Reduce automatic subscription volume, ask for automatic subscription
Since the first Internet virus was created, viruses on the Internet have emerged in endlessly. Just like disease viruses in reality, software viruses have attracted everyone's attention to the "health" (security) of computer data, and some anti-virus software companies have gradually been established. , they launch specialized security software to help customers protect their systems from virus intrusion and damage.
The battle between virus writers and anti-virus software is like a replica of the battle between viruses and therapeutic drugs in nature. You come and go, winning or losing is only temporary, and no one side has ever gained an absolute advantage.
War is the biggest source of driving force to promote technology.
In computers and the Internet, the war between viruses and anti-software is going on every moment, which has also led to the rapid improvement of related technologies and even indirectly promoted the upgrade process of operating systems.
After two or three years of rapid development, computer viruses have evolved from boot sector viruses, to file viruses, to complex worm viruses and other stages.
Its infection mode and transmission method have made great progress compared with before, and of course it is more complicated to write than before.
But basically, the Internet can still operate normally. Most anti-virus software can detect and kill most virus programs. Even if new viruses appear, they can be researched and upgraded in a short period of time, and special anti-virus programs can be launched. \\Initial release 13800100yd First release\\
However, there are no absolutes in this world. This is the case with the mysterious virus called "Grady" that suddenly appeared on the Internet.
"Grady" in English is greedy, which means greedy, because this virus is like a very delicious creature. No matter what data is on the Internet, as long as it is infected by it, it will "eat" it completely. Make it a part of yourself.
Security experts named it the "Grady" virus based on this characteristic.
Speaking of which, the "Grady" virus appeared on the Internet. It's been at least a week, and it didn't appear to be destructive at first, but some security research agencies noticed the shadow of this worm. And began to conduct targeted follow-up research on it.
However, before security experts could produce any results, the Grady virus began to show its true "greed".
Due to its powerful replication characteristics, it has caused serious data congestion in the network and consumed a large portion of bandwidth and resources.
News reports continue to show that many software giants have also been affected, including Microsoft, Apple, IBM and other well-known giants, as well as other well-known anti-virus software and other security companies.
Security experts around the world are studying this new virus. It can be said that this virus has completely absorbed all the advantages of previous viruses. It has various transmission methods, high concealment, and strong camouflage ability, which cannot be discovered by non-professionals.
The most troublesome thing for security personnel is that it has extremely high deformation ability. The previous traditional methods used to identify viruses, such as signature recognition, fixed action recognition, etc., can no longer be used directly. Grady has a very strong disguise ability and can disguise itself as very similar to ordinary programs.
¡°The virus is coming!¡±
¡°The Greedy Virus Grady has swept the world!¡±
¡°Security experts say the type of Grady virus is unprecedented.¡±
¡¡
"The New York Times" in the United States, "The Times" in London, "Liberty" in France, "Mirror" in Germany and other mainstream newspapers in the world have all conducted extensive follow-up reports on this.
Immediately afterwards, the "Wall Street Journal" also released news, saying that the super virus attacked Wall Street securities, futures and other financial exchanges. Computer data was almost completely destroyed, and Wall Street eventually had to close the market.
There is internal news that the losses caused this time will be immeasurable, and even the transaction data in the past ten days may not be able to be backed up.
¡¡
When this happened, Lin Hong was concentrating on treating Ah Huang. When he learned the news, the Grady virus was already raging around the world, and even China was not spared. More The company's website and servers were not functioning at all.
It seemed as if the entire Internet suffered a nuclear bomb attack overnight, almost pushing the entire Internet to the brink of collapse.
Lin Hong realized the seriousness of the problem, immediately put down what he was doing, and focused on the Internet.
In the end?What virus is so powerful?
Lin Hong couldn¡¯t help but feel a little curious, and at the same time, he was also a little excited.
Since the birth of his super brain system, many things on the Internet have seemed to him to be purely repetitive tasks, losing their original challenge.
For example, network intrusion and cracking seemed very fascinating and charming at first, but now looking back, they suddenly feel boring.
"It's like there is a building here. You sneak over and kick in the doors one by one, only to find a certain door that is not locked - it is very boring.
Therefore, since Lin Hong had the super brain system, he rarely did things like intrusion. Many times, if he wanted to achieve certain goals, he would write some automated programs and let the programs complete it.
He feels that the fun of programming lies in creation and construction.
To realize the fantastic ideas through programming and finally create something "beautiful" is what makes him happiest and gives him the most sense of accomplishment.
Starting from scratch - this is the essence of hacking.
Hackers are different. Hackers hardly create. They use existing technology and software to destroy and trample for their own purposes.
Thinking from this aspect, Lin Hong believes that hackers should not only be limited to the Internet field. It is a spirit and concept, and a way of thinking.
Painters, composers, sculptors, and writers can all be called "hackers", and they are all creating something "beautiful" from scratch. It is precisely because of them that human society can possess such colorful spiritual wealth, which is something that animals and plants simply cannot achieve.
Lin Hong was curious because he wanted to know which talented person had programmed such a powerful virus. His excitement was a subconscious feeling of "meeting an opponent".
Experts are lonely, Lin Hong feels this kind of loneliness now.
After quickly connecting to the network, Lin Hong quickly captured Grady virus samples spreading around the network.
However, he did not rush to analyze. Instead, he carefully read all the information released by other security agencies and learned about some of the characteristics of the Grady virus from its initial appearance to the present.
After putting this information together, Lin Hong couldn't help but have a very strange idea:
This Grady virus seems to be growing? (Welcome, your support is my biggest motivation.)
{Piaotia Literature www.piaotia.com thanks all book friends for their support, your support is our greatest motivation}