Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Romance -> Super brain hacker

Volume 2: The Holy Land of Hackers Chapter 693: Meeting the Opponent

Previous page        Return to Catalog        Next page

    While Lin Hong was reading the network security analysis report, he received a call in his head from Xia Tian.

    "Mr. Lin, the server at our company headquarters is infected with the Grady virus!"

    Lin Hong couldn't help but frowned when he heard this: "Are you sure?"

    At this time, the Super Brain system received the virus sample code sent by Xia Tian.

    Xia Tian said: "According to the code analysis, it is undoubtedly the Grady virus!"

    Lin Hong didn't check the decompiled code of the virus sample. It wasn't that he didn't believe Xia Tian just now, he just felt a little surprised.

    All operating systems within Sansehuo Company use linx and have been specially customized. Even if someone specially writes a virus for the linx system, it is just a dream to run it within Sansehuo Company, because they  A very strict permission control mechanism has been added to the internal system. Without corresponding permissions, other external programs cannot run at all.

    ? Could it be said that the other party has broken through the internal permission control mechanism of linx?

    They have not opened this mechanism to the outside world, and its source code is kept confidential.  Unless someone leaks this part of the source code, the probability of this happening is very low, unless the other party is indeed a top expert.

    Of course, Lin Hong was not so confident that no one could break through the security defense of Sansehuo Company. He was just surprised, especially when the other party did not trigger the security alarm set by Lin Hong at all.

    Lin Hong asked: "What's the situation at Yangqifeng Base? I didn't receive an intrusion alert here."

    "I checked and there is nothing wrong with the base."

    Hearing the news, Lin Hong felt a little relieved.  Although there is not much confidential content in the server, if some information is leaked, it will still cause a certain impact and loss. At least it will let others know some important internal situations of Sansehuo Company.

    "This virus is so difficult to deal with. A few of us have been together for several hours without any clue"

    Xia Tian was also embarrassed to trouble Lin Hong with everything and asked him to come forward to solve it.

    This feeling is like a child crying to his parents when he encounters a problem.

    But the stakes were so high that they found there was nothing they could do.  We can only inform Lin Hong.

    After ending the call, Lin Hong immediately started studying the source code of the Grady virus.

    The current source code is definitely not the original code, but has become a binary. If you want to analyze it, you must decompile it and restore it from binary to assembly form, so that the human brain can understand it easily.

    Lin Hong processed it initially and decompiled it directly in his mind.  There are nearly tens of thousands of assembly codes that appear on the retina screen.

    Of course, there is likely to be a lot of waste code, and the specific breakpoints must be determined according to the actual situation, and then disassembled in a targeted manner.

    Looking at it, Lin Hong felt that it looked familiar.

    Before he could recover, he suddenly received a warning that a key node of the Bitcoin network in Switzerland had been invaded.

    These key nodes are actually servers that Bitcoin enthusiasts voluntarily contribute to the development of Bitcoin, specifically used to accelerate Bitcoin payment transaction confirmation.

    There are many such key nodes all over the world, and other Bitcoin supporters usually use donations to support these server contributors.

    Lin Hong deployed intrusion detection mechanisms in some key servers.  Once an abnormality occurs, it will be triggered and he will know immediately.

    Lin Hong originally didn¡¯t want to pay attention to this signal.  But what surprised him was that the opponent easily broke through the first line of defense, and then destroyed the enemy and completed the occupation of the server in an instant.

    This phenomenon made Lin Hong's heart move.

    "What's going on? Why do all the masters seem to appear suddenly?"

    Connected to the virtual terminal of that server through the Bit Messenger proxy network.

    Lin Hong's appearance obviously immediately aroused the other party's awareness, and all operations stopped immediately, as if he was burglarizing a house and suddenly encountered the owner returning home, and was so frightened that he did not dare to move.

    Lin Hong directly uses SiSense to input commands.  It was many times faster than manual input. He wanted to check who the other party was.

    While Lin Hong was making quick inquiries, the other party just woke up from a dream and started to take action.  The purpose is to prevent Lin Hong from discovering useful information and traces.

    All this time, the invasion and anti-intrusion process that Lin Hong encountered was actually extremely difficult.?It's boring. Basically, after just a few instructions, the outcome is already decided.

    But this time it¡¯s different.

    Lin Hong used his super brain and his super mental ability to fight evenly with his opponent.

    Invasion and counter-invasion between the two parties.  Tracking and counter-tracking, fighting and counter-fighting, the competition actually gave off the smell of gunpowder.

    interesting!

    Lin Hong became more courageous as he fought.

    On the Internet, he has never encountered such a situation.

    When his skills were very poor, he had no chance to compete with masters. But as his skills grew, he left others far behind.

    I have never been able to encounter a rather opponent with a lot of power.

    Lin Hong completely let go of his hands and feet and concentrated all his attention on this battle that was thousands of miles away.

    "I have to admit that the other party's skills are extremely superb. If he follows the tactics of seeing each other's tricks, Lin Hong will not be able to do anything to the other party.

    However, after this continued for a period of time, Lin Hong's mind was divided into two, one part was used to defend against the opponent's invasion, and the other part was quietly outflanking from another angle.

    When Lin Hong was about to discover the truth hidden behind the other party, he was suddenly stunned:

    ¡°Grady Worm?!¡±

    He never expected that the opponent he had just fought with for such a long time was actually the Grady Worm!

    How can this be?

    Judging from the previous attack and defense methods, the opponent is undoubtedly an experienced and highly skilled top hacker.

    Lin Hong checked it again reluctantly, and it was obvious that he was not mistaken.

    Could it be that

    Lin Hong had an idea in his mind that he couldn't even accept - could it have produced intelligence?

    The other party obviously noticed Lin Hong¡¯s investigation from the side, and immediately stopped fighting and exited the server.

    Lin Hong followed him all the way and finally lost the other party's whereabouts on a computer in the United States.

    However, this tracking made him further confirm that the other party was indeed the Grady worm!

    Regarding this situation, Lin Hong was filled with questions.

    How could such a thing appear?

    Who does it belong to?  Which institution?  Which force?

    Lin Hong is actually quite happy about this situation. After all, its emergence means that artificial intelligence research is likely to achieve a qualitative breakthrough.

    This is definitely an event that can shock the world. If it can be used well, human society may immediately undergo extremely huge changes.

    The field of artificial intelligence has always been an area that Lin Hong wants to study in depth. He has basically understood the existing theories. Learning and reading materials have always been his strengths, and it does not take much time.

    ¡°But in his opinion, existing artificial intelligence theories have flaws. If artificial intelligence life could be created, it would have been created long ago.

    This is also the reason why he has never really calmed down to conduct research. After all, he has too many things to do, and there are too many puzzles waiting for him to solve.

    According to his judgment, it will take at least ten or twenty years to develop artificial intelligence life with independent intelligence.

    But he never thought that he would meet one today, and he seemed to be very intelligent.

    Of course, while he was happy, he also felt that the situation was very serious.

    Because he didn¡¯t know who the ¡°person¡± was who created this artificial intelligence and what kind of impact it would have on Sansehuo Company.

    Lin Hong no longer cared about whether Grady had invaded Bitcoin network nodes elsewhere in the world, but immediately began to analyze its source code.

    There are so many variations of Grady, and basically every sample has a different code.

    But Lin Hong is not worried. Many codes are always confusing, and the core code will definitely not change.

    He collected dozens of Grady virus sample codes from all over the world, then decompiled and disassembled them all for reading.

    This process takes full advantage of his ability to multi-task.

    The retina screen has now been cut into eight areas, each area is a small display screen.

    ?The four blocks in the upper area are constantly brushing the disassembled code upwards.

    When encountering a key code segment, stop immediately and respond accordingly.??The lower window will start to set breakpoints and re-decompile, and then update to the upper window in real time.

    Soon, Lin Hong found similar core code among the dazzling codes.

    He gathered these similar codes together for comparative analysis. The more he analyzed them to the end, the weirder the expression on his face became.

    "Why do these codes look so familiar?"

    Lin Hong looked at these codes and couldn't help but feel a little dazed.

    Some of the code was familiar to him - it was the key code segment he used in the super worm.

    Everyone has his own coding style, just like a writer has his own style of writing and a composer has his own style of music.

    Lin Hong also has his own coding style. Especially when implementing core functions, he will subconsciously use the method he is most familiar with when writing code.

    The last time he upgraded Super Worm, Lin Hong deliberately avoided this aspect and used a completely different style to write the new Super Worm core, which was completely different from the previously written Bit Messenger and Bit Messenger.  Coin and other software.

    It was precisely because of this that he was sure that this piece of code in Grady's code was definitely written by himself.

    How is this going?

    Is Grady the super worm?

    Or did it evolve after swallowing the super worm?  (To be continued)

    {Piaotia Literature www.piaotia.com thanks all book friends for their support, your support is our greatest motivation}
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report