Super-brain hacker

Chapter 246 Worm

On the fifth day after the summer vacation, Lin Hong officially moved out of Arthur's house.

He simply didn't even rent another house and lived in Mrs. Rama's house.

These days, in addition to cooperating with Mrs. Rama to do some simple tests, he spends most of his time in the mit library.

He made a detailed schedule for himself and arranged his time slowly.

He has already decided that the task in the summer vacation is to read crazily.

His field is not limited to electronics and computers, but also includes social sciences and psychology. After meeting Heidi Rama, he added physics, biology and philosophy.

Mrs. Rama has designed a lot of small experiments for him these days.

For example, there is a meditation experiment to measure the strength of the "Tesla wave" emitted by Lin Hong's brain.

According to Tesla's theory, the human brain will emit a very special wave, which is similar to electromagnetic waves but completely different.

According to Maxwell's electromagnetic equation, an electromagnetic wave is a transverse wave that vibrates up and down.

In addition to transverse waves, there is also a longitudinal wave in nature. The direction of vibration is the same as the direction of propagation, and the most common are sound waves and seismic waves.

Tesla believes that the wave emitted by the human brain is also a special longitudinal wave, the frequency of which can be controlled by the brain to achieve different energy transmission. Heidi Rama calls this wave "Tesla wave".

Like sound wave resonance, Tesla waves also have resonance phenomena.

Once the Tesla wave resonates with the Etheta medium, it can act on the ghost field and even manipulate the energy inside to achieve its own purpose.

It is said that Tesla has successfully found a way to generate such waves using electronics and mechanical devices, thus generating a very mysterious power.

This was one day in 1903, when Tesla tested his wireless energy transmitter at full capacity.

The experiment was carried out at midnight. That night, New Yorkers witnessed countless dazzling electric current beams that lasted hundreds of miles connecting the launch tower with the sky, creating dazzling scenery in the sky.

What exactly have you seen, but it is no longer known. All the information has been hidden and eliminated by someone with intention.

Heidi Rama wanted to repeat Tesla's experiment, but her research on electronic technology was not deep enough. She had always wanted to reinvent such a device before, but it failed.

This time, she decided to step back and not to use artificial devices, but to let mentally strong people test.

This experiment is divided into two stages.

In the first stage, she let Lin Hong sit in the middle of the even magnetic field, and then gradually meditate according to the set of methods she invented to train Lin Hong's control of the "Tesla wave" frequency.

After Lin Hong is more proficient in this aspect, he will carry out the second stage of the experiment, which is to use the resonance and superposition of longitudinal waves to influence and manipulate external objects.

Of course, this experiment is not easy.

Experiments show that Lin Hong's brain can indeed produce Tesla waves, which was measured by Heidi using a modified seismic wave measurement device.

However, it is very difficult to control the frequency of Tesla waves. The experiment is stuck in this step and has not been able to break through.

In the evening, Lin Hong spends most of his time programming or surfing on the Internet.

After moving out of Arthur's house, he immediately went to the computer store to buy an ibm laptop computer, and then installed the Linux that he had improved and optimized.

He is now completely out of the minix platform, and all work can be done under Linux.

The configuration of the notebook is not as good as the desktop, but it is light and easy to carry.

In addition, Lin Hong has specially optimized the hardware of the notebook, and the running speed is also very fast, which is much more efficient than the popular Microsoft and Apple operating systems on the market.

Under the influence of Heidi Rama, Lin Hong became very interested in Nicholas Tesla, and his curiosity and admiration for Tesla even exceeded Leonardo da Vinci.

After thinking about it over and over again, Lin Hong decided to do one thing - to write his first worm.

Lin Hong now has a deeper understanding of the virus.

Since he used the computer, he has encountered many poisoning incidents.

Of course, that was when he was a novice.

Later, because he used minix and linux, which were not compatible with other computers, he was rarely poisoned.

In fact, Lin Hong has been paying attention to the virus.

Strictly speaking, this is a special computer program code.

What Lin Hong found interesting is that this kind of code can be self-replicated, just like biological cells.

Self-replication and propagation are the characteristics of organisms, but now they appear in computers.

It seems that there has never been such an example in history.

Since Lin Hong was poisoned for the first time, he has begun to pay attention to this aspect intentionally or unintentionally.

In particular, the last April Fool's Day music virus actually hit other members of the Sam Association, which had a great impact on Lin Hong.

From then on, he decided to delve into this technology, which is inherently a little evil.

In fact, the virus was not originally used for destruction, but a game called "Core War" written by three young engineers in Bell Labs.

The game itself is written to imitate nature. The two sides play against each other. At the beginning, there is only one point, and then devour and copy Zhou Wei's things. Whoever devours all the resources, including the opponent, will win.

Later, after the continuous optimization and expansion of computer engineers, the technology of computer viruses was completely opened.

Hackers like this kind of thing because it can better reflect their own technology and is more interesting.

Write a virus, just like creating a new species, giving them a sense of accomplishment as a creator.

In computer viruses, there is a special virus called a worm.

The difference between a worm and an ordinary virus is that it has network characteristics and can spread autonomously on the network. Moreover, worms can exist independently without being attached to other programs or manually executed by others. These things can be done by itself.

Compared with ordinary viruses, worms are closer to an organic organism.

The original worm was an auxiliary tool invented by computer engineers to reduce their workload. The purpose is that when the network is idle, the program "wanders" between computers without causing any damage. When the machine is overloaded, the program can "borrow resources" from the idle computer to achieve the load balancing of the network.

However, in 1988, this situation changed.

At Cornell University in Mei, there is a first-year graduate student named Robert Morris. In order to verify whether computer programs can self-replicate and spread between different computers, he wrote an experimental program.

In order for the program to successfully enter another computer, he wrote a piece of code to crack the user's password.

At 5 a.m. on November 2, 1988, this program called "(worm) began its journey. It really lived up to Morris's expectations: it climbed into thousands of computers, crashed them, and caused economic losses of up to $96 million.

Two years later, Morris was sentenced to three years' probation by New York local law for making "Morris" worms, fined $10,000, and obliged to serve the new district for 400 hours.

The Morris incident shocked American society and the whole world.

What has a greater and deeper impact than the event is that hackers have really become black, hacker ethics have lost their constraints, and the hacker tradition has begun to be interrupted. Moreover, computer viruses have officially appeared on the historical stage of computers.

Lin Hong read this story in a computer magazine.

This story gave him an inspiration to solve something he has been thinking about for the past few days.

Because the information about Tesla was basically sealed by the Mei government, Lin Hong decided to collect this information through hacking technology.

He believes that with the popularity of computers, there must be detailed files about Tesla in the hard disk of a government agency's computer.

However, there is nothing he can do about the specific computer.

There are so many computers on the network that he can't invade one by one.

And the "Morris Worm" gave him an inspiration - he decided to also write a "Tesla Worm" to collect information about him.

Lin Hong learned from Kevin that most of the computer systems used by Mei's government intelligence agencies or the military are vax/vms series. Therefore, he decided to write a worm only for the vax/vms platform, which will have less impact on the mass society.

Lin Hong carefully analyzed the Morris worm and felt that there were many things that could be improved.

For example, Morris worms can cause computer failures, but Lin Hong is unwilling to attract the attention of others.

His purpose is only to collect information, of course, to "secretly into the village, don't shoot". Therefore, he has to make the worm exclusive on the same computer, that is to say, when there is a worm on the computer, there is no need to continue to copy itself, otherwise it may take up too many resources and affect the normal work of the computer.

Secondly, because it is a collection of information, the content found must be sent out.

The most common way is naturally to use email.

But this method is easy to be traced. Once it is traced to the email server, it is easy to find the real purpose of the worm.

And Lin Hong collects Tesla's information and hopes to keep it confidential and not attract the attention of others.

Therefore, he decided to combine the worm with the bit messenger. Once the information is found, it will be transmitted to another client running online through the bit messenger, so that even if others find the existence of the worm, they will not be able to trace the whereing and content of the specific information.