that if Zhang Yang wants to do something, he can just speak directly.?, what he said will be automatically converted into commands, and then the computer will automatically execute them. There is no need to show off and execute them by hand.  Moreover, you don¡¯t have to worry about command errors like those on smartphones. This fuzzy search function written by anubis is very powerful!

    More importantly, you have to use your hardware resources, and you don¡¯t have to worry about the waste of hardware resources. This system can maximize the optimization of system resources to achieve optimal use, and when analyzing something, you no longer need to do it.  Just wait for the results.

    The only drawback is that when you give commands, you must learn to use programmed language to give commands like a program.  For example, you ask him to call the qq program.  You can't tell me to open qq. The system still can't understand such humanized language. You have to say, run the qq program.  In this way, the system can understand what you mean.

    And there is another problem. Although it is a smart program, its core settings are all in English. If it is converted into Chinese, a lot of code will have to be rewritten.  Fortunately, Zhang Yang's internal settings page for the infected bugs was originally set to Chinese, so when the infected bugs mutated, they were automatically translated into English.  That's why it "speaks" Chinese.

    There are errors in the automatic translation. In many places, Zhang Yang needs to use his authority to correct them one by one and let the infected bugs rewrite the system database.  However, what makes Zhang Yang happy is that the original virus function of the infected bug has not disappeared. It is now like the queen in the ant network, and the small viruses placed are small ants, which can contact and control all copied viruses.

    The only pity is that the future is beautiful, but the reality is cruel.  The server in Zhang Yang's dormitory seems very powerful to ordinary people, but the result of running this system is that it cannot run for a long time at all, and the system cannot be searched online. Otherwise, the CPU computing speed will be instantly overclocked, and the entire server will directly  burn.

    In other words, Zhang Yang now has a gadget that can chat with him mechanically. Apart from that there is no benefit at all. More importantly, even if the system is not running, it still takes up system resources.  If Zhang Yang uses the system by himself now, it will be even slower than before. All in all, this seemingly awesome system is useless to Zhang Yang in just four words it's useless.

    "Okay Since it's satisfactory to me, anubis, I don't blame you for causing the performance of my computer to drop." Zhang Yang said helplessly, but if anyone else saw that expression  , no matter how you look at it, you look like you don¡¯t deserve a beating.

    Use your laptop to open the Black Alliance Forum. Zhang Yang has been testing the system all night and has not paid attention to what is going on online. Now he goes to the forum to see if there is any latest news.  After opening the Black Alliance Forum, the highlighted post at the top is the conversation between thanatos and gscsd, and there are countless speculations below.

    At first, Zhang Yang felt it was very interesting when he saw thanatos scolding him, but now Zhang Yang felt happy when he saw it. The more he looked at thanatos' words, the happier Zhang Yang felt.
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report