Chapter 693 Chess Meets Opponents
While Lin Hong was reading other network security analysis reports, he received a phone call from the summer.
"Mr. Lin, the server at our company's headquarters is poisoned. It's the Grady virus!"
Lin Hong couldn't help frowning when he heard the words: "Are you sure?"
At this time, the superbrain system received the virus sample code sent by summer.
Summer said, "According to the code analysis, there is no doubt that it is the Grady virus!"
Lin Hong didn't check the decompilation code of the virus sample. It's not that he didn't believe summer just now, but he felt a little surprised.
The internal H of the three-color fire company has an operating system, which uses LINX, and has been specially customized. Even if someone has specially written a virus for the LINX system, it is just a dream to operate within the three-color fire company, because they have added very strict powers to the internal system. The limited control mechanism has no corresponding permissions, and other external programs cannot be run at all.
Does it mean that the other party has broken through the authority control mechanism within LINX?
This mechanism is not released to the outside world, and its source code is confidential. Unless someone leaks this part of the source code, the probability of this happening is very low, unless the other party is indeed a top master.
Of course, Lin Hongye is not so confident that no one can break through the security line of the tricolor fire company. He is just surprised, especially that the other party did not trigger the security alarm set by Lin Hong at all.
Lin Hong asked, "What's the situation at the Yangqifeng base? I didn't receive the intrusion alert on my side.
"I have checked that there is no problem with the six on the other side of the base."
Hearing the news, Lin Hong was a little relieved. Although there is not much confidential content in the server, some information will be leaked. After all, it will still cause some impact and losses, at least let others know some important information within the Tricolor Fire Company.
"This virus is so difficult to deal with. We have been together for hours without a clue"
In summer, I'm embarrassed to bother Lin Hong for everything and ask him to come forward to solve it.
This feeling is like a child crying and looking for his parents when he encounters a problem.
But it was a big deal. They found that there was nothing they could do, so they had to inform Lin Hong.
At the end of the call, Lin Hong immediately began to study the source code of the Grady virus.
The current source code is definitely not the initial code, but has become binary. If you want to analyze it, you must decompile it and restore it from binary to assembly form, so that the human brain can understand.
Lin Hong initially processed it and decompiled it directly in his mind. There were nearly tens of thousands of assembly codes that appeared on the Retina screen.
Of course, there is likely to be a lot of waste code, and it has to be broken according to the actual situation, and then disassembled in a targeted way.
Looking at it, Lin Hong felt a little familiar.
Before he recovered, he suddenly received a warning that the key nodes of the Bitcoin network in Switzerland had been invaded.
These key nodes are actually servers that Bitcoin enthusiasts voluntarily contribute to the development of Bitcoin, which are specially designed to accelerate the confirmation of Bitcoin payment transactions.
There are many key nodes around the world, and other Bitcoin supporters usually use donations to support these server contributors.
Lin Hong has deployed an intrusion detection mechanism in some key servers. Once there is an abnormal situation, it will be triggered, and he can know it immediately.
Lin Hong didn't want to pay attention to this signal, but to his surprise, the other party easily broke through the first line of defense and then destroyed it, and completed the occupation of the server in an instant.
This phenomenon made Lin Hong's heart move.
"What's going on? Why does it seem that all the masters suddenly appeared?
The virtual terminal of the server is connected through the bit messenger proxy network.
Lin Hong's appearance obviously immediately aroused the other party's awareness, and all the operations stopped immediately, as if he was burglary. Suddenly, he met his master and went home, and he was too scared to move.
Lin Hong directly uses the sense input command, which is many times faster than manual input. He wants to check who the other party is.
When Lin Hong was quickly inquiring, the other party woke up from a dream and began to act in order to prevent Lin Hong from finding useful information and traces.
The invasion and anti-invasion process that Lin Hong has encountered for a long time is actually extremely boring. Basically, the outcome has been determined by a few instructions.
But it's different this time.
Lin Hong used his super brain and his super sense of thought, and unexpectedly fought with the other party.
Invasion and anti-invasion between the two sides, tracking and anti-stalking, competition and anti-competition, unexpectedly showed the smell of gunpowder smoke.
Interesting!
Lin Hong became more and more brave in the war.
On the Internet, he has never encountered such a situation.
When he was very skilled, he had no chance to meet a master at all, and when his technology grew up, he left others far behind.
I have never been able to meet a comparable opponent like this.
Lin Hong completely let go of his hands and feet and concentrated all his mind to deal with this battle thousands of miles away.
I have to admit that the other party's skills are superb. If you follow the way of seeing the move, Lin Hong can't help the other party at all.
However, after this lasted for a period of time, Lin Hong's mind was divided into two, part of which was used to defend against the invasion of the other party, and the other part quietly enveloped it from another angle.
When Lin Hong was about to find out the truth hidden behind the other party, he was stunned: "Grady worm?!"
He never thought that the opponent who had just fought with him for so long would be the Grady worm!
How is this possible?
Judging from the previous attack and defense methods, the other party is undoubtedly an experienced and highly skilled top hacker.
Lin Hong was a little reluctant to check it again. Obviously, he was not mistaken.
Is it...
Lin Hong had an idea in his mind that made him a little unacceptable. Did it generate intelligence?
The other party obviously found Lin Hong's exploration from the side, immediately stopped fighting and exited the server.
Lin Hong followed him all the way and eventually lost his whereabouts in a computer in the United States.
However, in this way of tracking, he further confirmed that the other party was indeed a Grady worm!
For this situation, Lin Hong is full of questions.
How did such a thing happen?
Who does it belong to? Which institution? Which force?
Lin Hong is actually happy about this situation. After all, its emergence means that artificial intelligence research is likely to have achieved a qualitative breakthrough.
This is definitely an event that can shock the world. If it can be used well, human society may immediately produce tremendous changes.
The field of artificial intelligence has always been the field that Lin Hong wants to study in depth. He has basically understood the existing theories. Learning and reading materials have always been his strengths. It doesn't take much time. However, in his opinion, the existing artificial intelligence theory is flawed. If he can create artificial intelligence. If life can come, it has come out long ago.
This is also the reason why he has not really calmed down to carry out research. After all, he has too many things to do, and too many puzzles are waiting for him to solve.
According to his judgment, it will take at least more than ten or twenty years to develop an artificial intelligence life with independent intelligence.
But he never thought that today he met one and seemed to be very intelligent.
Of course, while he is happy, he feels that the form is very serious.
Because he doesn't know who the "person" who created this artificial intelligence is and what kind of impact it will have on the tricolor fire company.
Lin Hong no longer cares whether Grady has invaded the Bitcoin network nodes in other parts of the world, but immediately began to analyze its source code.
There are too many variants of Grady, and the code of each sample is basically different.
But Lin Hong is not worried. Many codes are always confusing, and the most core code will definitely not change.
He collected dozens of sample code of Grady virus from all over the world, and then decompiled and disassembled them for reading.
This process makes full use of his multi-purpose ability.
The Retina screen has been cut into eight areas at this moment, each of which is a small display screen.
The four blocks in the upper area are constantly brushing up the disassembled code.
Whenencounters a key code segment, it will stop immediately, and the corresponding window below will start to decompile the breakpoint again, and then update to the above window in real time.
Soon, Lin Hong found a similar core code from the dazzling code.
He gathered these similar codes into a comparative analysis, and the more he analyzed to the end, the more strange the expression on his face became.
"How can these codes be so familiar?"
Lin Hong looked at these codes and couldn't help but be a little stunned.
There are some of the code that he is most familiar with. It is the key code segment he uses in the super worm. Everyone has their own coding style, just like a writer has his own style of writing and a composer has his own style of music.
Lin Hong also has his own coding style, especially when implementing the core functions, he will subconsciously use his most familiar way to write code.
The last time he upgraded the super worm, Lin Hong deliberately avoided this aspect and used another very different style to write a new super worm core, which is completely different from the previously written software such as Bit messenger and Bitcoin.
That's why he was sure that the code in Grady's code was definitely made by himself.
What's going on? Is Grady a super worm?
Or did it devoured the super worm and evolved? To be continued